text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
New technologies, such as tangibles and touch tablets with haptic feedback, may provide solutions for helping dyslexic children learn to read. Tangible letters that can be encoded with graphical or haptic information may enable dyslexic children to better decode them. For example, color coding, used by syntheses, may enable reliable 2D decoding. Haptic feedback can be used to encode letters with signature movements. In this project we are exploring these strategies and others. The main research outcome is to determine if any of these strategies improve reading outcomes for dyslexic children.
- Dr. Alissa N. Antle: Project Lead
- Dr. Maureen Hoskyn: Director, Centre for Research on Early Child Health and Education, Faculty of Education, Simon Fraser University.
- Dra. Alyssa Wise: Associate Professor of Learning Sciences and Educational Technology, Steinhardt School of Culture, Education, and Human Development, New York University.
- Min Fan, Post-Doctoral Fellow
- Shubhra Sarker, MSc. Student
- Emily Cramer, Ph.D. Student
- Ying Deng, MSc. Graduate
- Jianyu Fan, Ph.D. Candidate
|
<urn:uuid:924f996c-8032-48b9-9e52-a9f9eda90312>
|
CC-MAIN-2020-10
|
http://antle.iat.sfu.ca/research/phonoblocks/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146681.47/warc/CC-MAIN-20200227094720-20200227124720-00257.warc.gz
|
en
| 0.846951 | 245 | 3.15625 | 3 |
Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...
Everyone gets bothered by spam e-mails landing in their inboxes all the time. These unsolicited messages have been a constant part of our e-mail correspondence since the mid-nineties. But what actually is spam and why is it sent? Most importantly, how can you get rid of undesired spam e-mails or prevent them entirely?
The basics of spam e-mails
Spam (often referred to as ‘junk‘) is any unrequested and unwanted messages that are sent electronically. These messages are usually sent (by e-mail) to numerous recipients and relentlessly fill up the inboxes of the world. The majority of these are unsolicited bulk e-mails (UBE) such as chain mails or unsolicited commercial e-mails (UCE). The recipient is usually asked to buy a certain product, reveal personal data, click on a website, or open a file attachment.
Spam e-mails make up around half of all e-mails sent worldwide. The USA is the biggest generator of spam e-mail in the world. In some countries spam e-mails are decreasing and this is due to network providers increasing spam protection and the criminal authorities acting more strictly against spam e-mails.
The term spam comes from the American canned meat brand (‘spiced ham’), and there is even a Monty Python sketch that centers around the curiosities of this tinned meat. In the sketch, the word “spam” is mentioned so often that a normal conversation is no longer possible. A similar situation applies to the communication variant of the word: so many useless spam e-mails flood into a user’s inbox that it becomes almost impossible to discern between wanted and unwanted content.
Different types of spam mails
Spam does not just appear in e-mail correspondence—is also circulated this way. When this happens, the sender is then identified as a spammer. Most spammers use computer programs that are called spambots or harvesting bots. Many junk e-mails contain advertisement for (often shady) products, hoaxes, links to phishing sites, or malware.
The most common forms of spam e-mail can be divided into the following four groups:
- Advertisements: Vendors of cheap watches (that are imitations of famous luxury brands), unlicensed medicines (commonly Viagra), or illegal internet content use spam to advertise their products. Typical content of solicited e-mails can include links to seemingly free products, which then lead to subscription traps, or links to get-rich-quick schemes. The latter requires a fee-based download that makes the spammer rich.
- Hoaxes: In many spam mails you will find appeals, warnings or stories that seem very realistic but are actually totally fictitious and melodramatic. If one of the recipients falls for the hoax and forwards the mail, it could quickly snowball out of control.
- Phishing: This type of spam occurs when someone receives an e-mail from a business (usually a bank) that looks authentic. The recipient is requested to submit personal data, such as account numbers or credit card details, as well as any relevant passwords to this information. For this purpose, phishing fraudsters often create websites that the spam e-mails link to. These websites look deceptively like those of official banks. If you enter your private data, it will fall straight into the hands of criminals.
- Malware: Many spam e-mails contain malware, also known as malicious software, evilware, or junkware, that then finds its way onto your computer. Computer viruses, worms, Trojans and spyware fall into this category. Opening these programs, links, or attachments, allows the malware to penetrate the system, but most of these are removed by anti-virus programs or other special software.
Why do we receive spam e-mails?
Many users wonder why so much spam is being sent to their e-mail address and, in most cases, are helpless to do anything about it. Spambots and harvesters systematically trawl the internet for e-mail addresses. When they come across an e-mail address they will save it for future junk mails. When friends and acquaintances’ e-mail accounts are hacked, it could mean that your address might fall into the hands of spammers, too. The address book of the hacked account will then be saved for sending spam e-mails.
Often carelessness on the user’s part leads to spammers and spambots getting the information they need. When registering for giveaways, site operators are often allowed, according to the terms and conditions, to use the given e-mail address for promotional purposes. Many giveaways are set up for the sole purpose of collecting addresses for spam reasons. Mentioning your address on websites, social networks, in forums, chats, and comments can make them easy targets for e-mail harvesters.
Preventing spam – how can you protect yourself?
It is impossible to defend yourself completely from spam e-mails since there are too many spammers and spambots out there that send their daily mails. There are, however, a few procedures and tricks to reduce the volume of spam you receive. Only give your main e-mail address when it is totally necessary and definitely do not use it for questionable giveaways or for registering with unknown websites. For less important internet services, it makes sense to use a second e-mail address that is not used for any other activities. This is how to protect your inbox from spam e-mails.
Avoid publishing your main address on internet sites. Make sure to only give your e-mail address to protected online portals and communities and use a modified spelling, such as writing ‘(at)’ or ‘AT’ instead of using the ‘@’ sign. Rather than using a dot in front of the top-level domain, you could write the word ‘DOT’. Some spambots, however, can recognize this disguise and can even generate the correct e-mail address from it. An alternative method is to display your e-mail address as text image. Note that nothing can protect you from spam completely.
A spam filter is a type of software that recognizes and takes care of unwanted messages. These filters are used by every professional e-mail provider and e-mail program. Many of these programs achieve this with automatic inspections of e-mail content, which is known as the blacklist method. This process uses a list of words with typical spam expressions and phrases and, along with additional processes, spam e-mails can be recognized. No method can fully guarantee spam recognition, and it is not uncommon for spam filters to classify normal mail as promotional messages. Nevertheless some spam e-mails can end up in your regular inbox. Despite having a few hiccups, you should definitely make sure a spam filter checks your e-mails.
Recognizing and eliminating spam
If spam is not being filtered out in advance, then you need to recognize it yourself. In such cases only expert spam mail care will yield reliable protection. Many mails can be recognized as spam simply by their subject lines: winner notifications, offensive content, or attractive saving possibilities. When these mails come through the spam filter, the user should mark them as spam. By allocating them to the spam folder, the filter in turn learns to sort out new types of junk mail automatically.
Links and file attachments from suspicious mail should not be opened under any circumstances. Spam content is usually hiding behind these unknown senders and weird-sounding subject lines.
If malware content is accidently opened, your computer can only be saved by an anti-virus program. The purpose of this software is to recognize known viruses, Trojans, worms, spyware and so on. When malware attempts to access your computer, the anti-virus program will block it. No anti-virus program can offer complete protection since the software can only identify and block known malware. Nevertheless an anti-virus program belongs to the most fundamental security measures of a computer.
Be aware that operating systems need current updates in order to be able to stop any security breaches. It is recommended to back up your computer’s most important data onto another medium. This way you will at least have a backup copy should the system be damaged by malware. If you want to protect yourself as much as possible from spam e-mails and their consequences, you should use a spam filter, an anti-virus program, and create a backup copy. The best protection is to be cautious when opening suspicious e-mails and handing out your e-mail address.
