text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Access to classroom-ready datasets and powerful lesson creation features will empower teachers to build data literacy and bring authentic, engaging lessons to students.
(New York, NY - Nov 7, 2022) - In a world with a rapidly growing focus on data, it is
increasingly difficult to find datasets that are useful for teaching, learning, and assessment in K-12
education. Today Tuva is launching the Tuva Dataset Library - a curated library of instruction-ready datasets
related to a broad spectrum of topics and content areas.
The datasets come from publicly available local, national, and international agencies, museums, published researchers, and other reputable primary sources. They are curated by Tuva so that they are accessible to students and they inspire curiosity and fascination about a wide variety of dynamic phenomena, places, and processes.
"We believe that datasets of a surprising variety and from myriad sources hold stories within them that are of interest and importance to young people. Our work at Tuva is to give those stories life by making the data accessible and engaging in a way that inspires curiosity, exploration, and discovery by students." says Molly Schauffler, Tuva Science Consultant.
To ensure these datasets meet the instructional needs of their students, teachers can use the new "Activity Builder" feature on Tuva to easily create their own activities, quizzes, and other types of lessons. They can create short, open-ended activities that engage students to think, or more guided activities that engage students to use specific concepts and skills – whatever they deem their students need. Teacher-created activities will remain private to their classes unless they choose to share them broadly within the Tuva community.
Tuva envisions the Dataset LIbrary to be a lasting asset – a one-stop-shop where educators and their students can turn to quickly find and access datasets to enhance instruction and foster discovery. Whether it is data about census, climate, economics, physical forces, Earth systems, sports, living organisms, elections, or historic events, educators can rely on finding a wide variety of real-world data presented with classroom instruction in mind.
"As the world continues to change, data continues to change. Tuva is committed to long-term stewardship of our Dataset Library. We envision it as a dynamic asset, and will continue to find new datasets, archive data that become obsolete, and update current datasets as observations and experiments continue to emerge. We believe this library, along with the Tuva data, graphing, and statistical tools are hugely important to broadly catalyze data literacy and data science education and we look forward to supporting teachers, schools, and districts in this work" said Harshil Parikh, Co-Founder & CEO of Tuva.
The Tuva Dataset Library includes 250+ ready-to-use datasets, including 65 Spanish datasets that educators can begin using in their classrooms. Visit tuvalabs.com/datasets/ to get started today.
Tuva’s next generation data, graphing, and statistical tools and instructional program are bringing real-world and engaging math and science education to teachers and students globally. With over 100 million datasets, graphs, and charts uploaded and created, the Tuva tools have become the digital tools of choice for students to learn how to explore, visualize, and analyze data and learn important data literacy skills. Over 5 million teachers and students use the Tuva Content Library and Instructional Program to bring authentic, powerful learning in the classroom. Visit tuvalabs.com and get started today.
|
<urn:uuid:8951f282-d35d-46d7-86bc-988de64cbb7f>
|
CC-MAIN-2023-40
|
https://tuvalabs.com/press/tuva-announces-datasets-library-launch/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00030.warc.gz
|
en
| 0.937845 | 733 | 3.0625 | 3 |
here, we will learn about diffferent types of Adverb and their examples.
Adverb ( বিশেষণের বিশেষণ বা ক্রিয়ার বিশেষণ)
Definition of Adverb: an adverb usually modifies an adjective, another adverb or a verb. যে সকল শব্দ কোনো Adjective, অন্য আরেকটি Adverb বা Verb কে বিশেষিত করে তাকে Adverb বলে।
Ex: 1. He has done well in the exam.
Ex: 2. I know where he lives.
Ex: 3. The girl is walking slowly.
Ex: 4. Today, I am ill.
Ex: 5. As he is my best friend, I will help him anyway.
Ex: 6. Yes, you are absolutely right.
Ex: 7. No, I don’t know this person.
Ex: 8. I do not like you.
Ex: 9. Come here please.
Ex: 10. Don’t go there.
Ex: 11. She can sing very well.
Ex: 12. The boy is very good.
Note: 1. An adverb expresses time, place, quality, number, quantity, manner, degree, affirmation or negation, reason, frequency etc. মনে রাখতে হবে, Adverb সাধারণত দোষ, গুণ, সংখ্যা, পরিমাণ, তুলনা, ধরন বা রকম, সময়, স্থান, কারণ, হ্যাঁ কিংবা না ইত্যাদি প্রকাশ করে।
Kinds: Adverb is mainly classified in to following types. Adverb কে নিম্নের প্রকারভেদ অনুসারে ভাগ করা যেতে পারে।
[a] Simple Adverb: the words which normally modify adjective, verb and adverb itself are called simple adverb. যে সকল Adverbial শব্দ কোনো Adjective, Verb এবং Adverb কে বিশেষিত করে তাদেরকে Simple Adverb বলে।
Ex: 1. She decorated the room well.
Ex: 2. You did a great mistake.
Ex: 3. The boy can swim fast.
Ex: 4. I tried my best to solve this problem.
[b] Adverb of time: the words which express time or sequence are called adverb of time. যে সকল শব্দ সময় বা কাল প্রকাশ করে তাদেরকে Adverb of Time বলে।
Ex: 1. I will arrive at your home in the morning.
Ex: 2. Yesterday I was attacked by cold and fever.
Ex: 3. Then the thief entered in to my house.
More Example of time: Now, Yet, Today, Nowadays, Presently, Instantly, Immediately, Already, Just now, Lately, recently, Yesterday, Formerly, Anciently, Once, Since, Till now, Long ago, Tomorrow, Hereafter, Soon, Shortly, When, Then, First, Just, Before, After, While, Meanwhile, Till, Until, Seasonably, Early, Late, Whenever, Afterward, Afterwards, Always, Ever, Never, Eternally, Forever, Perpetually, continually, Endlessly, Evermore, Everlastingly.
[c] Adverb of place: the adverbs which express place are called adverb of place. যে সকল শব্দ স্থান বুঝাতে ব্যবহৃত হয় তাকে Adverb of Place বলে।
Ex: 1. They are playing in the field.
Ex: 2. I will meet you in Luxmipur.
Ex: 3. Tomorrow you must come here.
[d] Adverb of frequency: the words which express regularity, irregularity, repetition of an event or habit are called adverb of frequency. যেসকল শব্দ দ্বারা কোন ঘটনা নিয়মিত,অনিয়মিত এবং পুনঃপুনঃ ঘটা বুঝায় তাকে Adverb of Frequency বলে।
Ex: 1. Usually, I go to the market on holiday.
Ex: 2. The boy hardly comes here.
Ex: 3. Generally, children are fond of sweets.
More Example of time: Often, Again, Occasionally, Frequently, Sometimes, Seldom, Rarely, Daily, Weekly, Monthly, Yearly, Annually, Once, Twice, Thrice or Three times.
[e] Adverb of negation or affirmation: if an adverb refers to affirmative or negative, it is called adverb of negation. যে সকল শব্দ দ্বারা হ্যাঁ অথবা না বুঝানো হ`য় তাদেরকে Adverb of Negation বলে।
Ex: 1. No, I will not be your friend.
Ex: 2. Yes, come in.
Ex: 3. Okay, I will take care of this matter.
Example of affirmation or assent: Yes, Yea, Truly, Indeed, Surely, Certainly, Doubtless, Undoubtedly, Assuredly.
Example of negation: No, Nay, Not, No way, No how.
[f] Adverb of manner: when an adverb expresses how the thing is done called adverb of manner. কোনো কাজ কিভাবে সম্পাদিত হয় তা Adverb of Manner প্রকাশ করে।
Ex: 1. The boy is running quickly.
Ex: 2. The baby was crying loudly.
[g] Adverb of purpose: the words which express the purpose or target of an event is called adverb of purpose. যে সকল শব্দ দ্বারা কোনো উদ্দেশ্য বুঝায় তাকে Adverb of Purpose বলে।
Ex: 1. I am studying hard to get good marks.
Ex: 2. She is begging to live in this earth.
Ex: 3. I will go to the cinema for enjoying a movie.
[h] Interrogative adverb: the adverbs which are used for asking any question called interrogative adverb. যে সকল Adverb দ্বারা কোনো প্রশ্ন করা হয় তাকে Interrogative Adverb বলে।
Ex: 1. Where do you live?
Ex: 2. When is your birth day?
Ex: 3. How do you make this curry?
Ex: 4. Why did you ask me this question?
[i] Relative adverb: the adverbs which relate one idea or sentence with another idea or sentence are called relative adverb. যে সকল Adverb দুটি ধারণা বা বাক্যের মধ্যে সম্পর্ক স্থাপন করে তাদেরকে Relative Adverb বলে।
Ex: 1. I know where he lives.
Ex: 2. Do you know why he will not come today?
[j] Adverb of reason: the adverbs which modify a sentence or clause expressing their reason are called adverb of reason. যে সকল Adverb কোনো দুটি বাক্য বা বাক্যাংশকে বিশেষিত করে এবং তাদের কারণ প্রকাশ করে তাদেরকে Adverb of Reason বলে।
Ex: 1. He could not go to school because he is ill.
Ex: 2. As she studied hard, she stood first in the exam.
[k] Conjunctive Adverb :the conjunctive adverbs are those which perform the activity of Conjunctions. মনে রাখতে হবে, যেসকল শব্দ দুটি বাক্য বা বাক্যাংশের মাঝে সংযোগ স্থাপন করে তাদেরকে Conjunctive Adverb বলে ।
Ex: I will also help you in this regard.
Ex: I will wait here until he comes.
Ex: You cannot get admission unless you pass the test.
|
<urn:uuid:37a62a94-d178-4e41-a27f-e29b0193b289>
|
CC-MAIN-2020-29
|
http://grammarhelp.net/article?act=details&itemid=adverb-%E0%A6%AC%E0%A6%BF%E0%A6%B6%E0%A7%87%E0%A6%B7%E0%A6%A3%E0%A7%87%E0%A6%B0-%E0%A6%AC%E0%A6%BF%E0%A6%B6%E0%A7%87%E0%A6%B7%E0%A6%A3-%E0%A6%AC%E0%A6%BE-%E0%A6%95%E0%A7%8D%E0%A6%B0%E0%A6%BF%E0%A7%9F%E0%A6%BE%E0%A6%B0-%E0%A6%AC%E0%A6%BF%E0%A6%B6%E0%A7%87%E0%A6%B7%E0%A6%A3378369
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887046.62/warc/CC-MAIN-20200705055259-20200705085259-00410.warc.gz
|
en
| 0.65723 | 3,052 | 3.140625 | 3 |
Why would anyone, especially you want to encrypt your email?
According to Statista, 269 billion e-mails were sent out in 2017. That is about 737 million e-mails a day. Those are big numbers and according to Google’s transparency report, many e-mail providers do not encrypt e-mails in transit. So, while e-mails are extremely convenient for sending information and documents, from a security standpoint it is not the ideal method to send sensitive or confidential information.
That being said, the e-mail culture has been ingrained into our daily lives and to stop using it would akin to losing a limb (metaphorically of course!). This is where data encryption takes the stage. By encrypting your e-mail or documents before they are sent out, nobody other then the intended recipient would be able to access the contents.
Still unsure if you need encryption? Check out some of the reasons we came up with below:-
- Sending e-mails with private or confidential information (e.g. address, security number, bank account number)
- Ever sent an e-mail to the wrong person?
- If you work on unsecured networks (e.g. public WiFi or Hotspots)
- The possibility of the recipients e-mail account being compromised is a concern to you
- Local regulations require you to implement sufficient measures to protect against theft of data
What type of Encryption solutions are available?
A few different encryption solutions exist, each with their own benefits and issues.
- If you are are a fan of open source, then GNU Privacy Guard is worth checking out. Users can generate a encrypted digital signature as a form of verification that documents sent are from them and not from anyone else. More importantly GNUPG allows users to generate a private and public for e-mail encryption.For example, if Kai if wanted to send you an e-mail, he would use your public key to encrypt it and you would use your private key to unlock the contents. If you wanted to send Kai an e-mail, you would use his public key to encrypt the contents and he would use his private key to unlock it.As you can see, this method a type of asymmetric cryptosystem, allows users to securely exchange information through the use of keypairs and it is currently impossible to derive the private key from the public key which is shared. However the downside for this is speed. Having to manage a few public keys is relatively simple. However, imagine a scenario where you have to send hundreds of e-mails to hundreds of people using this method. Encrypting each e-mail with different public key can be a challenge.
- Another alternative is using a symmetric cryptosystem, which only requires one password to encrypt and decrypt a document. For example, if Kai wanted to send you a document, he would encrpyt it with the password “XXXXX”. For you to unlock that document, the same password “XXXXX” would be used. This method is significantly faster. However the challenge here is getting the password across without having it compromised during transmission.Some organisations also use a variation of this system. When sending personal information unique to a user, they encrypt the document with a password generated through a set of rules. For example, when a bank sends its credit statement, the system automatically creates a password that is based on the combination of your birthday digits and last few numbers of your mobile phone. This is a basic level of protection, as anyone who is able to obtain these details can easily unlock your documents.
- A third solution, is to use a secure e-email gateway for sending and receiving of e-mails. More details on this can be found in the next paragraph.
How can I implement E-mail Encryption in my organisation?
Prior to deciding on a solution, some of criteria of assessment would be “ease of use” and the level of security provided. In some cases, organisations have to trade off functionality for user intuitive interfaces and vice versa.
Deltagon’s Secure Gateway provides customers with a user friendly interface without compromise on functionality. Compatibility with various platforms and seamless integration with popular web clients ensures minimal disruption or change to your existing work style. With our powerful rule-based engine, administrators can be assured that sensitive e-mails are automatically encrypted and reach the intended recipients. Multiple levels of protection are offered and can be easily selected based on the level of security required.
One key advantage of using a secured gateway is that recipients do not need to install any software to communicate with you securely. Instead they can directly respond through the gateway; similar to popular e-mail clients. Hosting can be on-premise or on cloud and configured to integrate with existing security solutions.
To find out more about click here or contact us for a free demo.
|
<urn:uuid:4f53fd36-8cc6-4ed9-aa36-ff4c9418107e>
|
CC-MAIN-2020-16
|
https://www.ktss.asia/blog/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370515113.54/warc/CC-MAIN-20200403154746-20200403184746-00054.warc.gz
|
en
| 0.94022 | 1,000 | 2.703125 | 3 |
Q&A: Identical or Fraternal Twins?
Identical twins develop from the same fertilized egg and are essentially genetic copies of each other. Fraternal twins, on the other hand, develop from two separate fertilized eggs, and are no more genetically similar than any other set of siblings. Making this determination before the babies are born is not always easy.
A couple of findings on ultrasound can help. If a first trimester ultrasound between weeks 8 and 13 shows that the fetuses share one placenta(or are “monochorionic”), the fetuses are identical more than 99% of the time. However, if the fetuses have two separate placentas, they can still be identical. In this case, a second trimester ultra sound can help.
If the twins are different sexes (one boy, one girl), then they are fraternal. If they are the same sex (and have separate placentas), the determination can be made by genetic testing during pregnancy(either with amniocentesis or chorionic villus sampling) or by testing afterbirth.
|
<urn:uuid:71169ed6-84fd-4a20-af8e-1689b6398fb6>
|
CC-MAIN-2020-05
|
https://www.thebump.com/a/identical-or-fraternal-twins
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597230.18/warc/CC-MAIN-20200120023523-20200120051523-00307.warc.gz
|
en
| 0.917138 | 227 | 3.25 | 3 |
I. Evaluation and Management of Syncope: What every physician needs to know.
Syncope is a symptom not a diagnosis. Syncope is characterized by transient loss of consciousness (TLOC) due to a spontaneously self-limited (usually at most a minute or two) period of cerebral hypoperfusion.
The term “presyncope” is best used to depict a period of time just prior to syncope in which the patient may report any of a variety of warning or prodromal symptoms or signs (e.g., light-headedness, visual “gray-out,” palpitations, and nausea.). “Near-syncope” is a term that reflects symptoms that seem to be leading to a full syncope event, but the latter does not materialize.
Thus, “near syncope” is best used when the symptomatic episode is limited to the occurrence of only prodromal symptoms without actually subsequent loss of consciousness. Research suggests that the basis for near-syncope in a given individual may not be the same as the cause of true syncope in the same person. Consequently, near-syncope should not be used as a surrogate for syncope when diagnostic testing is undertaken.
The term “syncope” is often used by physicians both in casual conversation, as well as during documentation of the patient’s history when an individual presents after having recovered from an apparent temporary loss of consciousness. However, such usage is both incorrect and the source of much wasted diagnostic effort and expense. TLOC is a more precise initial descriptor and should be employed.
In essence, even though a patient might ultimately be considered to have suffered a true syncopal episode, the initial presentation should not be automatically considered to have been ‘syncope’. The patient usually has come with complaints such as having experienced a ‘blackout’ or ‘collapse’. It is the physician’s responsibility to determine whether the episode was indeed a ‘syncope spell’ or some other cause of real or apparent TLOC. Thus, in every case, the evaluation begins with TLOC, and only later (usually after a careful history has been obtained), if warranted, is it appropriate to shift the focus to syncope.
Once it is concluded that the presenting symptom was syncope, the next steps are:
1. Assessing the likely cause
2. Advising the patient regarding prognosis both in terms of recurrence risk, and mortality, and
3. Initiating a treatment strategy
The last two of these steps is critically dependent on the first being correct, and on whether the patient has any evidence of underlying cardiovascular disease.
Syncope has many causes. However, in the vast majority of cases the basis for cerebral hypoperfusion is a self-limited period of systemic hypotension (acute severe transient hypoxemia, as in airliner decompression, is certainly an alternative possibility but is very rare). Consequently, subsequent investigation of syncope focuses on those etiologies that could trigger a transient drop in blood pressure.
The principal considerations are summarized below. However, in many cases, “syncope-mimics” also enter the diagnostic equation (e.g., psychogenic pseudo-syncope [conversion reactions], narcolepsy, malingering), and these can prove to be challenging for physicians to deal with.
The principal conditions that cause syncope due to transient global cerebral hypoperfusion may be classified as follows:
A. Reflex (Neurally-mediated reflex) syncope
Vasovagal (or “common”) faint in which the triggering of an as yet inadequately understood neural-reflex leads to inappropriate vaso/veno dilation with either severe bradycardia or at least insufficient heart rate compensation (Figure 1); the result is cerebral hypoperfusion and loss of consciousness, often accompanied by premonitory symptoms such as feeling hot or cold, palpitations, and nausea.
The triggers for the initial sympathetic activation, which in turn is responsible for reflex parasympathetic activation, may be emotional distress, medical instrumentation, fear, and in some cases prolonged orthostatic stress.
Situational faints are similar in nature to vasovagal syncope, but the triggers are more readily identifiable. Typical triggers in susceptible individuals include severe cough, defecation, micturition, visceral pain, and postexercise or postprandial situations.
Carotid sinus syncope is usually associated with demonstrable carotid sinus hypersensitivity (i.e., abnormal response to carotid sinus massage). This condition tends to be restricted to older patients and often those with atherosclerotic vascular disease.
It is now considered an important cause of otherwise unexplained falls in older individuals. The diagnosis is best made if the history suggests that the collapse was associated with neck movement, although such an association is uncommon.
The finding of loss of consciousness during carotid sinus massage (CSM) due to marked bradycardia and/or as a result of vasodepressor hypotension (best demonstrated during CSM with the patient studied on a tilt-table in the head-up position) may also be considered diagnostic if no other causes can be identified.
B. Orthostatic hypotension (OH)
Immediate (initial) OH refers to the abrupt drop in blood pressure that may be observed almost immediately after change of posture from supine or seated to standing. The phenomenon is almost universal, and occasionally causes transient ‘gray-out’ in even healthy individuals.
However, fainting may occur in some cases. The drop in blood pressure occurs as gravity displaces almost a liter of blood from the upper parts of the body to the splanchnic bed and legs.
Generally, vasoconstriction and modest tachycardia promptly respond to compensate. However, in some patients (e.g., older, dehydrated, certain neurologic conditions) may not compensate quickly or sufficiently, and syncope occurs. In older patients (who are often amnestic for any prodrome), the collapse may be mistaken for an accidental fall and the real cause is missed.
Delayed (classical) OH tends to occur some minutes after movement to upright posture . When the blood pressure is recorded in such cases, it tends to dwindle over time and the faint occurs when systemic pressure is low enough that cerebrovascular autoregulation is no longer able to compensate. In some instances, the collapse may not occur for 10 to 15 minutes after the change in posture.
Unlike Immediate OH, the delayed form is more troublesome and is more often associated with important predisposing medical conditions, including: volume depletion, primary or secondary autonomic failure, drug effects, and deconditioning. Primary autonomic failure may be indicative of Parkinson’s disease, Lewy body dementia, and multisystem atrophy.
Secondary autonomic failure is observed in patients with diabetes mellitus, alcohol abuse, amyloidosis, uremia, and spinal cord injuries. Drug-induced hypotension is particularly important, and can be the result of treatment with any of a variety of agents including diuretics, antihypertensives, adrenergic blockers, and antidepressants.
C. Cardiovascular causes
The recent European Society of Cardiology syncope practice guidelines now combine cardiac causes of syncope, along with other cardiovascular disorders that may trigger syncope. In many of these cases, hypotension is triggered directly as a consequence of a drop in cardiac output such as may be expected with abrupt onset of either a bradyarrhythmia or tachycardia.
Similarly, acute obstruction to blood flow occurring as a result off an atrial myxoma or severe cardiac tamponade may be expected to trigger symptomatic hypotension. On the other hand, the hypotensive event may be secondary to the triggering of a neural reflex rather than as a direct accompaniment of the structural disturbance; thus the triggering of syncope due to reflex bradycardia and/or vasodepressor responses have been associated with acute myocardial infarction, acute aortic dissection or pulmonary embolism.
1. Arrhythmic causes of syncope
Bradyarrhythmias and tachyarrhythmias (both supraventricular and ventricular) are the most frequent causes of syncope in the cardiovascular category. This latter group also includes the growing list of “channelopathies” (long Q–T syndrome, Brugada syndrome, catecholaminergic ventricular tachycardia, idiopathic progressive conduction system disease, etc.).
In patients with sinus node dysfunction (SND), syncope may be caused by abrupt slowing of the heart rate (e.g., sinus pauses, sinus arrest) or due to a long pause after termination of an atrial tachyarrhythmia in the so-called bradycardia-tachycardia syndrome (BTS). Similarly, transient symptomatic hypotension may occur if an atrial tachycardia (most often atrial fibrillation) starts and the resulting heart rate is too fast to maintain the cardiac output, while at the same time vasoconstrictive compensation is too slow or inadequate or both.
Atrioventricular (AV) conduction disease may also cause syncope, if abrupt conduction block, even if short-lived, slows the heart rate excessively and for a long enough period of time (generally estimated to be approximately 10 seconds or more). Generally, these patients have some evidence on an electrocardiogram (ECG) of conduction system involvement (e.g., bundle-branch block, abnormal frontal axis).
They may then progress to complete or high grade AV block (Figure 2) in which multiple atrial impulses (P waves) are blocked and the ventricular rate is unable to sustain an adequate blood pressure. Other less severe forms of AV block, including Mobitz 1 block (i.e., Wenckebach block) in older patients or Mobitz 2 block in any patient, may be a clue indicating that AV block is the cause of the patient’s problems.
As a rule, paroxysmal supraventricular tachycardia in young to middle-aged individuals rarely cause syncope. However, syncopal symptoms may occur in older patients or those with left ventricular dysfunction.
Conversely, ventricular tachycardias (VTs) are an important cause of syncope. However, the reason is not so much the site of origin of the tachycardia, or even the rate (which is often similar to the paroxysmal supraventricular tachycardias), but the fact that VTs tend to occur in the setting of heart disease.
It is the patient’s ability to maintain an adequate stroke volume at fast rates and also invoke compensatory mechanisms to maintain blood pressure that determine whether syncope occurs. Thus, even slow VT in patients with severe left ventricular dysfunction may cause hypotension.
On the other hand, torsades de pointes VT (Figure 3), which tends to be very fast, can result in syncope in a young or middle-aged patient with long Q–T syndrome, the heart being structurally normal from a contractile perspective. In some patients with an established diagnosis of arrhythmogenic cause of syncope and have a pacemaker placed for the same may present with syncope due to pacemaker malfunction (Figure 4). (Table 4)
2. Structural cardiovascular causes of syncope
Among the more important structural conditions that may be associated with syncope are: acute myocardial infarction, valvular aortic stenosis, acute pulmonary embolism cardiac tamponade, and hypertrophic cardiomyopathy. Less frequently encountered conditions that may also cause syncope include acute aortic dissection, intracardiac tumors (e.g., atrial myxoma), and arrhythmogenic dysplasia.
As noted earlier, the cause of syncope in these settings may be due to direct impact of the lesion (e.g., atrial myxoma), or a reflex effect (e.g., acute aortic dissection) or a combination of both (e.g., acute pulmonary embolism, acute myocardial infarction). Additionally, since these structural abnormalities may coexist with left ventricular disease, conduction system abnormalities, or sinoatrial disturbances, the potential exists for the explanation being multifactorial and complex.
D. Syncope mimics
A number of conditions may present with what appears to be TLOC and might be mistaken to be syncope. While these conditions are not “true syncope” and are not considered further in the remainder of the text, they are noted here for completeness sake.
The most important of these conditions is “pseudosyncope” (neurologists call this “pseudoseizures”). The hallmark is the very high frequency of attacks, usually but not always, unassociated with major injury. It is suspected that these patients may have had some true syncope events at some time in the past, and may have been the subject of abuse. In any case the clinical picture evolves into a severe psychiatric disturbance (possibly a conversion reaction) that needs intensive psychiatric and psychological assistance.
Functional autonomic disturbances may include real or pseudosyncope in the clinical picture. Thus, while syncope is not a major feature of postural orthostatic tachycardia syndrome (POTS) in most cases, it is a subset of the panoply of symptoms that these patients may complain of. Narcolepsy and cataplexy may also masquerade as syncope, and require experienced neurologic consultation to assess.
II. Diagnostic Confirmation: Are you sure your patient has Syncope?
Syncope by definition incorporates a self-limited period of loss of consciousness (usually associated with loss of postural tone as would be expected). A careful medical history obtained by an experienced individual is the key to confirming whether a true syncope has occurred (see below). The development of detailed standardized questionnaires may prove to be a useful diagnostic aid, but as yet there is no single well-proven instrument available.
The one other condition that most physicians concern themselves with in this setting is an epileptic seizure. Seizures are far less common than are syncopal events. In any case, careful history taking and eye-witness accounts may help distinguish the two problems.
In seizures, abnormal movements of the face, tongue, and extremities may be observed before collapse. In syncope, any abnormal jerky movements that occur (and they are common) do so after the loss of consciousness.
The quality of the motor activity is also different, but this may not be readily appreciated by nonexperts. Rhythmic tonic clonic activity(which may be absent some times in temporal lobe seizures) are indicative of seizure, while the jerky motions of syncope due to cerebral hypoperfusion are more erratic.
The postictal state also differs. In seizures the patient may experience postictal confusion or headache. The syncope patient tends to regain alertness promptly but may be fatigued. Incontinence can occur with both conditions, but tongue-biting is very rare with syncope.
In general, more patients are mislabeled as “seizure patients” when they are suffering syncope than vice-versa. Most neurologists would agree that it is important to establish the correct diagnosis, even at risk of recurrence, before labeling the patient and embarking on a futile course of action.
If necessary, video-EEG monitoring should be used. Placement of an insertable loop recorder (ILR) has proven valuable and cost-effective when longer term monitoring is needed.
Other conditions that occasionally appear similar to syncope are generally readily identified by experienced clinicians. Thus, for example, intoxications (e.g., alcohol, other agents) are usually accompanied by clear evidence of substance abuse; any suspicion can be confirmed with blood and urine tests for the intoxicating agents.
Psychogenic pseudosyncope is a far more difficult problem (see earlier discussion) and may only become apparent after considerable diagnostic energy and expense has been expended fruitlessly.
A. History Part I: Pattern Recognition
The initial evaluation of a patient presenting with TLOC in whom syncope is suspected consists of a careful and detailed medical history, physical examination (including orthostatic blood pressure measurements), and 12-lead ECG. The initial evaluation often also includes echocardiography.
Other tests may be selected as appropriate. Usually the most important of these is long-term ECG monitoring. Selection of these latter devices is discussed in more detail later.
Neurologic evaluation is rarely needed, and in the absence of any concern regarding an acute head injury from a fall, the use of head imaging and EEG is discouraged. The importance of the initial evaluation goes well beyond its capability to make a diagnosis as it determines the most appropriate subsequent diagnostic pathways and risk assessment.
The history is the most important element in the initial evaluation of a patient with suspected syncope. The goal is to establish a diagnosis with sufficient confidence that the patient can be advised of both his or her prognosis and a proper treatment strategy.
A carefully obtained comprehensive history (incorporating eyewitness accounts) alone may be diagnostic of the cause of syncope or may suggest the strategy of evaluation (Table 1). The clinical features of the presentation are most important, especially the factors that might have predisposed to syncope.
In this regard it is important to inquire in-depth into as many episodes as the patient and eyewitnesses can recall. It is helpful to start with the most recent event as that may be best recollected. Thereafter work backward. If a pattern is defined, then it may be possible to establish a diagnosis. (Table 1)
B. History Part 2: Prevalence
Syncope is a symptom that is common in the general population, but clinical epidemiologic terms, such as incidence and prevalence, are not readily applicable in understanding the epidemiology of syncope. For instance, as has been pointed out by Sheldon and colleagues, syncope prevalence must approach zero at any given point in time as very few people are unconscious.
Further, syncope is a transient symptom and therefore its true incidence is difficult to assess. Cumulative proportion and cumulative incidence are more meaningful indices that can be used to explain the epidemiology of syncope.
Studies of the approximate frequency of individuals reporting onset of syncope suggest that first episodes tend to occur between the ages of 10 and 30 years. The peak age for syncope susceptibility seems to be around 15 years where the occurrence is a high as 47% in females and 31% in males.
In a cohort study, only 5% had their first syncope above the age of 40 years. Nevertheless, there appears to be a second peak in both men and women above the age of 65 years.
Several studies have reported what can be considered as syncope burden and suggest that 40% of people faint at least once in their lives. Gazenboom et al in Netherlands found that the cumulative incidence of syncope is:
General population: 18.1 to 39.7 per 1,000 patient-years
General practice: 9.3 per 1,000 patient-years, and
Emergency departments: 0.7 per 1,000 patient-years
The recurrence rate of syncope is estimated at approximately 20% to 30% per year in some population studies, with important predictors of recurrent syncopal episodes including:
Age <45 years
A long prior history of multiple syncopal episodes
Multiple recent syncope events
The “prevalence” of the causes of syncope depends strongly on the clinical setting. Thus reflex syncope is the most frequent cause of syncope in any setting (about 40% to 60% in most reports). Orthostatic syncope is likely second in frequency if older patients are included in the population, with cardiovascular causes being third.
The mortality rate depends on the underlying cause of syncope. The 1-year mortality is high in patients with cardiac causes of syncope (18% to 33%), as opposed to patients with noncardiac causes of syncope (0 to 12%).
However, in most studies, the cardiac basis of syncope did not seem to confer a higher mortality when compared to matched controls having similar degree of heart disease. On the other hand, Olshansky et al found that in the SCD-Heft cohort (predominantly class 2 and class3 heart disease, with patients of both ischemic and nonischemic origin), the presence of syncope was associated with higher mortality.
Additional studies examining mortality risk in selected syncope patient subsets are needed. In this regard, it is recognized that in certain disease states, syncope does raise the mortality risk substantially.
For instance, syncope at diagnosis is a predictor of increased risk of sudden death in patients with severe aortic stenosis, hypertrophic cardiomyopathy and also to an important extent in patients with channelopathies, such as Brugada syndrome and long Q–T syndrome, and arrhythmogenic right ventricular dysplasia (ARVD).
Patients with syncope due to noncardiac causes in general have an excellent prognosis. This is especially true in healthy young individuals with a normal ECG and without any evidence of structural heart disease.
C. History Part 3: Competing diagnoses that can mimic Syncope.
The competing diagnoses that may cause real or apparent TLOC and need to be considered as part of the overall clinical assessment of the patient with suspected syncope have been discussed in detail earlier. Table 2 lists the key contenders.
D. Physical Examination Findings.
Certain basic physical findings may be useful in diagnosing the cause of syncope and assessing prognosis. Perhaps the most important is determining whether there is evidence of the presence of underlying structural heart disease (in this case also incorporating ECG and often echocardiographic data).
The absence of any abnormality reduces mortality risk as a cardiac cause is diminished. The presence of an abnormality raises concern regarding cardiac syncope, and its associated increased mortality risk. In either case, however, the possibility of recurrence remains an important consideration and patients need to be advised of this possibility.
Recognition of susceptibility to orthostatic hypotension (OH, see earlier) and carotid sinus syndrome (CSS, see earlier) are possible during a careful initial evaluation. However, clinicians must become knowledgeable about how to do the proper maneuvers and interpret the findings. The European Society of Cardiology (ESC) guidelines offer excellent guidance.
Physical examination can suggest the presence of important underlying structural cardiac disease. For example, the presence of an irregular, rapid or slow heartbeat, cardiac murmur, or severe dyspnea may suggest the presence of structural cardiac disease and lead one to seriously consider a cardiac cause of syncope.
On the other hand, while the presence of carotid vascular bruits may necessitate further assessment on their own merit, they do not provide a basis for syncope. As a rule, carotid Doppler assessment is of little value in the evaluation of the syncope patient.
E. What diagnostic tests should be performed?
In terms of deciding upon a diagnostic testing strategy, it is mandatory that careful consideration be first given to the likely contending etiologic diagnoses. A shotgun approach is costly and often ineffective.
The choice of tests is best determined after the medical history is carefully obtained and the risk of underlying structural heart disease (including familial conditions) has been assessed. The latter is termed the “initial evaluation,” and it is the cornerstone upon which a diagnostic strategy is established.
Before ordering any diagnostic tests, the clinician should be reasonably certain that the presenting symptom is indeed syncope and not other TLOC conditions, such as a seizure, intoxication, or head trauma. In essence, the initial evaluation should answer three important questions:
Has the patient indeed experienced syncope?
Are there any apparent clues from the history, ECG, and physical examination regarding what could have caused the syncope episode(s)?
Is there any indication that the patient has underlying cardiac disease and suggesting that syncope could be related to a high-risk cardiovascular condition?
The initial evaluation is able to define the most likely cause of syncope in 23% to 50% of cases. In this regard, a 12-lead ECG is generally considered to be part of the initial evaluation, although it may not be absolutely essential in all cases (e.g., a young otherwise healthy patient with classic symptoms indicating vasovagal syncope).
If the initial evaluation suggests a likely cause of syncope, then any subsequent testing may not be needed. However, should the physician wish to confirm the suspected diagnosis, the choice of testing should be focused on the specific condition under consideration.
Thus a tilt-table test or active standing test may be used to support a diagnosis of vasovagal syncope or orthostatic syncope. An electrophysiologic study (EPS) may help to confirm the presence of severe conduction system disease, inducible tachyarrhythmias, or (with less certainty) sinus node dysfunction (Table 3).
If the initial evaluation does not define the cause, then the next step is to risk-stratify patients and make the determination whether to admit the patient for evaluation or to discharge the patient and recommend out-patient work up. The latter is best conducted promptly (i.e., within 3 to 4 days) in a setting that specializes in the care of such patients (i.e., so-called “syncope clinic”). In either case, the choice of diagnostic tests should be based on probable causes derived from the history. In many cases, if there is no clear direction evident, specialty consultation from a syncope clinic practitioner may be helpful. (Table 3)
There are many tests that can be employed in defining the cause of syncope. However, the specific indications, utility, and limitations for each test must be understood to ensure that they are selected in a cost-effective manner. The most important of these tests and their primary utility are outlined here:
Carotid sinus massage (CSM)
Indications: In patients >40 years of age presenting with syncope of unclear etiology.
When is the test diagnostic?
Ideally, this test should be with the patient in a head-up position on a tilt table. If CSM reproduces syncope under these conditions with documentation of hypotension due to asystole or a ventricular pause of >3 seconds and /or fall in systolic blood pressure >50 mm Hg then the diagnosis is supported. Similar findings without reproduction of syncope are less convincing but often are relied upon if no competitive explanation is apparent.
CSM should be avoided in patients with a history of cerebrovascular accident (CVA) or stroke within 3 months of the test, or patients with carotid bruits unless significant carotid stenosis is excluded with a Doppler ultrasound.
Older patients in whom there is a clinical suspicion of orthostatic hypotension of any etiology.
When is this test diagnostic?
The test may be done in two ways, but in either case it is best to use beat-to-beat noninvasive blood pressure monitoring (e.g., Finometer). Active standing is likely the better of the two methods.
The patient is seated or supine and then physically moves to the standing position. The second method employs passive movement to head-up posture on a tilt-table. OH is defined as a decrease in systolic blood pressure (SBP) >20 mm of Hg and >10 mm of Hg, usually within 3 to 5 minutes of changing position from supine to an upright position.
Delayed responses may also be observed as discussed earlier. For patients who are initially hypertensive, the recent consensus document calls for >30 mm Hg drop of systolic pressure for a positive test. In any case, the medical history must be consistent with the laboratory findings before a reliable clinical diagnosis can be established.
Tilt-table testing was derived from early physiological studies examining human responses to extended upright posture. The test was introduced in the mid-1980s as a means of assessing susceptibility to vasovagal syncope.
It is usually done in a quiet room with continuous ECG and beat-to-beat blood pressure recording. The protocol calls for a 70- degree head-up tilt in a drug free state. Thereafter, if the test is not diagnostic, provocative pharmacologic agents (isoproterenol, nitroglycerin) may be used. These agents improve test sensitivity, but degrade specificity.
Main indication—Assess susceptibility to vasovagal syncope in patients in whom reflex syncope is suspected clinically but could not be confirmed by history and physical findings. It should be noted that the test should not be used to assess efficacy of therapeutic interventions.
-If patient had associated jerking movements but the episode is not definitive for seizure. Tilt-table testing can be helpful in distinguishing syncope from seizure.
-In elderly patients with dementia where good clinical history is difficult to obtain and a fall due to loss of balance needs to be distinguished from a true syncope.
-Distinguish syncope due to pure orthostatic hypotension from other causes of symptomatic hypotension (reflex syncope, some cases of postural orthostatic tachycardia syndrome [POTS]).
When is the test diagnostic?
The diagnosis of reflex syncope can be established when there is reproduction of symptoms with upright tilt and the recordings document sufficient hypotension (either due to marked bradycardia or due to a vasodepressor response with or without bradycardia).
Contraindications: Usually safe. The contraindications are mainly relative and restricted to those conditions in which the practitioner wishes to avoid use of isoproterenol (ischemic heart disease, uncontrolled hypertension [HTN], left ventricular [LV] outflow obstruction). Nitroglycerin is a potential alternative provocative agent and has proved to be very safe.
ECG monitoring is indicated for diagnosing intermittent bradyarrhythmias and tachyarrhythmias that could cause a syncopal or a near syncopal episode. It is very important to remember that ECG monitoring is indicated only when there is a high pretest probability of identifying an arrhythmia associated with syncope. ECG monitoring is done in two settings:
1. Inpatient: Inpatient monitoring is rarely useful unless the patient is having very frequent events. Given the cost of in-hospital monitoring, it is indicated only when the patient is deemed to have a high risk of life threatening arrhythmias. Such patients include those with:
Acute congestive heart failure or acute myocardial infarction (present or very recent)
Syncope episode associated with exertion or palpitations
Family history of sudden cardiac death (SCD)
Nonsustained VT on presentation
Prolonged or shortened QT interval
Brugada pattern on admission EKG
New bifascicular block on ECG
Severe sinus bradycardia on admission (HR <40 bpm)
2. Outpatient: Outpatient ECG monitoring as a rule should still be considered for patients with a high probable risk of arrhythmogenic syncope. The following types of monitoring may be considered:
Holter monitoring usually for 24- to 48-hour period and sometimes for a 7-day period. This of more valuable in patients with very frequent (e.g., daily or more than once daily episodes) loss of consciousness, where there is higher chance of symptom ECG correlation.
External loop recorders: These devices have loop memory and typically store 5 to 15 minutes of pre-activation ECG. The most effective of these are the mobile cardiac outpatient telemetry (MCOT) systems such as Cardionet. Patient compliance is a limitation, as some patients may not like wearing them for more than a few weeks.
Implantable loop recorders: These are the ideal devices for detecting infrequent symptomatic events. They are implanted under the skin using local anesthetic in much the same way that a pacemaker is implanted, but there are no intravascular wires and the incision is only about 1.5 cm in length.
The initial cost is higher than a wearable recorder, but several studies have shown that the cost per correct diagnosis is substantially less. Early use of ILRs in the evaluation of syncope is justified.
Cardiac electrophysiologic study (EPS)
For the evaluation of syncope, EPS has proven useful mainly in patients with underlying structural heart disease or suspected paroxysmal supraventricular tachycardia (PSVT). EPS should be considered in the following settings:
In syncope in a patient with known structural heart disease in whom ventricular tachyarrhythmias are thought to be a probable cause. EPS is useful in identifying susceptibility to these arrhythmias.
In syncope in patients with premonitory symptoms of palpitations (PSVT or VT are possibilities), but in whom monitoring has been ineffective.
In syncope with bundle branch block to assess risk of high degree AV block playing a role.
In Brugada syndrome to assess arrhythmia inducibility (a controversial indication).
In asymptomatic bradyarrhythmias of sinus node origin. EPS may be useful in establishing the severity of the condition and the likelihood of sinus node disease being a contributor to symptoms (a controversial indication).
Adenosine triphosphate (ATP) testing
This test is controversial. It may have value in identifying a subgroup of syncope patients in whom pacing therapy might be helpful. These are usually middle-aged to older women without substantial cardiac disease. The test remains under evaluation.
1. What laboratory studies (if any) should be ordered to help establish the diagnosis? How should the results be interpreted?
Routine biochemical or hematologic laboratory studies are rarely of value in the syncope evaluation of a syncopal episode. However, in certain cases, when the initial evaluation is appropriately supportive, certain tests may have utility; these tests should be used judiciously, and their results must be consistent with the patient’s history and presentation before they can be considered to be of diagnostic utility.
A basic metabolic panel can be useful in identifying prerenal azotemia, hypernatremia or hyponatremia, or hyperkalemia or hypokalemia. The first of these findings may help the clinician support a syncope diagnosis based on orthostatic hypotension due to hypovolemia/dehydration. The remaining findings could favor a conduction disturbance (i.e., inexcitable tissues in hyperkalemia) or tachyarrhythmias (e.g., torsade de pointes in hypokalemia).
A complete blood count (CBC) may be helpful if the medical history supports a concern that blood loss or anemia may be provoking syncope, or increasing susceptibility to syncope, in a previously stable patient.
In patients with syncope due to severe bradycardia or asystole, a thyroid function testing may be used to rule out any underlying thyroid disease.
If the patient has prominent respiratory symptoms, then checking oxygen saturations and/or arterial blood gases may be useful. Although uncommon, chronic hypoxia or acute upon chronic hypoxia may predispose to symptomatic bradycardia or tachycardia.
Serial cardiac enzymes can be helpful if acute myocardial ischemia is suspected to have triggered the syncope.
Specific drug levels have a role to play in assessment of those infrequent syncope cases in which drug toxicity is suspected. In the past, digitalis toxicity was a relatively frequent concern, but that is far less common today. On the other hand, many drugs may be associated with syncope (Table 4) and physicians may at times need to ascertain whether one or the other agent is a contender in the differential diagnosis.
2. What imaging studies (if any) should be ordered to help establish the diagnosis? How should the results be interpreted?
Echocardiography is often of value in the syncope evaluation when there is suspicion of structural heart disease being present. The goal is to ascertain both the nature and severity of underlying structural heart disease.
The presence of cardiac disease increases the risk of a cardiac cause of syncope, and impacts prognosis as syncope of cardiac cause is associated with a worrisome mortality risk. Thus the echocardiogram has utility for both diagnosis and risk stratification.
Certain conditions that may present as syncope are particularly amenable to assessment by echo; these include: valvular aortic stenosis, obstructive cardiac tumors, hypertrophic cardiomyopathy, cardiac tamponade, acute aortic dissection, and congenital anomalies of coronary arteries.
CT scan of the chest is appropriate when acute pulmonary embolism is suspected as a basis for syncope.
Nuclear cardiac imaging or computed tomography (CT) angiography are rarely of value in syncope patients. If acute coronary syndrome enters the differential diagnosis of a syncope patient, then coronary arteriography is a better choice.
CT or magnetic resonance (MR) scans of the head have no utility in the diagnostic evaluation of syncope. In some cases they may be warranted if the patient’s collapse resulted in head injury. However, in such cases the imaging is to exclude a possible consequence of syncope, not its cause.
For the most part, physicians only see syncope patients after the victim has recovered from the acute event. Consequently, it is rare that the practitioner actually witnesses the episode. However, should that occur, basic assessment of the patient entails determining if a pulse and respirations are present.
If so, the victim should be maintained on his or her side in a gravitationally neutral position until full recovery of consciousness has occurred. Thereafter, documentation of the observed events is wise, as eyewitness accounts can substantially facilitate subsequent diagnostic evaluation.
A. Immediate management.
Inasmuch as the physician is rarely involved with care of the patient during an acute event, immediate management when the patient comes for evaluation depends primarily on the practitioner’s initial assessment as described earlier. During this step, the need for in-patient assessment versus out-patient evaluation is made.
The patients who need to be considered for inpatient monitoring are mainly those with cardiac causes of syncope, in particular:
Patients with suspected acute myocardial ischemia
Severe ischemic or nonischemic cardiomyopathy
Suspected to be high risk for life-threatening arrhythmias (e.g., long Q–T syndrome, Brugada syndrome, etc.)
Other structural heart disease (e.g., hypertrophic cardiomyopathy, severe valvular disease)
In patients with noncardiac causes of syncope, the need for admission may depend on the suspected cause of the fainting or social issues. Thus, while orthostatic syncope does not typically warrant admission, hospitalization may be needed if the faint was triggered by severe dehydration or acute blood loss anemia. Similarly, in-patient care may be warranted in elderly and/or frail patients who are deemed to be at high risk of physical injuries if syncope should recur.
B. Physical Examination Tips to Guide Management.
In most cases, the fainter is fully recovered when seen by the clinician for diagnostic evaluation. Consequently, there is rarely any opportunity to record physical findings during spontaneous events. However, eyewitness accounts can be of value, even when derived from individuals who have no specific medical training.
Eyewitness reports of physical findings at the time of collapse may help distinguish true syncope from other forms of TLOC and may even help to determine the specific cause of syncope. Often, especially in older fainters, these details are not reported by the patient as they became amnestic or were unconscious. Consequently, eyewitness accounts should be sought out during the initial evaluation of the patient.
Pertinent, potentially useful physical findings at the time of the collapse might include one or more of the following:
The presence of seemingly inexplicable facial, tongue, or limb movements beginning before collapse favors the diagnosis of a seizure disorder, whereas jerky muscular movements that start after onset of the loss of consciousness favors a syncope diagnosis. It should be noted that “jerking” movements occur commonly in syncope patients, but the movements differ from those seen in epilepsy.
In syncope, the movements tend to be smaller, of briefer duration, and not synchronous over the body. The difference from the much more massive and synchronous clonic movements can be helpful in diagnosis, but making such a distinction is beyond the experience of most bystanders including medically trained individuals.
Details of the nature of the collapse may be valuable. Most syncope patients fall limply, whereas epilepsy patients tend to collapse rather more stiffly.
An apparent faint in the midst of vigorous exercise suggests a cardiac cause, while faints early after completion of such exercise is more likely neural-reflex in origin (possibly triggered by relative volume depletion).
Collapse associated with a rapid pulse may provide a clue to a tachyarrhythmia cause. Conversely, recognition of a slow weak pulse may lead to a greater likelihood of a bradycardia cause or neural-reflex mediated etiology. Unfortunately, not many eyewitnesses have the skill or presence of mind to make such observations.
Marked pallor in conjunction with cold clammy skin favors neural-reflex syncope (vasovagal or situational syncope).
Syncope associated with abrupt neck movement in older individuals (usually >50 years) suggests the possibility of carotid sinus syndrome.
Collapse shortly after changing posture (e.g., arising from seated position) favors orthostatic syncope, but may not be remembered by fainters (especially older fainters).
Multiple “faints” in a brief period of time, or faints with eye lids tightly closed, or faints that favor pseudosyncope rather than a true faint.
Collapse associated with seeming difficulty breathing suggests a cardiac origin or pulmonary embolism. On the other hand, faints in younger individuals associated with apparent emotional upset and/or tachypnea favor reflex syncope or possibly an acute anxiety spell (pseudosyncope).
Observations by the clinician in the emergency department or clinic
Most often the physician is restricted to recording physical findings that remain to be observed after the victim has fully recovered. Nevertheless, certain findings may be helpful in defining potential causes for the collapse and providing a strategic direction for subsequent evaluation (i.e., specific direction for selecting imaging or other tests).
Evidence of trauma resulting from the collapse should be documented. In this regard, tongue biting is more typical of seizure than of syncope.
Postevent confusion is more typical of seizure, but fatigue is common after vasovagal faints.
Susceptibility to orthostatic hypotension (see earlier discussion diagnostic criteria) should be obtained in all TLOC patients if circumstances permit. A positive finding, if consistent with the medical history of the event (and eyewitness accounts when available), may clinch the diagnosis without need for further testing.
Physical findings during carotid sinus massage (CSM) may be considered to be part of the physical examination as it is a generally recommended diagnostic step in all older (>55 years) syncope patients. However, the results of CSM should be interpreted with care.
For many years, a CSM-induced ventricular pause >3 seconds duration was been considered a positive response. However, such a finding only suggests the presence of a hypersensitive carotid sinus, but is insufficient to support a diagnosis of carotid sinus syndrome (CSS).
The ESC syncope guidelines recommend that CSS be diagnosed only if there is CSM-induced reproduction of symptoms (usually only achieved if CSM is done with the patient in an upright posture), or if the clinical history supports the diagnosis (e.g., syncope associated with neck movement). In the absence of either of these findings, a CSM-induced pause >5 seconds in duration may be accepted as diagnostic if other contending diagnoses have been excluded.
Pathologic cardiac and vascular murmurs, and peripheral pulse findings may be suggestive of severe aortic stenosis or idiopathic hypertrophic cardiomyopathy; if present, the significance of such murmurs may reasonably evaluated by echocardiographic study.
Differences in blood pressure/pulse in each arm, when identified, may indicate subclavian steal or aortic dissection. Confirmatory imaging is then the next step.
Signs of focal neurologic lesions, such as hemiparesis, dysarthria, or diplopia and vertigo, or signs of parkinsonism suggest but are not diagnostic of a neurologic cause. Thus evidence of a stroke may suggest that the collapse was not syncope, but due to loss of stability. A patient with signs of parkinsonism may raise concerns of orthostatic syncope or an accidental fall. Such patients warrant a neurologic evaluation.
C. Laboratory Tests to Monitor Response To, and Adjustments in, Management.
The majority of faints are neural-reflex in nature, particularly vasovagal syncope. To date, there is no evidence that tilt-table testing has any value in regard to assessing therapy of vasovagal syncope or related situational faints. Therefore, while of value as an initial diagnostic tool in selected cases of vasovagal syncope, its use in assessment of subsequent treatment is not recommended.
In patients with orthostatic syncope, many current therapies have the potential to aggravate supine hypertension. This problem requires clinical monitoring and treatment adjustments. However, such monitoring is usually readily achieved in the clinic without special tests.
Orthostatic testing (i.e., active standing, tilt-table testing) during follow-up might have merit in orthostatic syncope in those cases in which the medical history alone is not reliable (e.g., forgetful and/or demented patients). Similarly, periodic ECG monitoring and/or ILR use may have a role in similar cases in whom paroxysmal arrhythmias were found to be the cause of fainting. However, in most cases, a careful history is likely to be just as helpful if the patient is a reliable reporter.
Follow-up hematologic or biochemical laboratory testing are rarely needed. Perhaps they can be justified if syncope was deemed due to acute blood loss, anemia, or major electrolyte disturbances (e.g., conduction system disturbances associated with severe hyperkalemia or hypokalemia, or hypovolemia). Similarly, in elderly or demented patients with syncope due to repeated but subtle infections (e.g., urinary tract infections), such testing may be warranted. Echocardiographic reassessment is also reasonable in the case of suspected outflow tract obstruction being treated medically.
D. Long-term management.
The principal goals of treatment in syncope patients is to avert recurrences and diminish the adverse impact of syncope recurrences on quality-of-life, including risks of injury from falls. Preventing premature mortality is also an important priority, but for the most part the risk of death is primarily determined by the severity of underlying cardiac and vascular disease rather than the syncope itself. Thus, aggressive management of structural cardiovascular disease is mandatory, but alone may not be sufficient to prevent syncope recurrences.
Recommended long-term treatment strategies for the various causes of syncope may be summarized as follows:
For the most part, reflex fainting has a low immediate mortality risk, and therefore the goals of long-term treatment are to prevent recurrence and limit injuries.
In the case of vasovagal and situational syncope, the first step is education and assurance regarding the benign (from a mortality perspective) nature of the condition. Education consists of recognition of warning symptoms, and appropriate physical counter-maneuvers (PCMs) (e.g., sitting, squatting, leg crossing) when appropriate.
The patient must also be made aware of circumstances that increase risk of an event (overcrowded places, fearful situations, prolonged cough, micturition), early recognition of prodrome symptoms. In the case of situational faints (e.g., cough syncope, post-micturition syncope, etc.) avoidance of the trigger may be difficult but can be addressed (e.g., cough suppression, sitting while voiding, etc.)
In the case of CSS, education is similarly recommended. However, most CSS patients are best treated by cardiac pacemakers.
PCM should be probably the first line of management for vasovagal syncope. PCMs include maneuvers that will increase the blood pressure (e.g., crossing legs, hand grip, and arm tensing) that can abort or delay attacks if performed on recognizing prodromal symptoms. In the longer-term, physical exercise (lower body isometrics, rowing), and standing training may diminish susceptibility.
The pharmacologic management of reflex syncope (and especially vasovagal syncope) is at best restricted to those patients in whom hydration and physical maneuvers have not been completely successful. Only two agents appear to be helpful; specifically, midodrine and the salt retaining mineralocorticoid, fludrocortisone.
Some pharmacologic treatments for vasovagal syncope are still used in clinical practice despite the fact that there is little evidence of benefit, and some have been shown to be ineffective in clinical trials. These include:
Beta-adrenergic blockers (except possibly in “older” fainters (>40 years of age)
The alpha-adrenergic agonist midodrine (actually a pro-drug with an active metabolite) may be effective in some patients, but is only rarely the complete answer. Attention to increased hydration, enhanced salt intake, and physical exercise remain crucial treatment components.
Fludrocortisone is currently the subject of a multicenter randomized trial in vasovagal syncope where it has shown some benefit (Prevention of Syncope Trial [POST 2]). The complete article should be reported in 2012.
Based on findings from several randomized clinical trials, it is clear that cardiac pacing has only a small role to play in prevention of vasovagal syncope recurrences. However, the International Study on Syncope of Uncertain Etiology (ISSUE 2) study suggests potential value in patients in whom severe spontaneous bradycardia has been demonstrated by ECG monitoring during spontaneous faints. Pacing is also useful in carotid sinus syndrome.
2. Orthostatic syncope
Orthostatic syncope is an extremely common problem, especially in the elderly or frail. However, it can occur in even very fit persons who become deconditioned (e.g., astronauts returning from a low gravity environment, patients hospitalized for an extended time).
The basic problem is either volume depletion or failure of the appropriate compensatory cardiac and vascular mechanisms with change from a gravitationally neutral position (i.e., seated, supine) to a standing position. In many instances, prescribed drugs undermine these compensatory responses while in others there is evidence of autonomic failure.