IONOS E-Mail Validation service
Check the authenticity of a IONOS e-mail, find here immediately whether it is phishing attempt and report it to remove the phishing content.
|
<urn:uuid:50a1d02e-b4e1-4144-a5f1-40b6ce5788e2>
|
CC-MAIN-2020-29
|
https://www.ionos.com/digitalguide/e-mail/e-mail-security/how-to-recognize-spam-e-mails-and-prevent-them/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878753.12/warc/CC-MAIN-20200702111512-20200702141512-00578.warc.gz
|
en
| 0.945543 | 1,916 | 2.671875 | 3 |
The nurse is making a home visit to an elderly client during the summer. Upon arrival, the nurse notices the refrigerator and freezer doors are open as the client is using both for air conditioning. Which of the following actions by the nurse are most appropriate?
instruct the client to place a fan in front of the freezer to enhance circulation of cool air
hold a meeting with the client and family to advise them of the safety risks of this practice
note this observation in the client’s medical record, but do not discuss with the client
report the incident to the nursing supervisor
Number 2 is correct.
The nurse has an obligation to promote safety of the client in the home. Leaving the refrigerator and freezer door open for extended periods of time may lessen the temperature of perishable food items. Instructing the client to place a fan in front of the freezer serves to encourage risky behavior. The nurse has an obligation to intervene when an unsafe practice is observed in the house. In a reasonable period of time the nurse should inform the nursing supervisor, but this is not the most appropriate action to address a potential safety hazard.
|
<urn:uuid:58773c00-c1a2-4e57-ae31-534fc0f09b3d>
|
CC-MAIN-2023-23
|
https://nclex.me/the-nurse-is-making-a-home-visit-to-an-elderly-client-during-the-summer-upon-arrival-the-nurse-notices-the-refrigerator-and-freezer-doors-are-open-as-the-client-is-using-both-for-air-conditioning-w/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649439.65/warc/CC-MAIN-20230604025306-20230604055306-00060.warc.gz
|
en
| 0.946272 | 226 | 3.15625 | 3 |
(i) Source of illumination is a beam of electrons (not visible light)
(ii) There are a series (usually three sets) of electromagnets for focusing the beam of electrons. These are called magnetic lenses (not made out of glass)
The general construction pattern of TEM is same as that explained above. TEM is for studying the structural details of the various components present in a cell or microbe.
The specimens form a contrasting image with all the structural details. Depending on their refractive index, the components of a specimen bring about varying degrees of scattering of the electron rays.
Generally however biological specimens do not produce a great degree of scattering of electrons, hence the contrast is low. Staining is resorted to improve the contrast-But instead of dyes used for staining in light microscopy, electron dense heavy metal salts are used for staining in electron microscopy.
Some problems are encountered while viewing a specimen through TEM. Many a time artifacts appear which can be easily mistaken to be a component of a cell.
(An artifact is the appearance of something in an image due to causes within the optical system or due to the preparation of a specimen and does not represent any component of the specimen under view).
Proper preparation of the specimen, correct adjustment of the electron beams, accurate acumination will help in reducing the chances of artifact appearance.
Preparation of specimen for TEM:
The biological specimens to be examined have to be specially prepared in order to obtain proper structural details with high magnification, but at the same time avoiding the appearance of artifacts. The following steps are necessary before the specimens are ready for observation under TEM.
Dehydration and fixation:
Under light microscopy specimens are kept in water or oilier liquids for observation. But in an electron microscope, the specimens have to be absolutely dry.
Any water present, the specimen would boil (as it is in a vacuum) resulting in disintegrating the structural organization of the specimen.
Additionally the specimen also has to be fixed in its proper orientation. Fixation and dehydration have to be carried out in several stages in order to prevent distortion.
From the point of view of magnification obtained in an electron microscope, microbes are too thick for viewing.
Hence normally they are cut into thin sections using an ultra microtome. The ultra microtome has a device which advances the fixed specimen on a diamond or glass knife surface at a known thickness so that sections of uniform thickness are cut. The microbes are usually embedded in a plastic resin to facilitate sectioning.
In order to enhance the contrast, the specimens are stained with heavy metal containing compounds such as phosphotungstic acid.
The staining can be negative or positive. In negative staining, the sectioned specimen in dipped in heavy metal solution which stains the background and not the specimen. The specimens are then visualized in relief against a dark background.
This is a special technique employed mainly to reveal the details of structure in microbes. In freeze etching, various biochemically defined layers are made visible, including the organelle details. In this technique (instead of using fixatives to preserve the cell structure) the specimens are rapidly struck with a knife blade.
At this temperature (freezing) biological specimens are hard to cut, but they crack along the lines of their natural weakness i.e. they are fractured. The fractured specimen is then etched i.e. the water (ice) is allowed to evaporate from the surface.
This evaporation raises the surface layers of the specimen. A replica then is made of the freeze etched specimen, by exposing it to vapors of heavy metal (platinum) at 45° angle to produce a shadow effect.
The specimen then is rotated at 90, and exposed to vaporized carbon. This produces a replica of the surface of the specimen.
After removing the remnants of biological material, the carbon replica is viewed under electron microscope. Surface details (internal as well external) of organelles can be clearly visualized by the freeze etching technique.
2. Scanning electron microscope (SEM):
SEM is primarily used for visualizing the surface architecture of the specimen (pollen grains, hairs, membranes, etc.) rather than the internal details. In a SEM, an electron beam is scanned across the surface and a three dimensional image is produced.
The construction plan and working principles of a SEM is different from that of Tem. In SEM, an accelerated beam of electrons is produced from the electron gun and is focused on the specimen by the condenser lens.
The magnetic lenses of a SEM are so constructed as to produce an extremely thin beam of electrons. Electrons are then transmitted from the collector to a detector which has a substance that emits light when struck by electrons. The light so emitted is converted to an electrical current which is used to control the brightness of an image on a CRT (Cathode Ray Tube) screen.
The secondary electrons deflected out of the specimen will be a replica of the refractive index of the surface and thus produce an image on the CRT screen revealing all the topographical details.
Image contrast mainly depends on surface topography which determines the number of secondary electrons reaching the detector. The image on the CRT screen will be three dimensional.
Magnification of the image of the specimen in SEM is not achieved through the lenses as in a light microscope or TEM. It is dependent upon the ratio of the length of the scan across the specimen surface to the length of the scan of CRT.
For instance if the electron beam scans 100 nm across of specimen and the image on CRT is 100 nm, the magnification is 100000 times. Thus one can decide the magnification (depending on the requirement) by adjusting the scan distance across the specimen.
SEM also has a resolution equal to that of TEM. A resolution from 1 -10 nm is possible with a corresponding magnification from 10000-100000.
Preparation of specimen for SEM
As SEM also operates on a vacuum like TEM, total dehydration is necessary, but as surface topography is essential, dehydration should be done in such a way as not to disturb the surface configuration.
This is achieved by critical point drying which minimizes artifact formation. In critical point drying at a particular temperature and pressure, the liquid changes to gas without any surface tension damage to the specimen.
The specimen is first immersed in ethanol or acetone to remove water and then in pressurized-liquid of C02 simultaneously raising the temperature above 32°C, the critical point of C02. At this temperature range, the liquid vaporizes without surface tension leaving the specimen perfectly dry.
2. Shadow casting:
In this technique, the specimen is coated with an extremely thin layer of gold, gold-palladium or platinum at an oblique angle, so that the specimen produces a shadow on the uncoated side.
The shadow technique results in the production of a three dimensional topographic image of the specimen. Coating is done with a device called a sputter coater. In some cases double shadowing also can be done by coating the materials from two different angles.
3. Surface replica:
In this technique, widely used for the study of architectural pattern of the wall surface of spores, pollen etc, a thin layer of a coherent material is coated on to the specimen who is then floated on to a water surface, from where it is transferred on to a strong acid or alkali.
This dissolves the specimen without damaging the replica. The replica is then dried and kept on the metal grid for viewing.
|
<urn:uuid:16ce021c-0186-4d80-91e8-bbc036de00c8>
|
CC-MAIN-2020-29
|
https://taxteaparty.com/useful-notes-on-2-basic-types-of-electron-microscopes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896905.46/warc/CC-MAIN-20200708062424-20200708092424-00517.warc.gz
|
en
| 0.917977 | 1,560 | 3.578125 | 4 |
Childhood is a happy, exciting time of life
Our school’s philosophy and practices reflect our dedication to high quality care and education for young children.
The Hersh Core Knowledge Curriculum is used in our preschool, pre kindergarten, and kindergarten classes. We believe that children learn by doing and need small group sizes to receive the necessary attention each child deserves. We believe that parents are the most significant adults in their child’s life. Through mutual respect and open communication, our staff enjoys a strong partnership with parents, aiding each child to develop physical, social, and emotional skills.
Childhood should be a happy, exciting time of life. A time that allows children opportunities to explore, create, and develop self confidence. Our classrooms offer challenging play and learning choices, allowing children opportunities to experience and learn…..and most importantly to succeed.
We practice positive methods of discipline that help establish consistent, age appropriate limits, to help children function in their world. The physical environment at Spring Creek School is safe, clean, healthy, and child oriented. Our goal is to meet the social, emotional, intellectual, and physical needs, of each child entrusted to our care.
|
<urn:uuid:edba4d7d-4a98-4aea-8384-6255b8611fc3>
|
CC-MAIN-2017-34
|
http://springcreekschool.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105955.66/warc/CC-MAIN-20170819235943-20170820015943-00698.warc.gz
|
en
| 0.936868 | 239 | 2.59375 | 3 |
What is Raman spectroscopy?
Raman scattering was first observed by C. V. Raman and his research assistant K. S. Krishnan in February of 1928. Raman observed this effect by focusing sunlight onto a liquid or dust-free gas. For these experiments, Raman’s eye acted as the light detector. Raman published his findings in Nature and won a Nobel Prize in Physics for his work.
To understand Raman spectroscopy, a basic knowledge of the variety of types is helpful. There are two main kinds.
Other motions such as the umbrella opening and closing in NH3 can be used to describe vibrational modes. Each vibration mode vibrates at a unique frequency allowing for identification of each feature.
such as Raman and IR, detect each of these modes based on their respective energies. Varying portions of the electromagnetic spectrum from ultraviolet to infrared and beyond interact with matter in various ways. Vibrational spectroscopies measure the energy changes in molecules that result in modifying the way their bonds vibrate.
This means that bonds can expand, contract, and flex. Vibrational modes can be described by a variety of different motions such as symmetric stretching, asymmetric stretching, bending, twisting, wagging, rocking, and breathing.
Because each atom has a different mass, and each type of bond has a different strength, one can imagine that a molecule is made up of various balls of different masses connected by springs of different strengths. Bonds between atoms are not rigid and are better modeled by springs.
Infrared, or IR,
spectroscopy is a widely used for detection and analysis of vibrational
modes. This method
through a sample and measuring the
wavelengths are absorbed.
For IR, the wavelengths of light that are absorbed relate to vibrational modes that change the dipole moment of the molecule. In FT-IR spectroscopy a beam containing a spectrum of IR light is split using optics and passes through a sample and a reference cell. The beam that passes through the sample is absorbed at the appropriate excitation wavelengths.
The light that passes through the reference is directed toward the sample beam in such a way that light of the same wavelengths destroys each other. This leaves a light equivalent to that absorbed by the sample which is then detected.
Raman vs. Infared
In order to understand the difference between detection by of vibrations by infrared and Raman one must understand the effects of vibrations molecular dipole. Vibrations that change the net dipole will be detected in infrared while those that do not are likely detected in Raman. This can be easily shown in carbon dioxide.
Carbon dioxide has four vibrational modes: a symmetric stretch, and asymmetric stretch, and two bends. Since oxygen is more electronegative than carbon, electron density will be brought toward the oxygen. This causes a dipole shift during the asymmetric stretching and bending modes as the electrons are being pulled unevenly in the molecule. This causes these modes to be infrared active while the symmetric stretch, which does not undergo this effect, is Raman active.
|
<urn:uuid:5ac93bab-9231-4e56-b9df-7a17e415e001>
|
CC-MAIN-2023-23
|
https://www.learnraman.com/what-is-raman
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00451.warc.gz
|
en
| 0.941228 | 689 | 3.90625 | 4 |
The Hallaton treasure gives us an unparallel insight into the deposition of coin hoards, even if it presents a special case with the late Iron Age shrine it is connected with. Vicki Score (2011) and a series of specialists have published lately a full volume to present different aspects of the hoard. Even if it is clear that more cartographic presentations and reconstructions will follow taken the emphasis on textual representation in presenting the context and interpretations, the volume shows us how the coins entered into the treasure.
Approximately 64 % of the coins originated from properly excavated stratified contexts. Out of over 5000 coins only 149 were Roman and 116 from other Iron Age areas outside north-east Corieltavi. Most stratified finds were related to an entranceway or to the Roman helmet. The latest Roman coins struck were from early Imperial period from the reign of Emperor Claudius AD 41/42. This confirms the exceptional nature of these deposits originating from a time when ‘the Romans were coming’.
The excavators could count 14 separate hoards in the entranceway area, several of them in clustered appearance, clearly been put into ground in ‘purses’. The make-up was very similar and the coins came from the same circulation pool. They were deposited over an extended period but Leins in the volume assumes they were buried in c. AD 43-50, during the early post-conquest period when the East Midlands was falling under the Romans. The coins buried with the helmet, presenting two different areas of deposition, nevertheless seem to form a single act of deposition. There was a discreet group of coins in the north-eastern part of the helmet pit but there was a number of coins alongside the helmet. The chronological distribution of the helmet coins was consistent with the reign of Emperor Tiberius.
In comparison, only a tiny number of coins came from ditches or other contexts. However, the composition of the ditch contexts was different with 50 % of coins being unstruck early types. These coins represented only a few percent of the entranceway or helmet deposits. There were other metal objects from the ditch, including a silver bowl and silver and silver and copper alloy ingots. The ditch deposits were partly destroyed by a land drain so a detailed reconstruction of the ditch fill contents is not possible.
The general trends in chronological composition were very similar, if not identical to the Scole and Warmington hoards. However, the Hallaton distribution peaks at 89-80 BC that is considered peculiar to the site. A number of coins from the stratified contexts and especially from unstratified ploughsoil are from later Roman periods. There were coins from the Flavian period and the reigns of Trajan and Hadrian but a higher number from the late Roman times, especially the late 4th century AD. These finds seem to avoid the Iron Age ritual area, though.
The coin deposits follow different logics. The early ditch deposits were lying on the left-hand side when going in, whereas the entranceway deposits were on the left-hand side when going out. In addition, the feasting deposits were buried outside the boundary. Score suggests a social distinction between the participants inside and outside. The location of many of the hoardsites near the hilltops suggest that the rituals were highly visible to those who were not directly participating in the acts.
Score, V., 2011. Hoards, Hounds and Helmets. A conquest-period ritual site at Hallaton, Leicestershire. Leicester Archaeology Monograph 21.
|
<urn:uuid:ac5fa27f-3b93-41cb-9cc2-5f043299f46b>
|
CC-MAIN-2017-47
|
http://landscapeperceptions.blogspot.co.uk/2012/10/coins-in-context.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806225.78/warc/CC-MAIN-20171120203833-20171120223833-00336.warc.gz
|
en
| 0.966067 | 725 | 3.265625 | 3 |
Rising temperatures and high carbon dioxide emissions are the means through which humans are inadvertently causing the decline of several species. But one animal actively uses both heat and carbon dioxide as murderous weapons – the unassuming honeybee.
With their stings and numbers, bees already seem to be well-defended but they are completely outgunned by giant hornets (right). These two-inch long monsters are three times longer than several times heavier than tiny honeybees and raiding parties can decimate entire hives. European bees mount little in the way of an effective defence, but Japanese bees aren’t so helpless. When their hives are invaded, they launch a mass counterattack.
Swarms of workers dogpile the hornet, pinning it down while vibrating their wing muscles. At the centre of this “heatball”, the frenetic buzzing heats up the hornet to a roasting 45 degrees Celsius.
Scientists have long thought that this manoeuvre bakes the hornet alive, for the bees that surround it are more resistant to high temperatures. But Michio Sugahara and Fumio Sakamoto from Kyoto Gakuen University have found that this isn’t the whole story.
They noted that heat-balls kill hornets in a mere ten minutes, but hornets will happily sit in a hotter 47C incubator for longer than that. To find out how the bees were actually killing their foes, the duo captured and anaesthetised giant hornets and taped them to the end of either a thermometer probe or a gas detector. Ignominiously restrained, the hornet was brought towards the hive and immediately surrounded.