As in the case of reflex syncope, treatment should start with education regarding the underlying condition. In many cases, removal or reduction of dosage of certain drugs that the patient is currently being treated with (e.g., diuretics, vasodilators) may be the first appropriate step.
As with reflex syncope, PCMs may prove helpful acutely. Longer-term, physical exercise (lower body isometrics, rowing), and standing training may offer benefit. Unfortunately, there is a paucity of evidence favoring any of these modalities.
As noted above, many prescribed drugs are in fact the cause of the problem. This aspect of “pharmacologic” therapy should be addressed first.
Thereafter, drug therapy is very similar to that employed for the reflex faints. However, treatment in these often older patients is complicated by the tendency for drugs to aggravate supine hypertension.
Typically, it is necessary to accept higher baseline blood pressure in this population than is normally recommended. Frequently, sustained systolic pressure in the 150 to 260 mm Hg range must be tolerated; the balance (which must be carefully discussed with patients and family members) is stroke/myocardial infarction risk versus falls and physical injury risk.
With the above caveats in mind, increased salt and volume in the diet and judicious use of drugs such as midodrine and fludrocortisone may be useful. However, aggravation of supine hypertension must be monitored as noted earlier, and excessive hypertension should be dealt with in the context of the patient’s overall picture. Table 5 summarizes certain therapeutic approaches to orthostatic syncope.
3. Syncope due to cardiac arrhythmia
The goals of treatment are to prolong survival, prevent recurrence, and improve quality-of-life. The specific treatment approach depends on the type of arrhythmia, and whether the problem is due to a primary conduction system disease (i.e., intrinsic abnormality) secondary to extrinsic agents (e.g., drugs, autonomic disturbances).
The following provides key points to consider in treatment:
In patients with syncope due to bradyarrhythmias of any cause, the first step is elimination of any drugs that may be causing or aggravating bradycardia.
In symptomatic patients (i.e., syncope, near-syncope) with sinus node dysfunction (SND) and demonstrable bradyarrhythmias (i.e., sinus pauses, sinus arrest, asystole after termination of paroxysmal atrial tachyarrhythmias), cardiac pacemaker therapy is indicated and is highly effective. However, in SND patients, permanent pacing relieves symptoms but may not prolong survival.
In syncope patients in whom AV conduction system disease is documented and sufficiently severe to account for symptoms, cardiac pacing should be considered. The ESC syncope guidelines provide specific pacing indications.
In patients with syncope due to supraventricular tachycardias or atrial flutter, transcatheter ablation should be considered. This procedure has a very high success rate (>95%) and very few complications.
In patients with acquired prolonged Q–T and syncope due to torsades de pointes, elimination of drugs that prolong Q–T interval is the essential step. In the case of congenital long Q–T syndrome, Brugada syndrome, and other channelopathies, management may entail beta-blockers in some cases and ICD therapy in others, or both. The management of these patients is in evolution and readers are advised to monitor the latest guidelines and expert consensus statements.
Symptomatic ventricular tachycardias (VT) that occur in the absence of structural heart disease may in some cases be amenable to ablation (e.g., outflow tract VTs, idiopathic fascicular VTs), but often require ICD treatment (e.g., channelopathies). In patients with ischemic or nonischemic cardiomyopathies, symptomatic VT generally is treated with an ICD, although ablation may also be recommended in select cases.
In these patients it is important to explain carefully to the patient and family that ICD therapy may not prevent recurrence of syncope (since it takes time to recognize and treat the arrhythmia), but does reduce risk of sudden cardiac death. Finally, while antiarrhythmic drugs no longer are the most prominent treatment strategy for VT, drugs such as beta-adrenergic blockers, amiodarone, sotalol and dofetilide often have an important ancillary role for arrhythmia prevention.
4. Syncope due to structural heart disease
The goal of treatment is to prevent recurrence and reduce risk of sudden cardiac death by correcting/ameliorating the underlying structural problem.
In this setting the appropriate treatment depends on establishing a correct diagnosis. For the most part, the presence of a severe structural abnormality defines the course of treatment. However, these patients also have increased risk of arrhythmic syncope, and this additional complexity must be considered in the diagnostic assessment.
Severe aortic or mitral valvular stenosis, intracardiac tumors atrial myxoma, and congenital coronary artery anomalies are best treated surgically. On the other hand, conditions such as hypertrophic cardiomyopathy (HCM) are more complex.
The role of drug therapy versus surgical myectomy needs individualized consideration. Nevertheless, ICD therapy is often also recommended in HCM patients presenting with syncope.
E. Common Pitfalls and Side-Effects of Management
Syncope is a symptom and the underlying cause needs to be correctly identified as effective treatment strategies are very specific to the underlying etiology (e.g., orthostatic syncope could be due to drug effects, autonomic failure, volume depletion, or a combination of factors. The appropriate treatment strategies differ depending on these specifics).
Syncope should be clearly distinguished from other causes of TLOC, such as seizure disorders, concussion, intoxication, and syncope mimics. Failure to distinguish true syncope from other forms of TLOC may lead to incorrect therapy and inappropriate “labeling” of patients (e.g., many syncope patients have been mistakenly labeled as having drug-resistant epilepsy until the correct diagnosis was established, often years later).
IV. Management with Co-Morbidities
The cornerstone of syncope treatment is to identify the underlying cause and adopt a cause-specific treatment strategy. Not infrequently, comorbidities contribute to syncope susceptibility (Table 6).
V. Patient Safety and Quality Measures
A. Appropriate Prophylaxis and Other Measures to Prevent Readmission.
The principal safety concern in patients with syncope is the risk of physical injuries due to loss of consciousness. Less frequent, but of public health importance are the risks associated with driving, flying, and operating heavy machinery. Treatment should also focus on educating the patient regarding the importance of avoiding potentially hazardous situations, and being alert for and promptly responding to warning symptoms to reduce injury risks, which include:
Home and work place safety assessment may be important in some patients, particularly for elderly individuals or persons with high-risk occupations or avocations.
Identification of underlying cause and distinguishing syncope from other causes of transient loss of consciousness again is the key.
Accurate “risk stratification” when undergoing initial evaluation to ascertain whether a patient is suitable for outpatient assessment.
Education and reassurance in patients with reflex syncope so that they do not come to the emergency room every time there is a syncopal episode.
Education regarding safety precautions can help prevent dangerous injuries that trigger preventable hospital admission.
B. What's the Evidence for specific management and treatment recommendations?
The European Society of Cardiology Practice Guidelines (2009) provide recommendations and evidence grades in detail.
Moya, A, Sutton, R, Ammirati, F. “Task Force for the Diagnosis and Management of Syncope; European Society of Cardiology (ESC); European Heart Rhythm Association (EHRA); Heart Failure Association (HFA); Heart Rhythm Society (HRS). Guidelines for the diagnosis and management of syncope (version 2009)”. Eur Heart J. vol. 30. 2009. pp. 2631-71.
Strickberger, SA, Benson, DW, Biaggioni, I. “American Heart Association Councils on Clinical Cardiology; Cardiovascular Nursing, Cardiovascular Disease in the Young; Stroke; Quality of Care and Outcomes Research Interdisciplinary Working Group; American College of Cardiology Foundation; Heart Rhythm Society; American Autonomic Society. AHA/ACCF scientific statement on the evaluation of syncope”. Circulation. vol. 113. 2006. pp. 316-27.
C. DRG Codes and Expected Length of Stay.
ICD 10 Code—R55
Syncope is a symptom code. Do not list symptom codes as principal diagnosis when a related definitive diagnosis has been determined.
Expected length of stay is variable as it depends on the underlying cause. If diagnosed as reflex syncope on initial evaluation, the patient may not need inpatient admission. There are exceptions, however, such as the older or frail individual who may not have an appropriately protective home environment.
Copyright © 2017, 2013 Decision Support in Medicine, LLC. All rights reserved.
No sponsor or advertiser has participated in, approved or paid for the content provided by Decision Support in Medicine LLC. The Licensed Content is the property of and copyrighted by DSM.
- I. Evaluation and Management of Syncope: What every physician needs to know.
- II. Diagnostic Confirmation: Are you sure your patient has Syncope?
- A. History Part I: Pattern Recognition
- B. History Part 2: Prevalence
- C. History Part 3: Competing diagnoses that can mimic Syncope.
- D. Physical Examination Findings.
- E. What diagnostic tests should be performed?
- 1. What laboratory studies (if any) should be ordered to help establish the diagnosis? How should the results be interpreted?
- 2. What imaging studies (if any) should be ordered to help establish the diagnosis? How should the results be interpreted?
- III. Management.
- A. Immediate management.
- B. Physical Examination Tips to Guide Management.
- C. Laboratory Tests to Monitor Response To, and Adjustments in, Management.
- D. Long-term management.
- E. Common Pitfalls and Side-Effects of Management
- IV. Management with Co-Morbidities
- V. Patient Safety and Quality Measures
- A. Appropriate Prophylaxis and Other Measures to Prevent Readmission.
- B. What's the Evidence for specific management and treatment recommendations?
- C. DRG Codes and Expected Length of Stay.
|
<urn:uuid:844aca46-4c0c-4eb3-a748-08b1d73b0129>
|
CC-MAIN-2020-29
|
https://www.cancertherapyadvisor.com/home/decision-support-in-medicine/cardiology/evaluation-and-management-of-syncope/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657146247.90/warc/CC-MAIN-20200713162746-20200713192746-00127.warc.gz
|
en
| 0.920139 | 13,108 | 2.921875 | 3 |
Living off the grid entails surviving away from conventional utility structures, such as public water, power, gas, and sewer networks. Homes that are entirely off the grid have their own systems for supplying necessities like solar-powered electricity and private wells. When it comes to necessities like home phone lines and internet services, people who live off the grid frequently choose to do without.
Table of Contents
Benefits of Living off the grid:
- Development of Skills: When you live off the grid, you no longer have access to everything you once did, thus you must rely on your own abilities. You may learn useful, concrete, and useful skills like canning, gardening, electrical, mechanical, woodcutting, foraging, and hunting by living off the grid. These abilities are beneficial since they increase your level of independence and reduce your environmental impact.
- Live sustainably: A sustainable lifestyle aims to lessen how much a person or society uses both their own resources and the natural resources of the planet. Living off the grid is a more environmentally friendly style of life that contributes to the preservation of natural resources and ecosystems for future generations. It acknowledges the obligation we have as humans to protect the environment and promotes environmental stewardship.
- Save Money: The expenditure of living, particularly in metropolitan regions, is always rising, from housing prices to energy expenditures. After the initial investment in land, housing, and renewable energy sources, off-the-grid life is very cost-effective. Given that most individuals generate their own power and grow their own food, the monthly expenditures of living off the grid are quite low.
Disadvantages of Living off the grid:
- High upfront costs: It might be expensive to set up your energy source, water supply, and waste disposal.
- Lots of work involved: You need expertise, especially when building your house for the first time. This includes understanding how to set up the water and electricity supplies. You also need to be able to hunt and raise your own food.
- Occasionally, things may go wrong. Be aware that you can occasionally have water or electrical outages.
- Isolation: Before going off the grid, you should ask yourself if you are comfortable with not having a meaningful human connection every day.
What are the best States for the Living off the grid in the US?
- Florida: Florida is a fantastic off-the-grid destination! The state has a decent septic system and water source. Additionally, it is quite lawful to subsist in Florida off the land. In Florida, you are allowed to add any kind of alternative energy system to your property, including solar panels, wind turbines, gardens, wells, and other features. You may grow your own animals, including pigs, cows, hens, and roosters. In Florida, getting ready to live off the grid is considerably simpler.
- Ohio: Living off-grid in Ohio has several benefits, including the following:
- Natural resources abound
- Low cost of land
- Low living expenses
- Compared to most other states, our state has substantially lower crime rates.
- Additionally, property taxes are minimal.
- Many counties lack zoning laws or a permission agency (the septic tank regulations, however, are managed by the health department)
- Tennessee: If you want to save money, Tennessee is the place to go. In the whole country, these three metrics are the lowest: taxes, living expenses (especially in rural areas), and property costs. Natural resources, fishing and hunting opportunities, unattended rainwater collection, and 260 days of the growing season each year are all on your side. Together, these characteristics make Tennessee one of the best off-the-grid options.
- Oregon: Even though Oregon has some arid areas, the Cascade Range Mountains and the whole western portion of the state have appropriate ground. There are many natural resources available, including good timber practically everywhere and opportunities for hunting and fishing.
If you are planning to live off-grid, then you must visit www.landsale4u.com, as we offer various vacant land across the US. All these vacant lands are verified and come with zone restrictions that can help one to identify which land will be suitable for you.
|
<urn:uuid:e077af56-989d-4eb5-818d-6d0ff4d1ba68>
|
CC-MAIN-2023-50
|
https://landsale4u.com/blog/living-off-the-grid-in-the-us
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00341.warc.gz
|
en
| 0.941525 | 864 | 2.84375 | 3 |
Have you ever wished you had a twin to play with when you are bored? Well someday you may have that opportunity. Current research and technology scientists have created several clones like Dolly the sheep or Dewey the deer. Let’s lay down a basic understanding of what cloning is before diving deeper.Cloning is normally a natural process but two artificial processes have been discovered as well. When a fertilized egg splits into two embryos this results in identical twins. When a mother gives birth to a set of twins, the natural cloning process occurs within the mother’s womb. The splitting of the egg takes place at the beginning of the pregnancy. There are two artificial processes of cloning. The least technologically advanced option would be Artificial Embryo Twinning. Similar to natural cloning, the embryo is split into two eggs. Simply put this process occurs in a petri dish through the cutting of the egg before differentiation. The first process is called Artificial Embryo Twinning, this is low tech compared to the other process. Artificial Embryo Twinning is just like natural twinning but carried out in a Petri dish instead of in the mother. In the Petri dish the scientists cut the embryo into two, this results into twins.The second more technologically advanced process is called Somatic Cell Nuclear Transfer or SCNT. Somatic Cell Nuclear Transfer is where they grab a cell different from the sperm or egg, like a skin cell and transfer the nucleus to the egg cell to fertilize the egg. They remove the old nucleus cell and the DNA from the egg cell. If the cell turns into an embryo, then they implant it into a surrogate mother to be born. Dolly the sheep: Dolly the sheep was the first mammal to ever be cloned. Dolly was the only lamb to be born out of 277 other lambs. To create Dolly they used a udder cell from a white sheep. Dolly the sheep was born on July 5, 1996 and died February 14, 2003. She was age six when she died. She died because she had a lung tumor in her hind leg and had Arthritis. A norml life span of a sheep is eleven to twelve years, Dolly most likely died because her cell was from a six year old sheep already. There could be the question why was she cloned, and why a sheep. Well the answer is they were trying to find a medicine in the milk of farm animal. Cloning an animal allows them to find the problem and continually fix the gene problem, to build a better stock. With the advancements in cloning they can take out certain defects in people/animals. Commercial Service are now breeding/cloning these special species and selling them for 100 thousand dollars. This treatment is not permitted on human yet because there could be negative affects. In the UK there is many discussions on making it legal for therapy and treatment. Sense Dolly there has been many different animals cloned like, rabbits, mules, and etc. Ralph the Rat: Ralph was created in an institution in France. Ralph was announced to the world in 2003. Ralph toke a lot of time to create because rats start to develop right after leaving the ovaries. Finally they stabilized the egg through chemical means. Ralph created several healthy pup normally. Proving that cloned animals can create healthy normal babies. It took one hundred and twenty nine cloned embryos to create 3 rats but only one lasted a normal lifespan. Ralph was the first to be born out of the litter. Cloning rats has several benefits including medical research for human diseases and disorders. If they have several rats with the same genes they can know it is the environment that is changing if they try different medications or vaccines. The other two rats died in half the lifetime there were supposed to live. Cumulina the mouse: Cumulina the mouse was the first animal cloned from an animal adult cells to live to adulthood. Cumulina died from a natural death, of old age. Cumulina was cloned using the Honolulu technique. This method was not effective in humans though. Cumulina name is from the method that created her. Tetra the monkey: Tetra was made in october of 1999. Tetra was made through a process called Embryo splitting. Tetra was the first primate to ever be cloned. Tetra was created by professor Gerald Schatten in the Oregon National Primate research center. Tetra was born 157 days later. Tetra got her name from Ancient Greek meaning “four”.Tetra was 1 out of 4 monkeys to survive the process. After four months of her being alive the genetically modified her genes with jellyfish genes. They ended up doing the gene modification to see in different environments.Idaho Gem: Idaho gem was the first member of the horse family to be cloned. After twelve minutes of being born Idaho gem was standing and walking. This was fascinating because it was the first hybrid to be cloned. What was so interesting is that mules cannot have babies, but if you clone them they can. Idaho gem came from a fetal egg cell in 1998. The scientist worked for 3 years without success. Final in 2001 they created the Idaho gem. The scientist had 14 pregnancy in 113 attempts.(Which is amazing.) In creating the Idaho gem there was another scientist racing to create him but failed and they have been trying for eighteen months. CopyCat: CopyCat is also known as Carbon cat. CopyCat was born on December 22, 2001. CopyCat is a brown and white tabby cat. CopyCat’s Donor was a short haired cat named Rainbow. CopyCat was the first cloned pet. CopyCats cloning process was Epigenetic reprogramming. Epigenetic reprogramming is when a scientist genetically modify the epigenetic marks, such as the Methylation DNA. So even though CopyCat and Rainbow are made out of the same genes the look very different. Some people do not like cloning pets, because people expect the to act and look the same as the old one. But in reality they are to different animals.As of today CopyCat has 4 kittens. There names are Tim, Zip(They are boys) and Tess, which is the girl. The last kitten was stillborn. Stillborn is where a baby gets born died. The baby died in the womb of the mother. CopyCat has had not health problem relating to the cloning process. It took the scientist three tries to successfully clone CopyCat. Embryo Transplant: A developing embryo is removed from a pregnant animal at an early stage, before the embryo’s cells have had time to become specialised. The cells are separated, grown for a while in a laboratory, and then transplanted into host mothers. When the offspring are born, they are identical to each other, but they are not identical to their host mothers, because they contain different genetic information .Adult cell cloning: In this process the nucleus for an egg cell is thrown out and a new one is put in. Then the scientist shock the egg so it starts to split. After that the egg is transferred to a host mother. Then in the host mother the baby is born. Dolly was the first animal to be cloned using this method.Honolulu Technique: The Honolulu technique was created by Dr. Teruhiko Wakayama at the University of Hawaii. In the Honolulu method, the nucleus is removed and put into another cell that does not have one. Then it is soaked in a chemical solution until it develops an embryo. When it has developed an embryo it is put into an surrogate mother. Conclusion: Scientists have experimented with reproductive and therapeutic cloning for decades. Ideas that were once far-fetched are coming to life. Cloning experiments are being conducted on organisms ranging in size and complexity from small clusters of cells to farm animals. Some applications of cloning are already being tested on humans.A review of the capabilities of reproductive and therapeutic cloning revealed that both methods have distinct benefits and disadvantages. When comparing these two cloning methods, it is concluded that therapeutic cloning is more beneficial for future medical applications, and is deserving of a higher concentration of governmental funding. The purpose of this scientific research is to make advancements that will improve the quality of life. The capability of culturing stem cells using an organism’s own genetic material and later transplanting them into diseased tissue is extraordinary. Treatments in humans using blood and bone stem cell transplants have already been successful. This contributes to optimism that therapeutic cloning will help overcome other human diseases. Even though there are risks, cloning would give people suffering from disease a chance for recovery, where there was none.Along with the endorsement of therapeutic cloning comes approval to use human embryonic cells for stem cell research. Despite objections based on ethics and morals, the potential benefits of this type of research cannot be overlooked. Research requires scientific testing of various ideas in order to acquire new knowledge. Experimentation involves many failed attempts before any success is achieved. This same logic applies to cloning. That is why an immense number of embryos must be used before any new breakthrough is discovered. Unfortunately, many embryos must be sacrificed in order for scientists to reach the next level of knowledge, which will then be the stepping stone for future research and experimentation. With the discovery by Yamanaka in 2006 that mature cells can be reprogrammed to become pluripotent, it is possible that use of human embryonic cells will end, and the moral dilemma will be eliminated.
|
<urn:uuid:a164b091-a45d-4dc5-96a9-4cb5912affd9>
|
CC-MAIN-2020-16
|
https://walktocurecancer.org/have-womb-the-splitting-of-the-egg-takes-place/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00135.warc.gz
|
en
| 0.975385 | 1,931 | 3.28125 | 3 |
Who says science can’t be poetic? Here are some science facts that would make great starting points for a story or poem. I recently used these as prompts in a writing workshop whose theme was Using Behavioral Science to Build Better Scenes and Characters. Below, you’ll find the citations for the original studies, as well as sources that describe these studies in ways that are accessible to non-scientists.
Creative writing prompt: Pick one of the following sentences and make it the first line of a story or poem
The desire for revenge is a physical craving.
I originally learned this from a book called We Need to Talk: How to Have Better Conversations, by Celeste Headlee. In a chapter making the case for apologies, she describes the work of Michael McCollough, who runs the Evolution and Human Behavior Laboratory at the University of Miami and who says that the brain scan of someone who has just been harmed or insulted looks similar to “the brain of somebody who is thirsty and is just about to get a drink or somebody who’s hungry who’s about to get a piece of chocolate to eat. . . . It is literally a craving.”
Michael McCullough, “Getting Revenge and Forgiveness,” interview by Krista Tippett, On Being, May 24, 2012
Laughter is a social bonding activity.
You can learn more in the “Laughter” episode of the Here We Are Podcast, a great podcast in which standup comic Shane Mauss interviews behavioral scientists. In this episode, he’s talking to Greg Bryant, assistant communications professor at UCLA, who studies – among other things – the vocal elements that make laughter contagious.
- Bryant, Greg. “Shared laughter in conversation as coalition signaling.” XXI BIENNIAL INTERNATIONAL CONFERENCE ON HUMAN ETHOLOGY VIENNA/AUSTRIA. 2012.
- Bryant, Gregory A., and C. Athena Aktipis. “The animal nature of spontaneous human laughter.” Evolution and Human Behavior 35.4 (2014): 327-335.
“Justice may be blind, but she’s sure sensitive to her stomach gurgling.”
This is a quote from the book Behave: The Biology of Humans at Our Best and Worst. In a chapter on metaphor, he explains that “‘hungering for fame and fortune’ are just metaphors, but our brain activates the circuitry that goes along with real hunger. When people are physically hungry, they become less generous in many ways, including this one, with huge real-world applications: Judges are more likely to grant parole if they’ve just eaten lunch. “In a study of more than 1,100 judicial rulings, prisoners were granted parole at about a 60 percent rate when judges had recently eaten, and at essentially a 0 percent rate just before judges ate (note also the overall decline over the course of a tiring day).”
Briers et al., “Hungry for Money: The Desire for Caloric Resources Increases the Desire for Financial Resources and Vice Versa,” Psych Sci 17 (2006)
What we’re feeling inside can be hard to separate from what we’re feeling outside
These examples are also from Robert Sapolsky’s book, Behave. In one example, when a resume was attached to a heavy clipboard, evaluators were more likely to describe the job applicant as serious, able to appreciate the gravity of a situation and deal with weighty matters, rather than being a lightweight. In another example, holding either a cup of hot coffee or iced coffee while interacting with someone made volunteers more likely to rate that person as having a warm or cold personality.
J. Ackerman et al., “Incidental Haptic Sensations Influence Social Judgments and Decisions,” Sci 328 (2010)
L. Williams and J. Bargh, “Experiencing Physical Warmth Promotes Interpersonal Warmth,” Sci 322 (2008): Y. Kang et al., “Physical Temperature Effects on Trust Behavior: The Role of Insula,” SCAN 6 (2010): 507.
Teachers: Looking for a behavioral science lesson plan to use your students?
You’ll find a full lesson plan on the brain science behind figurative language on Teachers Pay Teachers.
The lesson plan includes:
- An intro full of hidden figurative language.
- An answer key that highlights all 17 examples of figurative language in the intro.
- Behavioral scientist Robert Sapolsky’s explanation of how figurative language works in our brains.
- Writing prompts and ideas for expanding the lesson to fill a 45-minute class period or 90-minute block.
|
<urn:uuid:84ca8ce7-9473-4fd3-8ca7-ca8c3a757983>
|
CC-MAIN-2023-23
|
https://roxannaelden.com/2018/03/behavioral-science-facts-also-make-great-writing-prompts/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644913.39/warc/CC-MAIN-20230529205037-20230529235037-00294.warc.gz
|
en
| 0.920053 | 1,011 | 3.125 | 3 |
Retinopathy means disease of the retina, the nerve layer at the back of your eye. Diabetic retinopathy is related to prolonged high blood sugar, which damages blood vessels in the eyes. It can lead to poor vision or blindness.
Diabetic retinopathy usually gets worse over many years. People who have diabetes need regular eye exams so that this condition can be found early. Keeping your blood sugar and blood pressure under control can help protect your vision.
Current as of: March 1, 2023
|
<urn:uuid:52b54674-4c26-43d1-be9b-9b918e95a26b>
|
CC-MAIN-2023-23
|
https://www.wellspan.org/health-library/Document.aspx?id=std120874
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00644.warc.gz
|
en
| 0.950396 | 104 | 3.359375 | 3 |
Prevention of cancer is one of the biggest public health challenges of our time. It has meanwhile been shown that good nutrition, physical activity and a reduced body fat mass can lower the risk of cancer. According to the World Cancer Research Fund (WCRF), up to 30% of all cancers could be prevented by means of a healthy lifestyle and nutritional habits. Scientists also estimate that cancer of the large intestine, for example, could decline by up 50% if people were to follow a cancer-inhibiting diet. Other studies indicate that the chances of being cured for anyone already diagnosed with cancer can also be improved with this style of nutrition.
Scientific data show that a only a minor proportion of cancers are hereditary. Environmental factors are far more significant and, in many cases, these are controllable and include: smoking, infectious diseases, ionising radiation, industrial waste, environmental pollution, medicines and many aspects of nutrition, physical activity and body fat mass. It must be said, however, that no studies or types of studies can prove that one individual factor is the exclusive cause for a disease nor that it can provide absolute protection against a disease (WCRF report 2007).
The latest findings on what constitutes healthy nutrition are:
- Diversity in the diet (quantity and quality)
- Plenty of grains (wholegrain products: rice, wheat, rye, buckwheat, maize, quinoa, millet, Kamut, etc.) as well as legumes (pulses)
- 600g fruit & vegetables per day (3 portions of vegetables, 2 portions of fruit)
- Fish 1-2x per week.
- High Quality Milk.
- Meat 300-500g per week (eat as few processed meats, e.g. sausages, as possible)
- As little sugar & salt as possible. Use fresh herbes and high quality spices
- Little fat, plant-based fats such as rapeseed and olive oil are preferred.
- 1.5l water or unsweetened tea each day
- Avoid alcohol, only drink occasionally and in moderate quantities (10-20g alcohol per day). Problem: addiction damages the nerves and liver. (40g alcohol each day means a fivefold increase in the risk of developing cancer!)
- Take the time to enjoy your food and take pleasure from it.
- Careful preparation. When making sauces, use stocks, fresh herbs and jus instead of roux, sauce thickeners or other flavour enhancers!
- Ensure that you take exercise and pay attention to body weight
As indicated in the introduction and as the rising frequency of recent media reports show, increasingly undesirable and negative developments in the production and processing of food products are being observed. The day-to-day availability of a large number of food products seems to be steering the processes involved in producing the finished products in such a direction that we receive meat, fruit and vegetables as well as cereal products of a lower quality. This also includes meat products which do not comply with humane animal welfare standards and feeding practices. In such cases, the farm animals are degraded to production machines from which the intention is to extract an ever increasing amount of profit. Animal welfare (species-appropriate animal husbandry), by contrast, focusses on the natural requirements of the animals and also takes their innate needs into consideration. The result is livelier, healthier animals which are also more placid to handle. The argument commonly used that such meat also tastes better shouldn’t be the only criterion for this sort of husbandry. The far more important issue is a high-regard for other living creatures and respect for them. Killing (slaughter) of animals – a topic which is often completely concealed from society – should take place in accordance with strict animal protection guidelines. Unfortunately, the reality is that in Germany c. 500,000 pigs are still boiled alive every year, and with cows the captive-bolt device misses the target position in c. 200,000 cases and these animals therefore suffer a painful death (Patrick Hünerfeld: Fleischkonsum: Qualen im Schlachthaus (Meat consumption: torture in the slaughterhouse) BR-online, 30.3.2010, and Albert Schweitzer Stiftung press release, 31.3.2010). Transport to the slaughterhouse, even in compliance with current legal requirements, is often a painful journey on which animals experience exhaustion, dehydration and stress (Albert Schweitzer Stiftung information, 3.8.2013). Regional or even local slaughtering would spare animals a great deal of suffering.
Respect for animals and the killing of them puts the question of whether one should eat more red or white meat into perspective. The more pertinent question is whether one should ever eat meat which has been produced without regard to animal welfare. In terms of the quantity that should ideally be consumed, no excessive additional financial burden is actually involved, so the answer should certainly be yes to meat produced WITH regard to animal welfare!
When thinking about meat, also bear in mind a niche product which fulfils the desired requirements: game meat. The quality of this meat is determined by an intact environment and humane killing by a reliable shot. Wild boar is sometimes an exception in this regard as it can be a victim of the effects of the Chernobyl disaster – measuring radioactivity is a quick way to be certain in this regard.
In the case of native fish, environmental conditions determine the quality. But this resource also has its natural limits and therefore responsible fish farmers take on an important role. Responsibility means fish breeding without growth accelerators, antibiotics and artificial oxygenation – which stimulates the appetite of the fish – as well as species-appropriate feed.
The milk we drink each day should be healthy and flavoursome i.e. come from animals that have been fed in accordance with their needs. What does this mean in terms of cows? Primarily, little concentrated feed and at least 180 days grazing on natural pasture. Even in winter these cows get enough access to the open-air, sun, fresh air and natural hay. Nutritional medicine, in a recently published German-English study, has shown that organic milk and meat contain 50% more omega 3 fatty acids than conventional products! Organic milk also contains 40% more health-promoting conjugated linoleic acid (CLA) as well as slightly higher amounts of iron, vitamin E and several carotenoids.
Ideally, butter will also be made from organic milk. However, even if organic butter is used it is often criticised by many consumers and this is due to the bad reputation of saturated fatty acids. Yet if eaten in accordance with recommended daily guidelines, butter can actually be regarded as a culinary pleasure rather than a cause for a bad conscience.
And now a topic that has almost become boring: the ongoing discussion about sugar and salt! The problem here concerns their use in production of food products. In many products such as preserves, lemonade and fruit juices they are often “hidden” ingredients, used to improve flavour. For day-to-day habits there is just one rule: avoid these products! And when you are preparing food, use as little sugar and salt as possible.
There is no doubt that, in terms of health, avoiding alcohol is the best option. This is especially true for cancer prevention. A compromise might be more realistic here, however, that is to enjoy 20g of alcohol in the form of wine and beer – but not every day. This amount can actually be beneficial to quality of life. It is not without good reason that we speak of wine and beer culture. And it is not only beer that is at risk in terms of its purity but also wine. Unfortunately, there is a vast number of oenological additives which can be used to improve wine without having to be declared. Therefore, when possible, try to buy directly from a trustworthy winemaker and make a contribution to keeping wine as a genuinely natural product – not only for health reasons but also out of respect for the work carried out in vineyards and wine cellars.
It goes without saying that during cancer treatment alcohol is a no go! Alcohol and medicines – this is a highly explosive mix which is best avoided.
Fruit, vegetables and grains should be purchased from organic farms – not only as this is an important factor in healthy nutrition but also because it has sustainable consequences for our environment due the use of synthetic plant protection products, mineral fertilisers and genetic technology largely being renounced in this sector.
As a doctor and scientist, of course, I frequently reflect on the necessity of studies to investigate various claims. If feasible, they would be certainly helpful – in the best case for the next generation – because as a general rule they have to be long-term studies. One of the key questions would be: which effects would a diet which favours meat produced with disregard to animal welfare, and fruit, vegetables and grains from non-organic sources have on health? Let’s assume for a moment that such a study would find that this type of nutrition has no negative effects on health. Would the consequence then be that it is acceptable to continue, unperturbed, to exploit animals and impoverish the soil, or do we still, as a result of our instinct for self-preservation, have an ethical and and societal responsibility towards animals and nature?
In order to explore the issues raised and to provide you with helpful recommendations, the Munich Tumour Centre, in collaboration with cooperation partners, would like to draw increased attention to these topics in future, and furthermore, to have an active influence on undesirable and negative developments.
Prof. Dr.med. Volkmar Nüssler
|
<urn:uuid:101977bf-cdb8-49f2-af07-f56e3758e25d>
|
CC-MAIN-2020-29
|
https://news.tumorzentrum-muenchen.com/2016/06/eating-healthily-as-well-as-ethically-at-the-same-time-is-this-really-possible/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902496.52/warc/CC-MAIN-20200710015901-20200710045901-00562.warc.gz
|
en
| 0.956928 | 1,984 | 3.109375 | 3 |
A review of the seldom promoted Vitamin K shows that its benefits for bones, heart and even cancer are undervalued. October 2015 research from Missouri found that Vitamin K has several important functions, some of which are still being discovered. It states, “Vitamin K is an anticancer, bone-forming, anticalcification, and insulin-sensitizing molecule.” Vitamin K (K1 and K2) is important for proteins within the body to perform many functions including healthy blood clotting.
Researchers found that Vitamin K deficiency is not uncommon. Although intestinal bacterial make Vitamin K2, the amount produced is negligible, and intake from food was considered in this research to be not enough to create all reactions needed from the vitamin K-dependent proteins.
Drugs that deplete Vitamin K like warfarin (used to prevent stokes) may cause detrimental side effects, and might be alleviated by taking a vitamin K supplement. In addition to supplements, vitamin K1 is found in green leafy vegetables and olive oil, and Vitamin K2 is in chicken, egg yolks and cheese.
(James DiNicolantonio, Jaikrit Bhutani, James O’Keefe, “The health benefits of vitamin K”, Open Heart 2015;2: doi:10.1136, Saint Luke's Hospital, Kansas City, Missouri, US)
|
<urn:uuid:dace078b-7dbe-4d28-8312-31bb78d68ca5>
|
CC-MAIN-2017-30
|
https://enerex.ca/blogs/all/84380612-vitamin-k-the-unsung-hero
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436330.31/warc/CC-MAIN-20170728042439-20170728062439-00557.warc.gz
|
en
| 0.938984 | 284 | 3.5625 | 4 |
Drug Use, Dependence, and Addiction at a British Columbia University: Good News and Bad News
How to Cite
Two studies were undertaken to determine the perceived and actual prevalence of drug use, dependence, and addiction among students at Simon Fraser University. In thefirst, 144 students estimated the percentage of their fellow students that used each of seven drugs daily. Subsequently, each student reported how many days he or she had personally used each drug in the previous month. Estimated daily use (attributed tofellow students) was far higher than reported daily use. In a second study, detailed individual interviews of another group of students confirmed the unexpectedly low frequencies of daily use found in the first study: However, this does not mean that dependence and addiction were not a problem; of 107 students interviewed in the second study, 31% reported current dependence and about 5% current addiction. Surprisingly, the most common drugs in compulsive use were caffeine and nicotine followed, at a distance, by cannabis and alcohol. A new orientation towards drug problems among Canadian undergraduates in the 1980's is proposed, in which exaggerated concern over exotic, illicit drugs is replaced by greater awareness of serious problems of dependence and addiction to familiar drugs.
|
<urn:uuid:0e75f5ea-14f0-4458-acd0-8992c75748ed>
|
CC-MAIN-2023-23
|
https://journals.sfu.ca/cjhe/index.php/cjhe/article/view/182962
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644683.18/warc/CC-MAIN-20230529042138-20230529072138-00491.warc.gz
|
en
| 0.962165 | 252 | 2.546875 | 3 |
UK wildlife is already feeling the effects of climate change, scientists say. According to a report out on Thursday, with input from many of the UK's top environmental scientists, many species are now found further north and at higher altitudes than in previous decades.
Climate change may also be making it easier for species from foreign shores to invade, often to the cost of native wildlife.
The Terrestrial Biodiversity Report Card is the first in a series of reports commissioned by the Living With Environmental Change Partnership, led by NERC with Defra, the Environment Agency and Natural England.
The Report Card is designed to provide policy makers, land managers, environmental consultants and researchers with the most up-to-date evidence on the effects on climate change.
'When thinking about climate change it's important to stand back, review the evidence and take a long-term view,' says Dr Mike Morecroft from Natural England, who led the development of the report.
'The report card shows strong evidence from a large number of different scientific studies that the natural world has started to respond to climate change over the last few decades.'
'It also shows the range and complexity of these changes: some species and habitats are much more sensitive than others.'
'This is a challenge for conservation and we need to adapt our approach to reduce the risks and take advantage of any opportunities. It is also another wake-up call about the seriousness of tackling climate change.'
Amongst the report's most important findings is an increasing risk of new pests and diseases in the UK, such as the oak processionary moth, whose caterpillars can also cause respiratory problems in humans.
It also reveals a sharp decline in wildfowl and wading birds wintering in the UK. Surveys show that the number of Bewick's swan wintering in the UK declined by 44 per cent in just ten years between 1997/8 and 2007/8.
Natural Environment Minister, Richard Benyon MP, says the new report will be important for informing new policies to protect wildlife.
'It's essential that we improve our understanding of how the natural environment is changing, as this affects the action we need to take to conserve biodiversity,' he says.
'New policies are based on scientific evidence, which is why research like this is so important.'
Explore further: Dragonflies, as climate change indicators
|
<urn:uuid:4053d6c5-3248-4d54-87ed-99030dc3add1>
|
CC-MAIN-2013-48
|
http://phys.org/news/2013-05-climate-affecting-uk-wildlife.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163066263/warc/CC-MAIN-20131204131746-00093-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.940942 | 481 | 3.453125 | 3 |
Dyslexic students can have a hard time processing written and oral language. According to The Society of Neuroscience, about 3.5 percent of American students—slightly more than 2 million children have dyslexia.
Using Squigl in the classroom can help support these challenges by creating animated videos using simple images that are easy to consume and retain and help pace out learning content into microlearning chunks. You can also upload any existing PowerPoint or Word lessons and transform them into an interactive Squigl video with quizzing and assessments! Leverage Immersive Reader to increase engagement and accessibility for students with reading difficulties.
An average of 9 percent of students in U.S. public schools are English Language Learners (ELLs), according to the National Center for Education Statistics. Most educators have no formal training on how to support English language learners, which adds to the challenge of creating support materials for them.
With Squigl, you can create compelling and interactive videos to help support English Language Learners. By tapping into the visual channels of the human memory, Squigl videos can increase knowledge retention exponentially and make English Language content easier to understand!
Creating more effective, engaging, and memorable interactive videos for English Language Learners is as easy as 1,2,3 with Squigl. This unique online video maker software helps you connect more powerfully with your audience. Unlike regular slides, Squigl lets you show the relationships between the pictures and the main ideas of your presentation, taking viewers on a compelling, informative journey they’re not only likely to enjoy more, but remember and act upon.
Duaa Abu Amara, Educator, Riyadh Schools
Access with ease
Utilize single sign-on and say goodbye to multiple passwords and accounts. Save time by accessing everything in one place.
Want to take Squigl for a test drive? Get a Demo of Squigl for your school!
Take this course in the Microsoft Educator Center and earn a Squigl Badge!
|
<urn:uuid:6a81a2b5-36d9-4914-8bc2-9a2b10b79fe8>
|
CC-MAIN-2023-23
|
https://squiglit.com/microsoft-inclusion/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647895.20/warc/CC-MAIN-20230601143134-20230601173134-00604.warc.gz
|
en
| 0.901378 | 401 | 2.671875 | 3 |
Back to Archives
Spring 2009 Issue
Stereotypes of History: Reconstructing Truth and the Black Mammy
History is written by the victor, while the voices of the oppressed are created to suit the needs of the more powerful. This "history" allows for stereotypes to be taken as fact, with these negative images internalized by marginal groups as they are continually transformed and repeated throughout history. The black Mammy has been incorporated into American history for centuries. This mythical image has been repeatedly modified to serve the interests of advertisers and the powerful groups of society. The Mammy's image and qualities originated in the southern United States as a way of upholding the image of a unified South in order to maintain business interests. However, one may not easily recognize the more recent use of the Mammy stereotype in such characters as "The Pine-Sol Lady" or Tyler Perry's "Madea." This essay addresses the origin of this stereotype and how its perpetuation has been carried out over time in advertising, art, and film to serve the economic interests of the ruling class and the powerful institutions of society.
Images Of The Mammy
Re-Configurations of The Mammy
The writer Milan Kundera once wrote, "The struggle of man against power is the struggle of memory against forgetting"(Kundera 1981, 3). The ramifications of this statement are not fully realized until we consider the different vantage points of history, memory, and the power relations that decide who and what gets ignored and altered in order to fit an acceptable version of American history. These alterations and modifications usually create stereotypes surrounding the issues of class, race, gender, and sexuality. Despite the efforts society makes to diminish these exaggerated images, stereotypes often rule our everyday interactions. One of the most commonly known stereotypes, still featured in contemporary advertisements and other media, is that of the black Mammy. Characterized with her own "personal" history, this mythic female character has been portrayed as the always loyal servant to her master's family. This image of contented servitude denies the restrictions of a slave and distorts the struggle of the social "other" as a black woman attempts to gain power in a society that demeans her both because of her race and gender. The black Mammy serves as a primary example of how stereotypes are taken as fact and are unfortunately incorporated into American history. Therefore, for centuries, this image has been repeatedly modified in order to fit the interests of those in power.
The history of women has often been selective and subjective, due to the popular opinion of centuries past, which believed the lives and accomplishments of women to be less important compared to that of men. According to Deborah Gray White, "Colonial white America's perceptions of racial difference were founded on the different way they constructed black and white women" (White 1999, 4). Yet the history of women cannot easily be compared across the dimensions of race, class, and sexuality, as oppression and exploitation have been experienced differently. Women's culture and oppression cannot be universalized as the story of all American women. For example, black feminist scholars of black women's history found that their invisibility was reinforced when they corroborated with the historical sources of both whites and black men. For the black woman, sex and race cannot be separated or viewed distinctly from one another (White 1999, 6). But women's history and African American history are still seen as separate narratives.
One's identity is not just race and not just gender. When we take into account the plight which black women must face in the eyes of history, they remain lower on the social hierarchy that is constantly at work in the writing of history. In "Memory and American History," David Thelen states, "In each construction of a memory, people reshape, omit, distort, combine, and reorganize details from the past in an active and subjective way" (Thelen 1989, 1120). Mixing past and present events helps to form the current understanding of history today. Construction of a memory arises out of a specific need or circumstance which deems a certain element of history "necessary" in the eyes of those in power, who may happen to benefit from the existence of such a memory. The construction of history and, specifically, the stereotypes perpetuated throughout history, arise out of a selfish need for the powerful groups of society to have an event or idea remembered or forgotten for their own gain, regardless of the validity of this piece of "truth." However, these so-called memories of American history are not always the same history remembered by the collective society of America. It is less important whether these stereotypes are true or false; more important is the realization that these stereotypes prevent the production of new meanings and ideas from entering the dominant narrative of history. American history is believed to be the story of all Americans. This helps to develop a shared identity by allowing people of similar backgrounds to form a singular interpretation of the past. Yet, what role does the social "other" play in the creation of memory?
The less powerful groups of society, based on class, race, gender, and sexuality, have been forced to cope with the history which has been written for them. The "selective remembering"(Lerner 1997, 205) of American history has reinforced the notion that both the histories of women and non-whites are not worth recording for future generations. The impact of women on the recording of history had to be "made from the margins, through 'influence,' not power, and through the mediation of men" (Lerner 1997, 207). History helps to shape and explain the world, both in the past and present, but marginal groups have been denied access to this creation. According to Evelyn Brooks Higginbotham, language is always rife with connotations as "there have never been 'neutral' words and forms – words and forms that can belong to 'no one'; language has been completely taken over, shot through with intentions and accents" (Higginbotham 1992, 256). The history of women is viewed as a supplement to the history constructed by men in power. This is similar in relation to race. The history of African Americans was largely ignored, except for those aspects that involved white men. However, even this "history" was never entirely accurate as association between these two races began through oppression and slavery. According to Patricia Morton, the black American woman has emerged from history, alongside the stereotypical images associated with her identity, as a "natural and permanent slave woman" (Morton 1991, ix). This corresponds to the image of the enslaved black Mammy who remains tied to her white captors in advertisements and fictional images following the abolition of slavery. The appearance of loyalty on the part of the Mammy was deliberate, as advertisers and men wanting to maintain their southern business interests sought to uphold the image of a unified South. Kimberly Wallace-Sanders associates the use of the Mammy image with a "national amnesia about the history of slavery" (Wallace-Sanders 2008, 61) in order to justify this fabricated image. According to this myth of a picturesque Dixieland, the end of the Civil War did nothing to quell the faithful servant from the sense of duty to her former master's children.
The image of the Mammy is one of the most widely known and easily recognized stereotypes in American history. First mentioned in a travel narrative in 1810, the word "mammy" has been associated with a slave woman taking care of white children for centuries (Wallace-Sanders 2008, 4). With many depictions featuring the Mammy with her signature wide grin and large, white, shining teeth, the Mammy portrayed the image of constant contentment, thus serving as an important symbol to past and present slave owners to avoid the suggestion of maltreatment. Usually with an obese or robust figure, the Mammy was viewed as comedic, due to her betrayal of the common standards of beauty for women with a thin frame. Also, in relation to the concept of beauty, extremely large breasts and buttocks became common physical features of the Mammy. While these features are often viewed as the physical attributes which help to attract men, in the case of the Mammy, these features of exaggerated femininity merely helped to add to the comedic nature and encourage others to harshly critique and mock the Mammy. According to Wallace-Sander's analysis of the Mammy figure, the body of the Mammy acts as a "tendon between the races, connecting the muscle of African American slave labor with the skeletal power structure of white southern aristocracy" (Wallace-Sanders 2008, 3). Depicted often holding or caring for the children of her white master, the Mammy was placed in the precarious position of nurturing both her own black children and their future owners.
Images Of The Mammy
Wearing drab clothing, common to slave women during the nineteenth century, the Mammy was juxtaposed against the corseted Euro-American woman for whom she was working. And finally, with the addition of the headscarf, the image of the black Mammy would be complete. This headscarf, or more commonly called a head rag, is believed to be a custom from Africa, as it was sometimes necessary for women to cover their heads for religious ceremonies and certain occasions (Jewell 1993, 39). The inclusion of the head rag and its traces to Africa can be seen as an effort to further exclude these women from mainstream society as their ties to Africa are re-presented in a seemingly Americanized image.
With broad shoulders, large arms, and a wide stance, the black Mammy takes on the image of what bell hooks terms "masculinized sub-human creatures" (Hooks 1981, 71). The masculinization of the Mammy was used to maintain the patriarchal ideal of white women as passive and ladylike through this exaggerated alternative. These images show African American women as the "antithesis of the American conception of beauty, femininity, and womanhood" (Jewell 1993, 36). This is in spite of the fact that these images revolve around the kitchen and children, commonly seen as the domains of women. However, these physical spaces and the restriction of black women to these areas help to reinforce the system of hierarchy which is perpetuated throughout the rest of society. Jesse Parkhurst notices the stark differences between the Mammy and slave women, as the Mammy was given qualities which were often denied to other black female slaves:
She was considered self-respecting, independent, loyal, forward, gentle, captious, affectionate, true, strong, just, warm-hearted, compassionate-hearted, fearless, popular, brave, good, pious, quick-witted, capable, thrifty, proud, regal, courageous, superior, skillful, tender, queenly, dignified, neat, quick, tender, competent, possessed with a temper, trustworthy, faithful, patient, tyrannical, sensible, discreet, efficient, careful, harsh, devoted, truthful, neither apish nor servile. (Parkhurst 1938, 352- 353)
In this description, the Mammy is afforded certain qualities which deny her actual legal status as a piece of property to her owner, while presenting the illusion that the Mammy was well-respected by her master and his family.
The privileged class uses these "images and ideology" to keep African American women on the periphery of society, consequently limiting their access to societal resources and institutions (Jewell 1993, 4). This can also be seen in the display of diction and speech in some advertisements and fictional images of the Mammy. In order to further the idea that black women are less educated and, therefore, less worthy of the privileges of society, the common speech of the Mammy displays an uneducated, bossy, and domineering character. An example of speech used on a trade card for a Universal Clothes Wringer reveals the Mammy's response to her mistress as to why the washing was not yet done (Figure 1
): "Oh Mistis, De wringing am awful. Always tear de clothes. 'Spect dat I neber get through" (Morgan 1995, 103). Following the purchase of this clothes wringer, the work is finished quicker, but Mammy's grammar and diction remains relatively the same (Figure 2
). Advertisements clearly position the Mammy as the servant, and lower in status and prestige compared to the master's wife, despite her more apparent ability to conduct the business of taking care of a home and children.
Re-Configurations of The Mammy
From the Mammy figure, it is not hard to draw the connection between this mythic figure and that of Aunt Jemima. The figure of Aunt Jemima originated largely because of the long standing stereotype of the Mammy; however, Aunt Jemima's tasks in the home are usually reduced to being a cook. Aunt Jemima's smile and friendly demeanor arose out of the representation of stereotypes concerning black women by racist comedians, who profited from the image of an oppressed female body. Her personification has been traced back to St. Joseph, Missouri, where in 1889, Chris L. Rutt observed black-faced comedians performing. "[A] plantation cook in an apron and red bandana, seemed to fill the bill" for Rutt's hopes of advertising his self-rising pancake mix (Morgan 1995, 88). In the months that followed, Rutt hired Nancy Green, an African American maid to "play" Aunt Jemima at a company exhibit. Green, a former slave herself, entertained those visiting the exhibit with tales of life in the South, epitomizing the ideal of Southern hospitality and the redemption of the South which the Southern privileged class had been hoping for (Morgan 1995, 88).
Connecting the Mammy and Aunt Jemima to the image of the Southern home was also a comfort to those living in the North, fearing that the newly freed black slaves would move north and take away industry jobs. Presenting these black women as secure in their positions in the South led the privileged and working classes of the North to believe that blacks would not interfere with their future economic success. The manipulation of one's personal history for economic or societal gain was also quite common in the South as well: "Having been nurtured by an 'old black Mammy,' became a requisite fantasy for any southerner seeking to establish his or her pedigree" (Morgan 1995, 96). Being raised by a mammy allowed for others in society to believe that a person was wealthy and more prestigious than others associating in the same circles of the aristocracy.
Merely to act as a figurehead, the family and personal history of this female image was ignored, even to the point that the Mammy was denied a true name. While the term "Aunt" or "Mammy" was considered to be an honorary title given by the families who owned these slave women, personal alliances through marriage and kinship were left out in order to further bind the former slave to the south and the family of the master. The intended respect associated with the title of "Aunt" or "Mammy" does not allow for uniqueness or singularity among black enslaved women. Images of the Mammy were used to remove responsibility for the plight of the former slaves and the actions of the white Americans, which caused that struggle and enslavement to take place for centuries: "Seeing the former slave woman visually transformed into a contented servant absolved every one of past transgressions and future responsibility toward the freed people" (Morgan 1995, 94). This "sentimental recollection" allowed the negative history of the South to be romanticized and for the Mammy to become the symbol of forgiveness and redemption for the former Confederates and slave owners (Morgan 1995, 95).
This icon of redemption for the southern United States was denying the intense and long-simmering voices of enslavement, which continued on past the abolition of slavery. These images of submissiveness and aggressive femininity can easily be internalized, taking into consideration the popularity and continued appearance of these images in historical literature and film. This can be seen as historically significant considering that the occupations African American women entered until the 1960s usually revolved around the domestic sphere (Jewell 1993, 44). The hierarchy perpetuated by this image forced black women to remain in predominantly female occupations with little chance for career advancement or economic success. Those involved in the creation of such images remain insensitive and ignorant to the effect a stereotype can have on the "social construction of reality," as the negative and offensive images of black women guarantee that such women will remain "in their place" as they are subjected to discrimination and prejudice (Fuller 2001, 121).
As with many stereotypes, the memories of the Mammy fade and are again reshaped. Contemporized to include a lighter complexion and the removal of the head rag, the Mammy stereotype was once again featured in film and television. Similarly, the image of Aunt Jemima was updated to appear more politically correct as the symbol of slavery, the bandana, was removed. Aunt Jemima was also given a slimmer figure and depicted wearing pearl earrings, inching closer to the image of an ideal white housewife. Probably the most well-known use of the character of the Mammy in the last century has been her portrayal by Hattie McDaniel in Gone with the Wind. Going on to win an Oscar for Best Supporting Actress, McDaniel became the first African American to be nominated for and to win an Oscar. McDaniel was repeatedly criticized for perpetuating the Mammy image in many of her film roles. In defense of her choices as an actress, McDaniel stated, "Why should I complain about making seven thousand dollars a week playing a maid? If I didn't, I’d be making seven dollars a week actually being one" (Bogle 1994, 82). It is still questionable whether an actress should take responsibility for the roles that she plays and the images being transmitted to viewers or whether it is really those who created the imagery who should take the full blame. Do they both bear responsibility?
Even today, almost two hundred years since the abolition of slavery, the Mammy image can still be seen in subtle ways. Used to advertise the cleaning power of Pine Sol, Diane Amos remains relatively unknown for her other acting credits. Immortalized by her robust figure and ready-to-attack attitude toward grime in the kitchen, Amos's image in these advertisements has become widely popularized. Unnamed, other than being known as the "Pine-Sol Lady," Amos's part in these commercials is a perfect example of the re-envisioning of the Mammy image to adapt to the changing needs of our society. Wearing plain, loose-fitting sweaters with cornrow braids, these advertisements are perpetuating the image of the Mammy as a desexualized woman. Still featured in advertisements and on the company's website, Diane Amos's status as the "Pine-Sol Lady" appears to be continuing despite racial equality having been codified into law. A study conducted by Lorraine Fuller found that these more modern representations of the Mammy make use of language such as "honey" or "baby," which was often used by slave women to refer to the white children under their care (Fuller 2001, 126). "That's the power of Pine Sol, baby" is the common script for commercials featuring Diane Amos. Yet, are these informal terms really necessary to sell a cleaning product or are they also attempting to sell the image of the modern black woman as "domestic"? This contemporary image maintains the prejudicial conclusion that black women should clean for a living and are not intelligent enough to hold higher status jobs (Fuller 2001, 124).
Reworked and re-imagined over the years, the Mammy image has been incorporated into popular Hollywood movies of the last decade, with black men often taking on the role of the black Mammy. Films featuring actors, such as Martin Lawrence, Eddie Murphy, and Tyler Perry, have once again recycled the first existence of the Mammy/Aunt Jemima character in a comedic way. These characters are represented as full-figured women with strong and defensive attitudes, especially toward men who may bring harm to their loved ones. These latest images reflect the origin of the Aunt Jemima image as a man appearing in black face, as well as the idea that the Mammy is a divergence from the standards of female beauty and womanhood. The most recent of these examples come from Tyler Perry's numerous films, revolving around the character of Madea, who is seen as ruling with a heavy fist, depicted carrying a gun, and using a chainsaw. The image of the Mammy is still being marketed to mainstream society, attempting to voice the stories of assertive black women in stark opposition to the submissive slave woman who always obeyed her master. However, what message is it sending to viewers that this figure is a man in drag? If a black woman were cast in these roles, how would that affect the comedic nature of the characters? These figures are exaggerated and merely conform to the past images of the Mammy figure as a source of comedy that is subject to constant mockery and ridicule.
Outside of these images in the media, there are still a large number of African American or Afro-Caribbean women acting as caregivers and maids in the homes of middle-to-upper class Americans. Kimberly Wallace-Sanders expresses the apprehension she observed in her colleagues during the research process for her book concerning the Mammy: "Shadows fall across faces, eyes become moist, bodies shift nervously. The moment I say the words 'black mammy,' a disruptive presence enters the room; we all know it, we all feel it" (Wallace- Sanders 2008, xiii). These friends and colleagues were truly afraid to admit the fears they had concerning whether or not, by hiring a black woman to serve as a maid or nanny, they were replicating the previously troubling and unequal relationship between a mammy and her master.
Some artists have taken the opportunity to challenge the representations of this black stereotype. Betye Saar's The Liberation of Aunt Jemima (Figure 3) depicts the happy cook of the southern plantation with a rifle as Saar transmits her "frustration and simmering rage onto a beloved African American woman" (Wallace-Sanders 2008, 142). Depicted with a child, Saar is challenging viewers to look deeper and realize that this child is not the white child of her master, but rather a mulatto, showing the reality of the abuse slave women were subjected to by their white masters. The middle figure stands with her tools of revolution: her broom, rifle, and pistol, ready to gain freedom by force if necessary. The appearance of a glass display box mimics the pancake box which features Aunt Jemima's smiling face, as her artwork depicts a "relic under glass" (Wallace-Sanders 2008, 143).
Joyce Scott is another artist who has attempted to reconsider the image of the Mammy through her "Mammy/Nanny" series. Made from leather and beadwork, these three-dimensional figures depict scenes between the mammy and black and white children. One of the most provocative pieces of the collection is Chainsaw Mammy,
which portrays a topless mammy with a beaded white baby chained around her waist. According to Terry Gips, this piece "does not hide the possibility of violence" as she is chained to the baby of another race (Gips 1996, 313). This "tug-of-war over her body"(Wallace- Sanders 2008, 146) represents the constant and the continual conflict of the Mammy as she negotiates between the reality of slavery and the mythic family found with the children of her white master.
The creation of the Mammy takes into account the very different attitudes and recollections of slavery in the southern United States. While we may wonder what positive images could arise out of such inhumane treatment, "to whites the period of slavery has been sentimentalized and glorified" (Parkhurst 1938, 349). Despite the acceptability of the Mammy to whites, according to Jessie Parkhurst, the Mammy remains an unacceptable symbol to African Americans. A historical moment displaying this negative attitude on the part of African Americans toward this image was the clear opposition to a monument being erected in the memory of the Mammy, a largely mythical, fictional, and exaggerated figure. African Americans opposing this monument believed that "a better memorial would be to extend the full rights of American citizenship to the descendants of these Mammies," including other suggestions of the banning of lynching, granting the right to vote, equal access to educational facilities, and an end to all practices of discrimination (Parkhurst 1938, 349-350). The warm memories of the Mammy held close to the hearts of whites has led to multiple proposals for monuments throughout the South; however, these proposals never materialized for political reasons.
Personal identity is largely affected by history as one's experiences can be dictated according to an individual's placement in the class, race, and gender hierarchies of society. As Gerda Lerner argues, "People without a history are considered not quite human and incorporate that judgment in their own thinking...they cooperate in their own oppression" (Lerner 1997, 208). The lack of a history with "truth," concerning the role of black women in the United States before, during, and after the Civil War, continues the act of oppression well into the twentieth and twenty-first centuries. The devalution of the voices of black women, combined with fictional assumptions concerning their lives, render African American women on the margins of society, deemed less important and in effect less human. More accurate representations of black women are still ignored while fabricated stereotypes have been carried on for centuries. The image of the Mammy has become part of American consciousness because the past has been manipulated to suit the needs of the privileged class. The history of African American women and their role in America's history should be based in actual history rather than myth and fiction. Let us remember: "The dead continue to live by way of the resurrection we give them in telling their stories" (Lerner 1997, 211). However, we must take part in the construction of history, both personal and collective, in order to ensure that reality and "truth" are presented to future generations.
Bogle, Donald. Toms, Coons, Mulattoes, Mammies, & Bucks: An Interpretive History of Blacks in American Film. New York: Continuum, 1994.
Fuller, Lorraine. "Are We Seeing Things? The Pinesol Lady and the Ghost of Aunt Jemima." Journal of Black Studies v. 32 (September 2001): 120-131.
Gips, Terry. "Joyce J. Scott’s Mammy/ Nanny Series." Feminist Studies v.22 (Summer 1996): 311-320.
Higginbotham, Evelyn Brooks. "African-American Women’s History and the Metalanguage of Race." Signs v. 17 (Winter 1992): 251-274.
Hooks, Bell. Aint I A Woman: Black Women and Feminism. Boston: South End Press, 1981.
Jewell, K. Sue. From Mammy to Miss America and Beyond: Cultural Images and the Shaping of US Social Policy. New York: Routledge, 1993.
Kundera, Milan. The Book of Laughter and Forgetting. Trans. Michael Henry Heim. New York: Knopf, 1981.
Lerner, Gerda. Why History Matters: Life and Thought. New York: Oxford University Press, 1997.
Morgan, Jo-Ann. "Mammy the Huckster: Selling the Old South for the New Century." American Art v. 9 (Spring 1995): 87-109.
Morton, Patricia. Disfigured Images: The Historical Assault on Afro-American Women. Westport, CT: Greenwood Press, 1991.
Parkhurst, Jessie W. "The Role of the Black Mammy in the Plantation Household." The Journal of Negro History v. 23 (July 1938): 349-369.
Thelen, David. "Memory and American History." The Journal of American History v. 75 (March 1989): 1117-1129.
Wallace-Sanders, Kimberly. Mammy: A Century of Race, Gender, and Southern Memory. Ann Arbor, MI: University of Michigan Press, 2008.
White, Deborah Gray. Ar’n’t I a Woman?: Female Slaves in the Plantation South. New York: W.W. Norton & Company, 1999.
Edited by Alexander Husinko & Adelina Kendle
Back To Top
|
<urn:uuid:03e1b12a-f0ec-44b4-a0fe-a9605d971d70>
|
CC-MAIN-2014-35
|
http://www.albany.edu/womensstudies/journal/2009/kowalski/kowalski.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00463-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.958016 | 5,899 | 3.609375 | 4 |
What All Parents Need To Know About Video Gaming
In the twenty odd years that passed since you were a teen, the world changed. Gaming now means video games and online activities, not Monopoly on a Saturday night! So, if you aren’t the type to settle in for an evening of Mortal Kombat, you probably aren’t familiar with the intricacies of gaming and, more importantly, the risks. Surprisingly, it’s hard to get the right information on the dangers (and benefits) of gaming, so we thought we’d share!
First, gaming is not all bad!
Online gaming and video games in general get a bad rap, but there are also a number of benefits that can help your child’s development. With problem solving, logical and considered thought, analysis and creativity, gaming can provide improved cognitive development. Similarly the speedy use of controls can benefit hand and eye coordination.
Online multi-player gaming environments can also be a great way for your child to engage with others without feeling the social pressures, which can be a great way for shy kids to find friends with similar interests.
It’s also a great source of entertainment for very little investment and gaming is done, for the most part, at home. If you’ve got a teen, the alternative activity on a Saturday night may be experimenting with alcohol or other undesirable activities!
So, are these games really addictive?
With its growing popularity, video gaming has also generated some concerns around its potential for addiction. Indeed, this has become such an issue that it is now listed in the Diagnostic and Statistical Manual of Mental Disorders. Given its generally isolated use and its opportunity to create a ‘different self or identity’, gaming needs to be carefully monitored to avoid unstable or excessive use. Thankfully, although it does still hold cause for concern, the addictive behaviours of gaming are generally less detrimental than those of more extreme addictions of drugs, alcohol or self harm.
Online stranger danger, every parent’s new greatest fear
At some point, “Stranger Danger” was turned up to eleven. It is imperative parents keep a close eye on their child’s interactions online to avoid any opportunities where a child may be approached by an older stranger. Keep rules simple and across all online activity:
- Parents must approve all new friends
- All passwords to be provided to a parent
- If a stranger strikes up a conversation, the child must alert the parent for monitoring
- No adults are to become the child’s ‘friends’ (even if they are known)
- All chats are to be agreed upon with a parent and the parent will regular monitor
Online gaming content
All gaming should be thoroughly investigated by a parent to ensure it is age specific and does not contain any inappropriate content. Visiting fan pages and online reviews is a quick and simple way to assist in your assessment.
Although there are elements of online gaming that need to be considered carefully, it can offer a number of benefits – particularly for children who may be shy or struggling to create friendships in the playground. Allowing them to have the time to consider their responses and feel less intimidated by the social pressures of face to face interaction can be positive. Similarly the opportunity to join in multi-player quests and activities can also prove to be a great method for improving self-esteem and building social skills.
As with new activity, it is important for parents to establish clear guidelines around the expectations and accepted behaviours associated with gaming. Parents should communicate the risks and dangers of gaming, whilst identifying set rules around its use. Encouraging children to have a positive and open relationship about their participation in online gaming and use of online content generally will result in far better outcomes and will reduce their susceptibility to being preyed upon. Keeping the communication honest also allows you to identify if gaming starts to become a problem or if boundaries are being crossed.
Some dangers hide within…..
There is a whole other world of “gaming lingo” that signals some of the dangers that a young and inexperienced gamer may face. “Easter Eggs”, “Cheat Codes” and “User Generated Expansions” are some of the most common yet there is little information available for parents.
“Easter eggs” are extra things that a gamer may find while playing – often hidden beyond obvious sight and easily missed by an inexperienced first time player (such as a parent who may be testing it out for suitability).
Whilst these can be innocent and simply release an extra character feature, a change to a background or additional access to other parts of the game, they can also be more sinister. In higher rated games (M, R and AO), “Easter Eggs” can become far more explicit. An example of this was the popular (but AO rated) Grand Theft Auto where an Easter Egg allows the gamer to watch graphic sex scenes.
As their name suggests, cheats are methods for a player to gain advantages within a game that will allow them to progress further (often without completing basic stages of the game). This could include providing a line of code that then gives them access to levels not yet reached, or a far greater amount of points/money than the player has actually achieved. Though many cheats are relatively harmless, as with any game for your child, it is important to check the level of content and its suitability for your child.
A particularly relevant example of this is the EA Games best seller, “The Sims”. While the game does have an M rating, this can be somewhat forgotten through its advertising as a game centred around building families, houses and creating a life with pets, clothes, school classes and a career. This can seem simple enough and is particularly popular with younger children who thrive on the notion of ‘playing adult’. However there are in fact ‘implied’ sex scenes with this game, and with the addition of a game cheat “Censor Grid”, a player can view “mock” nudity and with other cheats even kill characters in strange and quite sadistic techniques.
User generated expansions
User generated expansions are a far more difficult element of gaming to manage and review as these are developed by gamers themselves. Created as an additional aspect of the game that can be downloaded via fan websites, these are generally not supported by the game developers however they remain difficult to regulate. They’re almost exclusively found on PC based games. If you are allowing your child to visit fan sties, forums or other game related websites, be aware of expansions. Past expansions for games such as the online “The Sims” game included sexually explicit scenes, anatomically correct characters and an ability to perform violent acts. To discourage the likelihood of your child accessing this content, set an automatic block on downloads that are deemed inappropriate via a parental lock software package.
Physical safety when gaming
It comes as no shock that gaming can lead to a more sedentary lifestyle – one that is contributing to the growing obesity epidemic in Australia. Keeping an eye on how much time your child spends sitting in front of the computer/game console is very important and should be coupled with bursts of exercise or activity outside and away from the gaming area. This will also prevent muscle cramping and/or pain which can result from sitting in one position for long periods. Investing in ergonomically correct furniture or special player chairs can be worthwhile, and ensuring your child’s computer/console is at a correct eye level height is also important.
Though there are benefits in using some of the more active consoles that encourage sports participation and dancing, such as Wii, these again need to be monitored carefully to avoid incident. While it is “just a game”, many of the latest editions of sporting focused games require significant physical activity and, as with any sport, it is important your child has done some basic warm ups before commencing. Similarly they should be encouraged to have fun without taking it too seriously or causing themselves harm by overzealous participation. Clear the area where they’ll play to avoid spills and stubbed toes and get them to rotate their wrists and rest their hands regularly.
Keeping an eye on your child’s involvement with physically based games is just as important as ensuring their physicality does not deteriorate as a result from too many hours sitting still. Watch for signs of RSI, bad posture, constant twitching or squinting – all can require further assistance from a doctor or optometrist and should be carefully monitored.
The gaming phenomenon is a continually growing part of our technologically intrigued society. There is very little chance it will decrease so rather than hiding your child away from it and its positive uses, rather encourage their knowledge, understanding and respect for the cyber world.
*(Guest Blog by Ngaire Stirling. Ngaire Stirling owns Brisbane Kids – Brisbane’s largest parenting community and is a well respected authority on tackling the big parenting issues, head on! Ngaire’s website is visited by over 100000 people per month and around 1 in 10 Brisbane families regularly rely on it for advice and up-to-date information on things to do in Brisbane with kids)
|
<urn:uuid:1426a369-140e-4885-b76f-05e47cfee721>
|
CC-MAIN-2013-20
|
http://www.supergeek.com.au/so-youre-raising-a-gamer
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699798457/warc/CC-MAIN-20130516102318-00067-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.949806 | 1,910 | 2.6875 | 3 |
Why does the United States have a per capita Gross Domestic Product of $55,000, while many countries in Africa have per capita GDPs of $5,000 or less? What accounts for poverty in American cities, and what can be done to foster more equitable outcomes? What is a population pyramid and how can it help us to understand rates of population growth, the impact of traumatic events on a community’s population, and more?
GES 102: Human Geography explores the distributions of human activities such as population, economic activities, resources, agriculture, and settlements and how they affect human systems and behavior. GES 102 also serves as a gateway course in the Geography Environmental Studies department and sets up students for success in courses that delve into ecology, cartography, and the geography of health in greater detail.
This course satisfies the Social Sciences GEP requirement and the Culture requirement for undergraduates.
|
<urn:uuid:a44a2fec-a670-4e09-8287-68ddb2eef4f9>
|
CC-MAIN-2017-47
|
http://gritgoing.umbc.edu/featured-course-human-geography/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805265.10/warc/CC-MAIN-20171119023719-20171119043719-00185.warc.gz
|
en
| 0.932746 | 183 | 3.25 | 3 |
Wednesday, July 15, 2009
The Wonderful World of Big Science
For most of its history, science has always been done by individual or at best a small group of scientists. World War II changed that: during the war, government-sponsored laboratories employing thousands of scientists sprung up to do large-scale research on weapons and technology. Since then, scientific research has entered a new era dubbed "Big Science".
Whether "big" science is any better than "small" science is a matter of controversy. Director of Oak Ridge National Laboratory Alvin Weinberg (who coined the term "Big Science" in the 1960s) defended the organization and big-budget financing of Big Science as the only way to continue research into progressively more complex scientific matters. On the other hand, science historian Paul Forman posited that defense-related funding by the government shifted the focus in physics from basic to applied research.
Whatever the answer, Big Science is here to stay. So let’s take a look at some of the biggest Big Science projects in the World:
|
<urn:uuid:2dcfbacd-9470-4514-aa5b-5949e965ce48>
|
CC-MAIN-2020-16
|
http://www.illuminatiunlimited.com/2009/07/wonderful-world-of-big-science.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370495413.19/warc/CC-MAIN-20200329171027-20200329201027-00063.warc.gz
|
en
| 0.937804 | 213 | 2.625 | 3 |
Your doctor gives you a due date when you first get pregnant and start with your prenatal care. Whenever people ask you when you are due, you give them the date. But there is no guarantee that you will go into labor on that particular date. You are supposed to be in labor around that time but it can be a few days earlier or a few days later. Prediction of the due date is a rough estimate as it is difficult to pin down the exact time of conception. Your body will start to prepare itself for going into labor way before it happens. Watch out for these signs to know that your due date is arriving.
Braxton Hicks contractions
These are named after the English doctor, John Braxton Hicks, who first described them in 1872. During your pregnancy, you may feel your tummy contracting for some time and then relaxing. This starts to happen from the mid-pregnancy and is thought of as practice contractions. As the due date approaches near, these contractions grow powerful and could be mistaken for the start of labor. Although they are strong and painful, they do not last for very long and are irregular in occurrence.
The baby gets into the birthing position
During the pregnancy, the baby moves around a lot inside the womb, floating in the bag of liquid. However, at some point in the late pregnancy, the baby settles in a comfortable position for birth. There are a few different birthing positions but the most common of all is head down with baby’s back facing outwards. Not all babies settle themselves in this position.
You may have a ‘show’
A small plug of jelly is blocking the entrance to your cervix, i.e., the neck of your womb, while you are pregnant. As the cervix gets ready for birth, it stretches and this plug of jelly starts to come away. You may notice it on your underwear. It may be pinkish or may even have streaks of blood in it. This is called a ‘show’. It can happen days or even weeks before the start of labor or might not happen at all until you go into labor.
The joints loosen
The relaxin hormone loosens and softens the ligaments during pregnancy. This is why before you go into labor, your joints may feel a bit looser.
As all the muscles in your body relax in preparation for going into the labor, including those in the rectum too, it can lead to loose motions. It is normal to happen, and it is a good sign. So, stay hydrated and stay prepared.
|
<urn:uuid:3b6f299b-c4ea-4cb2-bab3-c8bb307827f2>
|
CC-MAIN-2020-05
|
https://www.tinystep.in/blog/signs-your-due-date-is-arriving-soon-xyz
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594662.6/warc/CC-MAIN-20200119151736-20200119175736-00158.warc.gz
|
en
| 0.966558 | 530 | 2.5625 | 3 |
This obligation, as it applies to the acts of a single nation, and the rather restrictive exceptions to it are known as the rules on unilateral use of force. At the same time, there is the concept of collective security, which allows the community of nations to arise and oppose an aggressor nation together. This is regulated by the rules of collective security. Therefore, there are many situations where disputes between nations can break down into open conflict, and such conflict may still be completely legitimate under international law.
'All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of an State, or in any other manner inconsistent with the Purposes of the United Nations.'4
This builds on the preceding provision which places an obligation on Members to settle disputes peacefully5 which in turn follows from the very purposes and reasons for the United Nations, that being the maintenance of peace and security and the prevention and removal of threats thereto.6
De Arechega describes Article 2(4) as 'the cardinal rule of international law and the cornerstone of peaceful relations among States.'7 This altered the age-old rule, applying up till 1949, that us ...
|
<urn:uuid:811442dd-03f2-41c4-82fc-579a51f6278f>
|
CC-MAIN-2017-34
|
https://studentshare.net/miscellaneous/284078-international-law-institutions
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103910.54/warc/CC-MAIN-20170817185948-20170817205948-00530.warc.gz
|
en
| 0.948083 | 240 | 3.34375 | 3 |
It's a pretty common occurrence for people to find a corner of mould growing on their block of cheese, or slice of bread at home, to cut off that affected spot, and continue consuming the remainder, believing that they've gotten rid of the contamination.
But is it safe to do so? Let's find some answers.
Before the test, Leila takes her mouldy-looking cheese sandwich to Dr Ailsa Hocking, one of Australia's leading experts in the field of mould.
Dr Hocking is a little worried, and there's a reason for that. Mould is a growth of minute fungi which typically forms on food which has been left alone for too long.
But what if Leila were to just cut off the mouldy bits she can see? There is still risk: as the cheese has a lot of mould and varying sorts of mould, the mould can make toxics that diffuse into the cheese. So while it might look safe and not mouldy there might still be toxins in the food.
So after allowing a loaf of bread, a jar of jam, and block of hard cheese to go partly mouldy, Leila removes the mouldy portion then it's off to the testing lab to find out what is lurking in Leila's food.
The food is tested for:
- Yeast and mould count
- Standard plate count (bacteria)
- Water activity
A sample of each food is tested fresh to be used as a comparison.
The aim of the test is to find out whether or not the remainder of the food contains mould/microorganism activity if the mouldy portion is removed.
So can we cut the mould off cheese and still eat it? And how much mould is actually in a sandwich once the mouldy portion has been removed?
The lab results (and mouldy sandwich) are taken back to Dr Hocking.
At Leila's first visit, after removing the mouldy parts from her cheese sandwich, mould spores were present in the rest of the sandwich, but they hadn't yet started to grow.
They sure have grown at an alarming rate!
So how much mould is in it? The lab reports said there were about 300,000 moulds per gram. The normal amount for a cheese sandwich is less than 200 moulds per gram. The mould in the food left in the fridge for too long has multiplied more than a thousand times.
Therefore contaminating anything it is put near.
"In the past when I've chopped the mould off my bread and eaten the rest I've been eating these things ... I don't think I'm going to do that anymore," says Leila.
Cutting mould off food in the fridge is a really bad idea. Therefore if there's any mould anywhere on your food, the best place for it is in the bin.
It is possible to remove the mould from some foods and eat the remainder without harm, however, to do so does pose some risk in most cases and is therefore not advised.
Dr Hocking: "The problem with mould toxins is they don't make you sick straight away like bacterially toxins. Like food poisoning, they can be longer acting, they can be carcinogenic and so while it may be fine, it may not make you sick, it's probably not good to do this sort of thing on a frequent basis because every time you are exposed to a carcinogen you have a greater chance of eventually developing some sort of problem."
- Did you know that jam will keep in your fridge for much longer than bread or cheese? It's because jam has a very high concentration of sugar, but a low water content. On the other hand, tomato paste will only keep a week or two as it's got a high water content but freezing it will make it last longer.
- What about all those soft cheese we eat which are already mouldy? This is a case of good mould versus bad mould. A very small amount of penicillin rochefort (yes, that's what we make antibiotics from) is mixed into a thousand litres of cheese. This will produce enough live spores in the milk so that when the blue cheese is punctured later in its life, all those spores will grow into the little veins that grow through the cheese.
|
<urn:uuid:90159574-0431-4482-947f-ab8cd1682ca4>
|
CC-MAIN-2013-48
|
http://health.ninemsn.com.au/whatsgoodforyou/theshow/694036/can-you-cut-mould-off-food-and-still-eat-it
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054867/warc/CC-MAIN-20131204131734-00098-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.972887 | 877 | 3 | 3 |
— Rebecca A. via email
The impact of exercise on the gastrointestinal tract and digestion has been less well investigated than the same territory for heart, muscle and skeleton. However, over the past decade good studies have clearly demonstrated positive effects on a variety of conditions. Inflammatory bowel disease and liver disease are significantly improved by exercise. The risk for colon cancer and ulcers is decreased by exercise. In addition to prevention and treatment of disease, normal function of the gastrointestinal tract improves with exercise. For instance, gastric emptying, the passage of food out of the stomach, proceeds more efficiently when exercise is part of your daily routine. Many digestive problems are associated with abnormal gastric emptying.
Another area in which exercise has a powerful positive effect on digestion relates to stress. Stress has been identified as a contributing factor to a wide spectrum of gastrointestinal disorders. And there is no better stress-reducer than exercise.
Finally, an essential function of digestion is to turn food into energy. The optimal processing of glucose, our primary fuel, cannot occur without daily physical activity. The consequences of sedentary behavior are particularly powerful with diabetes because sitting has an immediate effect on glucose metabolism. People who sit after a meal have a 24 percent higher glucose level than people who take a walk after eating. This would suggest that when you don't use your muscles (sitting), insulin sensitivity decreases immediately. Impaired insulin sensitivity has been linked to diabetes, obesity, cancer and accelerated aging.
So if you were looking for yet another reason to exercise, put good digestive health on your list.
— Paul Spector, MD, Tier 4 Coach
|
<urn:uuid:21e632f9-e764-4e32-a49f-260d9269efe1>
|
CC-MAIN-2013-20
|
http://q.equinox.com/articles/2012/11/digestion
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00090-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.956265 | 329 | 3.0625 | 3 |
Last week Caturday brought you the big Leopard. Now it's time for the little one.
The Leopard Cat (Prionailurus bengalensis) is a small wildcat that can be found in southern and eastern parts of Asia. They are pretty widely distributed throughout Amur region, China, Indochina, the Indian Subcontinent, the Korean peninsula, and even Pakistan. There are twelve recognized subspecies of Leopard Cat, and they all vary quite strikingly in appearance, having different distribution and size of the spots on their coats, and in their general coat color.
The Leopard Cat is about the size of a domestic cat, weighing up to almost 9 lbs. and measuring 26 inches with a 12-inch tail. Their diet varies by the region, of course, but in general they primarily hunt rodents and other small mammals, reptiles, amphibians, birds and insects. Leopard Cats are notable for not "playing" with their food, like many other species of cats. They attack with a quick pounce and bite, holding their prey firmly in their paws until it dies.
Most species of Leopard Cat are nocturnal and solitary, though some are more active during the day. Leopard Cats are hunted in various regions for their fur, especially in China, whose main market is Japan. The European Union has imposed a ban on the importing of fur from Leopard Cats. The IUCN considers Leopard Cats to be a species of Least Concern, although their population is declining.
|
<urn:uuid:17273c51-ed43-4db5-8f4a-c1fc2f7fb3f8>
|
CC-MAIN-2020-29
|
https://observationdeck.kinja.com/caturday-post-prionailurus-bengalensis-edition-450815473
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655912255.54/warc/CC-MAIN-20200710210528-20200711000528-00031.warc.gz
|
en
| 0.965171 | 302 | 3.109375 | 3 |
Household income differences in food sources and food items purchased
1 Division of Epidemiology & Community Health, School of Public Health, University of Minnesota, Minneapolis, Minnesota, USA
2 Division of Biostatistics, School of Public Health, University of Minnesota, Minneapolis, Minnesota, USA
3 Division of Epidemiology & Community Health, 1300 South 2nd St, Suite 300 Minneapolis, Minnesota 55454, USA
International Journal of Behavioral Nutrition and Physical Activity 2010, 7:77 doi:10.1186/1479-5868-7-77Published: 26 October 2010
The present study examined income-related household food purchases among a sample of 90 households from the community.
Annotated food purchase receipts were collected for a four-week period by the primary household shopper. Receipt food source and foods items were classified into specific categories, and food quantities in ounces were recorded by research staff. For home sources, a limited number of food/beverage categories were recorded. For eating out sources, all food/beverage items were recorded. Median monthly per person dollars spent and per person ounces purchased were computed. Food sources and food categories were examined by household income tertile.
Subjects and Setting
A community-based sample of 90 households.
Higher income households spent significantly more dollars per person per month from both home and eating out sources compared with lower income households ($163 versus $100, p < .001). Compared with lower income households, higher income households spent significantly more home source dollars on both fruits/vegetables (21.5 versus 10.2, p < .001) and sweets/snacks (17.3 versus 8.3, p < .001), but did not differ on home dollars spent on sugar sweetened beverages (2.0 versus 1.7, p < .46). The proportion of home beverages that were sugar sweetened beverages was significantly higher among lower income households (45% versus 26%, p < .01). Within eating out sources, lower income households spent a significantly greater percent of dollars per person at carry out places (54% versus 37%, p < .01). No income differences were observed for dollars spent at discount grocery stores, small grocery stores or convenience stores.
Higher income households spent more money on both healthy and less healthy foods from a wide range of sources. Lower income households spent a larger proportion of their eating out dollars at carry out places, and a larger proportion of their home beverage purchases were sugar sweetened beverages.
|
<urn:uuid:73567ddb-0282-4a99-a67e-50d80b68bcbe>
|
CC-MAIN-2013-48
|
http://www.ijbnpa.org/content/7/1/77/abstract
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052641/warc/CC-MAIN-20131204131732-00094-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.960374 | 510 | 2.84375 | 3 |
Coniferophyta is a plant division that is easily noticeable due to their open seeds, which are usually in cones. Most coniferophyta are needle leaved and green throughout the year. The distinct characteristic of plants in this phylum is that they are all cone bearing. The cones are of different sizes and shapes. Most coniferophyta have one trunk (Calver et al. 249). Some species of coniferophyta include pine and spruce. Coniferophyta thrive in some of the most inhabitable locations on the planet. They thrive in high latitudes and altitudes. These plants have several adaptations that enable them to thrive in locations where other plants cannot thrive.
First-Class Online Research Paper Writing Service
- Your research paper is written by a PhD professor
- Your requirements and targets are always met
- You are able to control the progress of your writing assignment
- You get a chance to become an excellent student!
To survive in harsh environments, coniferophyta should have minimal loss of water to the environment. Coniferophyta have a thick outer back that is water and pathogen proof, which prevents the plant from loss of excess water and insulates internal living cells from the harsh external environment. Some plants in the division have barks that protect them from fires. Barks of coniferophyta also produce wax that helps reduce water loss (Bailey 59). In addition, survival in the harsh necessitates the plants to have roots that would enable them absorb as much water as possible. Coniferophyta have a strong tap root system that is highly branched and extensive, which enables the plants obtain adequate water.
Coniferophyta have sunken stomata that help reduce loss of water. In addition, plants in this division have an epidermis that has a thick cuticle and its walls are lignified. Coniferophyta also have a sclerified hypodermis. All this helps to reduce water loss through the leaves. In addition, coniferophyta have needlelike leaves that ensure that the plants lose very little water through evapotranspiration (Solomon et al. 617). Coniferophyta have an unbranched vascular that is in the center of the leaf; this reduces the amount of water that the leaves loose to the external environment.
Effects of Flowering Plants on Humans and Civilization
Humans depend on plants directly in various ways. Plants produce food that nourishes the human body. Flowering plants fulfill a sizeable percentage of the nutritional needs of human beings. Flowering plants provide humans with carbohydrates, proteins, vitamins, and fibers. People have appreciated the nutritional importance of fruits since ancient times. Flowering plants do not just help to nourish the body, but they also help in maintaining people’s health. Vitamins and minerals help improve the body’s immunity and prevent people from getting various diseases. In addition, flowerig plants are used to make various beverages, including coffee, tea, beer and wine. Thus, the importance of flowering plants as food cannot be underestimated.
Apart from being food, flowering plants also have medicinal and poisonous properties. Use of flowering plants due to their medicinal and poisonous properties is a practice that has begun even before civilization of humanity. A sizeable percentage of medicines are derived from flowering plants. Garlic and Aloe Vera are some of the flowering plants that have numerous medicinal properties. Some of the medicinal uses of Aloe Vera include reducing inflammation in the body and moisturizing the skin (Burke 19). In fact, most of the medicinal plants are flowering plants. Pharmacists copy the structure of active compounds in medicinal plants to make artificial compounds that are used to make drugs. Thus, it is pertinent to say that plants are used to make almost all drugs.
Flowering plants help fuel various industries that contribute to economic development. Flowering plants fuel the lumbering industries, tanning industry, and the cosmetic industry. Flowering plants are used directly in these industries, or they produce products that have driven the industries. Some of the products of flowering plants include tannin, pigments, and fragrances. In addition, farming is one of the major economic activities in various countries.
Types of Flowers
Classification of flowers is based on whether they have all flower parts (complete or incomplete) or on whether they have all the reproductive parts (perfect or imperfect). Complete flowers have a stamen, pistil, petals, and sepals. Most plants that depend on cross-pollination, movement of pollen grain from one plant to another, have complete flowers. Legumes are a good example of plants that have complete flowers (Sheaffer and Moncada 130). The features of complete flowers enable them to cross-pollinate effectively. Without these features, the flowers would not be able to cross-pollinate. On the other hand, just as their name implies, incomplete flowers lack one or more of the four flower parts. Incomplete flowers may lack sepals and petals. Grass is a good example of incomplete flower. Grass lacks sepals and petals and instead has leaves like coverings on stamens and pistils (Sheaffer and Moncada 130). Incomplete flowers do not have efficient cross-pollination. In grass, lack of sepals and petals means that winds carries pollen grains away easily making the pollen not to attach them on the stigma.
Perfect flowers have both male and female organs – the pistils and stamens. Thherefore, the plant can be pollinated by pollen of the same plant (Patterson et al. 81). On the other hand, imperfect flowers have only one organ. They may only the male organs (stamens) or female organs (pistils); this means that fertilization of incomplete flowers is only through cross-pollination. Squash and corn are some of the plants that have imperfect flowers. Plants with imperfect flowers are divided into two main categories: monoecious and dioecious plants. Monoecious plants have both male and female flowers on the same plant, whereas dioecious plants have separate male and female plants (Sheaffer and Moncada 131). A good example of a monoecious plant is corn, whereas hops and buffalo grass are examples of dioecious plants.
Competitive Advantages of Flowering Plants
Flowering plants are common in virtually every habitat on the planet. The existence of flowering plants in several plants is not by accident; it is by design. Flowering plants have several competitive advantages over other plants that enable them to thrive in a remote location. Flowering plants reproduce through seeds, which usually have a tough resistant coat that enable them survive even in harsh conditions. Thus, it is the main reason that makes flowering plants very dominant in the plant kingdom. During evolution, seeds of flowering plants survived in extremely harsh conditions and ultimately gave rise to other plants, which ensured that flowering plants did not become extinct. However, non-flowering plants do not reproduce through seeds. Therefore, they were unable to survive the extreme conditions which led to the extinction of several species of non-flowering plants (Niklas 205). It is one of the main reasons that explain why there are more flowering plants than non-flowering.
As it is mentioned before, flowering plants reproduce via seeds. Pollination is critical for the development of the seeds. Plants may have self-pollination or cross-pollination. Self-pollination refers to the pollination of the stigma from the pollen of the same plant whereas cross-pollination refers to the pollination of the stigma from pollen of other plants. Self-pollination reduces the range of variation of plants whereas crosspollination increases the range of variation of plants (Weberling 316). In most instances, fertilization is through cross-pollination. Cross-pollination leads to increased variation of plants, which may have characteristics that enable them to be more adapted to certain habitats than non-flowering plants (Geber et al. 113). However, non-flowering plants have a less likelihood of variation that denies them an ability to conform to changes in the habitat.
|
<urn:uuid:c0c9bc52-76da-4406-805c-94a8197ba035>
|
CC-MAIN-2020-24
|
https://essays-expert.com/essays/environment/adaptations-of-coniferaphyta.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413786.46/warc/CC-MAIN-20200531213917-20200601003917-00487.warc.gz
|
en
| 0.945449 | 1,669 | 4.15625 | 4 |
Why parents choose SplashLearn for their second graders?
Intelligently adapts to the way each child learns
Get coins for each correct answer and redeem coins for virtual pets
Monitor progress with iPhone app, weekly emails and detailed dashboards
Add by Composing Tens- 2nd Grade Math
Practice adding numbers within 1000 with carry at the ones place. While adding numbers using place value concepts, students add ones to ones, tens to tens and hundreds to hundreds. In this method, sometimes it is necessary to regroup the resulting ones as tens. Add by Composing Tens Worksheets focuses on problems with situations, where it is necessary to regroup ones to compose tens. This concept is the precursor to the concept of carry in the standard algorithm.
Common Core Alignment
2.NBT.7Add and subtract within 1000, using concrete models or drawings and strategies based on place value, properties of operations, and/or the relationship between addition and subtraction; relate the strategy to a written method. Understand that in adding or subtracting three-digit numbers, one adds or subtracts hundreds and hundreds, tens and tens, ones and ones; and sometimes it is necessary to compose or decompose tens or hundreds.
|
<urn:uuid:84c38435-e757-40a8-86b1-bbccd18ac4f9>
|
CC-MAIN-2020-16
|
https://www.splashlearn.com/math-skills/second-grade/add-within-1000/add-by-composing-tens
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500426.22/warc/CC-MAIN-20200331084941-20200331114941-00385.warc.gz
|
en
| 0.884434 | 250 | 4.03125 | 4 |
(PONARS Eurasia Policy Memo) Cossacks have become a highly recognizable feature of modern Russia, playing a central role in the annexation of Crimea and promotion of secessionism in Donbas. Beyond their role as enforcers and combat irregulars, however, their movement makes few headlines, even while, as argued here, Russian Cossack organizations have become a means of promoting the regime both at home and abroad. As the movement has developed, so has it been commandeered by the Kremlin. This is demonstrated by the role Cossack groups have played in the frozen conflicts on Russia’s borders. Instinctively patriotic and sometimes actively so, Cossacks initially joined in with the fighting to protect those who identified with Russia. Since being appropriated by the Kremlin, however, the “service” Cossack movement, which is still used to project hard power, has increasingly turned to the promotion of soft power in three main ways: institutionalizing a pro-Russian presence outside of internationally recognized borders, appearing as cultural emblems of the country, and maintaining contact with diaspora organizations overseas.
Russian Interpretations of Soft Power
Joseph Nye wrote that “soft power is the ability to get what you want by attracting and persuading others to adopt your goals” and was an important component of the United States’ strategic resources in the Cold War. Nye identified “U.S. Culture and U.S. policies” as sources of American soft power, insisting that mere propaganda was not sufficient to sway international public opinion in, for example, the Global War On Terror. There had to be substance to American claims to lead the world consistent with international law and give “greater sensitivity to the opinions of others in the formulation of policies.”
At first blush, Russia seems to possess a similar concept of soft power (myagkaya sila), using events such as the 2014 Sochi Winter Olympics and the 2018 FIFA World Cup to promote positive images of the country to an international audience. However, as President Vladimir Putin wrote in a 2012 article, he understood soft power to be “a matrix of tools and methods to reach foreign policy goals without the use of arms but by exerting information and other levers of influence.” The subtle change from Nye’s articulations of the concept is important. Whereas Nye warned against conceiving soft power as influence-peddling, such an understanding is at the core of Putin’s interpretation of the concept, which he saw as responsible for the color revolutions in Eurasia. It is this understanding of soft power that informs the instrumentalization of Cossack groups throughout the world.
Service vs. Free Cossacks: the Commandeering of a Movement
The term “Cossack” refers to a few distinct groups. While there is considerable dispute over the origins of the label, there is a clear division between those who identify as “free” and “service” Cossacks. The “free” Cossacks are those who consider themselves as “ancestrally” Cossack and claim the label from birth. The free Cossacks live mostly in Southern Russia and Ukraine, including the lands around the city of Rostov on the Don. Estimates suggest there are as many as 5 million such Cossacks across Eurasia, which makes them potentially the largest unrecognized “nation” (narod) in that space. The “service” Cossacks originated under Tsarist regimes and saw individuals (irrespective of their ancestral ties to the group) recruited to perform what would today be called paramilitary functions in exchange for privileges such as lower taxes. Cossacks were often used by imperial forces to settle border regions as a kind of force-in-residence.
Today, the state-registered Cossacks are the most salient movement. As of 2016, it comprised 11 “hosts” (vosiko) covering the territory of the country: Don, Kuban, Terek, Volga, Central, Orenburg, Zabaikalsky, Irkutsk, Yenesei, Siberian, and Ussuriyskiy, which were all re-established in the 1990s or early 2000s. Their most recent iteration has seen the creation, in 2018, in the hall of the church of Christ the Savior in Moscow, of the all-Russian Cossack Society (known by its Russian acronym, VsKO) under the leadership of Cossack General Nikolai Doluda. There are 17 tasks of the VsKO, of which the most salient for this memo are numbers 9 (participate in the development of the Cossack Cadets Corpus and a system of Cossack education), 10 (ensure the cultural, spiritual, and moral development of members of the VsKO and youth), and 12 (participate and support the development of international connections with Cossacks abroad in the framework of realizing the state policy of the Russian Federation in relation to foreign collaboration).
The focus on educational and training activities of the VsKO highlights the degree to which the Cossacks are in line with other Kremlin initiatives for propagandizing to youth, including YunArmia and Nashi. Like those other groups, the main direction of education is the promotion of pro-Russian narratives of history, combatting “falsifications” of history, and engaging in activities designed to stimulate interest in patriotism (such as recovering artifacts from World War II-era battlefields). This organization of priorities also plays a major role in preparing Cossack organizations to promote Russian foreign policy objectives.
Cossacks in Secessionist Republics, a Long History
Russian Cossacks today function as soft power resources for Russia’s foreign policy. This was not always the case, and the evolution of their function reflects their institutionalization from initial volunteers-cum-vigilantes to quasi-military GONGO now. Sergey Sukhankin (2019) argues that the Russian state tried to cultivate the image of the Cossacks as volunteers precisely because of the “aura of romanticism.” While not contesting this claim, it remains true that the level of state direction of Cossack activities is greater currently than in the past.
Initially, the role played by Cossacks in the conflicts on Russia’s periphery was mostly as volunteers. In Abkhazia and Transnistria in the early 1990s, Cossack vigilantes organized autonomously to fight for the rights of ethnic Russians. The leader of the Russian Union of Cossacks, for instance, boasted of his members going to fight in both conflicts as well as organizing self-defense squads following the Chechen seizure of Budyonnovsk in 1995. It was estimated that 200 Cossacks were among the mountain peoples who fought for the Abkhaz. In Transnistria, Cossacks from across southern Russia turned up to help fight on the side of pro-Russian separatists. As Cossack lieutenant Fedor Petrovich Parshukov told Komsomol’skaya Pravda at the time, “it was not the government which sent us here… we came here on our own and will leave on our own if the Cossack assembly so decides.” Generally, until 1995 and the introduction of the register, Cossacks were paramilitary volunteers.
In the early days of the uprisings in Ukraine, Kuban Cossacks physically took part in the annexation of Crimea and the secessionist movement in Donbas. There is a direct statement on the VsKO website thanking the “thousand Kuban Cossack volunteers [who] were among the first to go to the aid of our brotherly people and defend our safety.” At that time, the Cossacks performed mostly police and public order functions due to the absence of fighting. In the Luhansk and Donetsk regions, free Cossacks rallied to the side of the liberators who sought to bring them home to Russia. However, as Nikolay Mitrokhin (2021) noted, the Cossacks “were comparatively numerous but lacking in resolve, [they] tended to abandon their positions at the first sign of shelling.” In any case, the free Cossacks of the region soon fell out with the regional authorities who drove them from the territory. Pro-Russian Cossack groups in Ukraine are seemingly also ready to use hard power to destabilize the country if needed. Cossacks remain an instrument of Russian “hard” power but have increasingly played a “soft” power role as well.
The Place of Cossacks in Russia’s Soft Power Toolkit
Currently, Russian service Cossacks promote the country’s soft power in three main ways. First, Russian Cossacks institutionalize a pro-Russian presence outside of the country’s internationally-recognized borders. In Crimea, the Black Sea Cossack Host was re-created in 2018 with an anticipated membership of 10,000 Cossacks to promote public order and run educational institutions that advance pro-Russian narratives of history. They are a part of the All-Russian Cossack Host, which had to be expanded from 11 to 12 hosts to take account of this increased membership. The result will predictably be the cultivation of a pro-Russian constituency through such schools, similar to other neo-Cossack communities.
So too, in the Luhansk People’s Republic, the authorities have created a council of Luhansk Atamans which seeks to unite all Cossack communities and strengthen their cooperation with the secessionist authorities. As with other Cossack communities, the Luhansk group is committed to promoting certain historical narratives and encouraging love of Russia. Organized Cossack groups also promote Russian soft power in Transnistria and Abkhazia, although the South Ossetian authorities denied such a group registration in its statelet on the grounds that it was “not native.” Given the reputation of the South Ossetian authorities for valuing their independence, it is likely they saw the Cossacks’ promotion of soft power as a threat to their authority.
Second, Russian Cossacks have become emblems of the country and a stand-in at international events. Such a move did not happen overnight. In the ceremony passing over the figurative baton of holding the Winter Olympics at Vancouver 2010, for instance, the Cossacks were chosen as cultural representatives for the Caucasus city of Sochi. This was despite the protests of the Circassian diaspora and activists inside of Russia, for whom the Cossack gendarmes of the nineteenth century represent agents of genocide. The Cossacks featured significantly in the Sochi Opening Ceremonies as well (even if they made headlines for assaulting the Pussy Riot punk musicians). Also, at the 2018 FIFA World Cup, local Cossack history in Rostov and Yekaterinburg was marketed to incoming fans, promoting Russia and its ownership of the Cossack legacy.
Even in government policy, the Cossacks have taken on a new role in promoting the country abroad. In 2018, when the president attended the wedding of Austrian Foreign Minister Karin Knaisl’ (who was later given a seat on the board of Rosneft), he took with him the Kubanskii Cossack Choir from Krasnodar at a cost of 1.8 million rubles ($25,000). This is despite the fact that the present Kuban Cossacks are descendants of the relocated Zaporozhian Cossacks, who Ukraine claims as a progenitor. The choir has also toured Japan, France, Italy, Spain, Portugal, Germany, Norway, China, Vietnam, Poland, the Czech Republic, Bulgaria, Serbia, and Australia. Such visibility for a movement so closely identified with Putin cannot help but promote positive images of the country abroad.
Third, because many Cossacks fled the decossackization in the early twentieth century, there are Cossack emigre communities throughout the world. Bringing them back into the fold has been a central theme of Russian Cossack policy. Since 2003, there have been a series of six “Global Cossack Congresses” that brought together Cossacks from all over the world in the southern city of Novocherkassk, usually to discuss questions of history. The fifth Congress in 2015 saw 300 participants representing over 28 countries, including the United States. There are also other Cossack international conferences, such as that devoted to “securing and developing the spiritual-moral and cultural-historical traditions of Cossacks abroad” in May 2016 in Paris.
Such events individually may be small but represent part of a coordinated strategy to reach out to these communities, which appears to be yielding results. Reports suggest, for instance, that pro-Russian Cossack camps and training sites are occurring in California and Oregon. Likewise, the leader of the Zabaikalsky Cossack society of Australia, Simeon Boikov, has taken part in a series of attention-grabbing events such as hanging a pro-Putin flag from a bridge in front of an anti-Putin demonstration. Closer to the Motherland, too, pro-Russian Cossack organizations in Serbia (who appear at first glance to be relatively numerous) united and represented both a potential fifth column and a way of injecting pro-Russian discourse into European narratives.
This memo has outlined the evolution of the Russian Cossack movement from being an institution of “hard” power that participated in frozen conflicts in the so-called near abroad to also being one of “soft” power that works to influence other societies’ attitudes to Russia. This manifests a particularly Russian understanding of the soft power concept. Cossacks have become an increasingly prominent component of the Kremlin’s domestic toolkit and remain ready to use hard power as vigilantes beyond Russia’s borders, yet scholars and analysts would do well to note the “soft power” purposes with which Cossack groups are being tasked.
Richard Arnold is Associate Professor of Political Science at Muskingum University.
Michael Hetzer, “Georgia: Cossack Warriors Reborn as Mercenaries in Abkhazia War,” Inter-Press Service, July 16, 1993. (LexisNexis)
Olga Rvacheva, “Donskoe Kazachestvo XXI Veka. Konstruirovanie Sotsial’nogo Fenomena [Don Cossacks of the XXI Century. The Construction of a Social Phenomenon],” Vestnik Iuzhnogo Tsentra RAN, 5:3, 2009, pp. 89-95.
PONARS Eurasia Policy Memo No. 728
|
<urn:uuid:9da893d5-2950-4f2e-ba3a-6e33264d817c>
|
CC-MAIN-2023-23
|
https://www.ponarseurasia.org/the-role-of-cossacks-in-russias-soft-power-toolkit/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645810.57/warc/CC-MAIN-20230530131531-20230530161531-00116.warc.gz
|
en
| 0.954265 | 3,101 | 2.828125 | 3 |
Strictly defined, spyware is computer software that gathers information about a computer user without the user's knowledge or informed consent, and then transmits this information to an organisation that expects to be able to profit from it in some way. Data-collecting programs installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared.
More broadly, the term spyware is applied to a wide range of related malware products which are not spyware in the strict sense. These products perform many different functions, including the delivery of unrequested advertising (pop-ups in particular), harvesting private information, re-routing page requests to illegally claim commercial site referral fees, and installing stealth phone diallers.
Spyware and viruses
Spyware is very similar to a virus, but clearly distinct. In both cases, the program is installed without the user's knowledge or consent. In both cases, system instability is a common result.
A virus, however, is self-replicating: it spreads copies of itself to other computers if it can. Spyware generally is not self-replicating. Where a virus relies on users with poor security habits in order to spread, and spreads so far as possible in an unobtrusive way (in order not to be detected and removed), spyware usually relies on persuading ignorant or credulous users to download and install it by offering some kind of bait. One typical spyware program targeted at children, for example, claims that:
He will explore the Internet with you as your very own friend and sidekick! He can talk, walk, joke, browse, search, e-mail, and download like no other friend you've ever had! He even has the ability to compare prices on the products you love and help you save money! Best of all, he's FREE!
In reality, it installs itself in such a way that it starts up every time the computer starts up (using CPU cycles and RAM, and reducing stability), and runs at all times, monitoring Internet usage and delivering targeted advertising to the child.
A virus generally aims to carry a payload of some kind: in other words, to do some damage to the user's system (such as, for example, delete certain files). The damage caused by spyware, in contrast, is usually incidental to the primary function of the program. Spyware generally does not damage the user's data files; indeed (apart from the intentional privacy invasion and bandwidth theft), the overwhelming majority of the harm inflicted by spyware is simply an unintended by-product of the data-gathering or other primary purpose.
A virus does deliberate damage (to system software, or data, or both); spyware does accidental damage (usually only to the system software). In general, neither one can damage the computer hardware itself. Certain special circumstances aside, the worst-case outcome is a need to reformat the hard drive and reinstall the operating software, and restore from backups. The cost to have this done professionally is typically well over £100. The cost of lost time and productivity can be much higher than this. It is not uncommon for the owner of a badly spyware infected system to purchase an entire new computer in the belief that the existing system "has become too slow.
Unprotected Windows-based computers, particularly those used by children or credulous adults, can rapidly accumulate a great many spyware components several hundred individual instances is common. The consequences of a moderate to severe spyware infection (privacy issues aside) generally include a substantial loss of system performance (over 50% in severe cases), and major stability issues (crashes and hangs). Difficulty connecting to the Internet is another common symptom.
Spyware infection is now (as of 2004) responsible for more visits to professional computer repairers than any other single cause. In more than half of these cases, the user is unaware of the spyware problem and initially assumes that the system performance, stability, and/or connectivity issues are related to hardware, Windows installation problems, or a virus.
Some spyware products have additional consequences. Dialers attempt to connect directly to a particular telephone number rather than to the user's own ISP: where the number in question is interstate or overseas, this can result in massive telephone bills which the user has no choice but to pay. To further compound the situation, some telephone companies have taken advantage of the situation by charging more for dialing the locations where these scams originate. Eircom, the former state telecom operator in Ireland has placed a number of small Pacific islands (where the scams originate) in a special $6/min tariff band. Unlike the band of special premium rate numbers, telephone subscribers cannot block these numbers.
Spyware is normally installed through either one of two common methods. The first is to hide a spyware component within an otherwise apparently useful program. Often, the containing program is made available for download free of charge, so as to encourage wide uptake of the spyware component. The second common method is to take advantage of security flaws in Internet Explorer. Spyware can also be installed on a computer by a virus or an e-mail trojan program, but this is not common.
The HTTP cookie is a well-known mechanism for storing information about an Internet user on their own computer, often used to assign wesbite visitors an individual identification number for subsequent recognition. However, the existence of cookies and their use is generally not concealed from users, who can also disallow access to cookie information. Nevertheless, to the extent that a Web site uses a cookie identifier to build a profile about the user, who does not know what information is added to this profile, the cookie mechanism could be considered a form of spyware. For example, a search engine website could assign a user an individual ID the first time he visits and store all search terms in a database with this ID as a key on all subsequent visits (until the cookie expires or is deleted). This data could be used to select advertisements to display to that user, or could legally or illegally be transmitted to third parties.
Another cause is granting permission for web-based applications to integrate into your system. These browser helper objects embed itself as part of your web browser.
Spyware is usually installed by some stealthy means. If you read the user agreements for the software you download and install, references (sometimes vague) are cited for allowing the issuing company of the software to record your internet usage and website surfing. Some software vendors allow you to buy the same product without this overhead.
Neglect is an additional cause. Use of automatic updates, antivirus, and other software upgrades will protect your system. Software bugs and exploits remain with older software, because the public is more aware how to invade your system.
Here are some brief explanations as to what types of Spyware are out there and what they set out to do:
Explanation: Program that creates advertisements on your PC.
Note that many websites have their own advertising, unrelated to adware.
"Adware is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user.
Adware has been criticised for occasionally including code that tracks a user's personal information and passes it on to third parties, without the user's authorisation or knowledge."
Explanation: Program that changes some settings in your browser.
- Changing your "search" page to pass all searches to a certain pay-per-search site
- Changing your default home page to the company page (most of often porn sites)
- Transmitting URLs viewed toward the company server
Browser Helper Object (BHO)
This category contains mostly dubious browser plugins such as "Search Assistants", toolbars etc. that have been known to transmit user data to their creators.
Explanation: Program designed to monitor user activity. May be used with or without consent.
Because it is sold commercially, most anti-virus vendors do not detect it.
Commercial Network Management Tool
Explanation: Tools of this kind are mostly used in (large) corporations. They can log network traffic passively (sniffing) or examine the logs of proxies etc. Nothing is installed on the individual computers, the software runs on a central server, They can only log things that pass through the network, not local things like entered passwords, keystrokes or screenshots.
Explanation: A program that (secretly) changes your dialup connection setting so that instead of calling your local internet provider, your PC calls some very expensive 0900 or international phone number without your knowledge or permission.
Explanation: Generic category for all unwanted software that secretly executes unwanted actions
Remote Administration Tool
Explanation: A tool that is intended to be used by network administrators to remotely control a PC on the network, usually for support or inventory purposes.
Due to the nature of the program, the possibility exists to be exploited for spying purposes.
Explanation: A hacker tool that is secretly installed on your PC and that allows the attacker to get almost complete over your computer.
Explanation: Malware that spreads itself automatically by infesting other files on your PC
"Software which attaches to other software. A boot virus inserts its code into the boot record or master boot record of a disk, so that when the machine boots from that disk, the virus code is executed. A file virus inserts its code into an executable file, so that when that file is executed, the virus is executed as well. A macro virus attaches itself to documents like Word or Excel."
Explanation: Virus-like program that spreads automatically to other computers, by sending itself out by email or by any other means.
"A program that propagates itself by attacking other machines and copying itself to them. Both worms and viruses are self-replicating code that travels from machine to machine by various means. Both worms and viruses have, as their first objective, merely propagation. Both can be destructive, depending on what payload, if any, they have been given. But there are some differences: worms may replace files, but do not insert themselves into files. In contrast, viruses insert themselves in files, but do not replace them."
"Spyware" Wikipedia: The Free Encyclopedia.
|
<urn:uuid:7c35de0e-e869-4af7-bf9e-8dd220ee3bbd>
|
CC-MAIN-2020-10
|
http://www.bridgendcomputerrepair.com/information/spyware/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145897.19/warc/CC-MAIN-20200224040929-20200224070929-00214.warc.gz
|
en
| 0.930117 | 2,174 | 3.359375 | 3 |
Back in December we covered how holiday stress can affect teens. One of the ideas that was mentioned as a stress reliever for teens was to partake in random acts of kindness. This is a great idea, with Random Acts of Kindness Week coming up next week during February 14th-20th, teens can continue to spread the kindness. The purpose of this special week is to urge everyone to be kind to each other and especially to be kind for no reason at all. Random acts of kindness or RAKs can be done any day of the week and numerous amounts of times, there is no limit on showing kindness to others! RAKs are selfless acts performed to either assist someone in need or to cheer up a person and make them smile. The driving force behind RAKs is having a selfless concern for the welfare of others. Selflessness focuses on doing good without receiving a reward in return.
The Random Acts of Kindness Foundation has put together a very comprehensive website with resources for teens that want to learn more about how kindness affects the world. The RAK Foundation thinks that kindness is a science and that it should be studied very carefully. They have posted studies on kindness and how it can make a difference for teens in their attitudes toward others and how RAKs affect those who receive such kindness.
The RAK Foundation has listed many articles that talk about how kindness helps reduce stress with emphasis on how kindness should be taught to young adults. Stage of Life, a site that is dedicated to helping teens shares the experiences and thoughts on the different stages in their lives asked 344 teens to complete a national survey about RAKs. The survey data displayed staggering results that teens who perform RAKs often find that it reduces stress and boosts their self-esteem. This is excellent news because reducing stress also leads to better physical and emotional health.