Ten minutes later, and all the hornets were dead. Four were actually removed within four minutes and while three survived, they were in critical condition. As others have noted, the temperature within the buzzing throng rose to 46 degrees within five minutes. But Sugahara and Sakamoto also found that the concentration of carbon dioxide within the tight ball of bees was a whopping 3.6%, around 5 times higher than the levels around a typical hive and 100 times higher than levels in the atmosphere.
The presence of so much CO2 changes things for the hornet. In normal air, it takes temperatures of 47-48C to kill a hornet but when CO2 levels rise to 3.7%, that tolerance falls to 45-46C. This two degree gap is the difference between life and death for it puts the threshold of the hornet’s heat tolerance within the temperature range of the heatball. The bees themselves are safe. Regardless of CO2 levels, they can withstand temperatures of 50-51C but when carbon dioxide levels are high, hornets just can’t take the heat.
The buzzing defenders generally produce the most heat and carbon dioxide within the first five minutes of heatballing. Sugahara and Sakamoto suggest that it may only take this long to vanquish the hornet, and the rest of the 10-minute slot is “free running to ensure their victim’s death”.
Reference: Naturwissenschaften DOI 10.1007/s00114-009-0575-0
More on bees: Come back in a few hours and I’ll repost and old article I wrote about a different variation on the heatball defence.
|
<urn:uuid:a4a92ff8-ea45-4249-a83d-7893d69a3c51>
|
CC-MAIN-2014-15
|
http://scienceblogs.com/notrocketscience/2009/07/05/bees-kill-hornets-with-carbon-dioxide-emissions-and-local-wa/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538824.34/warc/CC-MAIN-20140416005218-00469-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.945878 | 694 | 3.109375 | 3 |
Theater workshops are small classes that focus on interaction and practice within different areas of theater. In most cases, students in these classes create a product or finished piece, but there are some workshops that simply teach techniques. The use of the term workshop as opposed to class is primarily due to tradition, as there are many acting classes that function much like workshops. Generally, the duration of a workshop is shorter than that of a class, and the students involved may critique one another as part of the learning experience.
Within the broad category of theater workshops, there are a number of smaller, more specific types of workshops available. It is common, given the short duration of most of these activities, for these workshops to be highly specific or involve a small number of participants. Play writing workshops, acting workshops, and even design workshops all fit under the broad category of theater workshops. Many are even more specific, focusing on, for example, a single style of acting or problems within play writing.
In many cases, theater workshops are taught by talented professionals or famous individuals. When offered through a school, this type of experience is a great way for institutions to connect students with important theater figures without demanding that the professional teach a full class. Each teacher may have a different style for teaching workshops, but some adhere to very strict guidelines. There are also traditional teaching styles that may be common in certain theater movements.
The activities performed in theater workshops depend on the subject at hand. In acting workshops, students may work on scenes or physical tasks. Writing workshops often involve bring a piece to work on and critiquing the work of others. Design workshops are frequently limited by the scale of many theater projects, and thus often focus on creating small models or other reasonable projects. Some workshops involve significant amounts of work outside the group, but others focus on creating an experience within the class.
While there are many reasons that people attend theater workshops, one of the most compelling is the chance to interact with other individuals a student respects professionally. This means that the caliber of participants and teachers has a large impact on the value and prestige of the workshop. Some well-established workshops are thought of as breeding grounds for future stars in theater and are thus highly competitive. Smaller workshops can be just as valuable, but rely on mutual respect for success.
|
<urn:uuid:87bca5e5-781d-498b-86c2-9c2b1e854fa8>
|
CC-MAIN-2014-10
|
http://www.wisegeek.com/what-are-theater-workshops.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010722348/warc/CC-MAIN-20140305091202-00073-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.96768 | 465 | 3.53125 | 4 |
The influence of food characteristics, activated goals and dietary restraint on the portion size effect
01 / 2012 - 01 / 2016
The portion size effect, the increase in intake when the food portion size is increased, is believed to be an important contributor to the increasing prevalence of overweight and obesity (Chandon 2012, Rozin et al 2003). Although the existence of the portion size effect has been clearly established, less is known about the moderators and boundary conditions of the effect. The aim of this research is to (1) determine to what extent the portion size effect differs for foods that differ in perceived palatability and perceived fattiness, (2) investigate the moderating effect of the activation of a health or food-enjoyment goal on the portion size effect, and (3) to investigate the role of dietary restrained in susceptibility to the portion size effect. We will examine this using lab experiments in which the portion size, perceived palatability of the food, fattiness of the food, and goal activation will be independently manipulated. When we have a better understanding of the factors that can strengthen or diminish susceptibility to the portion size effect, we can use this knowledge to strengthen the portion size effect for healthy foods, such as fruits and vegetables, and diminish it for unhealthy foods.
|
<urn:uuid:9f476535-f545-4c75-941e-2e9d46e88e1b>
|
CC-MAIN-2014-41
|
http://www.narcis.nl/research/RecordID/OND1347093/Language/nl
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137145.1/warc/CC-MAIN-20140914011217-00151-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.90617 | 259 | 2.625 | 3 |
|People subject to emotional, physical and sexual violence
- Staff training to accommodate sensitivities when communicating with people who have been subject to violence.
- Strict guidelines in place to help staff recognise when it is appropriate to contact authorities and the function of mandatory reporting.
|Vulnerable people (e.g. children, or adults who are unable to protect themselves against exploitation)
- Appropriate screening for people (including sub-contractors and volunteers) who are working with, or are in contact with, vulnerable people.
- Staff-to-client ratio adjustments relative to the complexity of the case load.
- Understanding local and national Indigenous culture, including languages, customs and community structures.
- Awareness of cultural sensitivities relating to gender roles, kinship structures, social dynamics and traditional practices.
- Employing Indigenous staff members where appropriate.
- Delivering cultural sensitivity training for all staff members
- Consulting with local Indigenous elders where necessary and the creation of strong networks with local leaders and groups.
- Aligning to the Government’s Indigenous Advancement Strategy and the Whole of Government Programs Framework.
- Employing staff skilled in AUSLAN (Australian Sign Language), or providing training where necessary.
- Staff knowledge of when and how to organise a sign language interpreter for clients who communicate using AUSLAN.
- Assistive listening systems (such as hearing loop) are available and staff understand how to organise and operate them.
- Ensuring all website materials meet accessibility guidelines - WCAG2.0 Level AA compliance.
|Mobility and access restriction
- Accommodating mobility needs, including ramp access and accessible facilities in service outlets, including access to toilets and kitchens where appropriate.
- Designated and adequate disability parking or knowledge of local mobility transportation services.
- Providing spare wheelchairs and other walking aids on-site.
- Making sure services allow enough time for appointments to cater for restriction of access and mobility.
|Blind or low vision
- Facilities built to accommodate low or nil vision, particularly for safe navigation.
- Braille variants of materials, where appropriate.
- Website materials supporting text-to-speech functionality - WCAG2.0 Level AA compliance.
|Hard of hearing
- Contact details on website include a TTY email address for those who cannot operate standard phone services.
- Staff have a working knowledge of how to organise and implement assistive listening systems (such as a hearing loop, live captioning and National Relay Services).
- Making sure service outlets provide a noise free environment, where possible.
- Making sure all website materials meet accessibility guidelines - WCAG2.0 Level AA compliance.
|Culturally and Linguistically Diverse (CALD) and older people
- Making sure that people (including sub-contractors and volunteers) who are working with, or are in contact with, Culturally and Linguistically Diverse people, including older people, are appropriately trained to have an understanding of CALD and ageing client needs.
- Staff knowledge of the common languages and cultures within their service delivery area.
- Considering the specific services needs of the aged, veterans, refugee and migrants using services.
- Employing multilingual staff where necessary.
- Providing credentialed translators and interpreters via face‑to-face, telephone or video conference where appropriate.
- Making sure that website and advertising material are clear, meet accessibility guidelines and cater to the multiple language options of client groups.
|Intellectual impairment or disability
- Appropriate and respectful use of language, visuals and tone.
- Materials available in appropriate accessible format and prepared in easy-English.
- Clear contact details for further support or advice.
|People who identify as gay, lesbian, bi-sexual, transgendered, queer or intersex (LGBTI).