Stage of Life’s statistics revealed:
- 96.5% of teens have performed a random act of kindness
- 88% of teens have been on the receiving end of a random act of kindness
- 85% wanted to pass the kindness to someone else
- 56% teenagers that had performed a random act of kindness have done so more than 7 times
It’s evident that as teens continue to perform RAKs for others they will want to continue because of the great feeling it gives them to dole out kindness. There are a plethora of things that teens can do to celebrate Random Acts of Kindness Week. There are many things that can be done to brighten someone’s day for free. Just think about how great it would be if everyone took time to make someone smile. The kindness could go on and on. Let’s encourage teens to take part in RAK Week and get the ball rolling! Help them be creative and come up with some awesome ideas. When it comes to kindness, there’s no limit to the number of ways you can make a difference in someone’s life. Here are some fun ideas:
- At a drive-thru pay or toll bridge for the person behind you
- At the gas station offer to pump gas for someone
- At the grocery store buy some supplies for the local food bank or animal shelter
- Around the neighborhood rake the yard or cut the grass for an elderly neighbor
- Visit someone in the hospital or make a meal for a family dealing with illness
Here is a list of teen realistic fiction books that focus on teens having compassion and kindness for others and how that affects their lives and the lives of others.
Finding Audrey by Sophie Kinsella – A terrible incident with her school friends disrupts fourteen-year-old Audrey’s life. She is ridden with anxiety and hides in her house at all times wearing dark sunglasses as a shield against her fears. She meets with her therapist Dr. Sarah and wonders what the meetings will do to help her. When she meets Linus, her brother’s gaming teammate Audrey feels a sense of relief come over her. Linus has a wonderful smile and a deep warm and caring disposition. They begin their friendship through writing notes back and forth. Linus brings such kindness and sweetness to the crazy upside down life that Audrey is trying to deal with and he soothes her anxiety with his delightful smile.
Stargirl by Jerry Spinelli 2001 Top Ten Best Books for Young Adults – When Stargirl Caraway arrives at Mica High as the new girl it’s obvious that she’s not like any other girl. She dresses differently and acts the opposite of the norm, which creates various catalysts for change. Are these changes for the greater good? Leo Bolstruck may have an idea of how Stargirl has changed his own point of view and his opinion on love. Stargirl jumpstarts her classmates and when they notice her, it takes her from zero to hero with mass popularity and then back down to zero again, which is very traumatic for Stargirl and Leo. Stargirl is a classic story about bullying and how some can overcome the fear of peer pressure and stand up for others by using kindness and consideration. This is truly a compelling story about an amazing girl and a kindhearted boy who must choose between his friends or be true to himself and act on his feelings for Stargirl.
I am the Messenger by Markus Zusak 2006 Michael L. Printz Honor – Ed Kennedy is a 19-year old cab driver who lives in a tiny little shack with his smelly 17-year old dog named the Doorman. Ed’s life is boring and insignificant as he struggles with daily issues of being in love with his best friend Audrey and hanging out playing cards. One day Ed’s life changes forever when he is faced with a decision while accidentally walking into a bank robbery. Ed becomes a hero when he points a gun at the incompetent robber and that’s when his life of redemption starts. He begins to receive assignments from an anonymous person. Hesitant to pursue the assignments, he realizes he’s been chosen to care, to be kind, and to act as a protector for those that can’t protect themselves. This story is fantastic and as it progresses Ed transforms into a real hero and the changes he makes in his life and in others lives are quite memorable.
How to Save a Life by Sarah Zarr 2012 Teens Top Ten Best Books Nominee – This powerful YA novel packs a lot in the kindness and compassion department. It’s about a family that is hurting and through that hurt and pain they reach out to a teen girl who is hurting internally in her own way. 17-year old Jill is dealing with the recent death of her dad, and her mom Robin is trying to move on with her life, but feels that there is something missing. Robin reaches out to young mother to-be Mandy who in turn fills a void in both Robin and Jill’s lives even though Jill might not be willing to admit it at first. Zarr is incredible at relaying true feelings and emotions that run deep with teen angst. How to Save a Life is a story of hope, kindness, and resiliency and offers a fresh look at what can happen if you do something good for someone else out of the kindness of your heart.
Wonder by R.J. Palacio – Although this is more of a middle school book, it really hits home in the area of being kind and compassionate to others. 10-year-old Auggie Pullman has been homeschooled his entire life and now he is starting 5th grade at a private middle school in his neighborhood. He hopes that other students at his school will think he’s just a normal person under his disfigured face, which is an affliction he was born with. Auggie’s classmates are challenged to “be kinder than necessary” under all of the circumstances that should be an easy task, but can they really do it? This uplifting story shows readers that everyone carries some kind of stigma that makes them feel different at times, maybe not on the outside, but definitely on the inside. Auggie managed through his difficult time and it was very moving to see how kindness can change the lives of those who really need a helping hand.
— Kimberli Buckley, currently reading Everything, Everything by Nicola Yoon
You may also like:
Latest posts by Kimberli Buckley (see all)
- Reality Scoop: Depression in Young Adult Literature - June 9, 2016
- Reality Scoop: National Autism Awareness Month - April 22, 2016
- Reality Scoop: Importance of Sleep for Teens - March 24, 2016
|
<urn:uuid:26660693-d051-4d97-992f-afeaf296542d>
|
CC-MAIN-2017-26
|
http://www.yalsa.ala.org/thehub/2016/02/11/reality-scoop-random-acts-of-kindness-for-ya/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320491.13/warc/CC-MAIN-20170625115717-20170625135717-00241.warc.gz
|
en
| 0.971137 | 1,770 | 2.78125 | 3 |
GREAT Shark nurseries are an area where young sharks are born or where they reside and where their growth starts. These are generally near their mating areas and are at a spot safe from other predators and provide abundant food for nourishment and growth. Scientists define nursery areas by looking at the GREAT number of juveniles and neonates compared to other places where sharks are present in a large number. There should be a tendency of immature sharks to return to the place and that the immature shark should stay there GREAT for a couple of years. The purpose of nurseries is to stabilize and increase the populace of a specific population.
The great white shark is the largest predatory fish GREAT present on earth, which can grow to an enormous length of 15 feet. They comprise six genetically distinct population, in Japan, Australia, South Africa, the Mediterranean, north-west Atlantic and northeast Pacific. It’s a migratory shark which can adapt to various oceanic climates and can survive all kinds of depths. Despite its notoriety in its inhabiting areas, it is considered to be threatened with
extinction also because of its slow GREAT growth and late reproduction with very few offspring which makes them vulnerable.
THE GREAT FIND
A team of researchers recently GREAT discovered an ancient white shark breeding ground. It is the first-ever evidence found of a nursery of the great white shark, Carcharodon charcharis in Chile. This will provide a better understanding of the evolutionary process of the beast and could also help in protecting these endangered animals. The researchers had analyzed 5 to 2 million-year-old fossil teeth statistically which were found at various sites near Chile and Peru, to recreate body size distribution patterns which basically means that they analyzed the size of the shark with relation to the places GREAT so as to determine where the most amount of immature sharks are present.
In the results, they found that the favourable body sizes were present along the South American paleo pacific coast. One of them in Northern Chile, GREAT Coquimbo showed the highest
percentage of immature sharks and the lowest number of sexually matured sharks present.
This discovery is of utmost importance for the survival of these GREAT sharks in the future, with an increase in global warming every day the survival of these sharks becomes difficult and hence this discovery paves a way for a scientist to take appropriate protective measures to ensure the survival of the great white shark.
|
<urn:uuid:5e82c9e5-15c5-449c-9a5e-3d53eb1f6b65>
|
CC-MAIN-2023-23
|
http://www.newsorb360.com/first-evidence-of-a-palaeo-nursery-area-of-the-great-white-shark/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00010.warc.gz
|
en
| 0.957686 | 488 | 3.296875 | 3 |
In addition to its inviting beaches, elegant hotels, and great bargains, Guam has another vital attraction- its unique culture. The traditions and customs of Guam's proud island heritage thrive, despite invading conquerors, wars and epidemics, and changing governments. Forged from a neolithic foundation and molded by historical events, Guam's living culture has expanded into a vibrant, modern way of life.
Since the 17th century, Catholic churches have been the center of village activities. Even today, every village has its patron saint whose feast day is celebrated with an elaborate fiesta, which the entire island is invited to attend. Family groups still hold christening parties, fandangos (weddings, novenas, funerals, and death- anniversary rosaries). All are flavored by the rich Spanish heritage.
Spanish influence may also be seen in the mestiza, a style of women's clothing, or, in the architecture of Guam's southern villages.
Countless Americans, Europeans, Asians, Micronesians, and other visitors have left their imprints on the island's pastimes and tastes, but nowhere is the island's multi-cultural influence more evident than in its food.
At a fiesta or other island party, families prepare heavily laden tables of local delicacies, such as red rice, shrimp patties, a Filipino style noodle dish called pancit, barbecued ribs and chicken, and taro leaves cooked in coconut milk. Another mouth-watering treat is kelaguen, usually prepared from chopped broiled chicken, lemon juice, grated coconut, and hot peppers. Fiery finadene sauce, made with soy sauce, lemon juice or vinegar, hot peppers, and onions, is sprinkled over the food for a truly memorable dish. After a hearty meal, Chamorros often enjoy chewing pugua (betel nut), mixed with powdered lime and wrapped in pepper leaf.
Music is an integral aspect of an island lifestyle, and performances using traditional instruments, such as the belembaotuyan, are highlights of cultural presentations. The belembaotuyan, made from a hollow gourd and strung with a taut wire and pressed against ones bare stomach, creates a melodic sound enjoyed by all. The nose flute, once a long forgotten instrument, is now making a hearty return.
The Kantan Chamorro style of singing has been a favorite form of entertainment for generations. Additionally, it has been used to lighten long hours of group work activity, such as weaving, corn husking, and net fishing. One singer would begin the familiar four-line chant, referring romantically or teasingly in the verse to another person in the group. The challenged person would then take up the tune and the song might continue in this fashion with different singers for hours.
Contemporary music is an important element of social gatherings, ranging from fiestas and fandangos to casual backyard parties. Musicians usually sing Chamorro, American, Filipino, or a variety of Asian songs.
Legends and folklore about village taotaomo'na (ancient spirits), doomed lovers leaping to their death off Two Lovers' Point (Puntan Dos Amantes), and Sirena, a beautiful young girl who became a mermaid, are portrayed in many of Guam's enriching cultural dances.
Guam's traditional arts are very much alive. During cultural fairs and exhibitions, visitors often have the opportunity to watch master weavers, carvers and even a blacksmith at work.
Weavers, using the traditional pandanus or coconut fibers, fashion baskets of various sizes, purses, hats, floor mats, and wall hangings. Carvers hew tables, plaques, figurines of people or animals, and household implements using ifil wood, or pago woods.
The traditional ways are being passed along to the younger generations through apprenticeship programs in order to preserve the island's art heritage. A master blacksmith, for example, recently graduated three pupil, who have learned how to make useful steel farming and fishing implements, such as coconut graters, hoes, machetes, and fishing spearheads. Other hand-forged items include betel nut scissors, tools for weaving, and knives.
A trip to Guam is like visiting the four exotic corners of the globe. Guam is considered the hub of the western Pacific and undeniably Micronesia's most cosmopolitan destination - a true example of the great American melting pot. In addition to the indigenous Chamorros and 'stateside' Americans, Guam boasts large populations of Filipinos, Chinese, Japanese, Koreans, and Micronesian Islanders, as well as a few Vietnamese, Indians, and Europeans.
As the 1990 census figures indicate, the ethnic composition of the island is 43 percent Chamorro, 23 percent Fllipino, 15 percent other ethnic groups, 14 percent Caucasian, and 5 percent other Pacific Islanders. Approximately half of all Guam residents were born on Guam, and 70 percent of these are under the age of 34.
Our island has been enjoying a steady population growth. The 1990 census reports a population of 133,152, a 20.4 percent increase since 1980. Population estimates for 2009 indicate Guam has grown to 177,000 people.
|
<urn:uuid:61b79c14-ce46-4638-ac86-469a15b7994a>
|
CC-MAIN-2020-29
|
https://www.visitguam.com/chamorro-culture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657155816.86/warc/CC-MAIN-20200715035109-20200715065109-00039.warc.gz
|
en
| 0.937108 | 1,090 | 2.78125 | 3 |
EATING FOR STRESS RELIEF
A recent survey has reported that a staggering 74% of Brits have, at some point, been so stressed that they have felt completely overwhelmed and unable to cope, with 51% suffering from depression and 61% suffering from anxiety as a result. The survey, carried out by the Mental Health Foundation, also found that 46% of adults have eaten too much or eaten unhealthily due to stress.
As the statistics show, it’s clear that stress is one of the biggest challenges we face. Not only is stress a significant factor in mental health problems like anxiety and depression, but it is also linked to serious physical health issues like heart disease, a weakened immune system, and digestive problems.
Eating a balanced and nutritious diet is key to helping our bodies manage the physiological changes brought on by stress. As the food we eat affects our hormones, eating to balance these out will help you keep your cool.
Ahead of Stress Awareness Month in April, Gosh! Food’s leading nutritionist Fiona Lawson has curated her expert opinion on how to eat for stress relief…
- Maintain a steady blood sugar level
This step is so important and essentially means avoiding sugary or starchy foods and opting for more satisfying complex carbohydrates, protein, and healthy fats. An ideal blood sugar-balancing meal might include sweet potato and broccoli (complex carbs) with salmon (protein and healthy fat). Gosh!’s Sweet Potato Pakoras are also a great option to chuck into a main meal to benefit from the stress-busting nutrients.
- It’s all about the B Vitamins
B Vitamins help your adrenal glands deal with stress. Luckily, these handy little vitamins are everywhere; in whole grains, eggs, meat, nuts, and seeds. Focus on eating wholesome, nourishing foods and you can’t go wrong.
- Ensure you’re getting enough vitamins and minerals
Vitamins and minerals like magnesium really help your body deal with stress, so much so that a magnesium deficiency has even been linked to anxiety. To boost your magnesium intake, load your plate with Swiss chard, spinach and pumpkin seeds. Gosh! Spinach & Pine Nut Bites are also a great option to help increase levels.
- Cut back on the stimulants
It’s so easy to forget how much stimulants can exacerbate the stress response. For many of us, this means the many coffees that power us through the day. Try to have no more than two cups a day. If you find yourself needing that caffeine hit, go for green tea instead – it contains a compound called l-theanine which helps you feel calm.
Managing your diet and nutrition is key to help relieve stress responses. But if you are feeling overwhelmed by stress, it’s important to speak to someone or seek professional support.
|
<urn:uuid:2bfca03e-c0bb-4c88-b4da-9ca5830ca556>
|
CC-MAIN-2023-23
|
https://missjonesgroup.com/eating-for-stress-relief/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00612.warc.gz
|
en
| 0.941795 | 619 | 2.578125 | 3 |
Did you know that planets and stars actually give off music? Although space is a virtual vacuum, this does not mean there is no sound in space. Sounds still exists in the form of electromagnetic vibrations and can be detected using specially designed instruments developed by NASA.
These amazing ambient space sounds come from electronic vibrations of the planets, moons and rings, electromagnetic fields of the planets and moons, planetary magnetosphere, trapped radio waves bouncing between the planet and the inner surface of it’s atmosphere, charged particle interactions of the planet, it’s moons and the solar wind, and from charged particle emissions from the rings of certain planets.
Looking into outer space, we often assume it would be absolutely silent. Little do we realize that the universes is teeming with planetary music. The sounds these planets give off are absolutely breathtaking:
Hope you enjoyed this!
One thought on “NASA Discovers Planets And Stars Give Off Music – This Is What It Sounds Like”
Are y’all going to find more planets within the Milky Way?
|
<urn:uuid:1917618d-790b-4f75-b791-59d38dc6c4f5>
|
CC-MAIN-2023-23
|
https://www.thespiritscience.net/2015/06/15/nasa-discovers-planets-and-stars-give-off-music-this-is-what-it-sounds-like/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00627.warc.gz
|
en
| 0.920816 | 217 | 3.34375 | 3 |
The term special allowance accounts refers to a contra asset to accounts receivable that ensures the amount appearing on the balance sheet is stated in terms of net realizable value. Special allowance accounts are required to match anticipated and real expenses with the corresponding sales revenues.
Allowance accounts are contra assets, and are used to ensure accounts receivable is shown on the balance sheet at net realizable value. Generally, companies will have several types of allowance accounts, the most common of which include:
The above categories of costs are contra asset accounts, and their values are based on estimates provided by various subject matter experts in the company. Actual expenses such as sales returns and bad debt expenses would appear on the company's income statement. Companies need to go through the process of reconciling actual expenses to these allowance accounts so that accounts receivable is accurately depicted on the balance sheet.
Company A's Q1 ending balance of accounts receivable was $3,867,000. Company A has estimated the allowance for doubtful accounts to be $77,340, sales returns and allowance at $5,300, and collection expenses of $2,500. Accounts receivable would appear on Company A's balance sheet as:
|Less: Allowance for Doubtful Accounts||-$77,340|
|Less: Sales Returns and Allowances||-$5,300|
|Less: Collection Expense||-$2,500|
|Accounts Receivable, Net||$3,781,860|
|
<urn:uuid:d3b611f2-d51c-4c83-aa42-864738e91477>
|
CC-MAIN-2020-16
|
https://www.money-zine.com/definitions/investing-dictionary/special-allowance-accounts/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371813538.73/warc/CC-MAIN-20200408104113-20200408134613-00296.warc.gz
|
en
| 0.926705 | 302 | 2.5625 | 3 |
(Part of the text that follows was contributed by Prof. Shana Brown, History)
The University of Hawai‘i dates to 1907, when the Hawai‘i Territorial Legislature established the College of Agriculture and Mechanic Arts in Honolulu. It was renamed the College of Hawai‘i in 1912.
The elevation of the College to a University was largely due to the activism of a Chinese-American cashier at the Bank of Hawai‘i—Honolulu-born William Kwai Fong Yap (葉桂芳1873–1935).
In 1919, Yap wrote a letter to the editor of the Honolulu Star-Bulletin, noting that “need (for a university had) been felt for many years by a great number of poor but ambitious young men and women who have been forced to go to the mainland to get what they desire in their special line of education. Any opposition to expenditures for educational purposes is not worth of consideration. Education cannot be measured in terms of dollars.”
In 1920 Yap garnered sufficient signatures to successfully petition the Hawai‘i Territorial Legislature to elevate the College of Hawai‘i to university status. The university began to offer courses in what was then called “Oriental” i.e. East Asian studies, including Chinese, making UH the fifth U.S. institution to offer the language, after Yale (1877), Harvard (1879), the University of California at Berkeley (1896), and Columbia University (1901).
In 1921, the Board of Regents reported to the Legislature that “the finding of a suitable man for instruction in Chinese proved to be particularly difficult and it was not until December of 1920 that Dr. Tien Mu Wang was secured.” Prof. Tien Mu Wang (王天木, jinshi degree, Chinese imperial examinations; LL.B. Chuo University, Japan), taught Chinese history and language at U.H. [See p. 1, “The Department of History at the University of Hawaii”, here. ]
The next year, in August 1921, Wang Tianmu hosted a delegation of Chinese educators, including the Peking University President Cai Yuanpei 蔡元培, at a Honolulu conference on the subject of education in the Pacific. Then faculty at UH, Wang Tianmu was empowered as a member of the five-person delegation representing the Chinese government.
Above: Chinese delegation to a conference on Pacific education, held in Honolulu, 1921. Cai Yuanpei is seated, center; Wang Tianmu is on the far right. (http://blog.sina.com.cn/s/blog_5922c71e0102dv0m.html)
The Chinese delegation visit the pineapple fields, August, 1921 (http://bailushi.com.cn/toFindPicsListByKeyWord.html?keyword=%E7%8E%8B%E5%A4%A9%E6%9C%A8)
In September 1922, Wang Tianmu left Hawai’i, to be replaced by Lee Shaochang 李照昌 (1891-1977; Yale B.A. 1917; Columbia M.A. 1918) the following year. Over the next decade, under Lee’s leadership, the size of the Chinese studies program expanded considerably. Departments of Chinese and Japanese were created. By 1930, the UHM ranked third among U.S. colleges & universities in the number of Asia-related courses offered. In 1933, over a hundred students were studying Chinese literature; over sixty students took classes on Chinese history; and almost a hundred and fifty students were studying Chinese culture and Asian religion, in addition to Chinese language taught by a Mr. Xie Tianyu 谢天玉.
In 1935, the Departments of Chinese and Japanese merged into the Oriental Institute, and Li Shaochang was made the first director. It began to accept PhD students in Chinese history and literature.
In 1937, Hamilton Library hired its first Chinese collection librarian, Cheuk-woon Taam (Tan Zhuoyuan 譚卓垣 1900-1946), who greatly expanded the collection. In 1922 the university library had roughly 1,500 volumes in its China collection; under the efforts of Taam, the collection grew to over 41,000 volumes by 1943. As Taam wrote, “As a whole our Chinese library represents a small nucleus of a well picked collection for Sinological studies. We are fairly well equipped with books on Chinese history, literature, philosophy, and art.” (See Kuang-tien Yao, “Cheuk-woon Taam and the Chinese Collection at the University of Hawaii Library,” Journal of East Asian Libraries No. 156, February 2013)
Cheuk-woon Taam and his family.
The start of the World War II in the Pacific in 1937 led many Chinese intellectuals to flee educational institutions in Japanese-occupied cities like Nanjing and Beijing. Dr. Yuan Ren Chao 趙元任 left the Academia Sinica in Nanjing and came to Honolulu in 1939. He offered intensive Chinese language courses for graduate and upper-division undergraduates, before leaving to join the faculty at the University of California, Berkeley.
Chao, Yuan Ren
Also during the wartime period came Dr. Wing-tsit Chan 陳榮捷 (philosophy), who later became famous for his English-language works on traditional Chinese philosophy. Chan taught in the Department of Philosophy from 1937–42, and helped establish the East-West Philosopher’s Conference [see pp. 326–28, China Review International Volume 2 Number 3, Fall 1995, for an excerpt from an oral history archived at Columbia university, about his five years at the U of Hawai‘i].
Other faculty of the wartime era included Chen Shouyi (陳受頤, 1899-1978; BA Lingnan University, 1920; PhD University of Chicago, 1929) who was a specialist in comparative cultural studies. Chen had previously served as chair of the History Department at Beijing University from 1931-1937, and stayed at UH until 1941, when he moved to California.
In the 1950’s, the US government began to significantly prioritize funding for Asian language instruction, including Chinese. UH faculty were active in organizations that promoted Chinese-language instruction, like the American Association of Chinese Language Instructors, founded in 1962. This association was co-founded by the remarkable John Young (Yang Jiaoyong 杨觉勇, 1920 – 2013). Born in Tianjin and educated in Japan, graduating from Tokyo Imperial University in 1942, Young daringly traveled across occupied China to serve in Chiang Kai-shek’s wartime government in Chongqing. At one point he served as a translator for Mao Zedong in conversation with Japanese anti-war activist Wataru Kaji (鹿地 亘, 1903–1982). After the war he did important work for the Chinese government in collecting evidence of Japanese war crimes in preparation for the Tokyo trials. Young later helped found the American Association of Chinese Language Instructors (now the Chinese Language Teachers Association, USA) and served as its director while at UH from 1964-1974.
In 1959, Madame Soong Mei-ling (Madame Chiang Kai-shek, first lady of the Republic of China) visited the Mānoa campus to address graduates and guests at Commencment. She is seen here with Regents Chair Philip Spalding.
Another figure of international reknown is Prof. Li Fang-Kuei 李方桂 who taught Chinese linguistics from 1969 until he retired in 1974, specializing in historical linguistics, particularly the phonetics of Tai languages.
Prof. John DeFrancis was educated at Yale and Columbia Universities, and came to UH after having been blacklisted for a decade by McCarthyism. He chaired the Department of East Asian Languages and Literatures until his retirement, then, as professor emeritus, wrote three major works, and worked with the Center for Chinese Studies to write and publish three titles in the ABC Dictionary series.
Prof. Elizabeth Wichmann-Walczak trained under Madam Shen Xiaomei, a disciple of the famed Mei Lanfang, and built an internationally known program in Chinese theatre at UH during her tenure from 1981 to 2018. She translated and staged traditional jingju or kunqu every four years; three of those performances toured China.
The University’s extensive China-focused faculty resources were organized first as the Council for Chinese Studies in 1977, and then as the Center for Chinese Studies (CCS) in 1987.
Ronald C. Brown of the Law School was CCS director from 2000-6, Rosita Chang of the Business School from 2006-9, and Frederick Lau of Ethnomusicology from 2009–18.
Perhaps CCS’s most famous alumnus is Hao Ping 郝平, who came to us as the second visiting scholar on the university’s exchange program with Peking University. Then deputy director of Beida’s Office of Student Services, he arrived in Honolulu in 1991, and remained for a total of 4.5 years, completing a Master’s in History during this time. He returned to Beida to become head of the Office of International Relations, and was later promoted to Vice President. He picked up a PhD along the way—his dissertation was on “Sun Yat-sen and America”—which was translated into English by CCS and published by the press of the Beijing Foreign Studies University (BFSU). His next career move was to the presidency of BFSU, during which time UH jointly established a Confucius Institute with BFSU. From there, Hao Ping was promoted to the Ministry of Education, where he served as Vice Minister for seven years. This period included a term as Chair of the 37th session of UNESCO (2011-16). At the end of 2016, he first became Party Secretary of his alma mater, Peking University, and in 2018, President.
Hao Ping at the United Nations
In 1978, UHM was awarded the first National Resource Center for East Asian Studies (NRCEA) by the U.S. Department of Education. With two brief hiatuses, UHM been funded by the USDOE continuously since then.
The National Foreign Language Resource Center at the University of Hawaii was first established in 1990, and supports teaching and learning foreign languages, including Chinese.
In 2014, the National Flagship Program for Chinese was established to help bring student proficiency in Chinese to the “superior” (professional) level.
From 2006 to 2019, UHM operated a Confucius Institute, with funding from the PRC Ministry of Education.
The Center’s mission is to further strengthen Chinese Studies within the University system by supporting research, student learning, and community outreach. For a 10-minute oral introduction in Chinese to the website of the Mānoa Institutional Research Office, that compiles data about the University, go here (for mainland Chinese Mandarin) or here (for Taiwan Mandarin).
D.W.Y. Kwok, “Our History: The Department of History at the University of Hawaiʻi” (2006), http://manoa.hawaii.edu/history/about/our-history/#_edn1
Kuang-tien Yao, “Cheuk-woon Taam and the Chinese Collection at the University of Hawaii Library,” Journal of East Asian Libraries, No. 156 (Feb 2013) (https://scholarspace.manoa.hawaii.edu/handle/10125/32914)
Yao Daozhong 姚道中, “The University of Hawai’i and Chinese Language Instruction in the United States 夏威夷大学和美国的中文教学. TCSOL Studies 53:1 (2014) (DOI:10.16131/j.cnki.cn44-1669/g4.2014.01.002)
|
<urn:uuid:c51c934b-0a94-402e-ab11-58f9a9fdfb8b>
|
CC-MAIN-2020-24
|
https://manoa.hawaii.edu/chinesestudies/about/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00573.warc.gz
|
en
| 0.946647 | 2,587 | 2.796875 | 3 |
While the global craft beer boom has brewers experiment to an extend unseen before, a German law still strictly stipulating what is a beer turns 500. In 1516 two Bavarian dukes issued a law that prohibited brewers to use anything but water, barley and hops. Would they have known about the crucial role of yeast for actual beer production they would have allowed it too but they were simply not yet aware.
With the unification of Germany, the decree now known as the Reinheitsgebot (purity ordinance) spread over that ever bigger country. It means that to this day, German brewers can only use the aforementioned ingredients if they want to officially call their brews beer. If they do not comply, they might still label it beer but only if they subsequently export the stuff. Foreign brewers, in turn, can only sell non-Reinheitsgebot beer on German soil when it is not brewed there.
The Scottish craft brewers of Brewdog, for example, are allowed to open a bar in Berlin. But they can not brew the beers they are known for in the German capital. They will have to import them and then can only sell them when they are not advertised as beer. Labels like IPA are allowed though. This situation makes that many German craft brewers themselves export most of their beers.
While local craft brewers challenge the Reinheitsgebot, German beer consumption has seen a significant decrease. Reason to abolish the strict stipulations? Most German brewers oppose abolition. The Reinheitsgebot, they state, is the reason behind the excellent international reputation of German beer. While their opponents stress the limitations of the gebot, they like to stress the Reinheit. Compliance, they hold, results in pure, high quality beer.
Proponents tend to endow the law with an air of certified quality. But while the dukes who issued the decree five centuries ago also prevented their subjects against poisoning, their main aim seemed to have been something else: bread. In order to produce it, grains such as wheat and rye were needed, but they were not always available. In order to ensure that brewers did not fill their tanks with them, they were ordered to only use barley, less suitable for bread, onwards. A clever move by these dukes, who thus safeguarded bread and beer production.
Now that the reasons that inspired the law are no longer existent and a new generation of German brewers aims to break former boundaries, legitimate questions around the position of the age old Reinheitsgebot arise. In Amsterdam, MediaMatic will address these during Rein Beer Fest, on the 23th and 24th of April. Great opportunity to hear some beer specialists share their knowledge about this subject. Of course there is ample opportunity to taste what this is all about too.
As always, we are open too, just pouring the beers we brewed in whatever way we liked. While some of our beers are brewed with just the stipulated ingredients, sticking to the Reinheitsgebot would have prevented us from brewing some of our tastiest beers. We could not have added the loads of coriander to our Vlo, that we reintroduced again recently. Or that delicious fresh I.P.A. with rye (!) we launched not too long ago.
As long as it does not create any bread shortages, we will continue brewing like we used to.
|
<urn:uuid:951a3dce-4d69-4c84-a378-8f6e410808ed>
|
CC-MAIN-2023-23
|
https://www.brouwerijhetij.nl/reinheitsgebot-turns-500-german-brewing-regulations-never/?lang=en
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00449.warc.gz
|
en
| 0.970618 | 689 | 3.1875 | 3 |
Create perfect square trinomials to solve quadratic equations!
Students can get plenty of practice with these 2 sets of task cards for completing the square!
Flow along as I guide you through my notes on completing the square!
Practice by using flash cards or play a game of Quizlet Live!
New Jersey, USA
Copyright © 2018 iteachalgebra - All Rights Reserved.
Powered by GoDaddy
|
<urn:uuid:35e69883-75cd-44d0-adb2-62dd88019a3c>
|
CC-MAIN-2023-14
|
https://iteachalgebra.com/completing-the-square
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00032.warc.gz
|
en
| 0.893432 | 106 | 2.8125 | 3 |
An annex and an appendix are both forms of addendums to a main document. An appendix contains data that cannot be placed in the main document and has references in the original copy or file. An annex, on the other hand, is usually a standalone document that offers additional information than contained in the main document.
|Definition||Annex is an addition to a document.||Appendix is an addition made towards the end of a thesis.|
|Usage||a term used mostly in business models and ideas.||a term used in the research field.|
edit Relation to the main document
An appendix cannot be submitted without the main copy. The aim of an appendix is to add greater details, visuals and examples for better understanding of the main copy. An annex, however, is different from an appendix in that it can be considered without the main text. It cannot be added to the main text but still has importance as regards the original copy.
edit Authors of an annex vs an appendix
Appendices are usually written by original authors whereas annexes can be written by outside party.
|
<urn:uuid:c995cca9-ca37-4a94-b565-6e62614640dc>
|
CC-MAIN-2014-10
|
http://www.diffen.com/difference/Annex_vs_Appendix
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999675557/warc/CC-MAIN-20140305060755-00060-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.927716 | 224 | 3.546875 | 4 |
Show image list »
The constitution for the state of Connecticut...
Item # 638901
September 25, 1818
NEW YORK SPECTATOR, a pair of issues dated Sept. 25 and Oct. 23, 1818
* Connecticut Constitution adopted
Beginning on the ftpg. of the Sept. 25 issue and taking over one-third of ftpg. 2 is: "A Constitution" for the state of Connecticut, which was essentially the constitution under which the state operated through 1965 when a new constitution was written. Page 2 of the Oct. 23 issue has the report of the ratification of the constitution by the people of Connecticut along with the: "Proclamation" of the governor concerning this.
Each issue has four pages, nice condition.
Category: Pre-Civil War
|
<urn:uuid:21095fda-d457-4fa1-9834-a59647305e86>
|
CC-MAIN-2017-43
|
http://www.rarenewspapers.com/view/638901?list_url=%2Flist%2Fcategory%2F115-pre-civil-war%3Fpage%3D5
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822747.22/warc/CC-MAIN-20171018051631-20171018071631-00366.warc.gz
|
en
| 0.948754 | 160 | 2.5625 | 3 |
I hear from moms of babies around 4 months of age that they think their baby might be teething. A lot of babies at this age start displaying behaviors that look like symptoms of teething in older children. They start drooling a lot, and look like they’re biting and chewing on everything. However, getting the first two teeth at this age would not be usual. The average for the first two lower teeth to make an appearance is at about 6-10 months, right in time to try out new foods. I’m not saying it’s not possible for babies to get their first teeth at 4 months, but it’s pretty far outside the average compared to the number of babies who I hear about having “teething” behaviors at this age. So what’s going on that makes babies who are probably not teething look like they are?
The dance of mother/baby development in the first few months after birth amazes me. It’s incredible how the mother’s body works to accommodate a growing baby by making milk with different nutritional qualities as her baby grows. The reflexes and small adaptations babies develop that precede and prepare them for major developmental milestones also amaze me. The things that happen in a baby’s body to prepare for eating solid food are exquisitely choreographed to allow babies to start to feed themselves at just the right time, all coming together between 4 and 6 months of age for healthy babies, with readiness for solids actually beginning at 6 months of age.
When this appearance of early teething behavior occurs, to things are usually seen: drooling and chewing. Teething older children do these two things for a week or two before getting a new tooth, but in many babies right at 4 months or so of age have these two behaviors that precede tooth eruption by several weeks or even months. Also at 4 months, a lot of babies have about 6 weeks of sleep disturbance that is very common and sometimes lumped together with these behaviors and called “teething.” Since there is no tooth eruption imminent at most babies at this age, something else is probably going on that prompt these things that are completely unrelated to teething. I’m not doubting that parents see this drooling, chewing, and sleep disturbance at 4 months. I’m also in no way denying that when older babies are days away from cutting new teeth that they do these things. However, I am saying that there are other reasons why a 4 month old may experience what looks similar to teething when their first teeth are still at least 2 months away.
Let’s look at drooling first. It’s pretty normal and common for babies between 3 and 6 months to drool. A lot. Some babies even need to wear a bib to keep their clothes from getting soaked. It’s usually not a problem, except that some babies end up with a rash on their chins from the constant wetness. If this happens, you can occasionally dry the baby’s chin and apply a natural and edible barrier cream, like Earth Mama Angel Baby Nipple Butter or plain old coconut oil. (BTW, I don’t really recommend using your diaper cream for this, even if it’s a natural and edible one for the simple reason that you use it at the changing table. Probably someone has touched the baby’s butt and then put their fingers in the diaper cream jar, so then using it on the baby’s chin has a major yuck factor, if you think about it.) Drooling is certainly a teething symptom in older children, but in a 3 or 4 month old, there is a more likely explanation. Starting at about 3 or 4 months of age, babies start producing more saliva in preparation for eating solid foods. Preparing for a lifetime of eating food is a major developmental step that doesn’t happen overnight. Saliva is more than just liquid that keeps your mouth wet; it contains digestive enzymes. Mixing and mashing food in your mouth along with saliva is the first step in digesting food. Babies who are fed only liquid diets, which they should be at this age, don’t need a lot of extra saliva. But as the time for starting solids approaches, their mouths do start producing the extra saliva needed for digesting food right at about 3 to 4 months of age. While the extra saliva is a sign of impending readiness for solids, it should be noted that its presence in itself is not indicative of readiness to start solid food. It’s just one step in the process. Babies also don’t don’t swallow their saliva, so they drool the extra out of their mouths. The drooling at 3 or 4 months is almost universal, and unless a tooth is actually seen erupting is probably not a sign of teething, but just a developmental milestone in digestion.
The other symptom of concern here is biting or chewing. It’s well known that babies who are teething like to bite and chew. But babies at 3 or 4 months will also make a rhythmic chewing motion if something like a teething ring (or food, or their own finger) is put in their mouths. This is, again, something that mimics teething behavior in older children that can be explained by a normal earlier stage of development.
Before 6 months of age, a great many infant behaviors are driven by reflexes. There are a whole lot of things that your baby will do automatically and in the same way each time in response to certain movements or touches. A simple one to see is the asymmetrical tonic neck reflex. You’ve probably seen it and not thought anything about it. If a baby’s head is turned to one side while lying on her back, she’ll extend the arm on the side she’s looking straight out. The other arm turns upward. It’s sometimes called the Fencer’s Reflex because the baby looks like the baby’s ready for sword fighting. There are a whole lot more of these reflexive behaviors going on, too. One of them, the phasic bite reflex, is relevant to our discussion. This reflex is present at birth in full term infants. If you rub or put pressure on a baby’s lower gums, the baby will have a reflexive behavior of opening and closing the jaw, like chewing. However, it’s an automatic behavior created in the nervous system, and not really voluntary chewing for pleasure or pain relief as seen in older children who are teething. Like the drooling, this reflex is part of biological preparation for eating. It ensures that when babies do start to eat solid food, they will chew it. The phasic bite reflex goes away between 9 and 12 months, so it’s not responsible for what we see in teething babies past that age. The 4 month time frame also corresponds to when many babies start to put things into their own mouths, and at that time we see them stimulating their own phasic bite reflexes really for the first time. So what do we see? A drooling baby putting everything in her mouth and chewing on it. It looks a lot like an older baby teething, but is probably happening for completely different reasons that are also normal and biologically sound.
Lastly, the sleep disturbance. Teething in children whose teeth are actively erupting is painful, and often causes them to wake in the night. However, it’s observed that many babies at the age of 4 months go through a period of increased night waking. It’s so well known that it has a name: the 4 Month Sleep Regression. Whether its a sleep “regression” is a matter of perspective, but it’s extremely common. When babies go through this stage, they wake more frequently in the night than they previously did and it lasts about 6 weeks. No one really knows why this happens. There are a few theories for the cause. The most common that I’ve heard is that it corresponds with a baby’s increased awareness of the world outside of themselves. Basically, that they start to notice the world and get too distracted to go back to sleep. It can be incredibly distressing for parents. Many have reported to me that they never get more than an hour of uninterrupted sleep during this period. It’s made worse by the fact that this comes at the same time that many mothers are newly returning to work. Parents can get desperate. Some parents get so distressed by the 4 month sleep regression that they prematurely start solids in the form of cereal in the bottle to try to increase the length of baby’s sleep. (Please be aware, this practice has been shown to NOT help with infant sleep and is not recommended.) Others start using sleep training methods like extinguishing to try to get their babies to sleep like they used to right at this time. No one really knows how prevalent the 4 month sleep regression is nor what causes it, but it’s common enough that it probably doesn’t account for the small number of babies that get their first teeth at this age. Something else is going on. I’m not sure what, but I’m hoping to study it some day.
Babies’ first teeth erupt, on average, at 6-10 months of age. This is the biologically average age of first teeth. Getting teeth much before that is not unheard of, but it is unusual. However, many moms report “teething” behavior two or more months before the eruption of the first tooth. Seeing as how this behavior is much more common than it is for babies to get teeth before 6 months of age, and also that teething behavior does not generally last for weeks or months before later teeth come in, there is probably something else going on. As it turns out, there are other explanations for the cluster of behavior that includes chewing, drooling, and sleeplessness in babies around 4 months of age. At this age, babies’ bodies prepare for introducing solid foods by increased production of saliva, the source of the drool. They also at this age have an automatic reflex that can cause them to appear to be ravenously chewing on anything in their mouths. Considering that many people feel that babies should wean when they get teeth, identifying what is and isn’t teething could be important to a baby’s well being. Understanding that a 4 month old baby that is chewing and drooling may not actually be Keeping these normal developmental stages in mind when drooling, chewing, and sleeplessness appear significantly before the first tooth is expected may help parents understand their babies’ behavior and could reduce unnecessary intervention, anxiety, and weaning.
|
<urn:uuid:d8557cfa-a4fe-4561-b89b-69bc09ef8129>
|
CC-MAIN-2017-30
|
http://bringinghomebaby.biz/my-4-month-old-is-teething/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426169.17/warc/CC-MAIN-20170726142211-20170726162211-00187.warc.gz
|
en
| 0.964539 | 2,257 | 2.984375 | 3 |
What is cancer? Much more than a disease, finds Stanford scholar
Lochlann Jain, associate professor of anthropology, focuses her latest research on cancer and how it impacts all aspects of society.
Lochlann Jain, who specializes in medical anthropology, talks about her research on cancer.
It wasn't until after her first surgery, when the cancer had been removed, that Lochlann Jain, associate professor of anthropology at Stanford, found that cancer really made itself present.
The very clear biological definition of cancer – a set of cells dividing too fast – seemed to make sense. But she realized that it couldn't by a long shot describe what cancer means culturally, economically and even medically.
What seemed like a simple question of cell division was anything but.
She struggled with whether – and how – to make something so painful and personal into an object of study.
"I didn't expect to write about cancer. I just thought I'd get this treatment over with and go back to my work," she said. "But then I realized the whole experience was just so full of paradox that I couldn't let it go. These paradoxes were tied to the structural issues of how American science and culture, so successful in so many arenas, deals with one of its largest failures."
A specialist in medical anthropology, Jain already had a deep interest in investigating how cultures deal with disease and illness. Her first book was an analysis of American injury law.
"I couldn't find any other work or books that were looking at how we live with, and justify, the contradictions that have become central to how we understand and treat both those scary dividing cells and the people who inevitably get the disease," she said.
Those contradictions included being blasted with radiation to cure one cancer that could end up being responsible for another, or being bombarded with images and stories of survivors when cancer means death for so many. Or hearing that a cure is on the way while also hearing about a new product or additive or chemical now believed to be cancer causing.
The ways we understand and represent cancer, Jain found, pointed to science, economics, medicine and policy that operate too often at odds with each other, and in ways that need to be understood if we are to move toward a recognition of the immensity of the cancer problem.
Her new book, which weaves her research with memoir, aims to start a new conversation about cancer as a cultural, not just medical, phenomenon. Malignant: How Cancer Becomes Us, published by the University of California Press, is out this month.
The book doesn't so much tell about her own experience, which she describes as all too ordinary, but it aims to change the ways we tell stories about cancer. Cancer, as she shows in dismaying detail, doesn't fit within the scientific and popular strategies we have to contain and make it manageable.
Lochlann Jain's new book, which weaves her research with memoir, aims to start a new conversation about cancer as a cultural, not just medical, phenomenon.
"I looked at how this thing we have all agreed to call cancer is actually a completely different thing in screening debates, public policy, decisions about toxic waste and products, and law courts," Jain said. She shows how this slippage has vast ramifications for how we understand the science and technology of cancer, and for why so little progress has been made in curing the diseases we call cancer.
She spoke with survivors, examined lawsuits about toxic exposures and misdiagnosis, looked at oncology trials and talked to economists, policymakers, industry representatives and others.
She found that everyone truly does understand cancer differently – from the lawyer trying to prove a case against a company processing a known carcinogen to a scientist putting together the latest clinical trial. Their understandings, or misunderstandings, have major consequences, Jain says, for everyone trying to treat, cure and research cancer.
Patients, she says, get caught in the middle, by being asked to take part in trials with virtually no chance of success, wear makeup and wigs to disguise cancer, and bear the costs of medical mistakes or pay life savings and more for treatments on which huge profits are being made.
"Over half of all Americans will be diagnosed at one point in their lives with an invasive cancer," Jain said. Without understanding the many layers of cancer, "we're missing a huge part of American experience, culture and economics."
Jain was diagnosed at 36 years old after three misdiagnoses. She devotes her research to analyzing the implications of thinking about cancer narrowly and as a disease that encompasses one set of rules.
"One of the problems with looking at cancer as an umbrella term is that we miss subcategories of people with cancer," she said.
She says, for example, that young adults have "been completely erased from the cancer puzzle" because many oncologists believe the catchall "cancer" is an old person's disease. She notes that there are more than 70,000 diagnoses of cancer in young adults each year.
"A vast majority of them are diagnosed with late-stage, high-risk disease, and there's hardly any research for people of that age group even though those people are the ones with young families with very little money in savings," she said.
She also critiques pink ribbon and yellow wristband campaigns, and a program that invites women and men to learn how to put cosmetics on during chemotherapy.
"But when you look more carefully at the cosmetics, you find that actually a number of known carcinogens are in those cosmetics, not only being sold on the market but also being given specifically to cancer patients," she said.
"A lot of cancer patients know this; so they feel offended when they're being given these kinds of things to put on their face," she said. "We need ways of understanding that better."
Jain says by covering up cancer, we miss a lot of what it really means. "What I'm trying to do in the book is show cancer is also an ugly thing. It's not just pink, it's not just yellow. It's an ugly thing and we have a lot to learn by looking at the ugliness of it," she said.
She says some of the ugliness includes insurance companies making money off the illness or carcinogens being poured into the environment and the feeling like there's not a lot that can be done about it. She says cancer patients are often blamed or questioned why they didn't do something, as if there was something they could've done.
"Overwhelmingly in cancer survivor groups, I heard that people felt completely misunderstood by their friends and peers as well as by their doctors," she said. "I started to notice these huge gaps not only in communication but in the ability to communicate."
She said one woman, who was diagnosed with ovarian cancer, complained that her friends continually asked her why she hadn't had a pap smear.
"She constantly had to come across the question of why couldn't she have solved her own cancer problem," she said. "And she kept having to say, a pap smear has nothing to do with ovarian cancer. And that kind of thing happened all the time.
"Looking at cancer is looking at a constant struggle between those who lose and those who win. It's looking at a constant economic shift between those who are paying and those who are making money for it."
That money is driving cancer research, and it's not getting us much closer to solving the problem.
Lochlann Jain, Anthropology: (650) 714-2553, [email protected]
Dan Stober, Stanford News Service: (650) 721-6965, [email protected]
|
<urn:uuid:9509ed70-4bb1-4ba1-95a4-6fa957192827>
|
CC-MAIN-2017-30
|
http://news.stanford.edu/news/2013/october/jain-book-cancer-101413.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500550969387.94/warc/CC-MAIN-20170728143709-20170728163709-00545.warc.gz
|
en
| 0.982181 | 1,601 | 2.78125 | 3 |
1.1 BACKGROUND OF THE STUDY
Job enrichment is a management concept that involves redesigning jobs so that they are more challenging to the employee and have less repetitive work. The concept is based on a 1968 Harvard Business Review article by psychologist Frederick Herzberg titled 'One More Time: How Do You Motivate Employees?' In the article, Herzberg stated that the greatest employee motivators, based on several investigations, are (in descending order); achievement, recognition, work, responsibility, advancement, and growth. To improve employee motivation and productivity, jobs should be modified to increase the motivators present for the employee. Job enrichment can be described as a medium through which management can motivate self-driven employees by assigning them additional responsibility normally reserved for higher level employees. By doing this, employees feel like their work has meaning and is important to the company. This theory is based on the premise that employees have a natural tendency to want to succeed and are eager to be trusted with a bigger role in the company. When these type of workers aren't being challenged, they tend to slack off and not give their best effort because they view their task to be below their skill set. Conversely when an employee is given autonomy over his/her work, they tend to feel responsible for the outcome of the project and will try to put forward the best end result possible. Overall Job Enrichment is essential to the workplace because it helps prevent feelings of repetitiveness in the day-to-day operations from hindering productivity.
To enrich a position, first brainstorm a list of potential changes to the position. Once you have a list of options, Herzberg recommends using the following seven principles to review the options, and shortlist only those that invoke one or more of the following: Removing some controls while retaining accountability ;Increasing the accountability of individuals for own work giving a person a complete, natural unit of work ;Granting additional authority to employees in their activity ;Making periodic reports directly available to the workers themselves rather than to supervisors ;Introducing new and more difficult tasks not previously handled ;Assigning individuals specific or specialized tasks; enabling them to become experts .For example, you might have on your list 'Allow staffer A to present the monthly report directly to senior management.' When you review this option against our list above, you find that it will meet the following goals: ;Increasing the accountability of individuals for own work - by having them present directly to senior staff. ;Granting additional authority to employees in their activity - by trusting them to make a presentation to a second level manager. Advantages; Learn new skills: By having more responsibilities, the employee will have the chance to work on new tasks and therefore learn new skills. Decision making can lead to the employee to think, decide, and try new things. By having to learn new skills, the employee has the opportunity to become proficient at certain tasks and even become experts. Reduce boredom: Job enrichment focuses on giving employees more variety and responsibilities.
The target of job enrichment is to reduce the chance of boredom from the repetitive, tedious activities. Creates a better work environment: The net result of job enrichment is an overall more positive environment that promotes maximum productivity. This is simply because employees who are treated better tend to have better attitudes around the work place and tend to spread that positivism around the office. Disadvantages Lack of preparation: Because employees are given more activities and responsibilities in job enrichment, they do not necessarily have the right skills or experience for the job. Because the employee is not prepared or trained enough to do the activity, then they may not be as efficient as someone who is already trained or skilled in that particular activity. As a result, they may have a lower productivity rate.Heavier Workload: Job enrichment increases the employee’s overall workload. This requires skill in reprioritization for the employee. Some employees may not be able to quickly adjust to their new responsibilities. Employees may feel overloaded and tired, so they may have a lower productivity rate. Clash with Non-participants: Understandably, not every employee at a company can participate in job enrichment. Those who cannot join may feel disconnected from the company and not part of the team. The employees who cannot join may even feel jealous towards participants.
Poor Performance: As a result of lack of preparation and heavier workload, some employees may not perform as efficient as prior to job enrichment. These employees may actually work better in a non job-enriching environment. By not doing as well as desired, they may feel inept. Their poor performance may lead to demotions, which tends to have a negative impact on the employee’s self –confidence and motivation. Job enrichment, as a managerial activity includes a three steps technique: Turn employees' effort into performance: Ensuring that objectives are well-defined and understood by everyone. The overall corporate mission statement should be communicated to all. Individual's goals should also be clear. Each employee should know exactly how he/she fits into the overall process and be aware of how important their contributions are to the organization and its customers. Providing adequate resources for each employee to perform well. This includes support functions like information technology, communication technology, and personnel training and development. Creating a supportive corporate culture. This includes peer support networks, supportive management, and removing elements that foster mistrust and politicking.
Free flow of information, Eliminate secrecy. Provide enough freedom to facilitate job excellence. Encourage and reward employee initiative. Flextime or compressed hours could be offered. Provide adequate recognition, appreciation, and other motivators provide skill improvement opportunities. This could include paid education at universities or on the job training.Provide job variety. This can be done by job sharing or job rotation programmes.It may be necessary to re-engineer the job process. This could involve redesigning the physical facility, redesign processes, change technologies, simplification of procedures, elimination of repetitiveness, redesigning authority structures.Link employees performance directly to reward: Clear definition of the reward is a must.Explanation of the link between performance and reward is important.Make sure the employee gets the right reward if performs well.If reward is not given, explanation is needed.Make sure the employee wants the reward. How to find out? .Ask them. Use surveys( checklist, listing, questions). Once you know what the employees want, give them the tools they need to earn it and follow through on your word..the research therefore seek to evaluate job enrichment ,its implication and application with a case study of first bank plc
1.2 STATEMENT OF THE PROBLEM
The purpose of job enrichment is to make the position more satisfying to the employee. Overall goals for the company often include increasing employee job satisfaction, reducing turnover, and improving productivity of employees. To rephrase this: we want to enrich our staff's positions so that they will be happier, more productive, and less likely to seek a job elsewhere. Also it Reduce repetitive work. Increase the employee's feelings of recognition and achievement. Provide opportunities for employee advancement (i.e. promotions into jobs requiring more skills). Provide opportunities for employee growth (i.e. an increase in skills and knowledge without a job promotion). So when job enrichment is neglected a lot of this benefit is eroded. The firm faces high employee exist, redundancy,job, dissatisfaction, low productivity etc. Therefore the problem confronting this research is to provide an evaluation of job enrichment ,implication and application.
1.3 RESEARCH QUESTION
What is the nature of job enrichment, its implication and application?
What is the nature, implication and application of job enrichment in first Bank plc?
1.4 OBJECTIVE OF THE RESEARCH
To determine the nature, implication and application of job enrichment. To determine the implication and application of job enrichment in first bank plc.
1.5 SIGNIFICANCE OF THE RESEARCH
The research shall recommend measures to attract firms to adopt job enrichment as a necessary tool for improving staff productivity. It shall serve as a rich source of information on issues concerning job enrichment.
1.6 STATEMENT OF THE HYPOTHESIS
1. Ho: Productivity and retention rate in first bank is low.
Hi: Productivity and retention rate in first bank is high
2. Ho: Job enrichment is not significant in first Bank.
Hi: Job enrichment is significant in first Bank.
3 Ho: Impact of job enrichment in first bank is low.
Hi: Impact of job enrichment in first bank is high
1.7 SCOPE OF THE STUDY
The study focuses on the evaluation of job enrichment, implication and application with a case study of first Bank Plc.
1.8 DEFINITION OF TERMS
JOB ENRICHMENT DEFINED Job enrichment is a management concept that involves redesigning jobs so that they are more challenging to the employee and have less repetitive work
JOB ROTATION Job Sharing or job rotation programmes. It may be necessary to re-engineer the job process. This could involve redesigning the physical facility, redesign processes, change technologies, simplification of procedures, elimination of repetitiveness, redesigning authority structures. Link employees performance directly to reward:
VERTICAL JOB LOADING Vertical job loading is the terminology used by Herzberg to describe his principles for enriching positions and giving employees more challenging work.
JOB ENLARGEMENT 'Job enlargement,' a.k.a. 'horizontal job loading,' which often involves giving employees more work without changing the challenge level.
MOTIVATION The actuation of employees to optimal performance
Frederick Herzberg, HBR Jan 2003, One More Time: How Do You Motivate Employees? Retrieved from https://hbr.org/2003/01/one-more-time-how-do-you-motivate-employees/ar/1
Brookins, M. (n.d.).The Advantages & Disadvantages of Job Enrichment. Retrieved from http://smallbusiness.chron.com/advantages-disadvantages-job-enrichment-11960.html
Feder, B.J. 2000, "F.I. Herzberg, 76, Professor And Management Consultant", New York Times, Feb 1, 2000, pg. C26. Available from: ProQuest Historical Newspapers The New York Times (1851–2003). [28 October 2006].
Hackman, J.R. & Oldham, G.R. 1976, 'Motivation through the design of work: Test of a Theory”, Organizational Behavior and Human Performance, [Online], vol. 16, no. 2, pp. 250–279. Available from: Science Direct. [1 November 2006].
How do i choose a Project Topic?
Look for your department and select any topic of your choice
I have a fresh topic that is not on your website. How do I go about it?
How fast can i get a complete project from your website?
Within 15 minutes if the exact project topic is on our website
Is it a complete research project or just materials?
It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data
One of your topics suites my project, but the case study is different. What do i do?
Call Our Instant Help Desk Now: (+234) 813-292-6373 and you will be responded to immediately
How do i get my complete project?
Your Complete Project Material will be sent to your Email Address in Ms Word document format
Can I get my Complete Project through WhatsApp?
Yes! We can send your Complete Research Project to your WhatsApp Number
What if my Project Supervisor made some changes to a topic i picked from your website?
Call Our Instant Help Desk Now: (+234) 813-292-6373 and you will be responded to immediately
Do you assist students with Assignment and Project Proposal?
Yes! Call Our Instant Help Desk Now: (+234) 813-292-6373 and you will be responded to immediately
What if i do not have any project topic idea at all?
Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: (+234) 813-292-6373
How can i trust this site?
We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!
|
<urn:uuid:79e8756a-7cb5-4363-96c3-58836176a4d1>
|
CC-MAIN-2020-10
|
https://www.iprojectmaster.com/HUMAN%20RESOURCE%20MANAGEMENT/final-year-project-materials/an-evaluation-of-job-enrichment-implication-and-application
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146907.86/warc/CC-MAIN-20200227221724-20200228011724-00275.warc.gz
|
en
| 0.928812 | 2,632 | 2.875 | 3 |
Aboriginals in Australia, a little-known story
In 1901, Australia was declared a Federation and the Constitution came into force of the British Commonwealth of Nations, which ignores in its core values the rights of Aboriginals, the indigenous inhabitants of the island, very often called an island-continent.
Since 1788, British colonization looted the land of those who over thousands of years were distributed in more than 400 peoples or tribes that lived as hunters and gatherers, without writing their own history, transmission was based on oral history and culture.
The arrival of settlers throughout the eighteenth century marginalized indigenous peoples. Being located in inhospitable regions of the vast territory in Australia brought down the figure of nearly one million Aboriginal to less than 200,000.
Some historians like Henry Reynolds point out that the violent deaths with land dispossession, disease and hunger are estimated between 15,000 and 20,000. Others estimate that between 1788 and 1990, the Aboriginal population was reduced by almost 90 percent.
Currently less than half of the 400 indigenous peoples survived, with examples of absolute extinction as occurred in Tasmania, one of the current Australian states.
The few documents confirm that in the so-called Black War, from 1830, more than six thousand of the Palawah originating group were massacred and the last survivor, Truganini, died in 1876.
George Robinson, an advocate of Aboriginal rights, has brought such data and described the genocide committed by the colonists on the island.
In 2008 alone, the Australian authorities recognized these "excesses" and asked forgiveness for "snatching their land."
CONSTANT FIGHT FOR RIGHTS
Relegated to the most distant corners from the island continent, the Aboriginals have maintained a hard struggle against the colonialists, with figures and leaders like Pemulway, Yagan and Windrayne, considered the first heroes.
In a constant fight for their rights, the Australian indigenous inhabitants were only able to improve their living conditions from the 1940s in some reserves. They managed to legalize their electoral votes and formed various social organizations such as Survival and the League for the Advancement of Aboriginals.
However, since the early twentieth century, they remained largely marginalized in reserves, controlled in their movements and guaranteed to work on farms, but without receiving wages.
The lack of documentation that illustrates such data, the "secrets" guarded officially, does not allow accurate assessment of the life expectancies of Aboriginals, their lack of access to health care and levels of social participation.
So much drama has been accumulated, exposed and included in the present cinematography and Australian literature, which led in 2001, to Prime Minister John Howard proposing a Motion of Reconciliation to the Parliament.
Described in the text is "the abuse of the Aboriginals was the darkest chapter in Australian history."
Since then, some conditions have changed, particularly the social in some ways.
At least 32 percent of Australian Aboriginals live in major cities, but the rest remain in a difficult situation in continental regions, insular territories and deserted regions of the interior.
Updated figures estimate that about 400,000 of the heirs of indigenous peoples are mostly racially mixed and have barely preserved their traditional culture and history.
Australian Aboriginals, almost unknown on the worldwide level, cling to one of their few symbols: the yidaki, a kind of trumpet made of wood, used for internationally famous interpretations of rock, pop and jazz.
They have, the experts say, the pride of not having completely disappeared despite genocide at the hands of British colonialism.
Translated from the Portuguese version by:
What subcategory of human being takes a knee on a handcuffed man, mashed face down on the pavement and, ultimately, forces him to die?
|
<urn:uuid:07882209-c10b-49ad-a54e-211a63bcc294>
|
CC-MAIN-2020-24
|
https://www.pravdareport.com/history/119659-Aboriginals_in_Australia/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419593.76/warc/CC-MAIN-20200601180335-20200601210335-00255.warc.gz
|
en
| 0.964468 | 778 | 3.65625 | 4 |
As the economic collapse approaches, be aware that government will become more desperate and resort to measure(s) that will enable it to survive. The myth of government as a good, necessary and positive force in society is coming unraveled. To understand how we got to this point, it is useful to review some economic history..
The US has gone through many boom-bust cycles in its history. In every case excessive liquidity has triggered a boom which inevitably ended in a bust. Ludwig von Mises expressed the relationship thusly:
Credit expansion can bring about a temporary boom. But such a fictitious prosperity must end in a general depression of trade, a slump.
In the 1960s the arrogance of government led it to believe that it had obsoleted the business cycle. Keynesian economics provided the means to manage the economy in a way that would prevent downturns. Government convinced the population of this fallacy.
Initially government’s belief was sincere but based on an incorrect economic theory. The naive belief didn’t hold for long, but it was never renounced. Politicians liked the new-found power it afforded them. As a result, they promoted this new tool and role for government. A wrong theory can still be valuable if it furthers other aims, like the accumulation of additional power.
Keynesian economics was never correct in any long-run sense. This fact was seemingly understood by Lord Keynes himself. He focused only the short-term. When a critic questioned him about the long-run, he famously brushed aside the objection with the curt reply: “In the long-run we are all dead.” Keynes died during his short-run. The rest of us are living with the long-run consequences he was unwilling to address.
Keynesian economics appeared to work in the short-run because of the liquidity created by government efforts. This liquidity provided the basis for a new boom, but not a correction of the weaknesses in the economy that produced the recession. Its “solution” was similar to a drunk continuing to drink to avoid a hangover. Mises and others observed that any relief was temporary and the ultimate outcome would result in a bigger and unavoidable correction.
The political class repeated the Keynesian myth so often that it became accepted. That enabled them to increase control and power over the economy. For a while it worked as a short-term palliative. It did so by avoiding the pain associated with a recession. However, each application of the medicine was like the drunk and imbibing another drink. The cure was prevented from occurring, but the ultimate hangover was not avoidable and would become much bigger when it happened.
More harm (long-term) is done by “solving” the short-term problem with the same poison that brought it on. Each economic intervention was intended to prevent the economy from undergoing the inevitable hangover. Both the drunk and the economy only cure their problems by allowing the dry-out period to run its course. Government wants to prevent this from happening.
In the early stages, before the distortions had multiplied, government interventions could either eliminate the recession or make it milder. However good this might be in the political arena, it is bad, bad economics. While matters appear calm on the surface under the surface price distortions and mis-allocations of resources are not corrected and are increased with each intervention. They are suppressed, but at the cost of making them worse.
For the last decade, our recessions have become worse and our economy weaker as a result of the build-up in these unseen distortions. The dot-com boom was triggered by the loose money injected into the system prior to Y2K. At that point, the economic system should have entered a big recession, possibly depression. Government options were limited, at least in the traditional sense of interventions. Rather than admitting defeat, in desperation, they chose loose credit applied to the housing market. They literally created a Potemkin economy which eventually collapsed.
This collapse threatened the world’s financial system. Again, in even more desperation, government stepped in to bail out an insolvent banking system. This bailout was done on the backs of taxpayers who will have to pay back the massive amounts of government debt raised to accomplish the task. The financial system did not fall (yet!), but neither did the economy recover. We are four years after the problem and there are no signs of a recovery.
The economic system cannot recover. It s racked with cancers that will keep popping up. It needs serious treatment, but the political class cannot admit that or allow it to happen. As a result, they desperately milk what few options and resources they have left. We have reached the point where everything is failing. Whether it be Fannie and Freddie, the Post Office, social security, our healthcare system, etc. Government is virtually out of options other than massive printing of money in order to be able to pay their bills.
As we slide toward economic ruin, one system or structure after another comes under stress. Jim Quinn tells us about the next likely high profile collapse and that involves student loans:
Delinquency rates on student loans made in the past two years stand at 15%, according to FICO, versus 12.4% for loans made from 2005 to 2007. This is proof that loans doled out since the Federal government took control of the market have been distributed willy-nilly in a frantic effort to artificially reduce the unemployment rate. Average student- loan debt last year rose to $27,253 from $17,233 in 2005, with almost 605 of bank managers surveyed in December expecting delinquencies to worsen in six months, according to FICO. Andrew Jennings, chief analytics officer of Fair Issac, said in a statement:
“This situation is simply unsustainable and we’re already suffering the consequences. When wage growth is slow and jobs are not as plentiful as they once were, it is impossible for individuals to continue taking out ever-larger student loans without greatly increasing the risk of default.”
When subprime mortgages blew up, at least there was collateral to alleviate some of the losses. When the subprime auto loans blow up, at least there will be vehicles to repossess. Student loan debts are the ultimate in subprime, with no collateral and millions of jobless debtors. The situation is much worse than the delinquency numbers reveal. More than half of the student loans are in deferment, grace periods, or forbearance, meaning they are not currently requiring repayment. This means the true delinquency rates are twice as high as the reported figure of 15%. What happens next can be succinctly summed up by the esteemed economist John Kenneth Galbraith:
“Then the shit hit the fan.” – John Kenneth Galbraith
The involuntary taxpayer bailout for this Federal Government created disaster will exceed $200 billion after the shit is done hitting the fan.
The Emperor has no clothes, but he is doing everything he can to prevent citizens from recognizing that fact. The issue of student loans is a prime example of government’s true concern. Most kids coming out of high school (under-educated) are incapable of understanding the ramifications of student debt. They don’t know they are being lured into debt from which the declaration of bankruptcy is not an escape. It is offered to these novices in the same fashion that sub-prime mortgages were offered to home-buyers who had no chance of qualifying under normal standards and no chance of ever paying back the loans.
These are acts of desperation. They are cruel acts. They show that government will do anything to survive, no matter who it has to hurt in the process. Government is nearly out of options, but that only means they will try to create new ones. The trial balloon of confiscating IRAs, a technique used by Banana Republics before, has already been floated.
Be assured, government has run out of legal options, but that will not stop them. They are thinking in terms of the unthinkable and the illegal. Government has might and power. No law will stand in its way of survival. “We don’t need no stinking badges” has replaced the Rule of Law and our Constitution.
|
<urn:uuid:71dfc791-1c49-4fca-bc88-5a3bcfe8c628>
|
CC-MAIN-2014-10
|
http://www.economicnoise.com/2013/02/21/the-beast-is-on-the-prowl/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011294162/warc/CC-MAIN-20140305092134-00061-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.97129 | 1,697 | 2.84375 | 3 |
So, if income redistribution policies are the solution to shrinking the gap between rich and poor, why do they fail so miserably in the states?
Day after day, the middle class keeps leaving California. The wealthy areas such as San Francisco and the Silicon Valley boom. Yet the state has nearly the highest poverty rate in the nation.
The blue states that try to lift up the poor with high taxes, high welfare benefits, high minimum wages and other Robin Hood policies tend to be the places where the rich end up the richest and the poor the poorest.
California is the prototypical example. It has the highest tax rates of any state. It has very generous welfare benefits. Many of its cities have a high minimum wage. But day after day, the middle class keeps leaving. The wealthy areas such as San Francisco and the Silicon Valley boom. Yet the state has nearly the highest poverty rate in the nation. The Golden State, alas, has become the inequality state.
In a new report called “Rich States, Poor States" [PDF] that I write each year for the American Legislative Exchange Council with Arthur Laffer and Jonathan Williams, we find that five of the highest-tax blue states in the nation—California, New York, New Jersey, Connecticut and Illinois—lost some 4 million more U.S. residents than entered these states over the last decade. Meanwhile, the big low-tax red states—Texas, Florida, North Carolina, Arizona and Georgia—gained about this many new residents.
So much for liberal policies creating a workers paradise.
One liberal economic think tank—the Institute on Taxation and Economic Policy—recently issued a report on the states with the most and least “regressive” tax systems. The conclusion was that states should raise their income taxes on the rich to be more “fair.” Except it turns out that people are leaving the states that the think tank ranks as fair, and they are moving to the states the think tank ranks as economically backward.
The least “regressive” tax states had average population growth from 2003 to 2013 that lagged below the national trend. The 10 most highly “regressive” tax states, including nine with no state income tax, had population growth on average 4 percent above the U.S. average. Why was that? Because states without income taxes have twice the job growth of states with high tax rates. Unlike the experts at the Institute on Taxation and Economic Policy, most Americans think that fairness means having a job.
Ohio University economist Richard Vedder and I compared the income gap in states with higher tax rates, higher minimum wages and more welfare benefits with states on the other side of the policy spectrum. There was no evidence that states with these liberal policies had helped the poor much and, in many cases, these states recorded more income inequality than other states as measured by the left’s favorite statistic called the Gini Coefficient.
The 19 states with minimum wages above the $7.25 per hour federal minimum do not have lower income inequality. States with a super minimum wage—such as Connecticut ($9.15), California ($9.00), New York ($8.75), and Vermont ($9.15)—have significantly wider gaps between rich and poor than states without a super minimum wage.
States are supposed to be laboratories of democracy, right? These laboratories are providing us with concrete evidence that Robin Hood policies don’t help make the poor richer, they make most people poorer. In other words, the blue states have tried the Elizabeth Warren “progressive” agenda and people are voting with their feet by fleeing in droves. The kinds of income redistribution policies that Warren and others endorse can only work by building a Berlin Wall so no one can leave—though I hope I’m not giving them any ideas.
Read more at Daily Signal.
|
<urn:uuid:bc2f3f2e-f3bf-4f4d-a0e7-632ca588d6c5>
|
CC-MAIN-2017-26
|
http://directorblue.blogspot.com/2015/04/people-are-fleeing-states-where.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00100.warc.gz
|
en
| 0.959641 | 795 | 2.59375 | 3 |
There are two main concepts that I think are key here. The first is learning about signal paths and what the functions of each piece of equipment does along the way. The second is understanding the signals themselves and how they work. In video, this can be particularly important since many signals are actually the same on different cables. In both cases, I think the best way to get started is to research each individual device and signal.
For signal flow, simply looking at how things are wired up should help you start. You've normally got something similar to a camera that runs in to either a video switcher or a time base corrector followed by a switcher. From the switcher, there are feeds to the preview and production monitors as well as an output that most likely goes to a Distribution Amplifier and from there it goes to the outputs which are probably projectors.
If you understand the purpose of each device, that is the first step towards understanding where problems may be coming from. For example if one camera's signal is bad but the others are fine, check the camera and cable. If all the output has the same problem, it may be the switcher or something between the switcher and DA (or the DA itself). If only one projector has a problem, then either the DA, the cable from the DA to the projector or the projector itself has a problem.
The second part is understanding signals. This is more in-depth and many video guys don't get this deep in to things. Again, Wikipedia searches on either the cable or signal type are a great way to get detailed, accessible information. To talk about the ones you specifically mentioned. NTSC and PAL are actual video standards. NTSC and the Japanese version NTSC-J are 29.97 frame per second interlaced (every other scan line is updated) formats. PAL is the equivalent of NTSC that the rest of the world uses and is 25 frames per second, interlaced. They are both analog, standard definition formats.
BNC is a type of coax cable connection. It is a twist lock connector that can attach the cable securely and is generally used for professional video. It also used to be used for old school Token Ring networking (on computers). BNC cables can carry a very wide variety of signal types including Composite, Component and SDI. BNC refers to the physical medium and not the format of signal passing through it.
DMX is a lighting control protocol that works over either an XLR or a 5 conductor wire similar in connection to XLR cable (but with 5 pins rather than 3) or a standard RJ45 cable (network cable). There are also various wireless implementations of DMX. It supports 512 addressable channels with 256 possible values per channel. It can be used for controlling either robotic or fixed lighting. With fixed lights, one or two channels is used per light. (Dimmer and possibly color selection) For robotic lights, any number of channels may be used and each channel controls some different value such as gobo selection, x axis movement, y axis movement, strobe settings, dimmer, color, prisms, etc. Additionally, some devices may use 2 channels to give finer control over a single axis.
There is also far more information available on Wikipedia in a fairly friendly and accessible form assuming you have a fairly basic understanding of electronic concepts. That is how I have picked up the majority of my knowledge. You can also learn fun things like the fact that VGA is identical to the analog feed in DVI which is also a component RGBVU feed. Also, the digital signal on a DVI-D cable is the same as an unencrypted digital signal on HDMI.
Identifying the keywords to search for is probably the biggest trick, but if you know the cable name for example, you can likely find what the signal type is. Also, if you ever end up stuck on a particular signal or cable, feel free to come back here and post a question and someone would be happy to point you in the right direction and provide you with details about the particular signal or device.
Oh, one other term that might be worth searching is Gen-lock. It's a clock signal that is how the frames of video signals from higher end cameras are synchronized. Most modern video switchers can correct for time base shifting automatically now, but for minimum lag in display, if the video cameras support gen-lock, then using it to have them sample together can be helpful.
|
<urn:uuid:0867428f-222d-41a8-82d3-a4856b32a6eb>
|
CC-MAIN-2014-15
|
http://video.stackexchange.com/questions/7986/live-video-beginner-where-to-start
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207985.17/warc/CC-MAIN-20140423032007-00646-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.944408 | 916 | 2.875 | 3 |
With all-original artifacts, Henderson Hall Plantation north of Parkersburg is a one-of-a-kind historical treasure.
When it comes to illustrious West Virginia families, we all know the infamy of the Blennerhassetts. Irish aristocrats Harman and Margaret Blennerhassett built a mansion on the Ohio River in 1798, where they hosted the most extravagant parties west of the Alleghenies. But within a decade, Harman Blennerhasset was arrested with former Vice President Aaron Burr under suspicion of treason.
A story less often told is that another illustrious West Virginia family was among those who reported the Blennerhassetts’ alleged crimes. Brothers John and Alexander Henderson came west around 1800 to settle lands their father bought in western Virginia on the advice of his friend George Washington. When Blennerhasset tried in 1806 to recruit the brothers to Burr’s cause, they reported the sedition to family friends in federal government.
The Blennerhassetts were ruined, even though the case was dropped, and their elegant mansion burned in 1811. But the Hendersons went on to operate a wealthy plantation, develop oil fields, and assist in the formation of West Virginia—less flashy than the Blennerhassetts’ demise, but a far prouder legacy.
The fruits of the Henderson family’s labors may be seen at Henderson Hall Plantation just north of Parkersburg. Note that these are the real fruits. While sites like the recreated Blennerhassett mansion evoke places and times, the Henderson estate holds the genuine accumulations of five generations.
“This is not a ‘collection,’” Henderson Hall Director Randy Modesitt emphasizes. “This property has 200 years of artifacts, some dating back to the original family that came here from Dumfries, Virginia: the guns they shot, the trunks they used. Even at Mount Vernon or Monticello, most of the artifacts were bought or are reproductions. This site has been called a one-of-a-kind historical treasure.”
The Hendersons lived up the Ohio River from Parkersburg, then known as Newport, during the Blennerhassett debacle. But after Alexander’s son G.W. married Elizabeth Ann Tomlinson in 1826, they bought 1,100 acres of her father’s property closer to the renamed Parkersburg and began homesteading. Their homes over time reflected the family’s steady thrift and industry: first, log cabins, then a four-room structure of handmade red brick, and finally, in the 1850s, the handsome 29-room Italianate mansion that stands today. “The brick, the stone, almost all of the wood actually came from Henderson Hall property,” Modesitt says.
The early Hendersons kept slaves—possibly as many as 30. “G.W. Henderson sued David Putnam, Jr. for encouraging and helping their slaves to escape,” Modesitt says. That was in 1849. Yet Henderson served as a delegate to the May 1861 First Wheeling Convention that led to western Virginia’s standing with the anti-slavery Union.
The family farmed, before and after the Civil War. “Longhorn and shorthorn cattle, Berkshire pigs—at one time there were over 200 peacocks. We have their still, and we know they made their own whiskey and sold that, too,” Modesitt says. In the late 1800s, the family also ran a renowned horse-breeding operation. “They trained trotting horses, and people would ship their horses here from all over the East Coast to be bred with Henderson horses.” And they did some entertaining of their own: among their guests, John Chapman, also known as Johnny Appleseed, and renowned wildlife artist John James Audubon.
All of this is known because remaining in place with original furnishings, paintings, photographs, and personal memorabilia are volumes of records. “We have more than 4,000 documents connected with the Hendersons, beginning in the early 1800s,” Modesitt says. “Detailed—they would write the grocery list on the back of a receipt and save that. There are diaries and personal letters that explain where they came from and what their interests were.” It’s thought that some of it may rewrite history.
Restored and on View
By the 1980s, the mansion had become too much for the last Henderson family daughter, Lorna. When she died in 1984, her cousin, New York graphic designer Michael Rolston, moved into the house and restored it enough for weekend and Christmas tours—a departure from longtime family custom. “G.W., Jr. decorated the ballroom for Christmas in 1862 to have a party with his friends and family,” Modesitt recounts. “After he died several weeks later of typhoid his mother, Elizabeth Ann, wrote in her journal that the hall would never again be decorated for Christmas. From 1863 until Michael started his Christmas tours in about 1987, the house was not decorated for Christmas.”
Rolston got the plantation listed as a 10-building, 65-acre historic district on the National Register of Historic Places. He worked with friend and local historian David McKain, co-founder of the Oil & Gas Museum in downtown Parkersburg, to document property and family history. And when he died in 2007, he left the plantation to the Oil & Gas Historical Association to be further developed as a museum.
Henderson Hall Plantation is open to visitors Tuesday through Sunday afternoons, March through December. The complex includes the oldest schoolhouse in the state, the family cemetery, and three Adena Indian mounds. Events planned so far for 2016 include an antique car show in May, a Civil War re-enactment in June, and a December candlelight tour. 517 River Road, Williamstown; hendersonhallplantation.com
|
<urn:uuid:6eee8e3f-d2b9-499e-821f-5d165c48b65b>
|
CC-MAIN-2020-10
|
https://wvliving.com/the-permanent-collection/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146643.49/warc/CC-MAIN-20200227002351-20200227032351-00546.warc.gz
|
en
| 0.970839 | 1,272 | 2.65625 | 3 |
Net Zero Energy
At the Solar Decathlon, houses designed and built by students show how sweet homes can beBy Heidi Jernigan Smith
Since 2002, college teams from around the world have been invited to design and build a home that can produce as much energy as it consumes. Their projects are showcased every two years during the U.S. Department of Energy's Solar Decathlon.
This year's decathlon village in Washington, D.C., in late September featured 19 entries with more than 357,000 public home tours conducted during the 10-day event. Competition rules stipulate that each home fall between 600 and 1,000 square feet of conditioned space. Energy can only be provided via the electric grid or solar processes.
A true decathlon, teams receive up to 100 points in each of 10 areas that go beyond mere solar technology:
- Architecture – Scale, proportion and a successful connection between the indoor and outdoor spaces are among the criteria.
- Market Appeal – How well does the house meet the intended buyer's needs?
- Engineering – How much energy will installed systems save relative to conventional systems and how much maintenance is required to sustain operating efficiencies?
- Communications – How well has the team communicated its design and engineering concepts to the public?
- Affordability – Teams receive a full 100 points if their home can be built for $250,000 or less.
- Hot Water – The system must be able to deliver 15 gallons of 110-degree F water in 10 minutes or less.
- Comfort Zone – Homes maintain an indoor temperature between 71 and 76 degrees F and relative humidity below 60 percent throughout the competition.
- Appliances – Teams must wash and dry laundry, run their dishwasher and maintain specific refrigeration temperatures.
- Home Entertainment – How well does the home allow occupants to dine as a family, watch movies in a home theater setting, surf the internet and telecommute? Teams must host two eight-person dinner parties prepared in their own kitchen.
- Energy Balance – A house receives the full 100 points if it produces as much energy as it consumes during the competition. Zero points are awarded if the home's net consumption of grid power exceeds 50 kilowatt-hours. Bonus points are no longer awarded for producing more energy than needed. The goal is to build an affordable, family friendly home, not a power plant.
When the competition concluded, seven of the 19 homes met the net zero-energy challenge, even though most days during the competition were cloudy and wet.
Water shares the spotlight
If ever a team had the perfect mascot for an efficient housing competition it was this year's winner, the University of Maryland Terrapins. Their entry, entitled WaterShed, drew its inspiration from the Chesapeake Bay ecosystem, which has been significantly impacted by water pollution. WaterShed featured a vegetative roof system that naturally filtered storm water and slowed runoff while cooling the roof in summer and acting as insulation in winter. Gray water from showers, dishwashing and laundry was filtered through the home's constructed wetlands and then recycled to irrigate the landscape which included a vegetable garden. Maryland captured the decathlon title with a near perfect score of 951.
Drawing on the familiar
Maryland wasn't the only team to draw on its locale for design inspiration. Florida International University's entry featured louvered overhangs to provide year-round shading, which when lowered and locked in place became instant storm shutters for hurricane protection. The shell of New Zealand's house, entitled First Light, was insulated with sheep's wool sourced from local ranchers. The most far-out looking structure came in the form of California's Compact Hyper-Insulated Prototype affectionately dubbed C.H.I.P. The team used recycled blue jeans to create "out-sulation" encased in vinyl and strapped around the home's exterior giving it the look of a puffy, white parka. C.H.I.P. also sported an Xbox 360 Kinect system modified to recognize various body motions to control lights, television and other electronics. Team China, in a nod to their country's export business, constructed a home from three metal shipping containers. A tipi-like structure paid homage to Team Canada's native communities. City College of New York designed a Solar Roofpod that could be sent up by elevator and reassembled to sit on an urban rooftop to maximize use of existing space.
Regardless of where teams originated, to prepare for the competition each had to extensively research meteorological data for Washington, D.C., which in early fall can range from a heat wave to the first signs of frost. Logistical challenges were numerous with homes originally built off-site, disassembled, shipped to D.C. and then reassembled in West Potomac Park. Once competition is under way, teams are not allowed to use batteries or other power storage devices. Unlike years past, when affordability was not part of the decathlon scoring system, teams can no longer justify the investment in large solar arrays. The focus is clearly on better whole house design with emphasis on passive systems including energy efficient landscaping, super insulated walls, non-mechanical dehumidification and waste heat recovery. The less energy you need, the less you must generate.
Home is where the heart is
While Maryland captured this year's official decathlon title, one home clearly captured the hearts and minds of visitors and that was Appalachian State University's (ASU) entry, The Solar Homestead. It won the coveted People's Choice Award, receiving 92,538 votes cast online and at the event. Inspired by the frugal self-reliant spirit of early Blue Ridge Mountains settlers, the house is predominantly clad in maintenance-free poplar bark. The Solar Homestead comprises four separate structures joined by a great porch which adds 900 square feet of usable outdoor space, including a sink and food prep area. The roof of the great porch was constructed using 42 bifacial photovoltaic panels that supply solar energy while providing filtered daylight to the deck below. Straw bale gardens surrounded the house and provided fresh vegetables for the team's two mandatory dinner parties. The 864 square-foot main house features a kitchen with full-sized appliances, master and guest bedrooms, living and dining areas, as well as bathing and laundry facilities. Hidden pocket doors in the kitchen allow for the configuration of a full-sized home theater screen that helped ASU finish third in the home entertainment category.
ASU received a perfect score in the hot water contest with its on-demand solar thermal domestic hot water system. The home's mechanical heating load was reduced through the construction of a trombe wall that collects outdoor heat during the day and transfers it into the house at night as conditions dictate. The home's unconditioned outbuilding modules (OMs) could be customized to accommodate a buyer's needs for storage or mechanical space. A Flexible OM, designed to serve as conditioned office or guest bedroom space, could also be detached and towed as a standalone camper. The Solar Homestead is particularly builder-friendly because most of the construction materials were found at Lowe's home improvement stores, ASU's primary building sponsor. The Blue Ridge Electric cooperative also was a sponsor.
The ASU team utilized a renewable energy source not officially recognized by decathlon rules: enthusiasm. In keeping with their conservation and energy efficiency mission, the team's male members stopped shaving in advance of the competition and soon a Beard Blog showed up on the Internet. But the star of this year's decathlon was the ASU reflective hat takeaway that doubled as an educational brochure. Folded origami style to resemble a short order cook hat, the piece unfolded to reveal a copy of the home's floor plan along with an explanation of the various energy components. That helped ASU secure a second-place finish in the decathlon's communications contest.
The Solar Homestead has now returned to Boone where it will serve as a learning laboratory for future students. At a reception for the ASU team held in Boone at the end of October, Gov. Bev Perdue said, "These students have shown America that we can do things in North Carolina. We all know that in North Carolina green is gold and that we must as a people focus on building a green enterprise for our state."
Learn more about the Solar Homestead at www.thesolarhomestead.com
|
<urn:uuid:bcf4c5f3-68cf-48d0-b6d2-dd39c8dbb96a>
|
CC-MAIN-2017-43
|
https://www.carolinacountry.com/carolina-stories/stories/net-zero-energy
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822668.19/warc/CC-MAIN-20171018013719-20171018033719-00339.warc.gz
|
en
| 0.955096 | 1,718 | 3.0625 | 3 |
The hashtag went viral as students and teachers shared and launched their creative projects all day long around the globe. This year, we are doing it again, and we can’t wait to see what students design, build, and make!
The 2017 Global Day of Design will be held on May 2nd!
Go to the GlobalDayOfDesign.com and get access to 20+ FREE design challenges that you can use or tweak/modify. Enter your details into the form at the bottom of this post and receive a Design Challenge for FREE.
You can also fill out this Google Form to include your class/school and students in the official count for The Global Day of Design.
How Do I Share What My Students Are Doing on the Global Day of Design?
This year the Global Day of Design will take place on 5/2/17. We will be sharing students designing, building, making, and tinkering on Twitter, Facebook, and Instagram using the hashtag #GDD17!
*Note: If your school can’t participate on 5/2 pick a date that works for you and still use the hashtag to share out!
What is Design Thinking?
Maybe you’ve heard the term before or even read some articles on Design Thinking. Here’s co-founder John Spencer’s description of Design Thinking from a K-12 viewpoint:
The term “design thinking” is often attached to maker spaces and STEM labs. However, design thinking is bigger than STEM. It begins with the premise of tapping into student curiosity and allowing them to create, test and re-create until they eventually ship what they made to a real audience (sometimes global but often local). Design thinking isn’t a subject or a topic or a class. It’s more of way of solving problems that encourages risk-taking and creativity.
Here is The LAUNCH Cycle video we created to explain Design Thinking to K-12 Students (watch it, you’ll love it!):
Where did Design Thinking originate?
So, it’s debate where design thinking originated. Some claim that it started in the sixties with The Sciences of the Artificial. Others point to Design Thinking, which focussed more on urban planning and architecture. Still, others point to Robert McKim’s work in Experiences in Visual Thinking. My guess is that, like all great ideas, it has been an evolution, influenced by thousands of people. We know that our work around Design Thinking has been influenced by people like Tom and David Kelley, Tim Brown, John Maeda, Peter Rowe (as well as organizations like Stanford d.school and IDEO). Our goal is to continue to read some of these texts in-depth and watch the evolution of the idea.
Other Design Thinking Resources:
- The Beginner’s Guide to Design Thinking
- FREE Online Video Course – The Ultimate Guide to Design Thinking
- Can Design Thinking work when we don’t have devices?
- The LAUNCH Cycle
Get the Design Thinking Challenge
And Join the Global Day of Design!
|
<urn:uuid:343597a3-a0a0-4be0-84b3-3f4b282d0740>
|
CC-MAIN-2017-39
|
http://ajjuliani.com/announcing-2017-global-day-design-gdd17/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00618.warc.gz
|
en
| 0.932722 | 639 | 2.84375 | 3 |
On October 31, 2012, The New Century School decided to come clean. As part of an ongoing sustainability plan, TNCS switched off fossil fuel–derived energy and turned on with the environmental-friendly, clean energy provided by Clean Currents. Clean Currents delivers 100% wind- and solar-powered energy, a service that benefits the school; the environment; and, some say, the U.S. economy.
TNCS is fortunate to be located in Maryland, one of a handful of states (see map) currently enjoying a deregulated energy market for both electricity and gas (most states have deregulated one or the other or are not yet deregulated). This means that although Baltimore Gas & Electric owns and maintains the power lines, Clean Currents’ wind energy is what’s coming through those lines to power the school. In other words, consumers can choose not only who provides their power, but also have a choice in what type of power they buy, thanks to companies like Clean Currents.
With choices come advantages. The most obvious benefit to wind energy is its environmental friendliness. “Windustry” ameliorates climate change by not only providing a non-polluting source of energy but also by displacing the greenhouse gas emissions that have already polluted the atmosphere from conventional power. But there are other tremendous advantages, too. By reducing our dependence on fossil fuels, for instance, clean energy also makes us less vulnerable as a nation to the vagaries of the international oil market . . . and to the associated security risks. Moreover, ever-renewable wind is a cash cow for farmers. Wind farming almost effortlessly generates considerable income without taking up land needed for crops as well as creating jobs and boosting the economy.
So, as President Obama has pledged to move the United States toward energy independence, TNCS is doing their part to get there at the community level. Clean Currents was a natural choice for collaboration. Being a “benefit corporation, we have elected to build in commitment to the local communities we serve along with the environment. It’s part of our operating agreement,” says Emily Conrad, Community Outreach Coordinator for Clean Currents.
And TNCS likes a company that is motivated as much by doing lasting good for its community as by its bottom line. The benefits to the school itself are also numerous. Besides going green, TNCS will host Clean Currents workshops with students that will focus on “age-appropriate activities around the world of energy,” says Conrad. This is another way that TNCS can reinforce to students the importance of respecting our world.
Finally, readers, you’re invited to ponder these very wise words:
When green is all there is to be
It could make you wonder why
But why wonder why wonder
I am green, and it’ll do fine
It’s beautiful, and I think it’s what I want to be . . .
P.S. Stay tuned to learn about the upcoming Green Neighborhood Challenge that will bring green energy to your door. That’s right—TNCS and Clean Currents are partnering to expand clean energy availability to the surrounding community. Look for a post about the Green Neighborhood Challenge in early 2013!
|
<urn:uuid:3c214774-5023-49bd-a507-52e7ca6d0bbc>
|
CC-MAIN-2020-29
|
https://blog.thenewcenturyschool.com/2012/11/23/blown-away-with-wind-energy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878519.27/warc/CC-MAIN-20200702045758-20200702075758-00555.warc.gz
|
en
| 0.96215 | 677 | 2.828125 | 3 |
Using social media safely is essential to protect your privacy, personal information, and online reputation. Here are some tips to help you stay safe while using social media:
- Strong Passwords: Use strong, unique passwords for each social media account. Avoid using easily guessable information like your name, birthdate, or “password123.” Consider using a password manager to keep track of your passwords securely.
- Privacy Settings: Familiarize yourself with the privacy settings of each platform and customize them to your comfort level. Limit the visibility of your posts, profile, and personal information to only friends or approved contacts.
- Be Cautious About What You Share: Think twice before posting personal information such as your home address, phone number, financial details, or travel plans. Also, be cautious when sharing photos or videos that could be used to identify your location or daily routine.
- Beware of Strangers: Be cautious when accepting friend requests or messages from people you don’t know personally. Some people may have malicious intentions or try to scam you.
- Recognize Phishing Attempts: Be cautious of messages or emails that ask you to click on suspicious links or provide personal information. Legitimate social media platforms will never ask for your password or sensitive data through unsolicited messages.
- Log Out on Public Devices: If you use a public computer or someone else’s device to access social media, always remember to log out afterward to prevent unauthorized access.
- Use Two-Factor Authentication (2FA): Enable two-factor authentication whenever possible. This adds an extra layer of security to your account and requires a second form of verification, like a code sent to your phone.
- Update Software and Apps: Keep your social media apps and devices updated with the latest security patches to minimize vulnerabilities.
- Avoid Clicking on Suspicious Links: Be cautious of links shared in posts or messages, especially if they appear to be out of character for the sender or lead to unknown websites.
- Report and Block Abusive Users: If you encounter harassment or offensive content, report the user and block them to protect yourself and others from further harm.
- Educate Yourself About Privacy Policies: Understand the privacy policies of the social media platforms you use. Know what data they collect, how they use it, and whether they share it with third parties.
- Think Before Posting: Remember that once something is posted online, it may be challenging to remove it entirely. Think about the potential long-term consequences of your posts.
- Limit Personal Information in Your Profile: Be mindful of the information you share in your profile. Consider using a nickname instead of your full name and avoid including sensitive details like your birthdate or home address.
- Use Private Messaging for Sensitive Conversations: If you need to share private or sensitive information with someone, use the platform’s private messaging feature rather than posting it publicly.
By following these tips, you can enjoy the benefits of social media while minimizing the risks to your personal information and online safety. Remember that staying informed and being cautious are key to using social media safely.
|
<urn:uuid:b49a1746-cc55-4b20-939d-58e77dadf241>
|
CC-MAIN-2023-40
|
https://soof.uk/2023/07/onlinesafety
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510810.46/warc/CC-MAIN-20231001073649-20231001103649-00411.warc.gz
|
en
| 0.866767 | 639 | 2.78125 | 3 |
Yesterday, the Federal Trade Commission announced that it would hold a public workshop on November 21, 2013 on “the growing connectivity of consumer devices, such as cars, appliances, and medical devices”―also known as, “the Internet of Things.” The FTC will accept public comments (due June 1, 2013) in advance of the workshop.
In describing the Internet of Things, the FTC noted that consumers can already use mobile phones to adjust thermostats and open car doors and that these types of services and technologies are rapidly developing. While the FTC recognized that these functionalities may have benefits for consumers, the FTC is seeking input on the “unique privacy and security concerns associated with smart technology and its data.” For example, in a blog entry on the workshop, the FTC’s Business Center Blog asks, “What if when we drive near a grocery store, our refrigerator lets us know we’re low on milk? Would that be convenient? Disconcerting? Or maybe a little bit of both?”
Among the questions that the FTC is seeking specific input are the following:
- What are the significant developments in services and products that make use of this connectivity (including prevalence and predictions)?
- What are the various technologies that enable this connectivity (e.g., RFID, barcodes, wired and wireless connections)?
- What types of companies make up the smart ecosystem?
- What are the current and future uses of smart technology?
- How can consumers benefit from the technology?
- What are the unique privacy and security concerns associated with smart technology and its data? For example, how can companies implement security patching for smart devices? What steps can be taken to prevent smart devices from becoming targets of or vectors for malware or adware?
- How should privacy risks be weighed against potential societal benefits, such as the ability to generate better data to improve health-care decisionmaking or to promote energy efficiency? Can and should de-identified data from smart devices be used for these purposes, and if so, under what circumstances?
The Internet of Things is not just a trending topic in the United States. The European Commission recently published the results of a public consultation it conducted last year on the Internet of Things (which it short-hands to “IoT”). Last year’s consultation “sought views on an a policy approach to foster a dynamic development of Internet of Things in the digital single market while ensuring appropriate protection and trust of EU citizens.” However, the Commission’s report concludes that, at least at this time, there is no consensus on the need for public intervention in the area, especially in light of the existing legal framework of data protection and competition rules and safety and environmental legislation. The Commission has published a series of fact sheets, including one on privacy and security issues.
|
<urn:uuid:995da7cf-591f-4822-9a4d-44c4a64e668e>
|
CC-MAIN-2017-43
|
https://www.insideprivacy.com/united-states/ftc-announces-workshop-on-the-internet-of-things-european-commission-publishes-report/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822625.57/warc/CC-MAIN-20171017234801-20171018014801-00046.warc.gz
|
en
| 0.939512 | 588 | 2.765625 | 3 |
Q. What can I use for bugs on my cabbage now?
A. The usual bugs on cabbage are aphids, whiteflies or cabbage looper. First off, remove the bottom leaves on the plants near the ground. They are nearly in full shade and no longer contribute much to the plant.
|Cabbage leaves too close to the ground and cannot be sprayed on the underside. Most bugs will collect on the undersides of the leaves.|
|Once the lower leaves are removed it is easier to spray the bottom of the leaves, pointing the nozzle upwards.|
These leaves are close to the ground, the underside is a great place for bugs to hide from predators and impossible to spray. In older plants they are tough so you will need to cut them off.
These insects also like to gather between leaves at the base. This is where you find cabbage looper eggs deposited. This is the white butterfly that likes to hang around cabbage and cabbage related vegetables, lay eggs that hatch into green worms that chew holes in the leaves.
|A sure sign of insect problems are holes in the leaves. The plants should be sprayed at the first sign. Cabbage butterfly lays its eggs deep inside the crevices of the leaves. This area needs Bt or Spinosad sprays or dust.|
You should have on hand at three to five of these organic sprays; insecticidal soap, Neem oil, Bt, pyrethrin and Spinosad and a good pump sprayer. Soap sprays will be used most often; twice a week. The others are applied less often, usually as needed.
Spray on top of the leaves as well as the undersides where most insects will hide and feed. Bt sprays like Dipel or Thuricide are used against pests whose adult forms are moths such as the cabbage looper. This spray or dust is applied between the leaves and left undisturbed for a few days so it can work.
|Some insecticides say Bt right on the label while others may say Dipel, Thuricide or worm or caterpillar killer.|
Whiteflies are controlled with insecticidal soap, pyrethrum or Spinosad sprayed alternately, a few days apart. Sprays need to be directed at the pests so it must be applied to tops and bottoms of leaves.
|A popular brand of insecticidal soap|
After harvest you will still have bugs in the cabbage and other leafy greens. A rinse in a clean sink with water containing 1 tablespoon of household bleach per gallon will kill any bugs remaining. Rinse all vegetables with clean water before preparing them.
|
<urn:uuid:347ba15b-5505-48a5-b294-686078cea7d8>
|
CC-MAIN-2017-39
|
http://xtremehorticulture.blogspot.com/2014/12/remove-bottom-leaves-in-cabbage-to.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687582.7/warc/CC-MAIN-20170920232245-20170921012245-00098.warc.gz
|
en
| 0.948809 | 542 | 2.515625 | 3 |
Following is a check list I refer to often which catches many issues often:
1. No errors should occur when building the source code. No warnings should be introduced by changes made to the code. Also, any warnings during the build should be within acceptable boundaries with good reasoning.
2. Each source file should start with an appropriate header and copyright information. All source files should have a comment block describing the functionality provided by the file.
3. Describe each routine, method, and class in one or two sentences at the top of its definition. If you can’t describe it in a short sentence or two, you may need to reassess its purpose. It might be a sign that the design needs to be improved and routines may need to be split into smaller more reusable units. Make it clear which parameters are used for input and output.
4. Comments are required for aspects of variables that the name doesn’t describe. Each global variable should indicate its purpose and why it needs to be global.
5. Comment the units of numeric data. For example, if a number represents length, indicate if it is in feet or meters.
6. Complex areas, algorithms, and code optimizations should be sufficiently commented, so other developers can understand the code and walk through it.
7. Dead Code: There should be an explanation for any code that is commented out. “Dead Code” should be removed. If it is a temporary hack, it should be identified as such.
8. Pending/TODO: A comment is required for all code not completely implemented. The comment should describe what’s left to do or is missing. You should also use a distinctive marker that you can search for later (For example: “TODO:”).
9. Are assertions used everywhere data is expected to have a valid value or range? Assertions make it easier to identify potential problems. For example, test if pointers or references are valid.
10. An error should be detected and handled if it affects the execution of the rest of a routine. For example, if a resource allocation fails, this affects the rest of the routine if it uses that resource. This should be detected and proper action taken. In some cases, the “proper action” may simply be to log the error and send an appropriate message to the user.
11. Make sure all resources and memory allocated are released in the error paths. Use try-catch-finally in C++/C# code. Is allocated memory (non-garbage collected) freed? All allocated memory needs to be freed when no longer needed. Make sure memory is released in all code paths, especially in error code paths. Unmanaged objects such as File/Sockets/Graphics/Database objects in C#/Java need to be destructed at the earliest time. File, Sockets, Database connections, etc. (basically all objects where a creation and a deletion method exist) should be freed even when an error occurs. For example, whenever you use “new” in C++, there should be a delete somewhere that disposes of the object. Resources that are opened must be closed. For example, when opening a file in most development environments, you need to call a method to close the file when you’re done.
12. If the source code uses a routine that throws an exception, there should be a function in the call stack that catches it and handles it properly. There should not be any abnormal terminations for expected flows and also the user should be informed of any un-recoverable situations.
13. Does the code respect the project coding conventions? Check that the coding conventions have been followed. Variable naming, indentation, and bracket style should be used. Use FXCop and follow C++/C# coding conventions/guidelines within acceptable limits.
14. Consider notifying your caller when an error is detected. If the error might affect your caller, the caller should be notified. For example, the “Open” methods of a file class should return error conditions. Even if the class stays in a valid state and other calls to the class will be handled properly, the caller might be interested in doing some error handling of its own.
15. Don’t forget that error handling code that can be defective. It is important to write test cases for error handling cases that exercise it.
16. Make sure there’s no code path where the same object is released more than once? Check error code paths.
17. COM Reference Counting: Frequently a reference counter is used to keep the reference count on objects (For example, COM objects). The object uses the reference counter to determine when to destroy itself. In most cases, the developer uses methods to increment or decrement the reference count. Make sure the reference count reflects the number of times an object is referred. Similarly tracing is important in code to validate the flow.
18. Thread Safety: Are all global variables thread-safe? If global variables can be accessed by more than one thread, code altering the global variable should be enclosed using a synchronization mechanism such as a mutex. Code accessing the variable should be enclosed with the same mechanism.
19. If some objects can be accessed by more than one thread, make sure member variables are protected by synchronization mechanisms.
20. It is important to release the locks in the same order they were acquired to avoid deadlock situations. Check error code paths.
21. Database Transactions: Always Commit/Rollback a transaction at the earliest possible time. Keep transactions short.
22. Make sure there’s no possibility for acquiring a set of locks (mutex, semaphores, etc.) in different orders. For example, if Thread A acquires Lock #1 and then Lock #2, then Thread B shouldn’t acquire Lock #2 and then Lock #1.
23. Are loop ending conditions accurate? Check all loops to make sure they iterate the right number of times. Check the condition that ends the loop; insure it will end out doing the expected number of iterations.
24. Check for code paths that can cause infinite loops? Make sure end loop conditions will be met unless otherwise documented.
25. Do recursive functions run within a reasonable amount of stack space? Recursive functions should run with a reasonable amount of stack space. Generally, it is better to code iterative functions with proper/predictable end conditions.
26. Are whole objects duplicated when only references are needed? This happens when objects are passed by value when only references are required. This also applies to algorithms that copy a lot of memory. Consider using algorithm that minimizes the number of object duplications, reducing the data that needs to be transferred in memory. Avoid entire copying objects onto the stack instead use reference objects (most of the time default in C# for large user defined objects)
27. Does the code have an impact on size, speed, or memory use? Can it be optimized? For instance, if you use data structures with a large number of occurrences, you might want to reduce the size of the structure.
28. Blocking calls: Consider using a different thread for code making a function call that blocks or use a monitor thread with a well-defined timeout
29. Is the code doing busy waits instead of using synchronization mechanisms or timer events? Doing busy waits takes up CPU time. It is a better practice to use synchronization mechanisms since they force the thread to sleep without using valuable cpu time.
30. Optimizations may often make code harder to read and more likely to contain bugs. Such optimizations should be avoided unless a need has been identified. Has the code been profiled? Check if any over optimization has led to functionality disappearing.
31. Are function parameters explicitly verified in the code? This check is encouraged for functions where you don’t control the whole range of values that are sent to the function. This isn’t the case for helper functions, for instance. Each function should check its parameter for minimum and maximum possible values. Each pointer or reference should be checked to see if it is null. An error or an exception should occur if a parameter is invalid.
32. Make sure an error message is displayed if an index is out-of-bound. This can happen in C# too for dynamically created lists, etc.
33. Make sure the user sees simple error messages, not technical jargon.
34. Don’t return references to objects declared on the stack, return references to objects created on the heap. In C# whenever new is called a new heap object is created, but if an object is passed by copy then the stack object would disappear on return resulting in invalid data.
35. Make sure there are no code paths where variables are used prior to being initialized? If an object is used by more than one thread, make sure the object is not in use by another thread when you destroy it. If an object is created by doing a function call, make sure the object was created before using it. The VS.NET C# compiler ensures this so don’t ignore this warning.
36. Does the code re-write functionality that could be achieved by using an existing API/code? Don’t reinvent the wheel. New code should use existing functionality as much as possible. Don’t rewrite source code that already exists in the project. Code that is replicated in more than one function should be put in a helper function for easier maintenance. The existing code/library routines may be already optimized for this operation.
37. Bug Fix Side Effects: Does a fix made to a function change the behavior of caller functions? Sometimes code expects a function to behave incorrectly. Fixing the function can, in some cases, break the caller. If this happens, either fix the code that depends on the function, or add a comment explaining why the code can’t be changed.
38. Does the bug fix correct all the occurrences of the bug? If the code you’re reviewing is fixing a bug, make sure it fixes all the occurrences of the bug.
39. Is the code doing signed/unsigned conversions? Check all signed to unsigned conversions: Can sign completion cause problems? Check all unsigned to signed conversions: Can overflow occur? Test with Minimum and Maximum possible values. Sometimes a downcast from ‘long’ to ‘int’ could mean loss of data, use the larger data type preferably.
40. Ensure the developer has unit tested the code before sending it for review. All the limit and main functionality cases should have been tested.
41. As a reviewer, you should understand the code. If you don’t, the review may not be complete, or the code may not be well commented.
42. Lastly, when executed, the code should do what it is supposed to.
Thanks to the authors at http://www.macadamian.com/index.php?option=com_content&task=view&id=27&Itemid=31
|
<urn:uuid:4b282cda-9ea2-4abb-ba7c-d2dca847b85c>
|
CC-MAIN-2017-43
|
https://charlesconradvaz.wordpress.com/2006/02/16/code-review-checklist-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823114.39/warc/CC-MAIN-20171018195607-20171018215607-00536.warc.gz
|
en
| 0.883744 | 2,288 | 2.65625 | 3 |
Professors oppose scholarly use of Wikipedia
Peer review Web site provides useful information, though not necessarily reliable, according to some professors
Issue date: 4/2/07
Wikipedia is used by millions of people around the world as a quick and easy source of information about hundreds of thousands of topics.
According to the Web site, Wikipedia is a "multilingual, Web-based, free content encyclopedia project�written collaboratively by volunteers from all around the world."
Kevin Carosa, a freshman in business management, said Wikipedia is a "great resource for general information."
He said he uses it mainly for his amusement, but uses it for academic purposes as well.
"I mainly search my interests like rugby or soccer or movies," Carosa said. "But I used it for English class to get some background information on different animals too."
Steven Horton, a senior in environmental technology, uses Wikipedia for similar reasons.
"I use it for looking up random information," Horton said. "Like if I want to find out about a musician, or a historical event, or some random location I use it."
However, many in the academic field are known to discourage students from using Wikipedia as a credible source of information. Jon Thompson, an English professor, has a different view on the topic.
He suggests Wikipedia to his students because "many students do not consult encyclopedias or dictionaries when there are terms that they're unfamiliar with. So part of it is an effort on my part to encourage students to expand the boundaries of what they know by getting into the habit of consulting reference material."
Thompson did note though that Wikipedia is widely believed to be unreliable and said he he treads lightly with the site.
"Wikipedia is spotty in terms of its reliability," Thompson said. "You have to be selective about how you use it."
When it comes to important research-based essays, Thompson does not accept Wikipedia as a source.
"I would expect that people would use more conventional, quality controlled sources," Thompson said. "In fact, I would expect that they go well beyond encyclopedias of any kind, whether online or print, mainly using criticism itself."
Carosa agreed with Thompson about using Wikipedia as a source.
"I don't think it is reliable because people can edit the entries so you can't be sure about its reliability," Carosa said.
He said he believes it is much better to get information from an academic journal than Wikipedia.
"Most of the entries are probably correct, but due to anyone being able to edit it you just can't be sure about," Carosa said.
Horton said he has not experienced negativity toward Wikipedia with his professors.
"My professors don't really give a crap about it," he said. "I've seen some people throw in a Wikipedia article for a source on a presentation and [the professors] don't seem to mind."
Despite his accepting professors, Horton said he still stays away from Wikipedia for his papers.
"I usually stick to the library for those, but if you check out the sources for the articles on Wikipedia, some could be valid," he said.
Thompson admitted Wikipedia is still a valuable resource for many purposes.
"It's really primarily useful as introduction to a subject, a kind of USA Today sort of introduction to a subject," he said. "Although, one wants to be aware that you might want to cross-reference anything that seems to be important or questionable."
Thompson said using it casually and judiciously is useful, but he has a greater purpose in suggesting it to his students.
"The main thing is to try to encourage students to look up things they don't know. If they can do that they can be well on their way to expanding their horizons," he said.
|
<urn:uuid:1434bd75-480b-480c-8ed5-209c4649f20c>
|
CC-MAIN-2017-43
|
http://wiki-problem-pedia.blogspot.com/2007/04/professors-oppose-scholarly-use-of.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825889.47/warc/CC-MAIN-20171023092524-20171023112524-00348.warc.gz
|
en
| 0.973852 | 783 | 2.734375 | 3 |
Improving Lives by Accelerating Progress towards the UN Sustainable Development Goals for Adolescents Living with HIV
A prospective cohort study
Low-income and middle-income countries (LMICs) face major challenges in achieving the UN’s Sustainable Development Goals (SDGs) for vulnerable adolescents. We aimed to test the UN Development Programme’s proposed approach of development accelerators—provisions that lead to progress across multiple SDGs—and synergies between accelerators on achieving SDG-aligned targets in a highly vulnerable group of adolescents in South Africa.
We did standardised interviews and extracted longitudinal data from clinical records at baseline (2014–15) and 18-month follow-up (2016–17) for adolescents aged 10–19 years living with HIV in the Eastern Cape province of South Africa. We used standardised tools to measure 11 SDG-aligned targets—antiretroviral therapy adherence, good mental health, no substance use, HIV care retention, school enrolment, school progression, no sexual abuse, no high-risk sex, no violence perpetration, no community violence, and no emotional or physical abuse. We also assessed receipt at both baseline and follow-up of six hypothesised development accelerators—government cash transfers to households, safe schools (i.e., without teacher or student violence), free schools, parenting support, free school meals, and support groups. Associations of all provisions with SDG-aligned targets were assessed jointly in a multivariate path model, controlling for baseline outcomes and sociodemographic and HIV-related covariates, and adjusted for multiple outcome testing. Cumulative effects were tested by marginal effects modelling.
1063 (90%) of 1176 eligible adolescents were interviewed. Three provisions were shown to be development accelerators. Parenting support was associated with good mental health (odds ratio 2·13, 95% CI 1·43–3·15, p<0·0001), no high-risk sex (2·44, 1·45–5·03, p=0·005), no violence perpetration (2·59, 1·63–4·59, p<0·0001), no community violence (2·43, 1·65–3·86, p<0·0001), and no emotional or physical abuse (2·38, 1·65–3·76; p<0·0001). Cash transfers were associated with HIV care retention (1·87, 1·15–3·02, p=0·010), school progression (2·05, 1·33–3·24, p=0·003), and no emotional or physical abuse (1·76, 1·12–3·02, p=0·025). Safe schools were associated with good mental health (1·74, 1·30–2·34, p<0·0001), school progression (1·57, 1·17–2·13, p=0·004), no violence perpetration (2·02, 1·45–2·91, p<0·0001), no community violence (1·81, 1·30–2·55, p<0·0001), and no emotional or physical abuse (2·20, 1·58–3·17, p<0·0001). For five of 11 SDG-aligned targets, a combination of two or more accelerators showed cumulative positive associations, suggesting accelerator synergies of combination provisions. For example, the fitted probability of adolescents reporting no emotional or physical abuse (SDG 16.2) with no safe schools, cash transfers, or parenting support was 0·25 (0·16–0·34). With cash transfer alone it was 0·37 (0·33–0·42), with safe school alone 0·42 (0·30–0·55), and with parenting support alone 0·44 (0·30–0·59). With all three development accelerators combined, the probability of adolescents reporting no emotional or physical abuse was 0·76 (0·67–0·84). After correcting for multiple tests, four of the SDG- aligned targets (antiretroviral therapy adherence, no substance use, school enrolment, and no sexual abuse) were not associated with any hypothesised accelerators.
|
<urn:uuid:23d9ee3a-f909-4cc7-87be-af776336b555>
|
CC-MAIN-2020-16
|
https://www.eccnetwork.net/index.php/resources/improving-lives-accelerating-progress-towards-un-sustainable-development-goals
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370526982.53/warc/CC-MAIN-20200404231315-20200405021315-00083.warc.gz
|
en
| 0.912041 | 884 | 2.65625 | 3 |
By now the message should be clear: Your hands are not your friends. Public health officials have told us repeatedly that putting your fingers near your eyes and mouth offers easy access to the new coronavirus. But they know it isn’t easy to follow this advice. (They can’t even follow it themselves.) One small study found that medical students, who really must know better, touched their faces an average of 23 times per hour during a lecture, or once every 2.5 minutes. This finding, like many others one can find in medical journals, makes a simple and prescriptive point: It tells us that we’re all a bunch of dirty self-inoculators, in the hopes of getting us to stop. But there’s another body of research into this same behavior, and one that tries to touch on deeper questions of its origins: Could there be an evolutionary basis among human beings (and our kindred species) for this unhygienic quirk? Might the rubbing of one’s face with germy digits come from primal urges that blossomed on our branch of the tree of life?