- Making sure people (including sub-contractors and volunteers) who are working with, or are in contact with lesbian, gay, bisexual, transgender and intersex people are appropriately trained to have an understanding of LGBTI client needs.
- Appropriate and respectful use of language and visuals that do not assume heterosexuality or binary gender identification.
- Staff having a working knowledge of the barriers that people who identify as LGBTI may encounter.
- Creating a LGBTI inclusive environment.
|
<urn:uuid:8ac0d715-3ce0-4b8b-931a-b6590431e441>
|
CC-MAIN-2023-23
|
https://www.communitygrants.gov.au/access-and-equity-policy
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00609.warc.gz
|
en
| 0.884936 | 939 | 2.5625 | 3 |
Trying to navigate your way through the world of investing in an effort to not only make good investment decisions, but also to avoid the pitfalls of poor investment advice, can be a daunting task. Some investors struggle just trying to understand the everyday language of investments. Add to that the countless types of investment vehicles available and how investment rules differ among them, and it is easy to see why investment advisors play such a critical role in helping investors decide which investments are best for them.
One popular investment opportunity is municipal bonds, also known as munis. These bonds are issued to off-set the capital expenses of municipalities or for special improvement projects such as schools or airports. Munis are publicly traded, leveraged closed-end bonds that sell a fixed number of shares, as opposed to open-end funds which do not restrict the number of shares that are issued. The money for these closed-end funds is borrowed from the issuer and then listed and traded on an open stock exchange. One of the things that both advisors and investors find appealing about municipal bonds is that they are exempt from federal taxes and, often times, also exempt from state taxes for the residents of the state in which they are issued.
In 1940, Congress passed the Investment Company Act of 1940 to prevent abuses of mutual fund and closed-end fund shareholders by requiring investment companies to release information about material details and about the financial health of each investment company. Although it applied to the United States, it exempted Puerto Rico because any investments issued there are not considered to be issued by a “state”. According to then general counsel for the Securities and Exchange Commission, David Schenker, stated that Puerto Rico was, “so far away from America that the policing aspects are quite difficult.”
As a result of this ruling, one investment that seems to keep rearing its head in investment news over the last couple of years is the Puerto Rico municipal bond. How the Puerto Rico muni bonds differ is an interesting case. The basis of leveraged bonds is that they will yield enough in returns to repay the loan with a profit above and beyond the interest rate of the loan. Leveraging creates a much higher risk for investors in an investment than is generally considered safe.
The disparity between protection of investors of domicile-issued bonds and those issued in Puerto Rico leads to a significant increase for potential losses. The exemption provided by Investment Company Act for Puerto Rico muni bonds permits issuers to leverage up to 50% of the fund’s assets, as opposed to only a 30% leverage allowance for closed-end funds that are issued within the 50 fifty states. With these Puerto Rico muni bonds, an additional 5% can be leveraged for “special circumstances”, which can cause as much as 55% of Puerto Rico muni bonds to be leveraged. This can easily result in huge losses for an investor if these muni bonds don’t perform as well as anticipated.
Wading through such issues can be complex, especially when special rules apply dependent upon where it munis are issued. If you feel that you have been misled and/or suffered a financial loss as a result of these varying rules or by investing in Puerto Rico municipal bonds, please call the office of The Blum Law Group at 1-877-STOCK-LAW. We offer a free consultation to help you understand if you are entitled to recompense.
|
<urn:uuid:bbf3da30-4f46-445b-8ef8-dea79d8bb7fc>
|
CC-MAIN-2017-39
|
https://www.stockattorneysblog.com/2014/03/puerto_rico_municipal_bonds_no.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696653.69/warc/CC-MAIN-20170926160416-20170926180416-00496.warc.gz
|
en
| 0.968443 | 695 | 2.53125 | 3 |
You Need Zinc! Here Are the 18 Foods Highest In It
Products are manufactured and sold by a third party. As an associate, Openfit may earn commissions from qualifying purchases on this site.
Zinc isn’t a nutrient that most of us think about on a regular basis. But it is an essential mineral, meaning we have to get it from food since our bodies can’t produce it on their own. That makes consuming foods high in zinc important for a rounded diet.
Read on to find out which foods are highest in zinc and which are lower than you might think.
What Is Zinc?
“Zinc is a very important mineral,” says Amy Gorin, MS, RDN, owner of Amy Gorin Nutrition in the New York City area. “It’s an essential mineral necessary for the proper function of your immune system and wound healing. It also plays a role in other important body functions such as synthesizing protein and helping maintain your sense of taste and smell.”
Zinc might come last alphabetically on the list of essential nutrients, but it’s responsible for some pretty important tasks. “Virtually all cells contain zinc,” says Laura N. Brown, MS, RD, LD, a registered dietitian and ACSM certified personal trainer.
Helps immune function
“Zinc plays an important role in your immune system,” says Gorin. “When you’re deficient in zinc, this impacts how T-cells develop and work. Your T-cells are in charge of many immune responses, including attacking bacteria, viruses, and other foreign substances. When you’re deficient in zinc, you are more susceptible to illness because your natural immune defenses are down.” (This is why some people might reach for a zinc lozenge when they start to feel a cold coming on.)
“It’s also important for fertility in men and women,” says Openfit Nutrition Manager and Registered Dietitian Andrea N. Giancoli, MPH, RD. One study found zinc may actually be a marker in diagnosing or treating male infertility (adequate zinc intake is necessary for healthy sperm). But while Giancoli says it’s an interesting finding, it has yet to be duplicated. For women, preliminary research in mice shows “zinc can actually affect egg development which may affect fertility.”
Brown broke down zinc’s other main roles:
- Helps cells fight free-radicals, thereby decreasing risk for cell mutation and disease development.
- Assists with growth and development.
- Helps with the synthesis, storage, and release of insulin.
- Aids in wound healing by interacting with blood platelets, which are important for clotting.
- Helps regulate gene expression, specifically DNA and RNA.
- Involved in thyroid hormone function.
- Plays a role in learning and behavior.
- Activates vitamin A, which is necessary for eye health.
- Is necessary for taste perception.
How Much Zinc Should I Get Per Day?
The Recommended Dietary Allowance (RDA) is the average dietary intake per day of a given nutrient necessary to meet the requirements of nearly all healthy individuals.
For zinc, the RDA is:
- Men: 11 mg
- Women: 8 mg (during pregnancy: 11 mg, during lactation: 12 mg)
Are there side effects of getting too much zinc?
You can easily overdo it on zinc. “More is not better,” says Giancoli. “Zinc is a mineral, so it’s not getting broken down.”
So, what can happen? Nausea, vomiting, diarrhea, abdominal cramps, loss of appetite, or headache.
“Zinc toxicity can occur from food-based or supplement-based sources,” says Gorin. “The tolerable upper limit isn’t very high, so definitely make sure you’re not overdoing it on supplements or lozenges. And if there are instructions on a supplement or lozenge to take the product only for a specific number of days/servings, definitely make sure to follow those instructions.”
What happens if I have a zinc deficiency?
“Zinc deficiency is not common in developed countries,” says Brown. But it can happen — pregnant women, young children, and older adults are at increased risk — and can have plenty of health consequences.
Gorin broke down the potential symptoms: “The list is long and may include loss of appetite, diarrhea, impaired immunity, hair loss, weight loss, abnormal taste, eye and skin lesions — and even growth retardation, delayed sexual maturation, or impotence.”
Top Food Sources of Zinc
In general, the foods highest in zinc are animal foods, especially shellfish, says Giancoli. But don’t worry if you’re vegetarian or vegan, she says. Beans, whole grains, and fortified breakfast cereals and breads can help you meet your daily needs.
Giancoli cautions that if you’re relying on plant-based sources of zinc, you might need up to 50 percent more. “The phytates in these foods actually bind some of the zinc and inhibit the absorption,” she says, adding that soaking and/or sprouting whole grains and legumes can help boost the bioavailability of not only zinc but other nutrients.
Here’s a rundown of some common foods high in zinc — followed by some that are good sources, and others that you might be surprised to find aren’t so high in this essential mineral.
Foods high in zinc
The following foods contain at least 2.2 mg of zinc per serving.
Zinc: 32.2 mg | Serving size: 3 oz., raw
The same amount of canned oysters has a whopping 77 mg of zinc. So don’t overdo it on the oysters — 40 mg is considered the upper level of safe, says Giancoli.
Zinc: 4.7 mg | Serving size: ¼ cup, toasted
Swap in wheat germ for your morning oats or sprinkle it on yogurt for a snack.
Zinc: 4 mg | Serving size: 3 oz., ground, 93% lean
Looking to boost your protein intake? A 7 percent fat burger is not only an excellent source of zinc, it has almost 18 g of protein.
Pumpkin seed kernels
Zinc: 2.5 mg | Serving size: ¼ cup, dried
Known also as “pepitas” when shelled, these crunchy little seeds are perfect on top of salads or popped.
Zinc: 2.9 mg | Serving size: 3 Tbsp., hulled
Three tablespoons of hulled hemp seeds are an excellent source of zinc and total 9 g of protein.
Zinc: 2.5 mg | Serving size: 1 cup, cooked
Says Gorin: “I recommend that anyone include pulses in their diet… These protein sources (18 g/cup) are among the best vegetarian sources of zinc!”
Zinc: 2.5 mg | Serving size: 1 cup, cooked
Bring on the dessert hummus! A one-cup serving of cooked garbanzo beans also contains almost 15 g of protein.
Zinc: 2.3 mg | Serving size: 3 oz., steamed
Shellfish like mussels are packed with minerals and vitamins, including B12.
Zinc: 2.2 mg | Serving size: 1 cup, plain, low-fat
Yogurt’s nutrient density and versatility make it perfect for finding creative ways to work more of it in to your meals.
Good food sources of zinc
The following foods contain at least 1.1 mg of zinc per serving.
Zinc: 1.6 mg | Serving size: ½ cup, fortified
All the more reason to eat overnight oats for breakfast!
Zinc: 1.6 mg | Serving size: 1 oz., raw
Zinc: 1.4 g | Serving size: 3 oz.
Cooked shrimp is not only high in protein (20 g), a serving also qualifies as a good source of zinc.
Zinc: 1.3 mg | Serving size: 3 oz., roasted
In addition to 25 g of protein, a serving of roasted turkey is a good source of zinc. So add some turkey recipes to your meal plan this week!
Zinc: 1.2 mg | Serving size: 1 oz., cheddar
Zinc: Varies | Serving size: ½ cup, cooked
These foods contain less than a gram of zinc
The following are foods most associated with internet searches for zinc that fall short of qualifying as “good” sources of the mineral.
|
<urn:uuid:f051cb7e-8408-4dfd-a728-3d10cf3e42f9>
|
CC-MAIN-2020-16
|
https://www.openfit.com/foods-high-in-zinc-benefits
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00164.warc.gz
|
en
| 0.913534 | 1,861 | 2.953125 | 3 |
The River of Grass Greenway (ROGG) Vision
“The River of Grass Greenway (ROGG) is a proposed non-motorized transportation and recreation corridor across the Everglades, connecting Naples and Miami, that promotes enhanced opportunities for education and stewardship of the environmental and cultural assets of this unique area.”
What is the ROGG?
The idea for the proposed River of Grass Greenway (ROGG) was born out of a notion to provide public access to one of the most unique and well-studied landscapes in the world. Building on the allure of a long-distance hiking and biking experience for a variety of users, the ROGG is envisioned to bring awareness to the Greater Everglades ecosystem, including the ongoing ecological restoration in the region. Well-planned, multi-use paths such as the ROGG allow access to natural areas, provide pathways for alternative modes of transportation and enhance opportunities for improved fitness.
Drawing upon the historical corridor of the Tamiami Trail, designated as U.S. 41 /Tamiami Trail/S.R. 90 (hereafter U.S. 41), the proposed ROGG links six national and state parks, preserves, forests, and wildlife refuges. Connecting Naples and Miami, ROGG is envisioned as a 76.47-mile pathway that will parallel U.S. 41 and would be suitable for a wide range of non-motorized transportation and recreation activities such as walking, bicycling, bird watching, photography, fishing and general enjoyment and education of the Everglades ecosystem.
|
<urn:uuid:bfe5f44a-de62-4aba-b3c9-7341164b5610>
|
CC-MAIN-2020-29
|
https://evergladesrogg.org/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655912255.54/warc/CC-MAIN-20200710210528-20200711000528-00296.warc.gz
|
en
| 0.939391 | 332 | 2.609375 | 3 |
The era spanning from the 1790s to the 1820s saw an emphasis on
elegance and simplicity which was motivated by the democratic ideals of the
French Republic but which looked back to classical Greece and Rome for its
fashion inspiration. Waists were high, the directional emphasis was vertical,
and lightweight white fabrics were at the height of fashions which were so
simple that the lady of the time often wore only three garments; a chemise, a
corset and a gown! This was an incredible contrast to the clothing of preceding and
succeeding periods with their horizontal emphases, multiple layers and often
The chemise was the only ladies' undergarment used during the era. (Panties
would not be developed until the 20th century and pantalets were not in vogue
until Victorian times.) The chemise was simply constructed of linen or cotton.
In modern terms its appearance was similar to a long blouse or short
In the early days of the Regency era some women wore tight but lightweight
linen stays which had an effect similar to a modern push-up bra while some
wear no support at all. The ideal was to emulate the "classical" Greek look of
ancient statuary and the older conical shaped stays of the Georgian era didn't do the
trick. But soon new corset designs had caught up in "support" of the latest
The corset was worn over the chemise, was typically made of linen, laced in
the back, was “boned” for firmness and often had a long wooden or whalebone busk in
the front to create the “lift and separate” support necessary for Regency
fashions. A lady wearing a proper Regency style corset will likely carry
herself with flawless posture.
Gown or Dress:
The gown was at least ankle length and had a very high “empire” waist. Some
bodices scooped quite low in front and/or back while others were more moderate.
Some had trains in the rear which were pinned up while dancing. The sleeves
could be short or wrist length as each style was popular at different times.
Even a few sleeveless gowns were seen early in the period. The fabric was usually
light in color with solid white being the favorite of the era. Small patterns
and vertical stripes were also used. Good fabric choices would be lightweight
such as cotton batiste, lightweight cotton muslin or a silk such as charmeuse
that isn’t too stiff but has a good “drape” to it. Sometimes a very light
semi-transparent overdress was worn on top of the main article. White cotton
voile or silk chiffon might be good fabrics for such an option. Trim could be
in the form of piping, metallic braid or ribbon.
The Spencer Jacket was an item peculiar to the Regency period which went well
with the empire waist gown. It was very fitted, had either a standing or flat
collar and could have short or long sleeves. The bottom of the jacket
conformed level with the high waist of the gown. Spencer Jackets were often
made of linen though wool or silk could be used.
Stockings were often silk or cotton and came up to thigh level.
Low shoes similar to modern lace-up ballet slippers were used as were leather,
lace-up shoes with a heel.
Hats and Bonnets:
The poke bonnet was the very popular, signature headwear for ladies of the
period. It was long and scoop shaped, sometimes compared unfavorably to a coal
scuttle in appearance. Critics of the era’s fashions (often older folks who
longed for the “good old days” of the 18th century) represented women in both
satire and cartoon as running about in their underwear (lightweight,
with comically long headwear (poke bonnets) for hiding their faces in!
Straw “cartwheel” hats, often plumed, were very popular both before and into the
1790s and would have a resurgence in popularity in future decades as well. Turbans and
ostrich feathers were quite in vogue for a time, particularly for formal
occasions, as were diadems.
Ladies’ hair was quite fashionable when piled high on the head in a
classically inspired style with hanging wisps, curly bangs and ringlets about
Small purses which shut by means of a drawstring were popular. Jewelry was
worn but for most women tended to be less ostentatious than that of their 18th
century counterparts. For example, a small gold, silver or pewter cross on a short, simple
chain worn around the neck was considered very tasteful and was the height of
fashion during the first two decades of the 19th century. In fact, Jane Austen
herself wore just such an item. Hand painted miniatures, (cameos with
portraits painted on them) were popular as well.
© 2001-2006 Please Note: This article and webpage are the copyrighted property
of the author and may not be copied or reproduced in part or in whole without
express written consent.