We do know it’s likely you’ve been pawing at your face since before you were even born. The well-established fact that fetuses will, in utero, touch their fetal hands to fetal faces has led to scientific inquiry. One recent study conducted ultrasounds on 15 women from week 24 to week 36 of their pregnancies and found that fetuses were more likely to touch their faces with their left hands when the women reported feeling stressed. The same researchers published another small study hinting that the fetuses of women who smoke cigarettes might be more likely to touch their faces than those of nonsmoking women, although that finding was not statistically significant.
The idea that stress fuels a face-touching urge has some backup from research into grownups. A study in Germany analyzed the electrical brain activity of 10 young adults while they completed a memory test, as unpleasant sounds were blasted at them from a loudspeaker. An association between the stressful sounds and volunteers’ grabbing (with either hand) at the nose, cheeks, or chin—as well as subsequent changes in their brain activity—led the study’s authors to to speculate that “spontaneous facial self-touch” helps people to regulate emotions. How might these results fit with those above, where fetuses with stressed mums face-touched with their left hands in particular? That remains a head-scratcher. (Please don’t really scratch your head.)
Clearly this behavior isn’t limited to humans. If you’ve never seen a dog cover its nose with a forelimb or a sleeping cat covering its eyes with its paws, then navigate your way to the nearest online stream of adorable animal memes. As is the case with humans, though, exactly why our furry, mammalian friends touch their faces remains difficult to decipher. One detailed study of self-grooming by ground squirrels published in the 1970s asserted that the animals’ “face washing” could be a scent-related behavior. The author noticed that the squirrels “washed” their faces with their forepaws, and that males would often do this before pouncing on other males in a fight. This, he thought, might be an action to help the rodents spread scents around their body from secretory glands.
We don’t think about humans passing scents to one another, let alone rubbing their faces for that purpose, but a preliminary study suggests that face-touching may serve a social purpose for us, too. In a 2015 paper published in the journal eLife, Israeli scientists hooked up volunteers to devices that measured the air flow through the nose. They didn’t tell the participants the reason for this, and secretly filmed the volunteers meeting people and shaking hands. The experiment showed that volunteers often brought their hands to their noses after shaking hands with other people of the same gender. And when they did so, the airflow through their noses doubled. According to the scientists, this suggests that the subjects weren’t scratching an itch but instead testing the scents of the people they had met. Of course these days it might be more difficult to do the same, since we’ve been advised against shaking hands altogether.
The evolution of face-touching is not a new mystery, but it’s an elusive one to crack. One highly cited paper from 1984 suggested that among primates, including humans, the left hand was more prone to touch the face than the right hand. This, they guessed, rather wildly, was so that the left hand could act as a pointer to emotions on the left side of the face that originated in the right side of the brain. That paper tried to connect a lot of loose dots, but its major findings (let alone its theories) haven’t been borne out. Case in point: The authors of the 1984 paper suggested that gorillas, orangutans, and chimpanzees touched their faces as often as humans do, whereas monkeys “show little if any face touching” at all. Followup studies did not agree with that: Macaques seem to touch their face too—and they do it a lot. (The later research also disputed the idea that face-touching among primates is primarily left-handed.)
There’s a lot of food for thought, though: A psychiatrist writing in 1970 about a patient who had a habit of touching himself on the face, particularly around his mouth, noted that “mouth-hand actions are coordinated during the first month in infancy as seen in association with the feeding process.” More recent research has tried to measure how babies’ faces receive sensory feedback, and how this can facilitate feeding. Scientists developed tools to measure brain waves from premature infants when they are touched on the face, and concluded that this sensory ability “is critical for breastfeeding in the first days of life.” Interestingly, the same researchers who ultimately uncovered hints in ultrasound images that fetuses might touch their faces with their left hands when moms-to-be are stressed also found evidence suggesting that fetuses in later stages of development open their mouths in anticipation of touching their mouth areas. The authors have wondered if this behavior in utero could be an indicator of brain development necessary for the healthy development of feeding behavior.
That fetuses and newborns should touch their faces as they get familiar with their mouths makes sense, but why do we continue to pull at the corners of our mouths in adulthood? Our bulging waistlines are evidence that we know perfectly well how to eat. Could it be that when we tug at the corners of our mouths or cover our eyes with our fingers we are tapping into an ancient tendency, shared with other species? It’s tempting to look around and see the possibilities. Take, for example, a report from a decade ago that a group of English mandrill monkeys in a zoo in Colchester, England, had started doing facepalms. When you read about the mismanagement of the current Covid-19 epidemic by White House officials, you’re likely to start making the same gesture.
Updated 3/10/20: This story has been corrected to reflect that medical students were found to touch their faces once every once every 2.5 minutes, not seconds, as previously stated. This was an error in editing.
- The secret to enjoying nature is … your phone
- Wikipedia is the last best place on the internet
- So, amphibians glow. Humans just couldn't see it—until now
- Is this the end of oversharing?
- Flying car developers get a boost from the Air Force
- 👁 A defeated chess champ makes peace with AI. Plus, the latest AI news
- 📱 Torn between the latest phones? Never fear—check out our iPhone buying guide and favorite Android phones
|
<urn:uuid:3b533937-3778-410c-a3e2-e9bfcf304d3e>
|
CC-MAIN-2020-16
|
https://www.wired.com/story/cant-stop-touching-your-face-science-has-some-theories-why/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370507738.45/warc/CC-MAIN-20200402173940-20200402203940-00148.warc.gz
|
en
| 0.966628 | 1,634 | 2.5625 | 3 |
There is A panel the kind of a home energy system. This Backyard Revolution System sort of system operates by collecting power. The panel releases it, then accumulates the power, stores it. This system is straightforward to install but may save a great deal of cash.
A kind of solar panel system is a heating collector program. By allowing the sunlight to warm water that is kept in 15, these systems operate. Since the temperatures of the water increases, energy collects in sunlight and turns it.
The Truth Behind The Backyard Revolution Program
A kind of energy process is the wind grid. These systems permit you to exploit and use that electricity in your house. There are a couple of distinct kinds of wind programs out there you can pick from, but this is one of the better ones to test out if you would like to cut back in your electricity expenses.
It is a fantastic question, In case you’ve ever wondered how many homes are Backyard Revolution Review powered with solar power. It is among the most typical questions. So, why do you wish to use energy?
People that are worried about their bills would love to change to using other power sources. This is an intelligent thing by switching to another source of electricity to do, it can help you cut back on your bills.
The quantity of electricity you’re using if you use it when you head to work or when you use it, you might be paying hundreds of dollars each month in bills. It is time so as to reduce your bill, you start looking into something more effective and energy-efficient.
You’ll discover they don’t need any power when you place solar panels around your house. The sun that’s recorded by the solar panels will help you create all of the energy that’s needed to power these things and you won’t have to have some electricity resources.
Does it Really Help to Reduce Your Electricity Bills?
The fantastic thing about the panels is that these panels can be used by you. Whether it’s to run your washing machine, fridge, washing machine, or whatever else you want to have to operate.
Among the explanations for individuals who are interested in energy is that they’re renewable. You do not need to pay a dime until you use the source up. This usually Backyard Revolution Does It Work means you will not ever need to worry about running out of electricity for your property.
That is the reason it’s becoming popular to start looking at this power supply. Is it effortless to install but it is possible to discover people who can provide you info so as that will assist you to work out how to establish the panels. And they’ll have the ability to work for your property.
Everything you can do now is working out how to use electricity so as to ensure that you are currently using power. You’ll be astonished at how much you’ll save by incorporating that the panels.
What Is A 3d Solar Panel?
By selecting the most appropriate sort of home energy system, you can reduce your utility bill. It could possibly be well worth the investment to shop about and see what’s out there if you’re trying to save a good deal of cash.
These systems can be found by you in lots of locations, such as hardware stores and your regional home improvement shop.
Solar power works in a place. To be able to save their electricity bills, energy is used by many times individuals in areas.
They’re also able also to have it operate on Backyard Revolution Program the grid rather than relying on facilities which were built to give electricity and to make the electricity themselves.
Then, the cells need to be set up around the exterior of this panel so it may absorb all of the sun’s energy it may get. These cells may have to have the wiring connected to allow it to function.
Make sure you be protected by following safety measures when installing your solar energy system. There are a range of things which you could do to safeguard your home. Be certain you shut down any electronic equipment when not in use rather than leave the region until the system was installed. Check for shorts in addition to connections near your appliances in the wiring connections.
Obviously, when you reside in a desert you might be more interested in solar energy since it is possible to create electricity from sunlight, but it can be tricky to keep this up so you won’t run from electricity once the weather is awful. Then this is correct if you reside in a place that is covered in sand.
How Many Solar Panels Are Needed To Power A House?
If you would like to understand how can solar-powered power work? Have a look which you’ve installed onto your roof and determine how they work.
There are various kinds of the home electrical system. If you’re seeking to decrease your electrical bill, can be saved a great deal of cash in the long term by the type. Whether you’re interested in finding a system that will enable you to get which can power your house or energy during the entire year there are.
For starters, if you utilize energy as your principal source of power and have a house, you will not only save cash, but you’ll make a large gap. You’re helping to reduce the Backyard Revolution Download your carbon footprint, by employing this sort of energy.
In the following guide, we explore the advantages of each and everyone and will take a look at the kinds of home energy systems. Let us take a good look at each kind so that you understand what to anticipate As soon as you’ve decided on which sort of system is most appropriate for you.
The energy system’s kind is that the energy conversion program. This is a system for those that reside. It works by heating water that’s kept in tanks and then turning the water.
Backyard Revolution System – Is It A Step-by-Step Guide To Follow?
» Another reason people are interested in energy is that it makes it feasible for them to do things. You can use solar power to make if you reside in a place that has a lot of sources, for example, property.
» It is possible to use the panels and you won’t need to purchase any parts for them to operate. This implies that in the event that you would like to reduce your utility bills, or in case you would like to spend less in an electric bill, you’ll have the ability to do with the panels which you’ve installed.
» One more thing you might wish to understand how does power work? There are Backyard Revolution Guide and you’ll be able to get your panel if you have some opportunity to understand these panels operate.
» How can solar-powered power work? Well, this really is a question a lot of men and women ask when they’ve seen the products for powering their houses offered to them. These products include a panel that will be set on the house’s roof or another area that receives a great deal of sunlight.
» It is vital that you look about to find the home grid if you’re thinking about using sunlight that will assist you to cut your bills. You could be amazed at what you’ll find.
Pros And Cons
How can solar power work? There are a range of items that are going to be necessary for the panels which are going to be set up on the home’s roof. The portion is. This can be used by the inverter, which will convert the solar power.
This is the energy is accumulated and turned into power. There are numerous actions to electricity as you can see and among these is the panel. With both of these things, Backyard Revolution Scam you may see it is not hard to create and set up the panels.
Another kind of program is that the solar collector panel. This is a system than the panel that is fundamental. The power accumulates from sunlight and stores it. Do this as they’re searching to decrease their monthly bills.
You do not have space to put in your solar energy system and if you’re on a budget, there are a range of businesses that set up the system for you and can come to your home. You can find these businesses on the internet, and a few will visit your house. They’ll come into your house run the wiring to get dimensions, then hook everything up.
Backyard Revolution review system pdf blueprint download guide program manual does it work price where to buy customer reviews testimonials pros and cons features reviews
If it comes to installation price, you ought to be certain you research what you are getting which you’re currently paying for your installation. Make certain Backyard Revolution Reviews the business that you are currently working with supplies a money-back guarantee. Otherwise, request a few choices and you may want to call them back. There are a range of businesses which will provide you with a refund guarantee if you are not pleased.
|
<urn:uuid:c0d79188-74bc-4a38-ac8b-36cdc1a3b005>
|
CC-MAIN-2023-23
|
https://www.sciencecenterofpinellas.org/backyard-revolution-program-review/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00040.warc.gz
|
en
| 0.958375 | 1,874 | 2.5625 | 3 |
The earliest “automatic” fire extinguisher on record is said to have been patented by a British chemist, Ambrose Godfrey, in 1723. It was a wooden cask containing a quantity of liquid and a pewter chamber loaded with gunpowder. When the attached fuses were ignited by a fire, the gunpowder exploded and the solution was released to help put out the fire. On November 7, 1729, Bradley’s Weekly Messenger, a publication, refers to its successful use in stopping a fire in London, England.
A more advanced extinguisher was invented by a British Captain, George William Manby, in 1818. Consisting of a three gallon (13.6 litres) copper vessel containing potassium carbonate solution within compressed air.
The soda-acid extinguisher that is familiar today, was patented in 1923 by an officer in the Hungarian Fire Brigade, Kornél Szilvay. This new extinguisher took advantage of the reaction between sodium bicarbonate solution and sulphuric acid to explosively propel a stream of liquid onto a fire.
Inside the cylinder a vial was suspended containing concentrated sulphuric acid. This vial of acid could be broken in one of two ways: using a plunger to break the acid vial, or releasing a lead bung that held the vial closed. When the acid mixed with the bicarbonate solution, carbon dioxide gas was expelled and the pressurized water was forced out through a nozzle or length of hose.
In the early 20th Century, about 1912, the Pyrene company introduced the carbon tetrachloride (CTC) extinguisher. This device expelled the liquid from a brass or chrome container via a hand pump.
Another variety, known as “grenades” consisted of glass bottles, or “bombs” that were filled with CTC and were intended to be thrown at the base of a fire. Upon contact the CTC vaporized and a chemical reaction extinguished the flames. Though very toxic, this compact extinguisher was found suitable for extinguishing liquid and electrical fires, and was popular in motor vehicles for the next 60 years.
A German invention of the 1940’s was a liquid chlorobromomethane (CBM) designed for use in aircraft. More effective, and slightly less toxic than CTC, it was used until 1969.
On to the next gallery (Firefighting Tools & Gear)
|
<urn:uuid:4e3f72e6-55f8-4dc7-9280-e64847efa207>
|
CC-MAIN-2023-23
|
http://www.firemuseumcanada.com/fire-extinguishers/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00364.warc.gz
|
en
| 0.961126 | 511 | 3.53125 | 4 |
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising.
Tuesday, September 2, 2014
Skin Care and Diseases
hi, what are the symptons of sun poison? went to the beach on 5 days ago and im still sun burn to the point that i can not touch my skin, its like my chest is oon fire.
It sounds like you have a severe sunburn. Usually time will resolve all the symptoms. However, since the symptoms have been around for more than 48 hours you may need to go see your doctor. If you have no other health issues over the counter anti-inflammatories such as Advil or Tylenol will help relieve some of the symptoms. Cool compresses or baths will take away some of the heat. It you have blisters try not to pop them to prevent possible infection. In the future, sunblock, protective clothing and a hat will help prevent you from going through this again. A really bad sunburn is not sun poisoning, just too much sun exposure. True sun poisoning is is called Solar Urticaria. It is a rare reaction to sun exposure. This is a true sun allergy. It develops rapidly--moments after exposure, the skin begins to itch, and then becomes red with wheals (red patches) or vesicles (bumps). The actual mechanism that causes this reaction is unknown, however, antihistamines, such as Benadryl, are effective in treating the reactions of some patients and will relieve some of the itching. Again, check with your doctor before taking any medication.
Tatiana M Oberyszyn, PhD
Associate Professor of Pathology
Associate Professor of Molecular Virology, Immunology & Medical Genetics
College of Medicine
The Ohio State University
|
<urn:uuid:75e70374-276c-46ad-925b-fb948361c7a1>
|
CC-MAIN-2014-35
|
http://www.netwellness.org/question.cfm/37318.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909044755-00163-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.942156 | 382 | 2.6875 | 3 |
1 It was as Hester said, in regard to the unwonted jollity that brightened the faces of the people.
The Scarlet Letter By Nathaniel HawthorneContext Highlight In XXI. THE NEW ENGLAND HOLIDAY
2 Then again, Stubb was one of those odd sort of humorists, whose jollity is sometimes so curiously ambiguous, as to put all inferiors on their guard in the matter of obeying them.
Moby Dick By Herman MelvilleContext Highlight In CHAPTER 48. The First Lowering.
3 The forty hearts of those waving couples were beating as they had not done since, twelve months before, they had come together in similar jollity.
Return of the Native By Thomas HardyContext Highlight In BOOK 4: 3 She Goes Out to Battle against Depression
4 I repeat, brothers, I repeat, no zeal, no hubbub, no excess; even in witticisms, gayety, jollities, or plays on words.
Les Misérables (V1) By Victor HugoContext Highlight In BOOK 3: CHAPTER VII—THE WISDOM OF THOLOMYES
|
<urn:uuid:03454f77-4d18-4b5b-9fda-c648714ebb8a>
|
CC-MAIN-2023-40
|
https://www.examword.com/sentence/word?x=jollity
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00547.warc.gz
|
en
| 0.946359 | 241 | 2.9375 | 3 |
Grain storage specialists utilize this information to relate equilibrium moisture content of grain and R.H. of the surrounding air for a range of stored cereals. Relationships calculated for a range of cereals stored at a temperature of 25 C are shown in Table 1. Grain moisture content in equilibrium with an R.H. of 70% (shown in bold type) is the figure beyond which the stored cereal grain becomes at risk of microbial damage and therefore mycotoxin contamination. In practical terms this means grain scheduled for storage at 25 C should be dried to and maintained at that maximum moisture level. Equilibrium grain moisture contents and corresponding R.H. levels are recalculated for higher or lower storage temperatures.
Getting the measure of mycotoxins
Exactly when and where to test along the supply chain is now formalized into Hazard Analysis Critical Control Point (HACCP) testing. Experienced operators will already be aware of inherently high risk points where testing has always been advised. This may be grain loads coming in from different parts of the farm and experiencing different growing conditions including soil moisture and irrigation levels. Mycotoxin testing will alert the farmer to any real-time mycotoxin problems and provide important farm and crop data for later use.
Routine testing of grain loads from different sources for mixing in silos or during feed manufacture is clearly a priority for managers of central grain depots and feed mills. Any point along the supply chain where grain and other debris can accumulate, whether in conveyors at the grain store or feed mixers and bins in the feed mill, are high risk points for fungal growth and mycotoxin accumulation.
Mycotoxins are not randomly or uniformly distributed throughout static grain or feed loads but tend to occur in so-called “hot spots” corresponding to damp spots and pockets of mechanically damaged or insect-infested grain that encourage mold growth. Sampling a moving stream of grain, feed ingredient or finished product reduces any selection bias associated with sampling and testing a static load. Static grain loads should be probed many times and all over, with sub samples bulked to produce a more representative gross sample for testing.
Speed and sensitivity of testing are the twin main thrusts of mycotoxin testing over the last two decades, including actual time taken to obtain an accurate and actionable reading and result. If a test result is achieved on-site within minutes, then “rogue loads” can be dealt with promptly and isolated without contaminating the main bulk of grain, feed ingredient or finished feed. When samples were taken back to laboratories for testing, no prompt action was possible for suspicious loads with visible mold or a musty smell, without holding up operations. Traditional methods to analyze mycotoxins include fluorometer and LC methods using immunoaffinity (IA) columns. Chosen for their ability to isolate mycotoxins in simple or complex sample types, IA columns ensure precise measurements whether in the field or laboratory setting and provide the most comprehensive range for detection of single or multiple mycotoxins.
Maximum protection against the threat of mycotoxin contamination is achieved when inbound raw materials such as rice, corn, wheat, cottonseed meal or barley are screened prior to storage or use in feed production. This need to know on-site and on-time led to the development of portable on-site testing equipment like the VICAM Vertu® Lateral Flow reader — used to identify and quantify key mycotoxin hazards at critical control points right along the feed and grain supply chain. VICAM has gone one stage further with the introduction of five-minute on-site quantitative strip tests to detect DON (DON-V™) and aflatoxins (Afla-V™).
VICAM’s quantitative strip tests are designed for use with the Vertu® Lateral Flow Reader and can be performed with a minimum of on-site training and technical expertise. These tests employ the highly sensitive and selective monoclonal antibodies required to accurately measure DON and aflatoxins in grain or feed material.
Current passion is to drive down testing times to several minutes. More important is the overall on-site ability for prompt testing by nonscientists anywhere along the supply chain to secure prompt, accurate and repeatable results over the sensitivity range required. Whether the testing time is three or five minutes is secondary.
|
<urn:uuid:6c2432b7-49fb-4426-a6a6-326682e73dae>
|
CC-MAIN-2013-48
|
http://www.feedandgrain.com/article/10909365/getting-the-measure-of-mycotoxins?page=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065790/warc/CC-MAIN-20131204131745-00025-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.919408 | 890 | 3.09375 | 3 |
Big Data | Feature
Training Next-Gen Data Superheroes
Faced with a shortage of professionals capable of taming Big Data, schools are launching data science programs to train a new generation of data specialists.
- By John K. Waters
Illustration by Miracle Studios
This is the third and final installment of CT's series on Big Data. The first article, "Big Data," explained the phenomenon and why it matters, while "Digging for Gold" explored how schools are using Big Data to improve student performance.
Run for your lives, the data is coming. The information equivalent of a giant meteor is hurtling toward Earth, threatening to bury us in data sets that could--ironically--contain the very seeds of our salvation. And the size of the threat seems to grow with each passing day. The latest data alert: By 2020, the amount of data generated daily will reach 40 zettabytes, or roughly 5,247 gigabytes for every person on earth.
That's one of the findings in a new report published in December by IT industry analysts at IDC. Cosponsored by EMC, the study casts doubt on our ability to capture the value of all this data, especially since we've barely tapped our existing stores of data. The study's researchers estimate that only 0.5 percent of the world's data is being analyzed effectively today.
"As the volume and complexity of data barraging businesses from all angles increases, IT organizations have a choice," said Jeremy Burton, executive vice president of product operations and marketing at EMC, in a statement. "They can either succumb to information-overload paralysis, or they can take steps to harness the tremendous potential teeming within all of those data streams."
That's sound advice as far as it goes, but many organizations are failing to tap this rich resource because there simply aren't enough IT pros capable of doing it. Where are the superheroes of the information age? Where are Data Woman and Byte Boy?
In a report published in May 2011, analysts at McKinsey & Co. predicted that the US would soon face a shortage of "140,000 to 190,000 people with deep analytical skills, as well as 1.5 million managers and analysts to analyze big data and make decisions based on their findings."
Higher Ed Ramps Up
Yet these gloomy forecasts and scary statistics don't take into account recent initiatives in higher education intended to fill the skills gap. A growing number of colleges and universities have launched--or plan to launch--graduate programs designed to turn out specialists in a field many are calling "data science."
"In some ways it's a catchall term that includes [a wide variety of] statistical analysis, predictive modeling, text analytics, and so forth," says James Kobielus, a former Forrester analyst who now serves as Big Data Evangelist at IBM. "But clearly the data scientist is going to play a key role in this Big Data phenomenon. And one of the big questions companies are asking right now is, 'Where are the data scientists of the world coming from?'"
If Terence Parr has his way, some of them will graduate from the University of San Francisco (CA). Last fall, USF launched a Master of Science in Analytics program in response to "massive demand for this set of skills among both students and companies," says Parr, an associate professor of computer science who conceived and runs the multidisciplinary program. The first dozen students are on track to graduate in June.
"We've built all new classes for the program, hired new faculty, and contracted with some strong adjuncts from Google and others," explains Parr. "We're a small school, and we have excellent support from the upper echelon, so we were able to move quickly on this."
Capturing the value of Big Data--loosely defined as data sets too large and/or diverse for conventional tools to manage and mine effectively--requires a cluster of capabilities not typically required or taught within a single academic program. Essentially, USF has combined business, computer science, and graphic design to teach students how to collect, process, analyze, and report on massive data sets.
"Students need to know something about economics, business, and finance, so they can ask the right questions and understand the data," Parr says. In addition, students must have some computational ability, so they can clean and prepare the data for processing by analytical tools. They also need to understand data modeling, so they can interpret the results and explain them. Finally, they must learn visualization techniques so they can share the value of their findings with others. "We want our graduates to be able to do the whole thing," notes Parr. "Companies don't want somebody who's a siloed specialist and needs five other people to do his job."
According to Parr, USF's new graduate program has quickly become a competitive differentiator for the school, attracting savvy students who expect to pursue lucrative careers in data science. "I'm already warning my programming assistant that there's an onslaught of applications coming into the system," adds Parr. "And I get e-mails from companies all the time asking to be part of our career-development and recruitment events."
Anjul Bhambhri, IBM's vice president of Big Data, also sees a lot of student interest in this emerging field. "I speak at a lot of conferences and events, and there are always a fair number of undergrad and grad students who are taking a keen interest, not just in the technology, but in how the different verticals are trying to leverage big data," she explains. "They want to understand the technology, but also the use cases and the challenges the enterprises have and how to overcome them. A lot of questions [involve] what courses they should be taking, especially around analytics, statistics, and mathematics-related stuff."
Even so, few undergraduates arrive perfectly prepared for this evolving, multi-disciplinary field of graduate study. In fact, USF found it necessary to provide some serious remedial preparation for its first cohort, in the form of a summer analytics boot camp. The five-week program focused on what Parr calls the "three pillars" of the graduate program: the ability to write some software (SQL, Python, and R); familiarity with probability, statistics, and linear algebra; and some background in business, finance, and basic economics.
"It was an issue finding students who had these three things nailed," Parr says. "It's actually a rare combination. So, we had a boot camp where we pounded on them for five weeks before the [graduate] program really got going in the fall. Now we're able to tell undergraduates what they need to study if they want to pursue this graduate degree."
In September, Northwestern University (IL) began offering a Master of Science in Analytics through its McCormick School of Engineering. The 15-month professional degree program is the result of collaboration between the school and IBM. Big Blue has long been active in higher education through its Academic Initiative, which the company describes as "a program that offers colleges and universities access to the latest advances in technology and business industry expertise." In the case of Northwestern, IBM reportedly provided curriculum materials, project-focused case studies, and access to "a wide spectrum of software solutions."
"We have been talking with many schools and universities in the US, but also in countries such as China and India," Bhambhri says. "We're really helping to put Big Data in context for these students. We're talking to them about why it's important, and why enterprises care about it. That's a perspective that a company like IBM can bring: what's happening in the enterprise world."
Part of that context is recognizing the difference between the traditional college-level study of data systems and the emerging discipline of data science.
"Traditionally, college courses in data management have been about managing relational databases--in other words, structured data," explains Bhambhri. "But big data is mostly unstructured. For students coming out of undergrad and grad programs today with an interest in this stuff, it's important that they understand that taking courses that teach them how to manage, analyze, and report on structured data is not going to be sufficient. It won't give them the right skill set. They have to find a course of study that can help them get their arms around the unstructured world."
The Northwestern-IBM relationship is not unique. In May, the Computer Science and Artificial Intelligence Laboratory (CSAIL) at MIT unveiled a research initiative called bigdata@CSAIL. At the same time, Intel announced the establishment of an Intel Science and Technology Center for Big Data at CSAIL. The computer chip maker is expected to contribute $2.5 million per year for up to five years to support the research center.
In August, Louisiana State University announced a collaboration with SAS, maker of business analytics software. The two organizations partnered to launch a Master of Science in Analytics in the school's Department of Information Systems and Decision Sciences (ISDS), which is part of the E.J. Ourso College of Business. The university describes the program as a combined effort between ISDS and the Department of Experimental Statistics. Students in a pilot program during the 2011-2012 school year were able to apply "cutting-edge SAS software to real-world data and challenges."
In addition to financial support, SAS provides LSU with experts to conduct on-site training, and hosts LSU faculty at the company's North Carolina headquarters. A SAS education expert serves on LSU's Industry Advisory Board, and the school gets free access to SAS software and teaching materials through SAS OnDemand for Academics. The school reports that all 38 of the first class of students to complete the new LSU program found employment within weeks of graduation, in companies ranging from Amazon to Bank of America and, of course, SAS.
Given that the lack of Big Data skills is being felt first in the corporate world, it's not surprising that companies such as IBM, Intel, and SAS are sponsoring programs to produce graduates who can help them with their growing data challenges. It also doesn't hurt that these companies make products that they'd like these graduates to use.
The USF program also benefits from the school's close relationship with local businesses. In fact, students work at various local companies throughout the yearlong program. Some of these internships are paid positions. "Companies have been very interested in working with our students," Parr says. "They get a low-risk way to check them out and find someone who'll really fit."
A Bright Future for Graduates
USF found its own low-risk way to provide its MS Analytics students with experience accessing and managing remote servers. The school has worked closely with Amazon Web Services (AWS), a division of Amazon that delivers IT infrastructure services in the cloud, to give all students their own virtual servers and on-demand access to compute resources.
"A lot of students have been using a laptop and know how to hit the 'run' button, but being able to access a giant set of cloud-computing resources and manage them remotely is an important Big Data skill that we drill into our students," explains Parr. "Using AWS, we can provide them with their own dedicated boxes, and they're free to run amok and do whatever they want, because it's virtual and we can throw it all away when they're done."
Despite the technical aspects that must be mastered, USF's Master of Science in Analytics needs to be considered a professional degree, Parr insists, not one focused on computer science or statistics. It's an assessment that IBM's Kobielus believes is fair.
"Fundamentally, this is about empowering the business analysts [in a company] to find patterns and trends, and to be able to do predictive forecasting," he says. "What these universities are providing are critical business tools for optimizing your company, finding opportunities, and nipping threats in the bud. This isn't a math project, but an ongoing effort to build a particular set of skills and to encourage promising young people to learn to work with data of disparate sorts to solve business problems."
And for these new professionals, the sky is the limit. "There are so few people in this field right now that some careers are going to launch like rockets," concludes Parr. "When there's a dearth of talent, people can get sucked right up to the top. Nature abhors a vacuum."
|
<urn:uuid:239d843e-71dd-473d-80af-1dc416ec4c5c>
|
CC-MAIN-2014-35
|
http://campustechnology.com/Articles/2013/02/26/Training-Next-Gen-Data-Superheroes.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00035-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.965189 | 2,577 | 2.65625 | 3 |
|Air Photo Study|
The Stone Gates: Welcome and Memorial
by Vicki Davis - Mainstreeter - November 1989
At the corner of Beckwith and Main Streets stand a pair of stone gates. They are so distinctive that all. who come into the area notice them. They might be the entrance to some grand estate. Closer examination reveals two brass plaques. One designates them as a war memorial and one as a heritage structure.
Brantwood Place -a new idea in town planning.
In 1911, Robert Sibbitt planned Brantwood Place as a new concept in subdivisions. The area spanning Clegg Street to Elliott Avenue, and from Main Street to the Rideau River, was to be developed as an exclusive neighbourhood.
"The principal roadway - Beckwith Road - has the decorative feature of massive gateways of architectural masonry and ornamental ironwork--lending an air of exclusiveness and distinction to this high class home section," extols the real estate pamphlet.
The pillars were solidly built of fieldstone with cement trim in 1912.
An ornamental iron structure By the late 1940's the which originally spanned
the s ton e gat e s had gate posts was removed many years ago.
The area did not grow as quickly as the developer had anticipated, partly
By the late 1940's the stone gates had deteriorated and were considered a hazard by the City. When a work crew arrived to demolish them, they were met with angry residents who loved the landmark. The gates stood firm.
A war memorial
Ottawa East residents negotiated with the City. If the gates became a
war memorial, they would be maintained in perpetuity by the City. E.P.Nunn,
a long-time resident, organized the project to save the stone gates. He,
like other neighbours, felt it was a worthy landmark to be preserved.Art
Humphries is one of the World War II veterans who went from door to door
gathering donations for a memorial brass plaque in 1949. "I was born
on Clegg Street and joined the armed
On November 11, 1949, the stone gates were dedicated "to the memory of those who made the supreme sacrifice and to the honour and glory of those men and women of this community who served in the armed forces, 1914-1918/1939-1945" .
Acting mayor Geldert addressed a crowd of some 500 Ottawa East residents, alderman L.L. Coulter unveiled the plaque, and wreaths were laid in memory of F .0. Peter Lochnan and F.O. W.H. Thompson (RCAF).
By 1977, the gates had again deteriorated and the brass plaque had fallen
off. Repairs were again made, and the plaque replaced. A plaque in French
and a new bilingual heritage plaque were also installed.
On November 11, 1982, the gates were rededicated. Alderman Nancy Smith
officiated. Art Humphries unveiled the memorial plaques (both English
and French community members who had lost their lives in the two world
wars. Saint Paul University hosted a reception.
The stone gates at Beckwith and Main Streets are a distinctive Ottawa
East landmark--for their historical value and memorial significance. The
plaque reads, "Praise can add nothing to their
|Return to the Mainstreeter Index|
|
<urn:uuid:12159243-fa37-4a85-8cb2-0428cc2462ca>
|
CC-MAIN-2020-10
|
http://history.ottawaeast.ca/HTML%20Documents/Mainstreeter/Stone%20Gates.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141806.26/warc/CC-MAIN-20200217085334-20200217115334-00511.warc.gz
|
en
| 0.961819 | 701 | 2.65625 | 3 |
Being conscious about your finances and setting goals for your money can help you achieve your dreams at any stage in life.
Here are some helpful tips to remember when you are making plans for your money and setting your financial priorities:
Identify Your Goals
Remember that you can do anything you want with your money, but you can’t do everything you want.
You will never have the unlimited resources to achieve all of your goals, so focus on which goals are most important to you and concentrate your efforts on those.
To accomplish these most important goals you will need to put some of the other less important ones towards the back burner.
What is Important to You?
When you are thinking about how you will manage your money, consider the things which are important in your life.
You will likely want to have an emergency fund to bail yourself out if the unexpected occurs. You also might want to free yourself of debt, or contribute to your child’s education fund.
Rank these goals in order of importance to decide which you should focus on primarily.
Talk to Your Family Members
When you are making a financial plan, it is important to involve all of your family members in the decisions.
The way that you manage your money will have an impact on everyone in the family unit including your spouse and your kids.
Make sure that you are involving everyone in the goal setting process and that they are getting their say.
Use Compound Interest To Take Advantage of Time
When you put your savings away in an interest earning account, the younger you are the better.
Over the years your nest egg will grow, thanks to the power of compound interest which will have you earning interest on your interest!
So no matter how old you are, start now because the earlier you start saving, the more money you will have!
Re-examine Your Financial Strategy
Your financial priorities will change throughout your life as you go through different stages, such as buying your first house, having a small child, sending your kids to school and moving towards retirement.
Every few years or so, it is important to sit down with your partner to make a new budget which will reflect your current stage in life.
With these planning tips, you will be able to budget your money and achieve your financial goals all throughout your life.
|
<urn:uuid:64122731-1183-4aa4-a2b6-50d703d2608b>
|
CC-MAIN-2014-23
|
http://www.my-personal-secretary.com/tag/goals/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273381.44/warc/CC-MAIN-20140728011753-00007-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.960943 | 474 | 2.5625 | 3 |
For centuries, children’s literature consisted almost exclusively of didactic texts designed to teach basic skills like reading and writing or to impart religious lessons. During the Middle Ages, the vast majority of these texts were still written in Latin. Hornbooks with the Lord’s Prayer and the alphabet were the most common forms of children’s literature in the 1400′s, and alphabet books began showing up in Russia, Denmark, and Italy during the following century.
In the 1600′s, the concept of childhood shifted: children were no longer thought of as miniature adults, but as separate beings with their own juvenile needs and preferences. Publishers began printing books exclusively for children, though these, too, were often didactic. The seventeenth century also saw the rise of Puritanism, which again shaped people’s views of children. They were viewed not as young innocents, but as moral savages who needed stringent moral instruction.
It was not until the eighteenth and nineteenth centuries that children’s literature came into its own as a genre. A Little Pretty Pocket Book (1744) by John Newbery is considered the first book published for children’s pleasure reading. As technologies improved and it got cheaper to produce books, the industry blossomed. Even as pleasure reading became popular, the publication of educational materials maintained its momentum. Literacy rates began to improve, increasing the demand for, and interest in, primers and similar educational pieces.
Today, collectors can build quite extensive collections around educational materials printed for children. The broadest category of these is the primer. The first known use of the word “primer” was in the fourteenth century. The term derives from the Latin primarium, meaning “primary,” and was the name for a layperson’s prayerbook. At the time, literacy was relatively uncommon, but people did need to read their prayers. This book was often the only one in a home, so it was used to teach children to read. Eventually the term broadened and referred to any small book intended to teach reading. Today a “primer” may refer to a short, introductory piece about a specific topic or to a brief, informative piece of writing.
A Selection of Primers
We’re delighted to offer a selection of primers in a variety of subjects and time periods. Should you have a question about an item, please don’t hesitate to contact us!
The London Vocabulary
Grammarian James Greenwood published the first edition of The London Vocabularly, English and Latin in 1713. After working for years at the Hackney Academy, Greenwood opened up his own boarding school in Essex in 1711 and was later appointed surmaster of St. Paul’s School in London. He’s best known for his An Essay on Practical Grammar (1711), which received much positive praise from a number of scholars and critics, including Isaac Watts. The London Vocabulary went through a number of editions, both English and American, of which this is the seventeenth English edition. Details>>
A quite popular primer, George Fisher’sThe Instructor appeared in numerous editions, both throughout the United Kingdom and in America. Like many educational books at the time, it purportedly offered an easier method of learning than other primers. And also like many educational books at the time, it reminds us of just how little people really knew about geography at the time, and that this truly was an age of exploration and discovery. In this Glasgow edition, printed in 1786, California is still an enigma: “Northward, on the Pacific Ocean, is New Mexico, and the island of California; but of these we know but little.” ESTC records five holdings of this edition. Details>>
The Young Child’s ABC
Written by Alexander Anderson and illustrated by Samuel Wood, The Young Child’s ABC (1806) contains a horn book-style alphabet and a syllabary. Letters are illustrated with objects in alphabetical order. This children’s chapbook was the first item published by Wood, who would go on to have an illustrious and prolific career in the trade. He had thousands of titles under his imprint. Although four copies of later editions have come to auction in the last three decades or so, none of this first edition have come to market. It’s quite rare in the trade. Details>>
A Book Explaining the Ranks and Dignities of British Society
Charles Lamb is best remembered for his collaboration with his sister, Mary Lamb, on Tales from Shakespeare. But he also anonymously published A Book Explaining the Ranks and Dignities of British Society in 1805. The charmingly illustrated children’s book delineates the hierarchy of the nobility, clergy, army, navy, government & professions; with their history & origins, forms of address, order of precedence, honors, with their coronets & coronation robes described, etc.This is the second edition, published in 1809. The book has been occasionally at auction these last 30+ years, though not since 2003. It’s scarce in the trade. Details>>
Le Livre des Enfans
Le Livre des Enfans was published in Quebec in 1834. Illustrated with woodcuts, the work begins with two alphabets, which are followed by the usual primer material. The cover features a short verse by Racine. Le Livre des Enfans also includes thirteen pages of animal descriptions, such as Le Zebre, Le Cheval, and Le Hibou. It’s scarce in the trade. Details>>
The New England Primer
Published around 1840, The New England Primer bears quite a drop title: Containing the Assembly’s Catechism; The Account of the Burning of John Rogers; A Dialogue Between Christ, A Youth, and the Devil; and Various Other Useful and Instructive Matter. With a Historical Introduction, by Rev. H. Humphrey, D.D. Rogers was a biblical translator and commentator, and the first English Protestant martyr under Mary I. He was burned at the stake for heresy in February 1555. This primer bears a frontis of Isaac Watts. Though this copy has some wear to its wrappers, it’s in good condition. Details>>
Girls’ and Boys’ Primer, Part II
Girls’ and Boys’ Primer, Part II was published around 1850 by Rufus Merrill in Concord, New Hampshire. The alphabet is illustrated with woodcuts. The primer features the usual material: alphabet, poems, and lessons in spelling and writing. This copy is in the publisher’s original buff paper wrappers with ornamental border to front and rear wrappers and the signature of “Eastman & Bogart.” Though there’s light wear and soiling to the wrappers, this is a very good copy. Details>>
A Farewell Present to a Female Scholar, on Going to Service
Thanks to the Enabling Act of 1799, dissenters could teach without subscription to the Church of England. The London Sunday-School Union was formed in 1803 with the aim of educating poor children and became a very active publishing organization. One of its publications was A Farewell Present to a Female Scholar, on Going to Service (ca 1828). An apparently unrecorded little work, it offers counseling a young lady regarding her pending move to the world of ‘service,’ “a useful and important station in society ” and outlines a number of ‘rules to live by’ follow, including “Fifthly- Always observe a respectful and obliging behaviour towards those with whom you live, and endeavor to go about your work with a cheerful air, as a pleasure rather than a burden to you.” It appears to have served as a sort of primer for young women entering domestic service. Details>>
Fleet Fact Book
Fleet Fact Book (ca 1906-1910) is separated into four sections: The “Dreadnaught” (2 text pages & 1 photographic image); Submarines (1 text page & 5 photographic images); Torpedo Boat Destroyers (1 text page & 2 photographic images); and The Fleet / Dreadnaught Types (1 text page summarizing the fleet strength, including ship types/numbers & 5 color postcard-type images of diverse dreadnaught types). In short, the volume offers a custom ‘primer’ for the Royal English Navy, ca 1910, with all indications the book created for the use of a senior Naval official, or senior political figure associated with the Royal Navy. Details>>
Puff and Dick
Pictured are the main characters from this famous primary reader: Dick, Jane, Spot, Puff & Baby. This is a rare unused printed sheet of a tale from the highly-collected Dick & Jane reader series, published in the 1950′s. Details>>
Thanks for reading! Love our blog? Subscribe via email (right sidebar) or sign up for our newsletter--you’ll never miss a post.
|
<urn:uuid:ecd61a1f-5874-4be3-a93a-9b8eaca155a5>
|
CC-MAIN-2017-47
|
http://blog.tavbooks.com/?tag=primers
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805466.25/warc/CC-MAIN-20171119080836-20171119100836-00222.warc.gz
|
en
| 0.955702 | 1,892 | 3.890625 | 4 |
How Do You Stack Up?
Return to Physics Index
Robert Foote Walt Disney Magnet School
4140 N. Marine Drive
Chicago IL 60613
Students will estimate the number of pennies, nickels, dimes, and quarters in
a plastic bag.
Students will build stacks of each coin.
Students will find the thickness of a penny, nickel, dime and quarter after
measuring their stacks.
Students will measure to the nearest centimeter using a ruler.
Students will determine how high a stack of $1000 is in pennies, nickels, dimes
4 plastic bags rulers
486 pennies 250 nickels
470 dimes 73 quarters
Have four volunteers hold up four bags with pennies, nickels, dimes, and
quarters. Have each class member write down on a piece of paper which bag has
the most coins and which has the most money. Then give the bags to different
groups to count. Write the results of each count on the board. Have the group
with the most coins split them in half so each group can have a group of coins.
Next, have each group (pennies, nickels, dimes, quarters) predict how many of
each coin they can stack without falling. Write predictions on board and then
let the groups stack. Have students imagine a stack of coins $1000 high. How
high would that stack reach? Give the following statistics as a comparison: A
basketball player is 2 meters(m) tall, the ceiling of most buildings is 4 m, the
height of a 10 story building is 40 m, and the height of the Sears Tower is
440 m. Students may graph each of these and then graph where each stack would
fall. To calculate the thickness of a penny, nickel, dime and quarter, have
students measure their stacks and divide by the number of coins. They will then
have a good approximation of the thickness of each coin.
Using either the measured thicknesses or the standard thickness for each coin,
have students determine how high a stack of 50 pennies, nickels, dimes and
quarters would be.
Page, David and Philip Wagreich. Maneuvers with Nickels and Numbers. Dale
Seymour Publications, 1990.
|
<urn:uuid:d1bdab4a-f721-4334-83a0-5fe058b7ba32>
|
CC-MAIN-2014-41
|
http://mypages.iit.edu/~smile/pl95m1.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657127222.34/warc/CC-MAIN-20140914011207-00269-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.908353 | 479 | 4.09375 | 4 |
If touching your toes is a stretch - You need Flexibility Training 101
You can bend over and reach for your toes all you want, but until you stretch, strengthen and circulate the muscles around this movement, you will never be able to touch your toes.
How many people do you know ( maybe including yourself) have said "I'm just not flexible." ?
Everyone can increase their flexibility. Flexibility is based on strength. The strength of the muscles surrounding the joints determine the range of motion your body will allow.
Flexibility is based on your body's sense to keep the joints and vertebras in a safe position. Flexibility is the range of motion for any given joint: your knee, your shoulder, your hip, your neck.
There are three keys to increasing your flexibility: Stretching, Strengthening and Circulating the muscles.
Technical: Moving the muscles in a lengthened position to "re-set" the tension length relationship in the muscles surrounding the joint.
What it means: Lengthening the muscle through it's movement patterns.
Types of Stretching: Dynamic vs Static
- Dynamic stretching is moving throughout the range of motion. ie. Swinging your leg front to back to "stretch the hamstrings". A great warm up activity and way to increase flexibility. Dynamic stretching may reduce the risk of injury prior to movement.
- Static stretching is holding a particular range of motion in a fixed position for 10 seconds to 2 minutes. ie: Putting your foot up on a block and leaning over the straight leg. This type of stretching is best as a post workout activity as opposed to pre-workout due to the delay in contractile speed in muscle contractions. Static stretching does not decrease the risk of injury prior to movement.
When one muscle group gets stronger than the opposing muscle group
around the joint, flexibility is limited. Hence, touching toes may be
difficult when hip flexors (front of thighs) are stronger than glutes
and hamstrings (the back side muscles). When there is a muscle
imbalance the weaker muscles will shorten to keep the joint in a fixed
position. Adding strength to these muscles ( the hamstrings in the
case above) will allow for a greater range of motion in the joint.
Simple leg lifts to the back can strengthen the glutes and hamstrings.
It is important to provide an increase in blood flow which will aid in
nutrients to the muscles as well as rid waste products to promote
healing, changes in length and tension to the muscles as well as
connective tissue changes in the fascia network. Foam rolling,
massage, acupuncture, and other modalities are ways to circulate the
For more information on increasing your flexibility or improving your
overall posture, pick up a copy Andrea Metcalf's, Naked Fitness. A new
approach to evaluating the overall flexibility of the body to lead to a
healthy lifestyle and weight loss program.
|
<urn:uuid:6f75af14-09b4-46b5-9a38-585c5d4ddc85>
|
CC-MAIN-2017-43
|
http://www.chicagonow.com/naked-fitness/2010/11/it-can-be-a-stretch-dont-pull-that-muscle/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825900.44/warc/CC-MAIN-20171023111450-20171023131450-00741.warc.gz
|
en
| 0.925895 | 614 | 3.15625 | 3 |
Nor[, , ... ] is the logical NOR function. It evaluates its arguments in order, giving False immediately if any of them are True, and True if they are all False.
Nor[, , ... ] can be input in StandardForm and InputForm as ... . The character can be entered as nor or \[Nor].
Nor[, , ... ] is equivalent to Not[Or[, , ... ]].
Nor evaluates its arguments in a non-standard way (see Section A.4.2).
Nor gives symbolic results when necessary, removing initial arguments that are False.
Nor is not Flat.
See The Mathematica Book: Section 1.5.6.
See also: LogicalExpand, Or, Xor.
THIS IS DOCUMENTATION FOR AN OBSOLETE PRODUCT.
SEE THE DOCUMENTATION CENTER
FOR THE LATEST INFORMATION.
|
<urn:uuid:e793daa6-b0dc-45cd-b490-234faf4d34c5>
|
CC-MAIN-2013-48
|
http://reference.wolfram.com/legacy/v4/RefGuide/Nor.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164009894/warc/CC-MAIN-20131204133329-00031-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.755615 | 189 | 2.75 | 3 |
Prince Albert National Park
Prince Albert National Park encompasses 3,874 square kilometres in central Saskatchewan, Canada and is located 200 kilometres north of Saskatoon. Though declared a national park March 24, 1927, it had its official opening ceremonies on August 10, 1928 performed by Prime Minister William Lyon Mackenzie King. The park is open all year but the most visited period is from May to September. Although named for the city, the park's main entrance is actually 80 km north of Prince Albert via Highways 2 and 263 which enters the park at its southeast corner. Two additional secondary highways enter the park: No. 264, which branches off Hwy. 2 just east of the Waskesiu townside, and No. 240, which enters the park from the south and links with 263 just outside the entry fee-collection gates. The park ranges in elevation from 488 metres on the western side to 724 metres on the eastern side. Waskesiu is the only town within the park, located on the southern shore of Waskesiu Lake. Most facilities and services one would expect to find in a multi-use park are available, such as souvenir shops, small grocery stores, gas station, laundromat, restaurants, hotels and motels, rental cabins, a small movie theatre, Royal Canadian Mounted Police detachment, camp grounds, three marinas, many beaches, picnic areas, tennis courts and lawn bowling greens. The facilities and services combine recreational and nature experiences. Notably, the park contains the Waskesiu Golf Course designed by famed golf course architect Stanley Thompson who also designed the course in Banff National Park.
The numerical value of prince albert national park in Chaldean Numerology is: 9
The numerical value of prince albert national park in Pythagorean Numerology is: 3
Images & Illustrations of prince albert national park
Find a translation for the prince albert national park definition in other languages:
Select another language:
Discuss these prince albert national park definitions with the community:
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"prince albert national park." Definitions.net. STANDS4 LLC, 2017. Web. 21 Sep. 2017. <http://www.definitions.net/definition/prince albert national park>.
|
<urn:uuid:ca78eb6d-680b-4045-9d4b-4d4d3fd96a75>
|
CC-MAIN-2017-39
|
http://www.definitions.net/definition/prince%20albert%20national%20park
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688158.27/warc/CC-MAIN-20170922022225-20170922042225-00654.warc.gz
|
en
| 0.907646 | 503 | 2.765625 | 3 |
Excerpted from the final chapter of The Cause: The Fight for American Liberalism from Franklin Roosevelt to Barack Obama, a just-released book by Eric Alterman.
One could not help but be struck by the dramatic turns in the summer months of 2011. As President Barack Obama found himself forced to begin the dismantlement of some of the most significant accomplishments of the New Deal and Great Society merely to entice his political opposition to agree to allow the U.S. government to pay its debts, the New York governor, Democrat Andrew Cuomo — son of former governor Mario Cuomo — was simultaneously concluding a remarkable run of legislative victories in what had famously been one of America’s most dysfunctional state legislatures.[ii]
The most significant of these was New York’s new law legalizing gay marriage. To win the necessary votes, Cuomo turned to top-dollar Republican donors who, according to a New York Times report, “had the influence and the money to insulate nervous senators from conservative backlash if they supported the marriage measure.”[iii] It was a thrilling moment, not only for gays, but for liberals looking for a leader who refused to be cowed by the scare tactics of conservative Christians.[iv]
Andrew Cuomo was no radical, however — the law was, in fact, popular with more than 60 percent of New Yorkers polled — and the respective roles he undertook as governor provided a picture-perfect incarnation of the transformation of American liberalism from its New Deal origins. Under Roosevelt’s presidency, liberalism became a political movement focused on improving the lives of working people and those who needed a helping hand from government. In Obama’s America (and Cuomo’s New York), however, liberalism was primarily a movement designed to increase social and cultural freedoms for those who could afford to enjoy them. Cultural liberalism, while not without political risk, did not cost the wealthy anything or restrict their ability to become even wealthier. As such, it proved a far easier sell in a political system like that in the United States in the twenty-first century, dominated, as it was, by the power of money.
The difference between the Cuomos, father and son, offers a telling illustration of this transformation. Recall the role that Mario Cuomo had played in rejuvenating both the language and the spirit of the New Deal with the series of mid-1980s addresses he gave in opposition to Ronald Reagan’s Social Darwinist reading of the American creed, culminating with his 1984 Democratic convention speech. As one journalist observed, “Mario was an FDR liberal (and child of immigrants) with an unyielding faith in the government’s power to improve people’s lives.”[v] Andrew, in turn, was the product of a political era described by Nobel laureate economist Joseph Stiglitz as “of the one percent, by the one percent, for the one percent.”[vi] Despite being elected to run the bluest of blue states in 2010, Andrew Cuomo governed, in the words of the local news columnist Michael Powell, like “a bulldog for the rich.” In the same legislative session that legalized gay marriage Cuomo engineered a cap on annual increases in the amount of property taxes collected by local school districts. He presided over a budget that forced the firing of 2,600 New York City teachers and laid off 1,000 city workers, many of whom were involved in health care for the poor, at a time when the need for both could hardly be greater.[vii] And finally, and most energetically Cuomo fought to ensure the demise of New York State’s millionaire tax at the moment when its proceeds might have been able to prevent the kinds of cuts being enforced.[viii] These were the priorities of a man who occupied the office once held not only by his father but also by Franklin D. Roosevelt before him.