We Make History
Email to Lord Scott
We Make History
An Introduction to
of the Regency Era
The images featured on this page represent a variety of ladies'
clothing and fashions ranging from the mid 1790s to the 1820s. Among the portraits may be
found commoners, aristocrats and royalty. Some are relatively unknown persons
while others were and are widely known. Included are a
number of those regarded as great beauties in their day such as Queen Louise
of Prussia (widely admired as the most beautiful woman in Europe as well as
the most noble), Madame Recamier and Dolly Madison. Among these paintings may be found the work of
perhaps the two greatest portrait artists of the age, Madame Vigée
Le Brun and Monsieur Jacques-Louis David.
Encouraging Words in Appreciation of the
It has been well acknowledged by persons of discernment
throughout history that of all the visible creation, God has blessed none with
so much beauty as he has woman. This alone would be cause enough for great
admiration, yet when woman adds to physical beauty such treasures as the beauty
of good character; nobility, grace, generosity, affability, and discretion,
along with intelligence, taste, wit and a sense of style, then she is a higher
work of art indeed. It is no hidden thing that women have great influence over
men. A low woman may be able to reduce a low man to the level of a swine. But
a true lady has the ability to lift, inspire and ennoble a good man toward
chivalry, gentlemanly ideals and greatness itself.
Ladies, do polish your physical beauty and allow it to shine,
recognizing that your attire does matter, yet take even greater heed to the development of those qualities which will
bring depth to beauty's luster. When you have done this you will discover
great power in making use of all to inspire the good men around you to higher
levels of their own.
Your fond admirer,
|
<urn:uuid:554677e6-bec2-4eea-90a6-d4c53241f5b7>
|
CC-MAIN-2014-23
|
http://www.wemakehistory.com/Fashion/Regency/RegencyLadies/RegencyLadies.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997895170.20/warc/CC-MAIN-20140722025815-00147-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.973652 | 1,549 | 3.0625 | 3 |
Pulp mold is a shock absorbing material made from paper.
Its materials are newspapers, corrugated papers, and milk packs.
Because of the use of paper, pulp mold has breath-ability, a water-holding property, and maintains its shape.
This is why it keeps fruits and eggs fresh for a long time.
The ashes of old pulp mold are the same as those of trees and grass.
In addition, we don't use any harmful chemical substances, which means sustainability for our planet.
Not only is pulp mold used with reused papers, but after use can also be degraded as soil.
|
<urn:uuid:fcad0b4a-10be-4d34-966c-aa281bf529fa>
|
CC-MAIN-2020-10
|
http://mold.co.jp/eng/product/what.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146485.15/warc/CC-MAIN-20200226181001-20200226211001-00226.warc.gz
|
en
| 0.959777 | 126 | 3.140625 | 3 |
How Equal Opportunity and Affirmative Action Support the Persistence of Women in STEM
Leading up to SWE’s Congressional Outreach Days in March, we will regularly share tips and ideas for how you can advocate for the rights of women and girls in STEM.
SWE seeks to fuel the economy of the United States in advocating for the advancement of women in STEM. In order to address the talent shortage in engineering, it is especially important that women who are from rural and economically disadvantaged populations and those who are underrepresented minorities in STEM have pathways to excel within the profession. Understanding Equal Employment Opportunity and Affirmative Action are necessary to pursuing these goals
In 2009, SWE published a General Position Statement on Equal Opportunity and Affirmative Action. This document is helpful in understanding SWE’s position on Equal Employment Opportunity and Affirmative Action and why both are vital to the persistence of women in STEM.
While you have likely heard these terms, you may be unfamiliar with their definitions, applications, and differences. To help, we have linked primary sources and defined them for you in brief below:
- Equal Employment Opportunity: Prevents discrimination based “on race, creed, color, or national origin” as first introduced by an Executive Order signed by President Kennedy in 1961. This directive enforced by President Johnson through Executive Order 11246, which required all government contractors and subcontractors to take affirmative action to expand job opportunities for minorities; this order was amended to include women in 1967 (through Executive Order 11375).
- Affirmative Action: Seeks to counter historic decimation and institutional basis based gender, race, religion, or ethnicity. As defined by federal regulators, affirmative action is: “…those actions appropriate to overcome the effects of past or present practices, policies, or other barriers to equal employment opportunity.” (29 CFR 1608.1)
- What is the difference? Equal Employment Opportunity, as it currently stands, means individuals cannot be discriminated against based on sex, color, religion, national origin, disability, and age. Affirmative Action can be utilized as a practice or plan to fulfill Equal Employment Opportunity regulations to ensure federally funded institutions are non-discriminatory in their hiring and selection practices.
- What is SWE’s Position? As noted in the General Position Statement, The Society of Women Engineers supports policies and legislation that strengthen the U.S. STEM workforce by ensuring equal opportunity for women in STEM education and careers.
Women Remain Critical to Fulfilling the Increasing Need for Engineers
Equal Employment Opportunity and Affirmative Action are still vital to ensuring women have equal access to employment opportunities and to addressing a critical need for talent in many sectors within the United States Economy.
Women and certain minority groups (including African Americans, Hispanics, and Native Americans) remain underrepresented in engineering in both four-year university degree attainment and within the workforce. For example, women comprise about half of all employed college graduates but only 12% of women with four-year degrees are working in engineering occupations (Corbett & Hill, 2015). While the number of women entering college and the workforce continues to grow, only 18.4% of those receiving engineering bachelor’s degrees are women (U.S. Department of Education, 2015). Among underrepresented minority (URM) groups, graduates from engineering bachelor’s programs receive less than 16% of total degrees earned (National Science Board, 2016).
According to the U.S. Department of Labor, Bureau of Labor Statistics (2014), job growth from 2014 to 2024 in engineering will yield over 500,000 open positions. While the field of engineering is growing, there is not a strong pipeline of domestic employees with STEM knowledge to fill the labor gap (Litzler, Samuelson, & Lorah 2014; Jiang & Freeman 2011). In addition, underrepresented groups constitute about 25% of the workforce but will grow to over 50% of the available total workforce by 2050 (Cole & Espinoza 2008; May & Chubin 2003). Given the economic promise associated with careers in engineering, combined with the importance of STEM to the success of the United States in the global network, there is great interest to increase the representation of women and URM in engineering.
In this General Position Statement, SWE made the following recommendations to support equal opportunity for women in engineering:
- Policy makers should enforce existing laws and, when necessary, enact additional legislation outlawing discrimination on the basis of sex in employment, pay, and education to promote equal opportunity in the preparation for and pursuit of STEM careers.
- Employers should scrutinize hiring procedures and career progress of male and female employees in order to identify and mitigate inequities. Personnel policies and procedures should provide all employees the opportunity to achieve their career goals and balance the demands of work and personal life.
- Voters and state legislatures should continue to support programs that ensure equal opportunity for women and men to pursue STEM education and careers, including where necessary affirmative action programs to address existing inequities
Cole, D., & Espinoza, A. (2008). Examining the Academic Success of Latino Students in
Science Technology Engineering and Mathematics (STEM) Majors. Journal of College Student Development,49(4), 285-300.
Corbett, C., & Hill, C. (2015). Solving the Equation: The Variables for Women’s Success in
Engineering and Computing (pp. 1-141, Publication). Washington, DC: American Association of University Women. ISBN: 978-1-879922-45-7
Litzler, E., Samuelson, C. C., & Lorah, J. A. (2015). Breaking it Down: Engineering
Student STEM Confidence at the Intersection of Race/Ethnicity and
Gender. Research in Higher Education, 55(8), 810-832.
National Science Board. Science and Engineering Indicators, 2016. Retrieved from https://www.nsf.gov/statistics/2016/nsb20161/#/.
U.S. Department of Education. (2015). Institute of Education Sciences, National Center for Education Statistics, Digest of Education Statistics 2015, Tables 325.45.