Cuomo’s commitment to the abolition of the “millionaire tax” was particularly illuminating and for economic liberals, deeply depressing. The surcharge, which affected only citizens earning a million or more dollars per year, garnered the support of seventy-two percent of state residents polled in October, 2011. It would have generated an estimated $2.8 billion in the coming year at a time when the state’s deficit happened to be $2.4 billion. What’s more, it had become a focal point of the first genuinely populist progressive movement to arise in decades. The so-called “99 Percent” took to occupying public spaces like New York’s Zucotti Park near Wall Street to demand an end to taxation and fiscal policies that served the interests of only the country’s wealthiest one percent. The millionaire’s tax enjoyed the energetic support of almost all traditional liberal constituencies in the New York legislature, including its labor union-supported representatives, as well as its Black, Puerto Rican, Hispanic and Asian caucuses. But acting in concert with body’s Republicans, Cuomo scuttled the tax and then went on to compare his lone wolf position to that of his father’s unstinting opposition to the death penalty. “The fact that everybody wants it, that doesn’t mean all that much,” he explained, apparently without noticing that his father’s lonely stand had been taken on behalf of prisoners on death row, rather than multi-millionaires on Wall Street. [ix]
Andrew Cuomo’s agenda, like the nascent 99 Percent movement, was less a cause of the transformation of American liberalism, than its product. In the years since his father had begun seeking public office, economic inequality in the United States surged into territory unseen in more than a century. In 1974 the top 0.1 percent of American families earned 2.7 percent of all income in the country. By 2007 this same tiny slice of the population had increased its holdings to fully 12.3 percent, roughly five times as great a piece of the pie as it had enjoyed just three decades earlier.[x] Half the U.S. population owned barely 2 percent of its wealth, putting the United States near Rwanda and Uganda and below such nations as pre–Arab spring Tunisia and Egypt when measured by degrees of income inequality.[xi] By the end of 2010, as corporate profits rose to 15 percent of national income — their biggest share of the economy since such statistics became available nearly seventy years earlier — the share going to workers’ wages fell to its lowest level in the same period.[xii] However much the election of an African American president was a point of pride for liberals, the fact remained that at two years into his historic presidency, white Americans enjoyed, on average, median wealth of twenty times that of black households and eighteen times that of Hispanic households.[xiii]
Months before the passage of New York’s gay marriage legislation, President Obama caved into Republican demands to slash the budget for spending for the poor and middle class and extended the Bush-era tax cuts for Americans lucky enough to earn more than $250,000 annually. Shortly thereafter, during the debt limit debacle, he conceded even more on the economic front, agreeing to additional budget reductions without winning any new tax revenues from the wealthy, whose tax breaks were now secure. As a result, liberals found themselves faced with two vexing questions raised by Robert Kuttner, cofounder of the liberal public policy magazine The American Prospect: “First, how did we make such stunning progress in three decades on issues involving tolerance and inclusiveness? And how is it that, during the same period, we have gone steadily backwards on a whole set of economic issues?”[xiv]
The short answer lies in the power and influence Americans have allowed money to assume in their politics. “We can have democracy in this country, or we can have great wealth concentrated in the hands of a few,” the great liberal jurist Louis Brandeis prophesied in the second decade of the twentieth century. “But we can’t have both.”[xv]
[i] Mari Jo Buhle, Women and American Socialism, 1870-1920 (Urbana, Ill.: Illinois University Press, 1981), 323
[ii] On the state of the New York State legislature, see Clyde Haberman, “The Stalemate in Albany: 5 Years On,” New York Times, June 8, 2009, quoted in Alan Ackerman, Just Words: Lillian Hellman, Mary McCarthy, and the Failure of Public Conversation in America (New Haven: Yale University Press, 2011), 23
[iii] Michael Barbaro, “Behind N.Y. Gay Marriage, an Unlikely Mix of Forces,” The New York Times, June 25, 2011
[vi] “Joseph Stiglitz: Of the one, by the one for the one percent,” Democracy Now, April 7, 2011
[viii] Thomas Kaplan and Michael Barbaro, “Cuomo Says Curbing Public Pension Benefits Will Be His Top Goal in ’12,” The New York Times, July 13, 2011
[ix] See Thomas Kaplan, “Despite Protests, Cuomo Says He Will Not Extend a Tax Surcharge on Top Earners,” The New York Times, October 17, 2011; and Mathew Cooper, “Occupy D.C.? Most Back Protests, Surtax,” National Journal, October 19, 2011
[x] See Seth Hanlon: “Making More, Contributing Less Millionaires’ Tax Rates Have Declined While Everyone Else Contributes to Deficit Reduction,” Center for American Progress, August 4, 2011, and Archon Fung, “Winning the Future: Should Political Scientists Care More About Politics?” Boston Review, May 12, 2011
[xii] Floyd Norris, “As Corporate Profits Rise, Workers’ Income Declines,” New York Times, August 6, 2011, B3
[xiii] Rakesh Kochhar, Richard Fry and Paul Taylor, Pew Research Center’s Social & Demographic Trends “Wealth Gaps Rise to Record Highs Between Whites, Blacks and Hispanics,” July 26, 2011
[xiv] Robert Kuttner, “The Paradox of Social Progress and Economic Reaction,” The Huffington Post, June 19, 2011
[xv] This quote can be found in many places, including William H. Gates, Chuck Collins, Wealth and Our Commonwealth: Why America Should Tax Accumulated Fortunes (Boston: Beacon Press, 2004) 17.
|
<urn:uuid:521259c4-f068-4b07-b1c2-3733ffa9e0b6>
|
CC-MAIN-2013-20
|
http://billmoyers.com/2012/04/17/winning-on-social-issues-losing-on-economic-ones/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699755211/warc/CC-MAIN-20130516102235-00088-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.957836 | 2,196 | 2.671875 | 3 |
Purchase this article with an account.
D. Lamba, T.A. Reh; Stem cell approaches for retinal repair. Journal of Vision 2009;9(14):28. doi: 10.1167/9.14.28.
Download citation file:
© ARVO (1962-2015); The Authors (2016-present)
Retinal degenerations are significant causes of vision loss. Efforts to stimulate regeneration of retinal neurons from Muller glia have recently been successful for amacrine cells, but not for photoreceptors. Cell replacement using transplantation offers an alternative therapy to potentially restore visual function to individuals who have lost their sight from photoreceptor degeneration. To provide a source of new retinal neurons for cell based therapies, we developed methods to derive retinal progenitors from human ES cells. We have found that the photoreceptors derived from human ES cells can be transplanted to mice with inherited retinal degeneration, and that they restore light response to the animals. We have also recently developed methods to purify the photoreceptors prior to transplantation. These results provide a proof of principle that human ES cells can be useful in cell replacement therapies for retinal degenerations.
This PDF is available to Subscribers Only
|
<urn:uuid:ff8e4dc2-7da1-4daa-8233-78e1a4151e1b>
|
CC-MAIN-2017-34
|
http://jov.arvojournals.org/article.aspx?articleid=2136502
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117874.26/warc/CC-MAIN-20170823055231-20170823075231-00273.warc.gz
|
en
| 0.897388 | 265 | 2.734375 | 3 |
Biological H2S scrubber
Raw biogas produced by digestion, for example during an anaerobic process is approximately 60% methane. If you need to upgrade your biogas in order to burn it safely then you first need to remove the hydrogen sulfide. Biological scrubbing upgrades it to high-grade biomethane. This can then be used in electrical generators and boilers as a substitute for natural gas.
A Biogas Scrubber Removing H2S Gas Cost-Effectively
The Global Water & Energy’s BIO-SULFURIX™ biological biogas scrubber comprises a scrubber tower containing a layer of non-clogging, randomly packed carrier material on which sulfur-oxidizing bacteria grow. A small amount of oxygen releases as the raw biogas passes through the carrier material, so the bacteria can convert the hydrogen sulfide into sulfate and ultimately, sulfuric acid.
The residual hydrogen sulfide is typically below 100 – 200 parts per million. This unique solution is superior to other alternatives where such a low residue is required. There are no waste products. Indeed, the sulfate can be diluted and discharged to a local sewer.
- Protect your boilers / biogas engines from corrosion-shortening operating life
- Benefit from a long-life desulfurization unit made of corrosion-free materials
- Install this equipment in new facilities or incorporate it in existing installations
- Comes in standard sizes or can be customised to meet your specific needs
|
<urn:uuid:91cca376-8ede-4607-8fdf-f753a3911f0b>
|
CC-MAIN-2023-23
|
https://making.com/equipment/biological-h2s-scrubber
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00462.warc.gz
|
en
| 0.879913 | 318 | 2.734375 | 3 |
In every age the dominant influence in the choice of therapy has been the particular model of abnormality in use by the therapist. The first known attempt at treatment of what we would now call emotional disorder took place roughly half a million years ago, during the Stone Age (Coleman, Butcher, & Carson, 1980). There is archeological evidence from the period of a practice known as trephining, which involved chipping a round hole in the skull with a stone tool presumably to allow an evil spirit, or demon, to escape. Some of these unearthed skulls show evidence of healing around the hole so at least some “patients” survived this drastic remedy and lived for several years afterward.
Early recorded history shows a similar belief among the Chinese, Hebrews, Egyptians, and Greeks that mental abnormalities were the result of possession by demons. The accepted mode of treatment was exorcism (expulsion of demons) involving rites of prayer and assorted attempts to make the body a most undesirable place for evil spirits. These included drinking vile liquids that were then regurgitated presumably along with the offending demon. Other approaches perhaps reserved for more stubborn cases, included flogging and starvation, Some centuries later, Hippocrates (c, 450-c. 377 B.C.), the Greek physician, rejected the prevailing idea of possession and formulated an early medical model, He divided mental illness into three categories: mania, melancholia, and phrenitis, or brain fever. All three, he thought, arose from natural disturbances of the body. Treatment was therefore aimed at the body and depending on the category, included vegetarianism, exercise, sexual abstinence, and bleeding. By the Middle Ages, however, the belief in demons had revived. Priests took over the treatment of abnormal behavior first with prayers and sprinklings of holy water, and later with more violent forms of exorcism. Starting in the fifteenth century, abnormal behavior was thought to be due to witchcraft. Treatment consisted of torturing “witches” until they confessed, and then burning them to death.
Witchcraft was still an offense punishable by both church and state in the early sixteenth century. Persecution of witches was not, however, without strong opposition. One of the leading attackers, Johann Weyer, published a book based on a humanitarian model arguing that witches were mentally ill rather than “possessed.” He advocated treatment based on understanding and help rather than on torture and burning at the stake. Although Weyer is regarded as the founder of modern psychopathology, his ideas were met at the time with scathing criticism.
Did you like this article? You can write articles like this and make money from it. It is free to join and you can make money online as soon as you sign-up. Click on the link to Sign-up with Bukisa.com and starting making some good money on the internet.
More Content on the Web by Spill Guy:
|
<urn:uuid:b6acf740-d1a6-41d1-811b-461ed7cf5795>
|
CC-MAIN-2017-47
|
http://bukisa.com/articles/57643_the-history-of-therapeutic-procedures-part-1-of-3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807084.8/warc/CC-MAIN-20171124031941-20171124051941-00084.warc.gz
|
en
| 0.971682 | 597 | 3.53125 | 4 |
If the prospect of fencing your property has you thinking about a second job, you may want to consider an old-fashioned, yet feasible, option. Wild grape vine fences date back to the settlers who would create beautiful woven fence designs using grape vine as the raw material. Grape vine has proven itself to be a worthy fence material that is capable of withstanding time and weather while still looking impressive.
Meandering your way through the woods, you may notice thick, curly, rather aggressive vines that seem to overtake surrounding vegetation. Wild grape vine shows no mercy as it attaches to anything within its reach. Flexible, yet strong, grape vine displays the dexterity of a ballerina combined with the endurance of a marathon runner. Grape vine grows rapidly in almost any conditions and is predominant in wooded areas. Grape vines are beneficial to animals, providing food and shelter but can also become a problem if allowed to overtake an area.
For fence building, medium-sized grape vine works best. The vine is flexible but still strong enough to make a durable fence. Harvest only in the fall and pick only those vines that are overtaking other vegetation. If you go to a public location, such as a park or forest, ask permission before harvesting the vine. Use a small handsaw to cut the grape vine as close to the ground as possible. It will require some pulling to get the grape vine untangled from other vegetation so bring a friend when harvesting.
Several options exist for constructing a grape vine fence. It is best to start with an outline of the area to be fenced, noting all existing landscape features and underground utilities. Fence posts are usually placed not more than 3 feet apart and can be made of any sturdy lumber. After placing the fence posts, the grape vine can be woven between the posts in any desired pattern. A tight weave will create more stability than a loose weave. Loose grape vine ends are tied with jute along the fence line.
Wild grape vine is naturally durable and weather resistant which minimizes maintenance. Deer and other animals like to nibble on grape vine, especially when other food is scarce. Pieces of the fence line may need to retied or re-woven or replaced. Keep extra grape vine on hand for these occasions.
- "Easy Garden Projects"; Barbara Pleasant; 2006
- "Build your Own Fences and Walls"; Penny Swift and Janek Skymanowski
- Photo Credit wicker fence image by green308 from Fotolia.com
What Type of Fertilizer to Use on Grape Vines?
Grape vines are easy to grow in the home garden if you have a trellis, arbor or fence on which they can...
How to Build a Grapevine Trellis
Valued for thousands of years for their fruits that are eaten fresh and used to make wines and preserves, grape plants (Vitis...
|
<urn:uuid:8ba81c14-8367-432a-9ece-f430fcfcba56>
|
CC-MAIN-2017-26
|
http://www.ehow.com/info_8030548_frugal-fence-building-grape-vines.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00286.warc.gz
|
en
| 0.930646 | 586 | 2.734375 | 3 |
New Bern, NC – Fifty years ago this week, a B-52 bomber crashed in a field near Goldsboro. The plane was carrying two nuclear bombs when it broke up in mid-air, dropping its nuclear payload in the process. The aircraft was on a 24-hour "Coverall" airborne alert mission on the Atlantic seaboard. During a mid-air refueling around midnight on January 23rd, 1961, the tanker crew advised the B-52 captain that his aircraft had a leak in its port wing fuel cell. The refueling was broken off and the aircraft was directed to land immediately at Seymour Johnson Air Force Base. As it descended through 10,000 feet, the pilots were unable to control the plane and ordered the crew to eject.
"real loud noise, like a noise you couldn't imagine. The whole sky was lit up, it looked like the whole world was ablaze."
Billy Reeves, who then lived in the small farming community of Faro remembers he and his family going outside to investigate the crash. The local fire department was first on the scene and started evacuating the surrounding homes.
"my dad was volunteer fire department here... they did what they could...the Airforce came and told everyone "Leave. Leave. Leave. You don't know how dangerous it is."
It wasn't until three days later Reeves or his family knew about the two nuclear bombs.
"one was hanging back at my house in a tree. I didn't see it personally because I was gone. It's not hard to remember 50 years when you're scared to death."
The wreckage covered a 2-square-mile area of tobacco and cotton farmland about 12 miles north of Goldsboro. In a narrative released from the Pentagon, structural failure of the right wing resulted in two weapons separating from the aircraft during aircraft breakup at 2,000 - 10,000 feet altitude. One bomb parachute deployed and the weapon received little impact damage. However, the other bomb fell free and broke apart upon impact. Traveling close to the speed of sound, it plunged into a muddy field and sank about 50 feet below ground. Dr. Jack ReVelle was with the Explosive Ordinance Disposal Unit that responded to the B-52 crash. His job was to recover the remains of the disintegrated bomb.
"it didn't take us long before we knew we'd have to use heavy machinery. We found the parachute pack, we found high explosives. The further we dug the more we found."
But after digging some 20 feet down, the hole began filling with water from a nearby Swamp.
"we hit the waterline. We're pumping water out and digging the hole deeper. If we weren't able to pump the water, we would have never found this stuff."
After eight days of digging, local officials dismissed the crew and they returned home. Too busy while on the job to think about the circumstances, it was only once he got home he realized he'd been removing a nuclear bomb.
"I sit down at the kitchen table to write my mom and dad where I've been and I see my hand start to shake... yeah, because you suddenly realize where you've been and what you've been doing."
Fortunately, no explosions occurred. But what would have happened if the bomb went off?
"oh, you'd have a Bay of North Carolina if that thing had gone."
A blast from a ground-level detonation would have left a crater in the ground a third of a mile wide and leveled homes more than five miles away, while the heat would have set fires and inflicted third-degree burns to a distance of nine miles from the point of detonation.
Jared: "how close was it to exploding?" ReVelle: "you're asking my opinion?" Jared: "I'm asking your opinion." ReVelle: "my opinion is damn close."
Controversy surrounds the issue of how close the bomb was to going off. The Pentagon claims that there was no chance of an explosion and that two switches didn't activate. However, most people believe the pilot's safe/arm switch was the only one of six arming devices on the bomb that prevented detonation. Despite the fact the military claims to have recovered many components of the nuclear weapon, some believe there's still a bomb in the ground. To this day, the U.S. government collects water samples from 50-foot wells near the site of the crash. Some Faro residents like Billy Reeves aren't convinced that the bomb that buried itself in the earth didn't bring consequences to their community.
"We did a water study because we had some people who developed cancer and died. We wanted to know if that was a possibility. But they only checked the well water. They didn't go down to where the bomb is actually located."
This week, a flag was raised at the site to remember the three lives that were lost in the crash. Adam Mattocks is one of the surviving B-52 crew members, and the only person still alive today. He was in attendance at the 50-year reunion ceremony held at the Faro Volunteer Fire Department Tuesday evening. Mattocks remembers the tense moments when the captain ordered everyone to eject.
"When he said bailout, I was pinned to the floor because of the positive Gs. I started to black out. When my sight came back, I saw the aircraft commander eject."
While the plane was gyrating out of control, he believes a change in G-forces helped him exit from the airplane through a hatch on the ceiling.
"I didn't want to open my parachute and the plane run thru it. I felt myself freefalling. So I counted to three and pulled the D-ring"
Mattocks remembers hearing multiple explosions as he slowly drifted towards the ground. After steering his parachute away from the crash site and avoiding a collision with a tree, he landed safely in a field.
"I went to forward roll and stuck right in the ground. They had just plowed the field that evening. I saw a house to my right. I saw three people looking at the crash. I gathered up my stuff and walked over. When I stepped on the porch, they looked at me. I said, its just me, I just got out of that plane... I'm not from Mars."
The family took him to Seymour Johnson Air Force Base. Mattocks considers himself lucky to be alive.
"one of the other pilots asked me what religion what I was. I said, "First Baptist, but don't worry about that, my mother's and my grandmother's prayers kept me straight out of this one."
To this day, Mattocks is the only person to ever manually escape thru the top hatch of a B-52 bomber and live. I'm Jared Brumbaugh.
|
<urn:uuid:3e939a27-7cd8-4b75-bca3-ef05b932d431>
|
CC-MAIN-2017-43
|
http://publicradioeast.org/post/fifty-years-ago-bomber-crashed-enc-carrying-two-nuclear-weapons
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824819.92/warc/CC-MAIN-20171021133807-20171021153807-00569.warc.gz
|
en
| 0.983387 | 1,401 | 2.53125 | 3 |
How plastic is changing the ecosystem of the North Pacific Gyre
You’ve probably heard of the Great Pacific Garbage Island – a floating island of solid plastic and trash, somewhere out in the North Pacific. Well, it doesn’t exist, at least not in the form that seems to have pervaded popular culture.
In the North Pacific Ocean, the northern jet stream and the opposite-moving southern trade winds create an oceanic gyre. In the centre is a large area of relatively stationary water, while the steadily turning currents surrounding it create a flow much like a whirlpool. This flow gathers floating garbage and debris, which builds up in the centre as it cannot escape the vortex once it enters it. This phenomenon, together with the world’s increasing reliance on, use, and (inappropriate) disposal of plastics, has created the so-called Great Pacific Garbage Patch.
It was predicted in 1988 in a scientific publication, and observed first-hand in 1997 by oceanographer and racing boat captain Charles J. Moore. He was returning to California from a yachting race in Hawaii, when he encountered the floating trash:
Yet as I gazed from the deck at the surface of what ought to have been a pristine ocean, I was confronted, as far as the eye could see, with the sight of plastic. It seemed unbelievable, but I never found a clear spot. In the week it took to cross the subtropical high, no matter what time of day I looked, plastic debris was floating everywhere: bottles, bottle caps, wrappers, fragments.
The disturbing image these eloquent words portrayed attracted significant attention from the media, and variants on “the Great Pacific Garbage Island” have appeared in countless newspapers and magazines. Unfortunately at some point – whether accidentally or on purpose to make the story more shocking – a picture of highly polluted Manila harbour was mislabelled as the Great Pacific Garbage Island.
NOT the Great Pacific Garbage Island, but Manila Harbour.
Since then, this highly evocative image has has become part of the myth of a solid island of garbage. Despite efforts by scientists to bring a "reality check" to the discussion, the myth persists, as can be seen by the recent publication of two graphic novels portraying the garbage patch as a floating solid island of trash.
The reality is somewhat different. While some large bits of debris can be found, most of the plastic pieces are are smaller than 1 cm cubed, and many can even be microscopic.
This is not by any means to say that the garbage patch is not a problem. Clearly, birds and fish often mistake the plastic for food, eat it, and, unable to digest it, can slowly starve to death. Yet there are creatures that are positively thriving in this new "plastisphere" environment: water skaters, small crabs, barnacles, and bryozoans. Some of these creatures are enjoying a veritable boom time - but this can lead to dramatic changes in the ecosystem of the ocean, especially when foreign creatures invade new areas previously inaccessible to them. Apart from possibly doing damage themselves (like barnacles and bryozoans do to ships hulls), these new creatures also attract their predators, which can also compete for other food sources with the locals. The plastisphere is "an ecosystem out of balance", and may pose a real threat to the long term health of the world-wide oceans.
|The actual Pacific Garbage patch. Area of this photo is approximately 5′ by 10′.|
Photo: Scripps Institution of Oceanography, 2009 SEAPLEX cruise.
|
<urn:uuid:097c3927-ecb1-490f-b84a-a1325344810c>
|
CC-MAIN-2014-23
|
http://curiouschloride.blogspot.co.nz/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894140.11/warc/CC-MAIN-20140722025814-00096-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.956414 | 743 | 3.1875 | 3 |
See also: Food Safety Videos
PLASTICS AND THE MICROWAVE
By Michelle Meadows
Stories about the dangers of chemicals leaching from plastic into microwaved food have circulated on the Internet for years. As a result, the Food and Drug Administration continues to receive inquiries from concerned consumers.
Consumers can be confident as they heat holiday meals or leftovers in the microwave that the FDA carefully reviews the substances used to make plastics designed for food use. These include microwave-safe plastic coverings that keep food from splattering and microwave-safe containers that hold frozen dinners. Even microwavable popcorn bags, which look like paper, actually contain a metalized plastic film that allows them to reach high temperatures so the corn can fully pop.
Under the food additive provisions of the Federal Food, Drug, and Cosmetic Act, new substances used to make plastics for food use are classified as "food contact substances." They must be found safe for their intended use before they can be marketed.
"It's true that substances used to make plastics can leach into food," says Edward Machuga, Ph.D., a consumer safety officer in the FDA's Center for Food Safety and Applied Nutrition. "But as part of the approval process, the FDA considers the amount of a substance expected to migrate into food and the toxicological concerns about the particular chemical." The agency has assessed migration levels of substances added to regulated plastics and has found the levels to be well within the margin of safety based on information available to the agency. The FDA will revisit its safety evaluation if new scientific information raises concerns.
One chemical called diethylhexyl adipate (DEHA) has received a lot of media attention. DEHA is a plasticizer, a substance added to some plastics to make them flexible. DEHA exposure may occur when eating certain foods wrapped in plastics, especially fatty foods such as meat and cheese. But the levels are very low. The levels of the plasticizer that might be consumed as a result of plastic film use are well below the levels showing no toxic effect in animal studies.
Other claims have asserted that plastics contain dioxins, a group of contaminants labeled as a "likely human carcinogen" by the Environmental Protection Agency. "The FDA has seen no evidence that plastic containers or films contain dioxins and knows of no reason why they would," Machuga says.
Machuga says that consumers should be sure to use any plastics for their intended purpose and in accordance with directions. If you don't find instructions for microwave use, you should use a different plate or container that you know is microwave-safe. Such containers are made to withstand high temperatures.
For example, carryout containers from restaurants and margarine tubs should not be used in the microwave, according to the American Plastics Council. Inappropriate containers may melt or warp, which can increase the likelihood of spills and burns. Also, discard containers that hold prepared microwavable meals after you use them because they are meant for one-time use.
Microwave-safe plastic wrap should be placed loosely over food so that steam can escape, and should not directly touch your food. "Some plastic wraps have labels indicating that there should be a one-inch or greater space between the plastic and the food during microwave heating," Machuga says.
Always read directions, but generally, microwave-safe plastic wraps, wax paper, cooking bags, parchment paper, and white microwave-safe paper towels are safe to use. Covering food helps protect against contamination, keeps moisture in, and allows food to cook evenly. Never use plastic storage bags, grocery bags, newspapers, or aluminum foil in the microwave.
FDA Consumer magazine, Nov-Dec 2002
|
<urn:uuid:13077ff3-d7e5-43a8-8636-8407d96a17a3>
|
CC-MAIN-2013-20
|
http://www.foodreference.com/html/art-plastic-mw.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701233842/warc/CC-MAIN-20130516104713-00083-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.942575 | 755 | 3.21875 | 3 |
The Mango fruit was introduced in the Canary Islands at the end of 18th century, originating from the Philippines. Although throughout 19th century came to the archipelago numerous Cuban and Venezuelan mangos. In a short period of time, this fruit is become in a common tree in gardens located in the coastline of the Canary Islands, where climate noticeably favors its development.
The best areas for mango cultivation in the archipelago are warm sites of coastlines in the South. Despite the tree is very rustic and it can grow in any sort of soil, due to the subtropical climate in the Canary Islands, mango (Mangifera) prefers those soils with a great depth (minimum 80 cm).
Mango blooming is presented in the Canary Islands in February or March, as a direct consequence of cold in winter. The minimum temperatures in those dates are relatively low and, therefore, there are some problems for bearing fruit.
The most important variety of mango tree for our archipelago it is the local Gomera 1.
Description of the Mango Gomera
Mango Gomera is a very robust medium sized tree, with dome shaped crown, and stiff, thick, arching leaves. Flushes of new leaves are deep red-burgundy. It is able to flower up to 3 times a year. If it is too cold or wet, it will lose the inflorescences and flower again, about 2 months later, until the right season for fruit set is matched.
Fruits are yellow with pale dots and sometimes with a hint of pink. They are produced in groups, with a small to average size (250 g average), very good flavor, aromatic, with a high content in fibers.
Genetic analysis shows thant it is very closely related (not the same) to the Cuban Mango “Filipino”, and to the Floridan Mango “Turpentine”. It is possibly the same of the Cuban “Manga Blanca”.
Scientific Literature in Spanish about Mango Gomera
“Mejora del Mango en Canarias”, Instituto Canario de Investigaciones Agrarias (ICIA)
“Gomera-1 en el programa de mejora del Mango”, Instituto Canario de Investigaciones Agrarias (ICIA)
Buy cold hardy mango trees in our Shop
In our shop, Canarius, you can purchase small trees of Gomera mangos and also a wide selection of mango trees of different varieties. All trees are grafted by hand, with specific cultivars. We ship to any countries in Europe. Try also our delicious Mango jam with or without sugar, in the honeys & jams section, produced with the mangoes of the Canary Islands.
|
<urn:uuid:8475f7fc-c8d0-4814-8fc6-b1cd0de284ce>
|
CC-MAIN-2023-40
|
https://www.canarius.com/blog/tag/cultivation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00848.warc.gz
|
en
| 0.931169 | 589 | 2.828125 | 3 |
Sustainability, Ethics and Nuclear Energy: Escaping the Dichotomy
AbstractIn this paper we suggest considering sustainability as a moral framework based on social justice, which can be used to evaluate technological choices. In order to make sustainability applicable to discussions of nuclear energy production and waste management, we focus on three key ethical questions, namely: (i) what should be sustained; (ii) why should we sustain it; and (iii) for whom should we sustain it. This leads us to conceptualize the notion of sustainability as a set of values, including safety, security, environmental benevolence, resource durability, and economic viability of the technology. The practical usefulness of sustainability as a moral framework is highlighted by demonstrating how it is applicable for understanding intergenerational dilemmas—between present and future generations, but also among different future generations—related to nuclear fuel cycles and radioactive waste management. View Full-Text
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Kermisch, C.; Taebi, B. Sustainability, Ethics and Nuclear Energy: Escaping the Dichotomy. Sustainability 2017, 9, 446.
Kermisch C, Taebi B. Sustainability, Ethics and Nuclear Energy: Escaping the Dichotomy. Sustainability. 2017; 9(3):446.Chicago/Turabian Style
Kermisch, Céline; Taebi, Behnam. 2017. "Sustainability, Ethics and Nuclear Energy: Escaping the Dichotomy." Sustainability 9, no. 3: 446.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.
|
<urn:uuid:eaea2726-6309-4e36-a5b5-be647de89422>
|
CC-MAIN-2017-34
|
http://mdpi.com/2071-1050/9/3/446
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112682.87/warc/CC-MAIN-20170822201124-20170822221124-00201.warc.gz
|
en
| 0.8619 | 404 | 2.75 | 3 |
By Gen Wright
What is meditation?
Meditation is a holistic discipline that trains the mind and the body to focus on calmness and tranquility.
It can help change your life because it can help place you in control of your stress levels which improves your ability to think calmly and rationally. Memory improvement often results from a calm approach to thinking. There are many forms of meditation. One of the most popular forms is Tratak Meditation.
Tratak that literally means, “Fixed Gazing” is a popular method of meditation that involves concentrating on one single point. This could be a small black dot, an object or a candle flame. Human beings are usually restless; it is quite difficult for the human mind to concentrate on something for a few minutes. It is because of the restlessness of the mind and lack of concentration that stressful thoughts creep in very easily.
By gazing at a particular object, it is possible to enhance calmness and tranquility. This enables a person to concentrate and release stress at the same time. It also helps in increasing the memory power and brings the mind to a state of attention, focus and awareness.
Tratak Meditation- A form of Traditional Exercise
Tratak meditation has been identified as a form of traditional exercise for the mind and the body. It helps the mind in attaining concentration, which is lacking in the modern world. Today, people are busy with too many things, their mind lacks focus, and they often fail to control situations. This increases stress and restlessness that evolves in the form of different stress symptoms.
Tratak meditation is a prehistoric technique. It is a form of yoga that helps the mind concentrate and opens up the psychic centers by awakening the divine sources of energy. In Tratak meditation, as you stare progressively at an object or a point without allowing your eyes to blink; your mind follows the focusing of your eyes and becomes calmer and your thoughts more focused. When you are staring at something steadily, you actually visualize that object even if you were to close your eyes.
Types of Tratak Meditation
Tratak Sadhana allows the brain to relax and unwind for a period. Because of the restless nature of our thoughts almost 80% of the mental energy is wasted and the central nervous system fails to maintain calm balance. However, as a person attains Tratak Sadhana, he or she gradually experiences peace of mind and a sense of calmness. In addition, all unwanted thoughts are relieved from the mind. This process also enables a person to gain more energy. There are 3 different types of Tratak Sadhana, which are basically 3 different forms of mediation- Inner Tratak Sadhana, Middle Tratak Sadhana and Outer Tratak Sadhana.
Inner Tratak Sadhana
Inner Tratak Sadhana is performed by closing the eyes and concentrating on the center of the forehead. This might cause some pain that will gradually subside as your attain the ultimate state of meditation.
Middle Tratak Sadhana
In case of Middle Tratak Sadhana, your eyes and your attention will focus on a candle light or a point of light. You will have to gaze at the beam of light and allow yourself to get deeper and deeper into the state of meditation.
Outer Tratak Sadhana
Outer Tratak Sadhana is simple and easy to perform at any time by focusing the eyes and attention on objects such as the stars or moon. People with weak eyesight might not be able to perform this meditation as required.
Choosing The Object for Tratak Meditation
The most important factor about Tratak meditation is the choice of object. This can be a simple candle or a flame of a lamp, a black dot, a single flower or some sign or object. The sign of “OM” is also a good choice for concentrating. Geometric symbols with mystical meanings specially designed for medication can also be used.
Setting Up the Space for Meditation
You must find a cool and silent corner of the house where you perform Tratak meditation to get maximum benefits. The chosen space should be clean and tidy. Do not get into very fancy meditation accessories or cushions as they can only distract your thoughts. All you will need is a comfortable place where you can meditate.
Choosing Chair or Floor for Meditation
The choice of a chair or sitting on the floor is entirely yours. You must choose the position that seems comfortable to you depending on the strength of your back. As you are trying to relieve stress and anxiety, you must be relaxed and comfortable when you are meditating.
Tratak for Stress
Tratak meditation helps you concentrate on certain things and your mind tends to release your tensions. Your concentration becomes stronger and stronger at all levels. As you reach the ultimate level of Tratak meditation, your mind will be free from all types of bindings and stressors that have been disturbing you.
Memory Improvement and Meditation
There are many claims that meditation helps you to improve your memory and mental alertness. This is an important benefit that we all need and when it is used in conjunction with a brain fitness program the effectiveness of your meditation program can not only be tested, but also enhanced. If you would like a free trial of testing your brain fitness against your peers based on age, gender and education read the resources box.
|
<urn:uuid:1f303dc3-dda4-41b4-ac56-fdfc0548ba49>
|
CC-MAIN-2017-34
|
https://going2natural.com/go2yogis/yoga-blogs/benefits-of-meditation-to-memory-improvement/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105700.94/warc/CC-MAIN-20170819162833-20170819182833-00181.warc.gz
|
en
| 0.945934 | 1,117 | 2.609375 | 3 |
Magnesium is an essential mineral that the human body needs in order to remain in good health. It helps our body produce nucleic acids that are involved in insulin release, muscle contraction, calcium and potassium transportation, cellular energy production, and more.
Recently, studies have shown that 68 percent of Americans have very low levels of Magnesium. The result of such a Magnesium deficiency is shown through hypertension, cardiovascular disease, type II diabetes, depression and anxiety.
We know that anxiety disorders are among the most common affective disorders that can be seen in any population. Anxiety affects men, women, children, and the elderly. When unmanaged, anxiety can and will affect job or school performance, and our relationships with others and ourselves.
The most typical way to battle anxiety is with benzodiazepines. Xanax, Klonopin, Valium and Ativan are the most popular medications prescribed to those afflicted with anxiety disorders.
Although these medications are effective in treating a range of anxiety disorders, they come with serious side-effects: addiction and abuse, memory impairment, dizziness, drowsiness, depression, hostility and emotional inhibition, the list goes on.
There are often cases of people suffering through their anxiety because they are afraid of these side-effects. What’s more, these medications are not always available to everyone. If you are someone that does not have access to affordable healthcare, these medications will be unavailable, unaffordable, and out of the question.
Over the years, people have been more and more inclined to seek alternative methods for treating their anxiety. Changing diet, exercising, meditation, and knowing which vitamins and supplements to add to your daily routine are a few ways people have found drug-free ways to manage anxiety. More recently, studies have been looking further into the implementation of magnesium to treat anxiety.
WHAT MAGNESIUM CAN DO
Because Magnesium is important to our psychoneuroendocrine systems, it is key to maintain healthy Magnesium levels. Some of the systems affected are our limbic, which helps to regulate our fear, pleasure and anger – hypothalamus, which regulates our sleep and emotional activity – pituitary, or the “master gland” because it controls our other hormone glands - and adrenocortical, which regulates hormones that help us respond to stress.
REGULATING MAGNESIUM LEVELS
There are many ways to get Magnesium back into our bodies. We can eat food with higher levels of magnesium, prepare Magnesium drinks or take capsules of Magnesium supplements. To reach proper magnesium levels, one should consume at least 400mg of potassium per day.
Pineapple, bananas, cherries and oranges are among the fruits with the highest levels of Magnesium. Each of them possesses over 13mg of Magnesium, per serving!
Beets, broccoli, corn and peas each have over 25mg of magnesium, per serving.
NUTS & SEEDS
Almonds, sesame seeds and sunflower seeds each have over 100mg per serving (1/4 cup). Search for or make your own Magnesium granola to get your levels up, fast.
If you are taking Calcium or vitamin D supplements, be sure to look for a magnesium supplement that is at least 250mg higher than your daily intake of Calcium or vitamin D. Both Calcium and vitamin D absorb Magnesium and while they are beneficial when taken together, they compete for absorption.
You can find many supplements that contain both Magnesium and vitamin D or Calcium so that the work is done for you.
Here are a few - more specific - Magnesium supplements depending on what you are looking for.
Magnesium L-Threonate – For cognitive function.
Magnesium Taurate – For calmness and heart health.
Magnesium Glycinate – For relaxation.
Magnesium Aspartate – For energy production and fighting fatigue.
If you are unsure about your magnesium or other mineral levels, it is always a good idea to consult a doctor first, if one is available to you. Ask for a blood panel and create a routine that works specifically for you.
|
<urn:uuid:fe80aa01-2daf-44aa-ad8f-46c2686304d4>
|
CC-MAIN-2020-16
|
https://www.holisticpublication.com/single-post/2018/12/23/MAGNESIUM-FOR-ANXIETY
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00345.warc.gz
|
en
| 0.909474 | 848 | 2.53125 | 3 |
Advantages of purebred dogs
Purebred dogs have many predictable physical traits.
Purebred dogs were developed by "selective breeding", which means dogs WITH specific traits (carried on genes inside the dog's body) were bred, whereas dogs with DIFFERENT traits (and thus differing genes) were not bred (i.e. their traits and genes were removed from the gene pool). The result is that every breed ends up with a specific set of genes that distinguishes it from every other breed. These genes include physical traits such as size, coat, and color.
So when you see a purebred puppy, you have a pretty good idea what genes he had to have inherited and therefore what he should grow up to look like. If you want a certain size dog, or a certain coat or color, you can choose a breed that has genes for those traits.
Purebred dogs have some predictable temperament/behavior traits.
SOME aspects of temperament and behavior are also carried on genes. If you want an energetic dog, you can choose a breed who inherits genes for high energy. If you want a dog for herding your cattle, or guarding your sheep, or hunting pheasants or rabbits, or pulling a sled, or doing police work, you can pretty much count on certain purebreds inheriting genes for those kinds of behaviors.
Proper raising and training can modify certain behaviors, but if a behavior is "hardwired" into your breed's genes, it's harder to change. Don't expect to easily "mold" a purebred dog into anything you want him to be. To minimize power struggles and stress, you should look for a breed with a temperament that already sounds very close to what you want.
Disadvantages of purebred dogs
Predictable traits means you're stuck with them.
Too many people acquire a purebred dog, and then complain about its built-in characteristics. Sorry, but if you choose, say, a Labrador Retriever, you need to accept that he WILL shed a godly amount, he WILL have a large powerful body that can knock over small children if he gets excited, and his enthusiastic tail WILL occasionally send breakables flying off your coffee table.
Physical traits are carried on genes. Specific genes come with each breed. You have to research a breed's genes before you buy.
Some purebred behaviors can be difficult to live with.
I'm talking here about working behaviors.
Most breeds were developed to do some kind of WORK – herding sheep or cattle, hunting pheasants or quail, retrieving ducks from the water, hunting rabbits or coons or wolves, killing rodents in the barn, protecting livestock, guarding estates and monasteries, pulling carts and sleds, police and military work, and more.
Certain behavioral traits that helped a breed do its work were "hardwired" into each breed's genes by selective breeding.
Common working behaviors in purebred dogs include:
If you just want a family companion (a pet), working behaviors can be a real nuisance. The reality is that most breeds were never intended to be "just" pets.
Purebred dogs are not GUARANTEED to develop the traits you want.
Up to now it may have sounded like purebred dogs were robots who all look and act exactly the same. If that were the case, you could just decide which traits you want and choose a breed that's supposed to have those traits, and voila! As easy as ordering a pair of drapes from the Sears catalog.
So here comes the other shoe dropping....
A purebred puppy can grow up to be different than what you expected.
It's true. All this purebred "predictability" that I've been talking about is TYPICAL – but not GUARANTEED. The reality is that some purebred dogs do not "conform to the norm" for their breed.
Purebred dogs can have a lot of health problems.
You're probably shocked
by that long list of health problems.
And you should be.
Over 300 genetic health problems occur in dogs – all kinds of dogs, purebred, crossbred, and mixed – but the risk of these health problems occurring in a purebred dog is higher than in a crossbreed or mixed breed.
To sum up, a purebred dog can be a good choice...
|
<urn:uuid:6effb989-dbad-4864-8ca4-6cb28eecd1b3>
|
CC-MAIN-2013-48
|
http://www.brownsbigbabies.net/alaskanmalamuteinfo.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164000905/warc/CC-MAIN-20131204133320-00057-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.952475 | 908 | 2.734375 | 3 |
In recent news several possible factors have been pointed to as causes of autism: maternal obesity, smoking during pregnancy, lead, PCBs, paternal age, and maternal age. Despite the rush to find a definite cause for autism spectrum disorders, the answers seem numerous and it becomes difficult to evaluate what studies are worth paying attention to and which are just bad science. Parents looking at the headlines may feel fingers are being pointed at them while expectant mothers may worry everything they do will cause autism in the future.The list also includes auto exhaust, pesticides, plastics, and gut bugs. (Also see a list by Emily Willingham.)
Now add a couple of other risk factors: maternal experience with childhood abuse and the age at which grandfathers had their children.
The problem here is not necessarily the quality of the research, but the risk of media overload. Under the barrage of potential causes of autism, people may end up believing everything or believing nothing.
If people obsess about remote, hypothetical risks, they may overlook real and avoidable risks. Alternatively, after a point, they may just tune out the entire subject.
|
<urn:uuid:3597696a-baaa-4c4b-b7d5-6f37f0acfd00>
|
CC-MAIN-2023-40
|
http://www.autismpolicyblog.com/2013/03/autism-causes-correlates-and-confusion.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00787.warc.gz
|
en
| 0.961819 | 224 | 2.640625 | 3 |
In a small lab at Brown University in Providence, RI, a rhesus macaque sits in a chair facing a computer screen, gripping the handle of a device that looks a lot like a sailboat’s tiller. For the moment, the monkey uses this device as if it were a computer joystick to control a simple video game: a colored dot appears on the screen, and the animal moves the cursor to meet it. Once the animal gets good at the task, though, the researchers in the adjoining room will flip a switch and it will be signals straight from the monkey’s brain, not the joystick’s movements, that drive the cursor.
This eerie feat is possible because the researchers, led by Brown neuroscientist John Donoghue, have implanted a tiny array of electrodes in the monkey’s brain. The electrodes intercept signals from individual neurons in the brain, and a specially developed computer algorithm translates these signals into trajectories and velocities for the computer cursor. The researchers’ ambitions, however, extend way beyond video-game-playing monkeys. Their hope is that their brain-machine interface system will give patients paralyzed by spinal-cord injuries or neurodegenerative diseases new abilities to interact with the world around them-using nothing more than the power of their thoughts.
Donoghue and his team launched Cyberkinetics in June 2001 to pursue that vision. The company is one of the first to arise from research into brain-machine interfaces, which has so far been relegated mainly to a handful of academic labs around the world (see “Brain-Machine Interfaces,” TR January/February 2001). And while much development remains to be done, a system like Cyberkinetics’ that taps directly into the brain could theoretically give paralyzed patients the means to control computers, robotic aids-and perhaps even their own muscles. Cyberkinetics aims to begin testing that theory in humans by the end of this year.
In the monkey studies that will pave the way for the human tests, the company-which includes cofounders Nicholas Hatsopoulos of the University of Chicago, Brown MD/PhD student Mijail Serruya and Gerhard Friehs, a neurosurgeon at Providence’s Rhode Island Hospital-is focusing on the area of the brain that issues commands to the monkey’s arm. Friehs starts by implanting a four-millimeter-square array of 100 electrodes in this region, which is located in the brain’s outermost layer, about halfway between the ear and the top of the skull. After the surgery, a small bundle of wires snakes from the array through a hole in the animal’s skull; those wires are plugged into a computer, feeding the electrical signals generated by neurons firing near each electrode into the machine.
Hatsopoulos sits at that computer as the plugged-in monkey practices a video game in the next room. The brain activity picked up by the array flashes across the screen as a jumble of hyperkinetic EKG-like graphs; rendered audible by the computer’s speakers, brain signals snap, crackle and pop like Rice Krispies in milk. Hatsopoulos turns up the volume. “I never get tired of listening to that,” he says. “This is really like reading the mind, eavesdropping on cells in the brain as the monkey’s thinking of something.” Pattern recognition software fishes the signal “spikes”-each representing a single firing of a single neuron-from the brain’s background noise and correlates them with the position of the monkey’s arm. “The amazing thing,” says Donoghue, “is that very quickly you can get a sense of the neurons’ activity and extract the hand’s trajectory.” Indeed, using only three minutes or so of data from the video game exercise, the computer can build a model capable of extrapolating the monkey’s arm movements from the brain signal alone. Once the model is fine-tuned, the computer can use the brain signal to drive either a cursor or a robotic arm in real time.
Such promising results are part of what inspired the researchers to launch Cyberkinetics and push toward clinical trials. “We already know so much; now let’s put it to use,” says Serruya. The participants in Cyberkinetics’ first human tests will be “locked-in” patients who, due to injury, stroke or neurological disease, are completely paralyzed, unable even to communicate except via subtle movements of their eyes. In those initial trials, the company will implant the electrode array, manufactured by Salt Lake City, UT-based Bionic Technologies, but the signal-processing hardware and power supply will remain outside of the body. If those first human tests bear out the promise of the monkey experiments, the company plans to further develop the technology to create an entirely implantable device.
To date, only one company has conducted human tests of a brain-recording implant with the aim of helping restore function in paralyzed patients: Atlanta, GA-based Neural Signals. Instead of an electrode array, the company implants two “neurotrophic electrodes”-glass tubes containing tiny wires and a substance that encourages brain cells to grow into the devices. Neurologist and Neural Signals founder Philip Kennedy says the studies, begun in 1997, are going more slowly than he had originally hoped, but that the company should have some clear results by the end of the year. Cyberkinetics researchers believe, however, that implanting 100 electrodes instead of just two will make their system more robust and will allow it to gather more information from the brain.
While recent work in brain-machine interfaces is encouraging, some significant hurdles remain, says William Heetderks, head of the National Institutes of Health’s Neural Prosthesis Program, which helps fund brain-machine interface research. Perhaps the biggest challenge, Heetderks says, is building an interface between the recording device (a rigid piece of hardware) and the brain (a squishy mass floating in cerebrospinal fluid) that will maintain its precise position for decades, despite small movements of the brain. While both Kennedy’s and Donoghue’s devices represent progress on that front-Kennedy’s by encouraging cells to grow into the device and stabilize the connection, Donoghue’s by gripping the brain much as golf cleats grip wet earth-Heetderks thinks that some combination of approaches might ultimately be necessary. At this point, Heetderks says, human studies “may be still a little bit premature. But obviously that’s just one opinion.”
Greg Licholai, director of ventures and business development for the neurological division of Minneapolis, MN-based Medtronic, offers a different view. “This is truly a breakthrough in approaching neurological disorders,” Licholai says of Donoghue’s efforts. “I don’t think there’s going to be a problem recruiting patients, and the system has been well proven in an animal model. The only potential holdup is how long it takes them to draw up the documents and get FDA approval of those early-stage trials.”
Cyberkinetics’ business manager and only employee, Brown undergraduate Mikhail Shapiro, is helping the company look for the management team and funding it will need to get that paperwork in order and the human tests under way. Shapiro and the company’s founders all realize they will face both business and technological challenges, but they are also convinced that, as Hatsopoulos puts it, “This is real. This is really going to help people.”
Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.Subscribe today
|
<urn:uuid:a385ec99-e555-4aa6-8de0-bf4855704c05>
|
CC-MAIN-2017-26
|
https://www.technologyreview.com/s/401396/brain-power/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00360.warc.gz
|
en
| 0.933757 | 1,623 | 3.34375 | 3 |
Prostate cancer is a major killer
Scientists have found a potential new way to assess whether prostate cancer is aggressive.
They have found tiny bubbles of fat in the urine may hold the key information needed to decide what type of treatment the patient needs.
If prostate cancer is aggressive it requires urgent treatment, but this is not appropriate for patients with slow-growing forms of the disease.
The study appears in Cancer Research UK's British Journal of Cancer.
Prostate cancer is the most common cancer in men in the UK.
Each year around 34,000 men are diagnosed with the disease, and around 10,000 die from it.
But while the disease can be a killer, in its more benign form it often requires nothing other than close monitoring and the patient often eventually dies from another, unrelated condition.
Until now, researchers have used levels of proteins, like prostate specific antigen (PSA), produced by cancer cells to try to spot the aggressive tumours.
But this can throw up inaccurate results, and lead to people unnecessarily undergoing treatment which can have long-term side effects, such as incontinence and impotence.
Direct from tumour
The latest work focused on fatty capsules called exosomes that are flushed out of the body in the urine.
Scientists found that in patients with prostate cancer exosomes contain molecules that come directly from the tumour itself.
These molecules, which contain a type of genetic material called RNA, can be used to figure out which genes are turned on and off in the cancer - and thus whether it is aggressive or not.
The researchers, led by Dr Jonas Nilsson, from the VU University Medical Centre in Amsterdam, hope the discovery will enable them eventually to develop a more effective test for aggressive tumours.
John Neate, of the Prostate Cancer Charity, said the study was a step towards finding a reliable way to identify aggressive forms of the disease.
But he warned it was a small study, and scientists would need to examine exosomes from a larger number of men before they could assess the reliability of the technique.
He also said the need to massage the prostate to increase the likelihood that the relevant molecules were released into the urine might reduce its acceptability as a mass screening tool.
Mr Neate added: "Nevertheless, this approach holds promise as a non-invasive test of malignancy that could help men and their doctors in the future.
"Possibly the most significant research question in prostate cancer is how to distinguish early, and with confidence, the potentially life-threatening prostate tumours from the slow growing form of the disease.
"Then treatments could be refined and concentrated on the aggressive cancers where the benefits of treatment far outweigh the risk of side-effects, which can seriously affect a man's quality of life."
|
<urn:uuid:bf73dccb-aab5-4fb3-a30d-84b4b592b0cf>
|
CC-MAIN-2014-10
|
http://news.bbc.co.uk/2/hi/health/8045345.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999678747/warc/CC-MAIN-20140305060758-00039-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.960389 | 573 | 2.90625 | 3 |
Gender equality in Nicaragua
Food insecurity and self-rated well being in rural Nicaraguan women of reproductive age: a cross-sectional examine
In the nationwide anthem of the Dominican Republic the author makes use of the poetic time period Quisqueyans as a substitute of Dominicans. The word « Quisqueya » is a by-product from a local tongue of the Taino Indians which implies, « Mother of the Lands. » It is often used in songs as one other mail order brides nicaragua name for the country. Dominican was historically the name for the inhabitants of the Captaincy General of Santo Domingo, the positioning of the first European settlement in the Western Hemisphere. The country has also been extremely influenced by African tradition, and Native Taino being a big minority.
This coverage encouraged the League of United Latin American Citizens in its quest to minimize discrimination by asserting their whiteness. In 1997, OMB issued a Federal Register discover regarding revisions to the standards for the classification of federal data on race and ethnicity. Prior to this decision, the Census and different authorities data collections requested folks to report just one race.
DepartmentRivas, NicaraguaLargest settlementAltagracia (pop. four,081)DemographicsPopulation29,684 (June 2005)Pop. density107.6/km2 (278.7/sq mi)Ometepe is an island formed by two volcanoes rising out of Lake Nicaragua within the Republic of Nicaragua. Its name derives from the Nahuatl words ome (two) and tepetl (mountain), that means « two mountains ». During the late Nineteen Sixties Dominican musicians like Johnny Pacheco, creator of the Fania All Stars, played a major position in the development and popularization of the genre.
The Spanish Inquisition led to many pressured conversions of Spanish Jews. In Spanish, the time period « hispano » as in « hispanoamericano », refers back to the people of Spanish origin who reside in the Americas; it additionally refers to a relationship to Hispania or to the Spanish language.
Gender Data Portal
Of the households, fifty three% were categorized as non-poor, 41% as poor, and 6% as extraordinarily poor. Six per cent of the population did not have a bathroom or a latrine, and solely sixteen% in the rural area had indoor running water.
In city areas, women had 2.6 kids on average while rural women had 4.4 children on average. The Committee on the Elimination of Discrimination towards Women held parallel meetings right now to think about the stories of Nicaragua and India.
How information on race and ethnicity are used
In front of the International Court of Justice, Nicaragua claimed that the contras have been altogether a creation of the U.S. However, the proof of a really shut relationship between the contras and the United States was considered overwhelming and incontrovertible. The U.S. played a really giant position in financing, coaching, arming, and advising the contras over an extended period, and the contras only grew to become capable of carrying out significant army operations as a result of this help. Although the FDN had its roots in two groups made up of former National Guardsmen (of the Somoza regime), its joint political directorate was led by businessman and former anti-Somoza activist Adolfo Calero Portocarrero.
Not till the Fifties were restrictions placed upon church buildings by Trujillo. Letters of protest were despatched against the mass arrests of government adversaries. Trujillo started a marketing campaign against the church and planned to arrest clergymen and bishops who preached against the federal government.
FeatureBeliefs about HIV in Low-Income Nicaraguan Women
I was dissatisfied that Ortega went on to be his celebration’s candidate whereas this matter was left unresolved. Had I been a Nicaraguan voter, I don’t assume I would have been able to voting for him. MADRE’s work with the ladies of Nicaragua became the model for our partnerships with sister organizations around the world, community-based mostly women’s organizations that share our dedication to social justice and progressive politics. The women who come collectively via these organizations are those for whom probably the most horrifying newspaper headlines are a day by day lived reality. They are survivors of war, political repression, genocide, economic and sexual exploitation and the dual burdens of natural catastrophe and disastrous policies.
This issue, along with the weather and light-weight altitudinal variations, permits the nation to harbor 248 species of amphibians and reptiles, 183 species of mammals, 705 bird species, 640 fish species, and about 5,796 species of plants. In addition to its beach and resort communities, the Pacific lowlands incorporates most of Nicaragua’s Spanish colonial architecture and artifacts. Cities such as León and Granada abound in colonial structure; based in 1524, Granada is the oldest colonial metropolis in the Americas. Before the overall elections on November 5, 2006, the National Assembly handed a bill additional limiting abortion in Nicaragua. As a end result, Nicaragua is one of five countries in the world the place abortion is unlawful with no exceptions.
Noting that Nicaragua’s maternal mortality rate was among the many highest within the area, she puzzled what the Government was doing to ensure rural pregnant women had access to well being companies. MERIEM BELMIHOUB-ZERDANI, skilled from Algeria, mentioned that, though Nicaragua had ratified seven articles of the Convention, it lacked the political will to implement them. Draft legal guidelines pending for a number of years should in reality be handed, including the regulation on parliamentary elections and the Family Code. She called for total implementation of article 7 in record time using article 4 on momentary measures.
Another instance are the MILPAS (Milicias Populares Anti-Sandinistas), peasant militias led by disillusioned Sandinista veterans from the northern mountains. Founded by Pedro Joaquín González (often known as « Dimas »), the Milpistas have been also called chilotes (inexperienced corn).
|
<urn:uuid:05860208-d3f4-4f80-b8f1-45fb64794fb6>
|
CC-MAIN-2020-29
|
https://blackwolf-securite.fr/gender-equality-in-nicaragua/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00456.warc.gz
|
en
| 0.956439 | 1,277 | 2.5625 | 3 |
Cyclopentenyl Cytosine (CPEC): An Overview of its in vitro and in vivo Activity
The experimental cytotoxic drug cyclopentenyl cytosine (CPEC) is an analogue of cytidine. Besides its antiviral effect, its potential use in the treatment of cancer has become an important area of research. CPEC is activated by intracellular phosphorylation ultimately forming its metabolite CPEC-TP. CPEC-TP is a non competitive inhibitor of cytidine-5-triphosphate synthetase (CTPsynthetase), an important enzyme in the formation of CTP. Studies have shown that cancer cells have a high CTP synthetase activity, thus making them interesting targets for chemotherapy. CPEC has been preclinically studied in different malignancy models. In vitro results on leukemia show activity in the nanomolar range on several cell lines. However in vivo results are conflicting and the findings vary from increase in life span over 100% to only limited effectiveness. Interesting results have been obtained in colorectal and neuroblastoma cells. In several neuroblastoma cell lines incubation with CPEC in combination with cytarabine or gemcitabine has resulted in increased cell death compared to incubation with with only one of the agents. CPEC has been studied in a phase I trial in patients with solid tumors. In five of 26 patients unexplained cardiotoxicity (extreme hypotension) occurred. The cardiotoxic effects could not be reproduced in animal models. However, precautions should be taken when using this drug in future clinical trials. Low dosage of CPEC seems necessary and intensive cardiac monitoring is advisable. In this manuscript, it is demonstrated that CPEC has an anti-cancer effect in several tumor models: CPEC might be a potentially useful drug in anticancer treatment.
Keywords: Cyclopentenyl cytosine, CPEC, cancer, leukemia, cardiotoxicity
Rights & PermissionsPrintExport
|
<urn:uuid:4ffe46fb-1ecb-46e6-8a67-7737fabc0262>
|
CC-MAIN-2017-34
|
http://www.eurekaselect.com/59547
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104704.64/warc/CC-MAIN-20170818160227-20170818180227-00405.warc.gz
|
en
| 0.935608 | 410 | 2.5625 | 3 |
PREGNANT women have been advised against taking Vitamin B3 just yet.
Claims the vitamin found in meats, green leafy vegetables and even Vegemite could prevent millions of miscarriages and birth defects has been called into question by obstetricians and other experts.
The Royal Australian and New Zealand College of Obstetricians and Gynaecologists says the “extraordinary” suggestions by researchers at the Victor Chang Institute were based on a small mouse study and have the potential to do more harm than good.
“There are literally millions of women affected by these problems and we would just hate for women to suddenly pin their hopes on something that’s essentially a tiny little mouse study,” RANZCOG President Professor Steve Robson told AAP on Friday.
An Australian study, led by Professor Sally Dunwoodie, discovered a new cause of miscarriage and complex birth defects and also found a potential way to prevent them occurring by using dietary supplement Vitamin B3.
Using advanced whole exome sequencing technology, the researchers found a deficiency in a vital molecule, known as NAD, prevents a baby’s organs developing correctly in the womb.
This deficiency was cured and miscarriages and birth defects prevented when naiacin or Vitamin B3 supplements were given to genetically-engineered mice. “This has the potential to significantly reduce the number of miscarriages and birth defects around the world,” Prof Dunwoodie said.
Victor Chang Institute Professor Robert Graham hailed the finding as “one of our country’s greatest”.
Professor Claire Roberts at the Robinson Research Institute and Adelaide Medical School at University of Adelaide says the authors have identified a genetic cause of a “rare” group of malformations at birth called VACTERL. It’s estimated about 1/20,000 babies are affected by these defects. Professor Roberts says just because niacin prevented these malformations in mice does not mean it will translate to humans.
“The Australian population is not considered to be deficient in niacin. Most breakfast cereals have niacin added to them, it is also present in meat and whole grain cereals,” Prof Roberts said.
Professor Robson from RANZCOG did not question the science but says the conclusions draw a “very long bow”.
“We urge extreme caution in applying these results to anybody’s personal situation at the moment,” said Prof Robson.
In a statement on Friday, the Victor Chang Institute stood by the “strong evidence” Vitamin B3 has the potential to prevent these birth outcomes. However it did acknowledge further evidence was needed.
“The Victor Chang Institute would never suggest this discovery will explain all causes of miscarriage and birth defects,” the statement read. “It is not known how many cases of miscarriage and birth defects are caused by low levels of NAD. It is also not yet known what dose of vitamin B3 will prevent miscarriage and birth defects.” Plans are now underway at the institute for controlled clinical trials testing the required levels of NAD and vitamin B3 in a large group of women. In the meantime, pregnant women are advised to eat a healthy diet and take folic acid.
Originally published as Vegemite vitamin claims ‘extraordinary’
|
<urn:uuid:4e05d6a1-bd9b-458e-a353-86243bc1f94f>
|
CC-MAIN-2017-47
|
https://www.perthnow.com.au/lifestyle/parenting/claims-made-about-vitamin-b3-preventing-miscarriages-and-birth-defects-are-extraordinary-ng-e0d6e5798ff5c0ef8d14f0adcd662b4e
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805578.23/warc/CC-MAIN-20171119115102-20171119135102-00677.warc.gz
|
en
| 0.958276 | 690 | 2.609375 | 3 |
This is a great sub lesson as it uses very simple materials yet keeps the students engaged. I found a template online HERE for matryoshka dolls. I enlarged it onto 11x17" paper. I did this lesson with a mixed grade class from 4 - 6. I showed them a slideshow of different types of matryoshka dolls and we discussed the characteristics and the history of them.
Students started by sketching out the faces, then cut them out and glued them onto the body so they'd know where to draw the rest of the shawl, etc.
They outlined the details in ultra-fine Sharpie, then coloured them using coloured
pencils and/or markers.
Once glued onto the body they designed the rest of the clothing.
Then they were cut out.
Because these were on thin photocopy paper (you could copy onto cardstock which I'll do in the future) I laminated them all. This lesson definitely took some time to finish due to all the beautiful detail and colouring involved. I loved how they turned out!
|
<urn:uuid:4b1e1208-5aae-49f6-9cbe-a16d25c84669>
|
CC-MAIN-2020-16
|
https://afaithfulattempt.blogspot.com/2017/04/russian-matryoshka-dolls.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371806302.78/warc/CC-MAIN-20200407214925-20200408005425-00278.warc.gz
|
en
| 0.968556 | 220 | 2.71875 | 3 |
Ideal for use with children birth to five, this practical, reader-friendly guidebook is the first to combine ABA with natural environment intervention, the widely used, research-supported approach to meeting the needs of children with disabilities. To get you started with ABA, the book gives you 25 sample teaching plans that strengthen communication, social interaction, positive behavior, independent play and daily living skills, cognitive skills, and participation in everyday routines. Vivid, realistic case studies of diverse children walk you through the ABA process from start to finish. And with the blank forms and data sheets, you’ll easily assess children’s skills and participation and monitor their progress toward goals.
Audience: Parent, Professional
|
<urn:uuid:3ecd5bfb-b2f7-4345-8459-a88b17045ff6>
|
CC-MAIN-2023-23
|
https://nhfv.org/library/bringing-aba-home-school-play-young-children-autism-spectrum-disorders-disabilities/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00199.warc.gz
|
en
| 0.919773 | 149 | 3.015625 | 3 |
Considering transgender health outcomes
Detransitioners’ marginalized experiences with gender-affirming care impart nuanced insight into the psychological and physical effects of transitioning.
Many universities actively strive to become more inclusive by providing student members of the trans community with wellness resources and opportunities for greater representation on campus. Within that same community, however, there are voices that haven’t been mainstreamed like those of their trans counterparts.
Jungian analyst and psychotherapist Lisa Marchiano says detransitioners “may feel out of step or unseen in an environment that is very-trans-affirming. […] They are sometimes treated as if they, as a group, are anti-trans, which just isn’t true.”
Marchiano has experience working with young women who have detransitioned. According to The SAGE Encyclopedia of Trans Studies, “to detransition is to reverse a prior transition from one gender or sex to another, typically returning to one’s [natal sex].”
In 2021, the Journal of Analytical Psychology published research from Marchiano on an 18-year-old woman, referred to as Maya, who took testosterone (a male sex hormone) for two years before she was hospitalized for suicidal depression. Maya eventually quit her medication, stopped identifying as trans, and six months later, began psychodynamic talk therapy with Marchiano.
“For most of the women I have seen,” Marchiano says, “they detransitioned after realizing that transition was not helping them.”
Suffering from ADHD, lack of positive parental attention, low self-esteem, disordered eating, and the “disarticulated grief” of losing her aunt, Maya tried to escape the trauma of her reality by adopting a new body and joining a diversity-defending movement—that serves the mental wellbeing of many people—for a sense of community belonging. In other words, the complex combination of psychosocial problems that initially led Maya to a period of trans identification in impressionable teenagerhood was never addressed.
“I do think some of [my clients] felt deeply betrayed by the doctors and therapists from whom they sought care [when they decided to medically transition],” Marchiano says. “In some cases, they were rushed or affirmed without any real therapy or exploration, and there is anger about that.”
Affirmation, in the words of psychologist Diane Ehrensaft, is “a method of therapeutic care that includes allowing [people] to speak for themselves about their self-experienced gender identity and expressions and providing support for them to evolve into their authentic gender selves, no matter at what age.”
Some might question the validity of this approach, as gender identity and personality develop over many years of adolescence and early adulthood, whereas sexual preference can emerge much earlier and become confused with gender identity.
While the process of detransitioning is an understudied field, a 2020 survey found that majority of its 100 participants detransitioned after realizing they weren’t adequately evaluated prior to receiving medical interventions. The second highest reason to detransition comes from concern about potential after-effects of those interventions.
Researchers from the Center of Expertise on Gender Dysphoria at the VU University Medical Center in Amsterdam, the Netherlands, discovered that transgender people who start cross-sex hormone (CSH) therapy after the age of 16 may be prone to osteopenia, or weak bones from asymptomatic bone loss.
A team of Dutch medical specialists and professors observed 34 transgender people over the course of 14 years. They started sex reassignment during puberty, first with gonadotrophin-releasing hormone agonists (GnRHa), then CSH, and lastly a combination of the two. GnRHa suppresses natal sex hormone levels, while CSH stimulates opposite secondary sexual characteristics.
For instance, female to male transitioners, like Maya once was, take testosterone and, as a result, develop facial and increased body hair, a deepened voice, an enlarged clitoris, and may lose their scalp hair.
To learn about the long-term effects of these injections specifically on bone health, the researchers measured their subjects’ bone mineral density (BMD) from 1998 to 2012. Data findings became available when the subjects turned 22. The pre-treatment BMD scores of individuals from both the transmen and transwomen’s groups decreased to a point where the World Health Organization would classify them as “osteopenic.”
The laying down of new bone is important for normal growth in adolescence. Osteopenia from CSH often progresses to osteoporosis. Osteoporosis is a skeletal disorder that puts people at higher risk of “sudden and unexpected” bone fractures.
Studies have also linked hormone use to cardiovascular disease, breast cancer, and debilitating acne.
“Detransitioners can feel very uncomfortable and self-conscious about their altered bodies,” Marchiano says. “They may ruminate about the changes […] and may have lost the friends and community they had when they were trans identified.”
“I hope that universities will offer services and support to this small but very vulnerable population of young people so that they can feel welcomed on campuses,” she concludes.
Sports & Health Editor (Volume 49)| [email protected] — Alisa is a third-year student completing a major in Professional Writing and Communication with a double minor in Political Science and Cinema Studies. She served as Editor-in-Chief of Mindwaves Volume 15 and Compass Volume 9 and was a recipient of the Harold Sonny Ladoo Book Prize for Creative Writing at UTM. Her personal essay, “In Pieces,” appears in the summer 2020 issue of The Puritan. In 2022, she published her first poetry chapbook, Post-Funeral Dance, with Anstruther Press and wrote for The Newcomer as a journalist. When Alisa isn’t writing, she’s probably reading historical nonfiction, ugly-crying over a sad K-drama, or dreaming of places far, far away.
You are brave for writing this. The dynamics around this in academia, media and the health professions is outright activist-captured and cultish with persons receiving social punishment and abuse for telling the truth about the horrible downsides of what is happening with the explosion in trans-identification. If anyone here wants to absorb what a disaster the pediatric transition movement and the gender craze is for the gay and lesbian community, it is articulated on a medical and cultural LGB watchdog site called Gender Health Query. I won’t spam the comments with a link. Just FYI. It isn’t pretty, and not a surprise given all prior research indicates proto gay and lesbian kids may have clinical GD in childhood but outgrow it. A large percentage of detransitioned young people are lesbian and bisexual women. A few very damaged young gay men have spoken out recently, not surprising given young damaged gay men are a reason the age of consent was raised in Thailand. What’s happening in the US is at way younger ages than anything in that country. I believe everyone knows this deep down, transing minors is gay eugenics (LGBT orgs, psychologists, doctors). They are just willing to sacrifice these youths for a “good cause” (it’s not, the medical damage to minors is significant and the suicide prevention argument doesn’t hold up to scrutiny). There are many more heterosexual minors doing this and at risk as well. So I don’t want to discount.
Thoughtful writing, and I love the illustration. Gender is complicated and sometimes fluid. I think it’s good to consider many options for those with gender concerns.
|
<urn:uuid:4f2205b6-e204-4a9b-8b93-43d0c4bf4633>
|
CC-MAIN-2023-23
|
https://themedium.ca/considering-transgender-health-outcomes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00286.warc.gz
|
en
| 0.952765 | 1,628 | 2.578125 | 3 |
We present a “Frankenstein” essay, the main character of which is a modern Prometheus, by definition of Shelley, and the young Swiss scientist Victor Frankenstein, who by nature is endowed with a bright talent and an unquenchable thirst for knowledge. Frankenstein creates an artificial organism similar to man, but his scientific victory does not bring him joy. The powerful giant created by him enters the world with the hope of serving people, making friends with them, but not finding a place among them, becomes an enemy of humanity and brings his first blows upon his creator.
If at first the novel “Frankenstein; or The Modern Prometheus” was perceived as entertaining reading, then over time the image gained a symbolic meaning. Already at the end of 1820, when parliamentary debates in England were about slavery in the West Indies, one of the statesmen compared the desperate slaves with the creation of the monster in Frankenstein, who destroyed his creator. A monster was a slave to his creator. So, we can conclude that the monster didn’t have free will. To consider this issue more closely, check out the following “Frankenstein” essay.
Do you think that the monster has free will? Provide textual examples in support of your claim.
Mary Shelley in her novel Frankenstein describes the character of the monster attempting to regard the moral questions and issues. The author of the story introduces the type of the monster behaving according to his free will to focus on the problem of the scientific progress and experiments. The question of the ability of the monstrous creature to act deliberately is a significant problem concerning the moral and ethical norms of society. The presentation of the character of the monster allows the author to demonstrate the harmful consequences of the experiments because the free will of the monster implies the fearful results of the scientific progress. The creature has free will because he developed without the influence of the society, he had clear mind and comprehension of the surrounding world, he made his own decisions and was responsible for his behavior.
The notion that the monster was created by a human and developed without the external influence including the education and teachings implies that the character acts according to his free will following his assumptions and decisions. The creature has no family, friends or teachers to explain him the principles and laws of the world. All the concepts and ideas are the result of his reflections, explorations, and observations. Therefore, the creature is entirely responsible for the decisions he makes demonstrating his free will. The character describing the process of his apprehension of the surrounding world admits that he “was dependent on none and related to none” (Shelley 152). Such an assumption implies that the monster creates his own understanding of the principles of life making his conclusions and behaving according to his individual beliefs and feelings. Therefore, the creature has the free will to learn, educate himself, help the family, and commit the crimes.
The ability to learn, comprehend and feel, his clear mind and the apprehension of the rules and standards of conduct and human sensations allow the monster to analyze the behavior of others and make the conclusions concerning the direction of his actions. Throughout the story, various episodes offer the creature the opportunity to comprehend the society and human feelings and emotions (Crimmins 563). The rationality of the way of thinking signifies the ability of the monster to make his conclusions and findings helping him to decide how to act. The character describes his feelings mentioning that he has “the desire of becoming one among” his fellows (Shelley 142). The monster develops his understanding of the social discourse and the feeling of sympathy and attachment to the family, the De Laceys, making him desire to be a part of their existence. These reflections of the creature demonstrate his ability to expand the knowledge and deepen his feelings observing the surrounding world and to analyze the situations developing his own opinions, views, and desires. Therefore, the monster demonstrates his free will because his ability to make the conclusions allows him to make decisions and be responsible for the consequences. Mary Shelley illustrates the capability of the creature to develop the critical thinking and comprehension of the principles of the social life to make the character act according to his free will.
Shelley chooses to make the monster a villain with his free will to demonstrate the harmful consequences of the scientific progress. The contrast between Enlightenment and Romanticism consists in the perception of the idea of the scientific experiments and discoveries. Shelley aspires to reveal the detrimental effect of the experimenting with nature describing the possible consequences of the interference in the natural laws. The image of the evil creature provides the opportunity to present the ideas of the author concerning the dangerous scientific experiments.
Frankenstein’s monster is a villain, “an autonomous agent that chooses to do bad things” (Michaud 95). In the novel, the monster behaves according to his intentions, and even the creator cannot control him. Although Frankenstein attempts to stop the crimes of the beast, he is unable to control the situation because his creation chooses to murder the family of the scientist. Shelley endows the monster with free will because only a creature with deliberate actions and clear mind may help her to demonstrate the harmful consequences of the scientific progress. The frightening image makes the idea of the novelist more evident allowing the readers to feel the fear connected with the inability to control the monster. The free will of the creature plays a crucial role in this allegory.
The theme of responsibility of the creature for the behavior and the results of the actions is one of the central issues in the novel allowing to analyze the free will of the monster. The idea about the free will is connected with the problem of responsibility for the actions because it offers the opportunity to determine whether the monster behaves and chooses the options deliberately. “If he could have refrained, he is free and responsible for his actions” (Michaud 96). The monster could have chosen the other direction and could have refrained from committing the crimes. Therefore, he is responsible for his actions because he was provided with the options but chose to be a villain. The monster confesses that he is “torn by the bitterest remorse” (Shelley 276). These words imply that the creature recognizes the atrocities of his actions, his responsibility for the crimes, and his ability to prevent the tragedy. The villain comprehends and admits that he had the opportunity to change the situation but his intentions and decisions determined the tragic consequences of his actions. Thus, the character realizes his responsibility for the crimes signifying that he was endowed with the free will and opportunity to choose among various options.
Thus, the problem of the free will of the monster is a significant question allowing to analyze the character and nature of his actions. The creature has free will because he developed without the external influence, he had clear mind and understanding of the surrounding world, he made his own decisions and was responsible for his behavior. The monster had neither family nor teachers to formulate his understanding of the principles of the society resulting in the creation of the picture of the world by his perceptions and views. The clear mind of the monster and the ability to learn and perceive the laws of society made him capable of critical thinking and analyzing resulting in his decisions and conclusions. Shelley applies such a method of demonstration of the character endowing him with the ability to act according to his free will to focus on the harmful effects of the scientific progress. The creature makes his decisions and commits the crimes deliberately which signifies the fearful nature of the scientific experiments. The monster admits that he is responsible for the crimes demonstrating his remorse. Therefore, the free will of the monster is apparent.
Crimmins, Jonathan. “Mediation’s Sleight of Hand: The Two Vectors of the Gothic in Mary Shelley’s” Frankenstein”.” Studies in Romanticism, vol. 52, no. 4, 2013, pp. 561-583.
Michaud, Nicolas, ed. Frankenstein and Philosophy, vol. 79. Open Court, 2013.
Shelley, Mary Wollstonecraft. Frankenstein: The 1818 Text. Penguin, 2018.
If you like this sample, you, probably, may like other samples on our site. Writers from WriteMyEssayOnline can cope with your assignments in the fastest possible time. Place an order with your requirements and set the deadline to get the paper for you!
|
<urn:uuid:cc59ad97-2856-4ef6-8ee7-f88983dd5703>
|
CC-MAIN-2020-29
|
https://writemyessayonline.com/blog/frankenstein-essay-has-the-monster-free-will/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891884.11/warc/CC-MAIN-20200707080206-20200707110206-00047.warc.gz
|
en
| 0.964336 | 1,694 | 3.296875 | 3 |
Kaluga, founded in 1371, is a relatively old city for Russia. It was created as a buffer fortress on the southwestern borders of Muscovy’s territory, a predecessor to the modern Russian state. Ivan the Terrible paid a visit in the sixteenth century at the head of armed forces on their way to battle the Tatars. Supposedly Prince Gustav of Sweden spent a year here around 1600 (when he would have been about four). Tsar Boris Godunov brought Prince Gustav to Kaluga. At the time, the Tsar was in the thick of the Time of Troubles (1598-1605), a brief, but chaotic period in Russian history.
Kaluga played an important role during the War of 1812 as a supply center and headquarters for Russian forces coming from the south. After retreating from Moscow, Napoleon initially headed in the direction of Kaluga, but after the Battle of Maloyaroslavets (in modern-day Kaluga region), the invading army was forced to flee in the direction of Smolensk along a road that had been destroyed by French forces on the way in.
Before Siberia became infamous as a place of exile for troublemakers, Kaluga filled that role. Kaluga housed important prisoners. Khan Shahin Girai, the last Khan of Crimea, was a modernizer in his brief reign, initiating reforms in the economy and the structure of government. However, he succumbed to pressure from the Russian Empire, spending part of 1786-1787 in the city under house arrest, before being sent on to modern-day Moldova.
The Kyrgyz sultan Arigazi-Abdul-Aziz spent 10 years here, during which he married the 16-year old daughter of a Moscow merchant and died in 1833 of fever. He was buried behind the Old Believer’s cemetery, which is now Kaluzhsky Bor, a forest just outside of town.
Imam Shamil, leader of the liberation forces of Dagestan and Chechnya that fought against Russia during the Caucasian War, and the last imam of the Caucasus, capitulated to Tsar Alexander II in 1859 and was exiled to Kaluga. He lived in a large stone house at Pushkinskaya Ul. 4 from 1859 to 1868 before being granted permission to move to Kiev.
The Georgian Princess Thecla was sent to Kaluga after a coup aiming to restore an independent Georgian monarchy was discovered. Arriving with her sons in 1834, she was allowed to return to Georgia less than a year later.
Kaluga’s official motto is, “The Cradle of Space Exploration,” and all of the energy in the town today seems to emanate from the almost superhuman brain and imagination of Konstantin Tsiolkovsky (1857-1935). Considered today to be one of the founders of rocketry and astronautics, Tsiolkovsky philosophized in relative obscurity here, teaching at a small provincial school and living in a log cabin. He was largely self-taught, because elementary schools would not admit him as his hearing was impaired after catching scarlet fever at age 10. His neighbors viewed him as a strange recluse. However, without him, it is questionable how far rocketry and space exploration would have progressed, not just in the Soviet Union, but around the world.
The author of more than 400 works, Tsiolkovsky is now Kaluga’s most famous resident. As a result of his discoveries, many landmarks, buildings, and parks in Kaluga are named after him, or after Yuri Gagarin, the first man in space, or are inspired by general outer-space themes. It is not uncommon for a beauty salon in Kaluga to be called kosmos (space) or a supermarket called luna (moon). One such place worth visiting is Gagarin Bar, found appropriately enough at Ul. Gagarina 4.
There are two locations in town where the legacy of Tsiolkovsky shines especially bright. The Tsiolkovsky State Museum of the History of Cosmonautics claims to be the first museum on earth to specialize on the history оf space exploration. Gagarin came here in June 1961—just two months after making his space orbit—to lay the inaugural stone; the museum opened six years later. There are two main exhibits. The first is dedicated Tsiolkovsky’s ideas and the second centers on space vessels. There is also a planetarium on the second floor and a rocket park on the riverside of the museum. It is located at Ul. Akademika Koroleva 2 ( http://www.gmik.ru/index_en.html ). Nearby the museum is an enormous obelisk, which sits on top of Tsiolkovsky’s grave.
Those who want to know even more about the man should head to the Tsiolkovsky Memorial House, where he lived for 29 years until his death in 1935 (Ul. Tsiolkovskogo 79). If you’re still curious about Tsiolkovsky, you can continue on to the town of Borovsk about 86 km north of Kaluga to visit the Tsiolkovsky Memorial Apartment, where the great thinker lived for 18 months in 1887-1888 (although he lived in Borovsk for 12 years). This museum focuses on his childhood and early discoveries made in the 1880s and 1890s.
There are so many statues of Gagarin and Tsiolkovsky and murals representing space that it is difficult to know where to begin your explorations. One must-see site is the statue commemorating Kaluga’s 600 th birthday on the banks of the River Oka at the bottom of Ul. Gagarina. Featuring Gagarin’s head in flames dangling from a mast overlooking earth below, it also memorializes Tsiolkovsky nearby.
For the architecture buff, the Kaluga Kosmodamianovsky Church is probably the oldest surviving example of old Kaluga architecture. First mentioned in the chronicles in 1626, this church originally featured four bell towers. Shortly after the Revolution of 1917, the two priests here were arrested and sent into exile for anti-Soviet agitation: one was executed several years later, while the other’s fate remains unknown. During Stalin’s repressions in the 1930s the church served as a prisoners’ holding pen. It was returned to the Orthodox Church in 1992 (Ul. Suvorova 177/16).
Be sure to take a walk through Ul. Teatralnaya, a pedestrian street that begins at the city’s main Drama Theater. On weekends the avenue is flooded with strollers and crowded with tables selling souvenirs. At Teatralnaya Ul. 9 is the Tsiolkovsky loft space, featuring freelance offices, an art gallery and a large “time café,” a popular café concept in Russia, where the limited menu is free, and customers pay for their time instead. This one is very spacious and features a large outdoor balcony overlooking a stone courtyard.
Kaluga is a musical town, filled with karaoke clubs and live music venues. If you’re looking for venues that serve food, stay open late and frequently host out-of-town acts, head over to Pub Overtime (Ul. Glagoleva 3, 3 rd floor, www.facebook.com/overtimepub.ru) and Bar Mazhor (Ul. Kirova 50, www.barmajor.ru/) One of Kaluga’s mysteries is that it is seemingly the Russian capital of flamenco. No one seems to know why, but there are concerts held most months of the year, often at the Regional Philharmonic Theater, which recently hosted the Mir Gitary (World of Guitars) festival. This year’s lineup featured masters from Argentina, Chile, Australia, France, Canada and the United Kingdom and was dedicated to Paco de Lucía, the Spanish flamenco virtuoso. The city’s premiere cultural venue is located at Ul. Lenina 60 (www.kof-kaluga.ru).
Perhaps due to its proximity to Moscow, and because of its significantly more affordable land, Kaluga Region hosts a number of interesting festivals and projects and, in the near future, perhaps Moscow’s fourth airport. Plans have been in the works for several years to build a fourth airport for Moscow in Yermolino, a town near the large university and science town of Obninsk on the grounds of an existing landing strip. Located 80 km beyond the MKAD, it would primarily service budget airlines.
Dikaya Myata is an annual folk and ethnic music festival that usually takes place around the June holidays. Founded in 2008, Dikaya Myata originally changed locations every year, although has been held the last four years at Etnomir, an open-air ethnographic park in Kaluga Region. When it is finished in 2020 it will be one of the largest such parks in the world and will feature the participation of dozens of countries from around the world, with architectural examples of structures of various cultures, different camps, music festivals and a spa and resort (mintmusic.ru/ and http://mintmusic.ru/ethnomir). About 70 km northwest of Kaluga is Nikola Lenivets, an art park and functioning organic farm, featuring festivals of architectural installations, new media conferences and a marathon. It is open to visitors, volunteers and interns and features camping options, cottages and a hostel on site ( http://nikola-lenivets.com).
Read more: How to spend a perfect weekend in Tver
All rights reserved by Rossiyskaya Gazeta.
to our newsletter!
Get the week's best stories straight to your inbox
|
<urn:uuid:f8cb9b7e-a2b4-43d6-b803-f2cb37363e44>
|
CC-MAIN-2020-34
|
https://www.rbth.com/travel/2014/20/06/a_cosmic_getaway_explore_kaluga_the_cradle_of_space_exploration
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739046.14/warc/CC-MAIN-20200813132415-20200813162415-00592.warc.gz
|
en
| 0.958664 | 2,053 | 3.09375 | 3 |
(ALSO CALLED "SCABIES")
Female mite burrowing into the skin generating inflamation as she digs. She leaves a wake of eggs in the tunnel.
APPEARANCE OF THE DISEASE
The motion of the mite in and on the skin is extremely itchy. Further, the presence of burrowed mites and their eggs generates a massive inflammatory response in the skin which creates yet more itchiness.
Mites prefer hairless skin thus leaving the ear flaps, elbows and abdomen at highest risk for the red, scaly itchy skin that characterizes sarcoptic mange. It should be noted that this pattern of itching is similar to that found with airborne allergies (atopy) as well as with food allergies. Frequently, before attempting to sort out allergies, a veterinarian will simply treat a patient for sarcoptic mange as a precaution. It is very easy to be led down the wrong path (pursuing allergy aggressively) if one considers sarcoptic mange too unusual or unlikely.
As the infection progresses, eventually most of the dog's body will be involved. Classically, though, the picture begins on the ears (especially the ear margins), the elbows, and abdomen.
The term "Scabies" refers to mite infestations by either Sarcoptes scabei or other mite species closely related to Sarcoptes scabei. While Sarcoptes scabei can infect humans and cats, it tends not to persist on these hosts. When people (including some veterinarians) refer to "sarcoptic mange" or "scabies" in the cat, they are usually referring to infection by Notoedres cati, a mite closely related to Sarcoptes scabei. In these feline cases, it would be more correct to refer to "notoedric mange," though the treatment for both mites is the same. Notoedric mange, in cats, generally produces facial itching and scabbing.
For more information on notoedric mange, click here.
HOW THE INFECTION IS SPREAD
Sarcoptic mange mites are usually spread by direct contact from host to host. While mites can live off of a host for days to weeks depending on their life stage, they are only infective for 36 hours which means that environmental decontamination is generally not necessary.
Mite infections on humans are self-limiting (i.e., they go away on their own) as the mite is not able to complete its life cycle on the "wrong" host. The condition is extremely itchy, though, while it lasts. The mites are most active where skin is warm (in bed and where clothing is snug).
IF A SARCOPTIC MANGE ANIMAL IS PRESENT IN THE HOME,
SKIN SCRAPING – Classically, mite infection is diagnosed by scraping the skin surface with a scalpel blade and examining the skin debris under a microscope for the presence of mites. If the mite’s presence is confirmed by skin scraping, then one knows immediately the cause of the itching and other conditions need not be pursued.
When an animal with sarcoptic mange scratches itself, it breaks open the tunnels that the mites have burrowed into and the mites are killed (though the itch persists due to toxins in the skin). The result is that the mites can be very difficult to confirm by skin scraping tests. (Probably mites are confirmed in 50% or fewer of sarcoptic mange cases).
MEDICATION TRIAL - Since negative test results do not rule out mite infection, a "Maybe Mange" test is frequently performed. This consists simply of treating for sarcoptic mange and observing for resolution of the signs within 2-4 weeks. Treatment is very simple and highly successful in most cases so it is fairly easy to rule out sarcoptic mange with a trial course of medication. See below for treatment options.
BIOPSY - Mange mites are rarely seen on a skin biopsy sample, though, if the sample is read out by a pathologist who specializes in reading skin samples, the type of inflammation seen in the sample can be highly suggestive of sarcoptic mange. As a general rule, if skin is biopsied, it is best for the veterinarian to request that a dermatohistopathologist read the sample.
While sarcoptic mange is difficult to diagnose definitively, it is fairly easy to treat and a number of choices are available.
REMEMBER, ALL DOGS IN A HOUSEHOLD WHERE
IVERMECTIN - This is one of the most effective treatments against Sarcoptes scabei yet is off-label as far as the FDA is concerned. There are several protocols due to the very long activity of this drug in the body. Typically an injection is given either weekly or every two weeks in 1-4 doses. In most cases this treatment is safe and effective but some individuals have a mutation (of the MDR1 gene) which makes ivermectin very toxic at the doses used to kill mites. These individuals are usually of the Collie family: Collies, Shetland Sheepdogs, and Australian Shepherds are classically affected. There is now a DNA test that can determine if any dog has the mutation that makes ivermectin use dangerous. An additional cautions comes from an interaction with the relatively new flea control product Comfortis® (spinosad). Relatively high doses of ivermectin are needed to treat sarcoptic mange and if Comfortis® is used concurrently, ivermectin side effects are more likely to occur. While ivermectin is a prototype compound upon which most other sarcoptic mange treatments are based, it may be worth using a product that has actually been approved for the treatment of sarcoptic mange.
For more information on ivermectin use, including testing for the MDR1 gene mutation, click here.
SELAMECTIN (REVOLUTION®) - Selamectin is an ivermectin derivative marketed in the dog for the control of fleas, ticks, heartworm, ear mites and sarcoptic mange mites. Normal monthly use of this product should prevent a sarcoptic mange problem but to clear an actual infection studies show an extra dose is usually needed after 2 weeks for reliable results. This product is probably an excellent choice for Collie or Australian shepherd breeds or other dogs that may have the MDR1 gene mutation.
Click here for more information from the manufacturer on Revolution.
MOXIDECTIN (ADVANTAGE MULTI®) – Moxidectin is yet another ivermectin derivative. In Advantage Multi, it is combined with imidocloprid, a flea killing topical, to create a product used against heartworm, hookworm, roundworm, whipworm, and fleas. In the U.S. this product is now FDA labeled for sarcoptic mange and is also a good choice for Collies and other breeds/individuals where there is concern about the MDR1 gene mutation.
Click here for more information from the manufacturer on Advantage Multi.
MILBEMYCIN OXIME (INTERCEPTOR®, SENTINEL®, OR TRIFEXIS®) - Milbemycin oxime is approved for heartworm prevention as a monthly oral treatment. Happily, it also has activity against sarcoptic mange and several protocols have been recommended by different dermatologists. This is another medication that one might find recommended. There are many brands available.
DIPPING - Here, a mite-killing dip is applied to the pet usually following a therapeutic shampoo. Mitaban dip (Amitraz), or Lime-Sulfur dips given weekly are usually effective. Disease typically resolves within one month. Dipping is labor intensive and rarely done any more as the other products are easier and more rapidly effective. We mention dipping since it has been a standard mange treatment for decades prior to the introduction of ivermectin.
IN THE MEANTIME
During the time it takes to control the mite infection, the pet will be very itchy. Control of secondary bacterial infections with antibiotics is important. Also, since the body's reaction to the mite is one of hypersensitivity (essentially an allergic reaction), a cortisone-derivative is worthwhile to quell the itchiest symptoms. Ask your vet about whether either such prescription is appropriate for your pet. As for anti-itch shampoos, rinses, and other forms of itch relief, please visit out Relief of Itch page for further suggestions.
Sarcoptes scabei most certainly can be transmitted from dog to human. Transmission is by direct touch such as petting and snuggling or sharing bedding with the dog. There are also human varieties of Sarcoptes scabei which are transmitted from human to human readily with no dog involved so when a person is diagnosed with "scabies" the dog is not necessarily the culprit; in fact, most human scabies does not involve pet transmission at all and is completely different from the canine condition above. For more information on human scabies, visit:
Page last updated: 9/10/2016
|
<urn:uuid:06041461-59d5-4933-84fc-108c810f09f6>
|
CC-MAIN-2020-29
|
https://www.marvistavet.com/sarcoptic-mange.pml
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882634.5/warc/CC-MAIN-20200703153451-20200703183451-00293.warc.gz
|
en
| 0.933424 | 1,969 | 3.578125 | 4 |
This is the first in a series of reports Ohio correspondent Joe Lowe will write on Bolivia, its cloud forests and the threats they face.
The attention of the international press will soon be on Bolivia and its president, Evo Morales, although not for the typical reasons. No, the U.S. ambassador has not been thrown again. Something else is afoot. Evo, as he is popularly known in Bolivia, has called the first World People's Conference on Climate Change and the Rights of Mother Earth
. The reasons for this are many, not least of all the failure in Copenhagen. Another might be Evo's background. Being the country's first indigenous leader puts him in a unique position regarding environmental topics. With cultural and ancestral ties to the land, Evo speaks passionately about human responsibility toward the Earth, in a way that has been absent in other recent Bolivian presidents. But the political and economic realities of modern-day Bolivia make transforming this kind of rhetoric into action a tough job.
To understand Evo's relationship with coca it's important to know a little about coca and its role in Bolivian society.
is a great cash crop; it can be harvested several times a year, needs less care and requires less financial input than other tropical crops. It is also a traditional plant, sacred to the cultures that have cultivated it for thousands of years. While it's true that coca is used to make cocaine, that is hardly its only use, especially in Bolivia. Many farmers in the countryside chew coca leaves as a mild stimulant which provides them with the energy to work long days. Since it is a stimulant, bus drivers and others working at night often chew coca to stay awake. Also, drinking tea brewed with coca leaves helps fight off altitude sickness, which is common in the mountainous areas of Bolivia. Finally, coca leaves also play an important role in traditional religious ceremonies and are even used to read people's fortunes.
Having said that, there's no doubt that a certain amount of coca leaves (no one knows how much) do end up being refined into cocaine. In addition to the harm caused by cocaine abroad, coca growing creates problems in Bolivia, as well. Coca is hard on the land; bush-sized coca plants require high nutrient inputs, and, like cotton, eventually leave the soil infertile.
That's not all. Demand for coca is sufficient to send pioneers hacking into the tropical Eastern Andes to make a living. This means employing slash and burn techniques and, due to the area's extremely rugged geography, planting on hillsides (already vulnerable to landslides) rendering them defenseless against erosion, which in turn destroys habitat in this bio-diverse region. As if this weren't trouble enough, the loss of tropical forest in this part of Bolivia has already led to water shortage problems, which is incredible considering the high level of annual precipitation it receives.
The plant and politics
Evo and coca go way back; their roots thoroughly intertwined. Coming to power as a cocalero, or coca-grower, in Bolivia's Chapare
region helped provide Evo with the support of other cocaleros and farmers, which he used to organize blockades and, eventually, oust several unpopular Bolivian presidents. After becoming president, these grassroots supporters naturally evolved into his political base. To no one's surprise, official coca-growing limits, which the United States helped to institute, were relaxed. But that wasn't the only effect his presidency had on coca growing.
Not all coca growing is done under watchful eyes; the geography and vegetation of the Chapare make it easy for farmers to grow coca off the radar. And because many farmers in Bolivia see Evo's election as a mandate for coca, they are emboldened to expand into new areas despite laws and an official line to the contrary. This puts Evo in a delicate situation. As much as he might like to preserve Bolivia's tropical environment, it is hard to refuse demands for greater coca production when those demands come from the same supporters who put him in power. To make things more complicated, growing coca is widely seen by many Bolivian coca growers, Evo included, as an inviolable cultural right.
Do coca and conservation mix?
Carrasco National Park
, located in the heart of the Chapare, is home to an impressive spectrum of ecological zones: from alpine peaks to lowland tropical forest, the park contains a bit of it all. It also lies in the Madidi-Amboro wildlife corridor
, a loose chain of protected areas, which, it's hoped, will help maintain the region's astounding levels of biodiversity. That's not all the park is known for. Social confrontations have plagued it for years due to disagreements over land management policies.
The quest to find new cultivatable areas for coca production has opened up the park's interior to agricultural development and numerous villages have sprouted up inside its boundaries, so numerous, in fact, that no one knows exactly how many. Colonists see the park's rules as conflictive with their own efforts to eke out a living in the jungle and, consequently, have struggled to push officials out. For them, growing coca is a very serious matter. Several years ago, a park outpost was burnt to the ground and on at least one other occasion Bolivian soldiers have been met with armed resistance when attempting inspections.
Despite Carrasco's difficulties, efforts were made in 2002 to create another national park in Cochabamba's tropical zone, this time farther to the north in areas that had received little use, remaining in a comparatively pristine state. Again, the goal was to improve the Madidi-Amboro wildlife corridor and protect threatened habitat in the Eastern Andes.
The proposal was met with angry resistance, including road blockades and marches and efforts to create an Altamachi National Park
were eventually scrapped. However, from the wreckage sprang a smaller municipal wildlife reserve, covering about 25 percent of the originally proposed park land.
The Northern Tiquipaya Wildlife Reserve faced an uphill battle from its beginning. CIDEDER
, a nearby Bolivian NGO funded by the WWF, began visiting locals, talking to them in their native language, Quechua, making the case for a reserve. In the beginning there were doubts about workers' safety, but over time farmers began to warm to the idea, especially when CIDEDER began help locals design micro-finance projects to increase sales of the organic honey and pepper they produced. In time, the eleven communities situated in and around the reserve even agreed to build an eco-lodge, named Yunga Pampa, which would allow tourists to explore nearby cloud forests, waterfalls and lakes as well as prehistoric rock paintings.
The reserve also protects endangered animal species like condors, spectacled bears, tapirs and jaguars, as well as a diverse assembly of plant life, including 73 species of orchids alone. Because of the reserve's success, the idea is starting to catch on and officials in the neighboring municipality of Morochata are considering a proposal to create their own wildlife reserve.
The success of the Northern Tiquipaya reserve, however, is not without its threats. Even in isolated regions like this one, demands from encroaching cocaleros and outside farmers are beginning to be felt. There are reports that villagers living in the reserve's two recognized villages have already had confrontations with outsiders eager to settle on unspoiled land nearby.
Evo's next step
To successfully host the conference will certainly leave Evo poised to become an environmental leader on the global stage. Regardless, if Evo is truly committed to taking a leadership role he will have to start working on difficult problems at home. Tackling the issue of coca growth and conservation in the Eastern Andes won't be easy, but it could help Evo prove his seriousness in defending the rights of Mother Earth.
Photos: Wikimedia Commons (top) and Joe Lowe
|
<urn:uuid:2c7d9251-b8b8-44ea-8405-1bc89832b981>
|
CC-MAIN-2014-41
|
http://www.mnn.com/local-reports/ohio/local-blog/evo-morales-upcoming-climate-summit-and-the-not-so-green-politics-of-c
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663743.38/warc/CC-MAIN-20140930004103-00274-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.966861 | 1,666 | 3.0625 | 3 |
North American children are now the most vaccinated on earth. Since 1980, Canadian vaccine schedules have more than doubled the types of vaccines given; for the first 18 months of life alone, public health authorities across Canada now recommend 32-41 (average 36) doses of thirteen to sixteen different vaccines. New Brunswick, the Northwest Territories and Nunavut start by injecting the first dose of Hepatitis B vaccine at birth; the rest of the country starts multiple injections/drops at two months.
It’s been declared that today’s children are the first generation whose parents will outlive them. Today, 10% of Canadian children have life threatening afflictions. In the last 25 years, concurrent with vaccine increase, there’ve been huge declines in children’s health in many categories:
- Autism – increased about 200 times in the last fifteen years; at least 1/50 in USA
- Over 27% of Canadian children fall short on at least one measure of physical, emotional or cognitive development when entering kindergarten.
- Attention Deficit Hyperactivity Disorder (ADHD) – 10%
- Learning Disability – 1/6
- Severe Mood Dysregulation (eg bipolar disorder) – 1/30
- Ear Infections – 50% of Canadian 2-3 yr olds since birth
- All types of Allergies – increased six times since 1980
- Anaphylactic Food Allergies – doubled in the last decade
- Allergic Eczema – 1/5
- Asthma – 1/8 or more; 10% of Canadians 2-7 yrs old
- Obesity – tripled since 1980; 25% of Canadian children overweight or obese
- Juvenile Diabetes – more than 100% increase since 1980
In contrast, Chicago-based Homefirst Medical Clinic, run by a group of doctors including medical director Mayer Eisenstein MD,JD,MPH, have no known autism and super-scarce allergies in their children, most of whom have had no vaccinations. Two studies done in New Zealand in 1992 and 1995 show that the unvaccinated children clearly have less allergies, less otitis (ear infections), less tonsillitis, less running noses, less epilepsies and less ADHD.
For the first time in history…children are sicker than the generation before them. They’re not just a little worse off, they are precipitously worse off, physically, emotionally, educationally and developmentally.
Vaccinations may cause significantly more injuries and deaths than they prevent.
The medical establishment considers vaccines effective if they suppress a few targeted illnesses – but at what expense? An emerging body of evidence indicates that vaccines can damage a child’s developing immune system and brain, leading to life-threatening or debilitating disorders like autism, ADHD, asthma, peanut allergy, juvenile diabetes, etc or to SIDS, death itself. If this is true, the number of vaccine-related deaths per year outnumbers deaths from so-called “vaccine-preventable” illnesses.
Historical trends show that deaths caused by illnesses targeted by vaccines had already declined by as much as 98% before mass vaccination programs for them began. Statistical tampering and incomplete and selective reporting over the last sixty years has made vaccination appear more effective than it truly is. For instance, the seemingly dramatic decline in polio cases after introduction of polio vaccine coincided with a change in diagnostic criteria from paralysis lasting 24 hrs or more to paralysis lasting at least 60 days. Polio incidence actually increased after vaccine was introduced; the oral polio vaccine became the sole cause of paralytic polio in North America until it was discontinued here.
Infectious diseases can be made worse by fever-suppressing drugs and antibiotics. Fever is part of the immune process; if it is stifled, infections that would otherwise be merely inconvenient can become dangerous, even deadly (eg see Fighting Flu fever with pills making death toll worse, study says).Routine use of fever suppressants during illness and after vaccination is inadvisable.
Antibiotics increase the number of bacterial toxins released into the body by killing other bacteria not targeted. Some also diminish Vitamin C, thereby inhibiting the immune system.
Vaccine injuries are drastically underreported. Although there is a government system in place for reporting vaccine reactions and injuries, most incidents go unreported. Doctors, who naturally do not want to admit to participating in a practice that injures a child, often choose to deny or disregard even the most obvious connection between a sudden health issue and vaccination. As a result, it is believed that fewer than 10% of vaccine injuries are actually reported; it’s impossible to know exactly how many children are injured each year.
Vaccines damage the immune system. It has been said that a healthy immune system has two main parts, Th1 and Th2. The theory is that Th1 leads with the first and most important immune response, to sense and eliminate incoming disease-associated organisms and particles. Th2 then creates antibodies and a memory of the disease. Babies are born with immature immune systems in which Th2 dominates. As their immune systems mature, dominance switches permanently to Th1. Usually, infectious agents enter the body through the nose and mouth, triggering Th1 which normally combats them effectively. But vaccines injected into the body bypass Th1 and over-stimulate Th2. This confuses the normal maturation and skews the functioning of the immune system; Th2 becomes dominant and the crucial Th1, suppressed. The result can be autoimmune disease (eg juvenile diabetes), allergic disorders (eg eczema, asthma and life threatening anaphylactic allergies to everyday foods like peanuts) and frequent infections (eg colds and ear infections).
Vaccine ingredients are risky. They include dangerous preservatives and adjuvants (chemicals which increase immune response) and other potentially harmful substances: aluminum phosphate, phenol (carbolic acid), MSG, formaldehyde, gelatin, etc. The flu shot still contains mercury. This and other toxins can accumulate and eventually suppress the immune system, cause brain damage, and lead to a myriad of health issues and developmental disorders. Exposure to toxins during the critical stages of development before age two is especially dangerous to the brain.
Some vaccines are made using tissue cultures: monkey kidney, foetal calf blood, chick embryos, aborted human foetal lung, yeast, etc. It’s impossible to remove all contaminating viruses and proteins left from this process. Injected contaminants can create immune problems including anaphylaxis. Other vaccines have genetically engineered or artificially fragmented active ingredients. These could result in injuries as yet unrecognized.
Vaccine safety has never been proven. Studies to compare the overall long-term health of vaccinated versus unvaccinated people have never been done, nor have studies to discover the combined and cumulative effects of so many vaccines. Safety studies prior to vaccine licensing are typically inadequate and limit follow-up to a few days or weeks.
Vaccinations are given indiscriminately. There are no tests to determine which children are likely to respond adversely to vaccinations. Little concern is given to innate health and family health history. Underweight babies are routinely given the same dosage using the same schedule as babies of normal weight. Unlike other drugs, vaccines are administered using a one-size-fits-all policy.
The wholistic approach treats the body with care.
Immunity is and can be acquired naturally. A foetus receives antibodies acquired by its mother from infections she’s previously had. After birth, breastfeeding provides multiple immune factors and optimum nutrition to the baby’s body and brain. Breastfeeding is so exquisitely refined that it continually changes and adapts to the baby’s needs as they change.
Immunity derived from exposure to infections can last a lifetime. Any immunity provided by a vaccine wanes over time and puts the child at risk of a more dangerous infection later in life. Infections contracted in childhood encourage optimal balance of Th1 and Th2 and may actually accelerate development and learning.
A healthy lifestyle continues the immunity established by breastfeeding. Excellent nutrition, avoidance of toxins of all kinds, sufficient rest, and being part of a loving family all contribute to freedom from disease of any kind.
The very young (babies and small children) are at high risk because their brains are undergoing the most rapid development at the very time they receive the greatest number of vaccinations…they receive many inoculations (up to 9 inoculations) in one office visit. This is insane and in my estimation, criminal.
Vaccination is based on fear.
Vaccination ignores our evolutionary history. We have survived in co-habitation with multitudes of germs. There’s a balance between immune enhancement and immune depletion. We can encourage the former by acknowledging the power and competence of our bodies to heal themselves.
Those administering vaccines rarely, if ever, provide full information on the vaccines being injected; they exaggerate risks of infection and don’t explain that vaccines may be just as risky or worse.
Vaccinations are NOT mandatory in Canada. “Unlike some countries, immunization is not mandatory in Canada; it cannot be made mandatory because of the Canadian Constitution. Three provinces require proof of immunization for school entrance: Ontario and New Brunswick for diphtheria, tetanus, polio, measles, mumps, and rubella immunization; Manitoba for measles. But, exceptions are permitted on medical or religious grounds and reasons of conscience; legislation and regulations must not be interpreted to imply compulsory immunization.” (Immunization in Canada; May, 1997; Vol 23S4
Note that Ontario and New Brunswick exemption forms are available.
|
<urn:uuid:4d4ec4c1-5096-413d-b832-7fba1f03f7a0>
|
CC-MAIN-2017-30
|
http://vaccinechoicecanada.com/about-vaccines/vaccination-the-basics/childrens-health-in-decline/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424961.59/warc/CC-MAIN-20170725042318-20170725062318-00199.warc.gz
|
en
| 0.939354 | 1,990 | 3.28125 | 3 |
Origin of the phrase “pick your battles”:
References a well-known aspect of military strategy, which suggests that when troops are thinly stretched, they are often unsuccessful. For example, when a country tries to fight a war on two fronts, it often struggles to secure both, and sometimes it is more advisable to deal with one issue before proceeding to the next to ensure success. The more fronts a military is coping with, the harder it is to handle the strategic and day-to-day operations on all of these fronts, and sometimes a front must be abandoned because there are not enough personnel to secure it, which is generally undesirable.
It’s funny how the older my kids get, the more grateful I am for the big things and the more I let the small things slip – things I would have never pictured myself letting go.
Our rule is to make your bed every day no matter what. That’s how my Mom taught me and the rule was passed down. Beds are not to be unmade unless you are in them.
Another rule is to be respectful and kind to your family members.
Some days, because they were kind and respectful and there were few arguments, I walk right past their unmade beds and gently pull their doors closed.
Picking my battles one at a time and grateful to be able to step back, take a deep breath, and accept an occasional defeat.
Do you ever have to pick one battle over another?
|
<urn:uuid:083d2be6-26fb-4a45-90f1-1e004329cbdb>
|
CC-MAIN-2020-05
|
https://lifeonwry.com/2012/11/18/picking-my-battles-gratitude-experiment-day-95/?replytocom=1346
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00079.warc.gz
|
en
| 0.977421 | 303 | 2.671875 | 3 |
Dogs are prone to heart problems like congestive heart failure. Regular vet checks can catch this problem at its early stages. A good pet insurance plan can reduce the cost of proper medication and treatment. This type of care will prolong your furry companion’s life.
There are several types of heart problems that your dog can have. Some of these conditions are congenital, meaning your dog has had them since birth. These heart conditions may have been passed down from your pet’s parents. Congenital heart diseases in dogs include congestive heart failure, canine dilated cardiomyopathy, and pulmonic stenosis.
In other cases, older dogs can also develop heart conditions. These conditions are usually the result of aging. If you have a middle-aged or older dog, some heart conditions you can ask the vet about include arrhythmias, pericardial disease, and canine valvular disease.
Being aware of the symptoms of canine heart problem signs can help ensure your loyal friend gets on-time urgent vet care as well.
Sign #1: Difficulty in Breathing
This is one of the most significant signs of heart issues in dogs. The type of breathing is rapid. This happens because the heart valves are already leaking fluids into the dog’s organ systems. The heart expands, then fluid collects and presses on the lungs. That is why the dog experiences difficulty in breathing.
A dog with a heart problem will often exert more force in breathing as well. Some dogs will also stretch out their necks or stand with legs parted to breathe better. Others will sit for long hours so they can be more comfortable as they attempt to expand their lungs more. You may also notice your dog having difficulties in breathing while lying down.
The normal respiratory rate (RR) in dogs is from 10 to 35 breaths per minute. Your dog will need emergency vet care once its RR exceeds 40 breaths per minute. Assistive breathing can help get a higher amount of oxygen into your dog’s lungs.
The vet may also order an X-ray to check for fluid build-up in the lungs. The main goal is to slow down your dog’s breathing. This will ensure proper oxygenation of your dog’s body before the vet provides further treatment.
Sign #2: Low Energy
A dog’s physical activity may depend on the dog’s personality. Some dogs love to relax and nap. Others like to run all around the house or at the park. You know your dog better than anyone else. Any change in your dog’s behavior or habit may signal low physical activity.
You may also notice signs of fainting or collapse in your otherwise healthy dog. Also called syncope, fainting occurs when the brain is deprived of oxygen-rich blood. This is often the result of heart disease. In most cases, exercise triggers fainting in dogs with heart disease. Sometimes, a coughing episode can trigger fainting as well.
Taking your dog to the vet will give the vet the chance to check for CHF. Don’t worry; pet insurance can reduce the cost of treatment, if needed.
Sign #3: Gum and Tongue Colors
A blood test and other medical tests will indicate a dog’s oxygen levels at the vet’s office. However, at home, there is a way to see if your dog is not getting the proper oxygen it needs. As you hold your dog, check their gums and tongue.
In a healthy dog, the gums will appear a pretty vivid pink, similar to the color of bubblegum. When a dog lacks the proper oxygen, the gums will have a blue or purple tone to them. One of the more common causes for this is a lack of oxygen due to congestive heart failure. In such cases, the heart works extra hard to pump blood through the dog’s body.
Any sign of gum discoloration in a blue or purple should turn into a vet trip as soon as possible. Your dog may need fluid drainage and oxygen in a matter of minutes before things take a turn for the worse.
Sign #4: Coughing
The increase of fluids in a dog’s body may result in an increase in coughing for your dog. Basically, some of the fluid build-up reaches the throat of the animal and the discomfort leads to coughing. You may find that the coughing is more intense at night.
Some dogs may have a coughing spell and it goes away. Try to give the dog some water or food. If the coughing persists for more than an hour, then bring the animal to an emergency vet service. The exact source of the cough may be found.
Even if the cough is not the result of congestive heart failure, there could be something lodged in the animal’s throat. Pet insurance can reduce the costs of removal of foreign substances.
Sign #5: Previous Health Issues and Sudden Changes
In some cases, your dog may have past health issues that lead up to congestive heart failure. For example, your dog may have been diagnosed with a heart murmur. Over time, the murmur may get worse and eventually cause the heart to expand in size.
Look for sudden changes in the way your dog breathes or acts. They may wake up all of a sudden in the middle of night, not bark as often, or have a reduced appetite. These sudden changes may seem small, but they could be the key to getting your pet the medical attention it needs.
Takeaway: Getting Heart Disease Diagnosed in Your Dog
Congestive heart failure is a struggle many dogs deal with, but thankfully there are multiple treatments to help your animal get through it and live comfortably for as long as possible.
In many cases, routine office visits can help vets detect heart disease in dogs. Your vet may also perform procedures like X-rays, blood and urine tests, an electrocardiogram, and cardiac catheterization to diagnose heart disease in your dog. Pet insurance can reduce the costs of these treatments, so you don’t have to worry financially.
|
<urn:uuid:ca5a260b-c186-4b2a-a309-6a5a92c3f606>
|
CC-MAIN-2023-40
|
https://dogperday.com/5-signs-your-dog-may-have-heart-problems/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00306.warc.gz
|
en
| 0.938826 | 1,264 | 2.671875 | 3 |
Follow These Tips and Protect Yourself from Coronavirus
Ever since COVID – 19 has hit the world, things have changed tremendously. Every nation in its own way is trying to curb the situation. Currently there is no vaccine for preventing coronavirus disease so far. Social media platforms are replete with multiple messages related to Coronavirus. However, the fear and panic is more in public. In this post we are sharing with you some tips to tackle the situation.
Well, we all know that there is no vaccine, but fortunately there are few things that everybody should do and avoid being exposed to this virus.
Here are the tips that we all should definitely follow:
- Since the virus is said to be spread mainly from person-to-person so it is best to maintain at least 1 and 1.5 mt distance. Avoid public places, like temples, mosques, market places, cinema halls, malls etc. As these are the places where many people gather at the same time and the chances of getting exposed to the virus increases.
- Make sure you wash your hands with soap and water for at least 20 seconds, especially after you have been to any public place, blowing your nose, sneezing or coughing.
- Keep a sanitizer handy, because soap and water can’t be readily available. In such cases you can use hand sanitizer. Hand sanitizer that you buy should contain at least 60% alcohol.
- Avoid touching your face, eyes, nose, and mouth with unwashed hands as much as possible.
- Avoid close contact with people who are sick.
- Eat only light and homemade food. Avoid eating cold or refrigerated food.
- Drink hot water as and when you feel thirsty. You don’t need to drink the whole glass all at once, have two to three sips of hot water at a time.
- Avoid going out as much as possible, and wear a face mask whenever going out.
- Cover your mouth and nose with a tissue or a handkerchief when you cough or sneeze. You can also use the inside of your elbow while sneezing.
- Do not reuse used tissues and masks.
- Clean and disinfect your frequently touched surfaces, like doorknobs, light switches, tables, countertops, handles, desks, keyboards, toilets, phones, faucets, and sinks.
- Do not panic. Educate your kids about the DO’s and DON’Ts, instead of scaring them.
Last but not least, Maintain Social Distancing, Stay Home, Stay Safe and Have Faith!!
|
<urn:uuid:e40d9ac0-5ea1-4bc7-8fd7-d32ddeae7d15>
|
CC-MAIN-2023-14
|
https://www.blackbirdnews.com/follow-these-tips-and-protect-yourself-from-coronavirus/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00190.warc.gz
|
en
| 0.950759 | 545 | 2.796875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.