U.S. Department of Labor, Bureau of Labor Statistics. (2014). Employment by detailed occupation. Retrieved March 25, 2016, from http://www.bls.gov/emp/ep_table_102.htm
|
<urn:uuid:29a4155d-51c3-43e6-b69b-b8077ef17a54>
|
CC-MAIN-2017-34
|
http://alltogether.swe.org/2017/03/equal-opportunity-affirmative-action-support-persistence-women-stem-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104681.22/warc/CC-MAIN-20170818140908-20170818160908-00698.warc.gz
|
en
| 0.915094 | 1,324 | 3.046875 | 3 |
The female breasts, or mammary glands, are the modified appendages lying on the anterior chest wall. It is present in males as well but in most men, it is not as prominent as it is in females. The female breast has a role in both nourishing the offspring as well as offering immunological protection to the newborn baby. To some degree, the breast also has a psychological function in that it is associated with sexuality. Underdeveloped breasts or partial or complete removal, which may be necessary to treat certain diseases like breast cancer, may cause significant emotional distress.
Function of the Breasts
The breast produces milk which serves to nourish the infant. It provides complete nutrition for the newborn baby and contains carbohydrate (lactose), fats and proteins as well as micronutrients. In the first few days after delivery (as well as the first few days before), the breast secretes colostrum which is similar in composition to breast milk except that it has very little fat.
Apart from nutrition, the breast secretions also ensures that the newborn has a significant amount of immunological protection. This is in the form of maternal antibodies, chemical mediators, vitamins and enzymes. These immune components augments the infant’s immature immune system and provides protection against infections. It also prevents certain allergies and autoimmune diseases to some extent
Anatomy of the Female Breasts
Parts of the Breast
The breast is somewhat circular in shape. It is broadly composed of the overlying skin, areola, nipple and underlying breast tissue (stroma). The stroma in turn can be divided into interlobular stroma, which is the connective tissue and fat which structurally provides size, protection and support to the breast, and the intralobular stroma which contains the functional tissue.
Internal Structure of the Breast
Milk is produced in the multiple alveoli (acini) that make up the 15 to 20 lobules of the mammary gland. The milk drains out through the terminal ducts into the lactiferous duct. It accumulates in the lactiferous sinus until it is expelled through the nipple. The entire lactiferous duct and the lobules are lined with luminal epithelium cells but only these cells in the lobules produce milk. Under the epithelium lie a muscular epithelial layer known as the myoepithelium. The muscle cells in this layer contracts and helps to eject the milk.
The glandular tissue develops during puberty. Fat accumulation in the breast contributes towards the breast size and this increases during puberty as well. It is only during pregnancy that the development of the glandular tissue is complete and has the ability to produce milk.
Picture of the Breast Structure
Areola and Nipple
The areola is the circular area that surrounds the nipple. It is slightly raised above the skin surface and contains many sebaceous glands. The sebum secreted by these glands lubricate the areola and nipple which are prone to chaffing during breastfeeding.
The nipple is the raised conical projection visible on the breast surface. The multiple lactiferous ducts open onto the nipple allowing breast milk to pass to the suckling infant. Underlying smooth muscle fibers compress the lactiferous ducts when the nipple is stimulated to allow for breastfeeding.
Deformities of the nipples are discussed under Abnormal Nipples.
Breast Location and Position
The base or bed of the breast is formed by the fascia that covers the pectoralis major and minor muscles (about tow-thirds) and the fascia of the serratus anterior muscle (about one-third). The breast runs from the second rib at the top (superiorly) to the sixth rib at the bottom (inferiorly) although larger breasts and the lactating breast may extend further down. The underlying tissue that makes up the breast is attached to the overlying skin by suspensory ligaments (also known as Cooper’s ligaments or suspensory ligaments of Cooper).
Picture of the Anatomical Position of the Breast
Blood Supply to the Breast
The breast tissue derives oxygenated blood (arterial blood) from the following arteries :
- Internal thoracic artery
- Medial mammary branches
- Anterior intercostal branches
- Axillary artery
- Lateral thoracic branches
- Thoracoacromial branches
- Thoracic aorta
- Posterior intercostal arteries
Blood is drained from the breast (venous blood) through the following veins :
- Axillary vein (most of the venous drainage)
- Internal thoracic vein
Lymphatic Drainage of the Breast
The lymphatic drainage of the breast is fairly complex and may vary slightly. It is an important anatomical consideration because of its role in the spread of breast cancer (metastases of cancer cells). Most of the lymph from the breasts drains into the axillary lymph nodes via the anterior or pectoral nodes although some may drain directly into the axillary nodes.
- Lateral quadrants of the breast
- Mainly to the axillary lymph nodes as mentioned above.
- Medial quadrants of the breast
- Drainage into the parasternal lymph nodes or sometimes to the opposite breast.
- Inferior quadrants of the breast
- May drain to the deep abdominal lymph nodes, if it does not drain as above.
A plexus of lymph vessels known as the subareolar lymphatic plexus drains lymph from the nipple, areola and lobules of the breast. Lymph from the skin of the breast drains into the parasternal lymph nodes through other nodes.
Nerves of the Breast
The nerve supply to the breast is from the fourth, fifth and sixth intercostal nerves via the anterior and lateral cutaneous branches.
Article reviewed by Dr. Greg. Last updated on October 26, 2010
|
<urn:uuid:30632384-3fb2-49f6-a6aa-e44b238522ea>
|
CC-MAIN-2014-23
|
http://www.healthhype.com/female-breast-anatomy-function-parts-and-pictures.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510275463.39/warc/CC-MAIN-20140728011755-00097-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.932904 | 1,218 | 3.1875 | 3 |
- Life with Bats, Books, and Caves
- THE B.A.T Club
- Photo Exhibit on Bats Opens in Israel
- Join Us in The Founder’s Circle
- A New Look for BATS
- Success with “Active Members Package”
- Thank you! We can’t do it without you!
- BCI Participates in Pan American Conservation Education Conference
- A last look. 1990
- On The Cover
- The Changing Face of Bat Conservation in the Pacific
- THE FLYING FOX: Becoming a Rare Commodity
- BATS AND CAVERS
MARIANAS FRUIT BATS (Pteropus mariannus) are among the most important plant pollinators and seed dispersers of the Marianas Islands. This one is pollinating the brilliant flowers of a coral tree. Some 40% of the local tree species on the island of Guam are dependent upon these bats, but Marianas fruit bats, as well as other Pacific island bats, are now endangered. Their loss seriously threatens the dense tropical rain forests of the islands.
|
<urn:uuid:db67ca9b-46d3-4603-8e1a-e5bb4b36e1a7>
|
CC-MAIN-2020-34
|
https://www.batcon.org/article/on-the-cover-12/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00068.warc.gz
|
en
| 0.863573 | 230 | 2.59375 | 3 |
Reishi mushroom, scientifically known as Ganoderma lucidum, is not your ordinary fungi. This mushroom, known for its reddish-brown, kidney-shaped cap, has been highly esteemed for centuries in various Asian cultures for its potential health benefits. But before we delve deep into its properties and uses, let's traverse through its nature and historical relevance.
Nature of Reishi Mushroom
Reishi mushroom can predominantly be found in hot and humid regions in Asia. In the wild, it often grows on hardwood trees, especially those that are decaying. One of its distinguishing features is its shiny appearance, which is why it is sometimes referred to as the ‘shiny polypore’. Despite its widespread use in herbal medicine, this mushroom is not typically used for culinary purposes due to its hard and bitter nature.
Reishi mushroom, esteemed as the "Lingzhi" in Chinese and "Reishi" in Japanese, holds a unique and venerable place in the annals of traditional Asian medicine. Its historical significance stretches across millennia, with its healing properties whispered down through generations and encapsulated in ancient texts.
Ancient History and Reishi
One of the most revered references to Reishi can be found in the Shen Nong Ben Cao Jing. This seminal piece of literature, dating back almost 2,000 years, serves as one of the earliest materia medicas — cataloguing and detailing hundreds of medicinal plants. Within its pages, Shen Nong, a legendary Chinese emperor and herbalist, positioned Reishi at the top tier, touting it as a superior herb.
Contrary to many medicinal substances of the time, which treated specific ailments, Reishi was described as a substance for broad-spectrum health. It was said to impact the life force or Qi of an individual, fortifying the spirit, mending the balance of energies, and enhancing longevity.
Reishi - The Mushroom of Immortality
The name, "mushroom of immortality", is not just a random title; it shows how the ancients viewed the potential of this fungi. Consuming Reishi was often associated with obtaining physical and spiritual wellness, and it was believed to ward off ailments, ensuring a life brimming with vitality. Its reputed benefits ranged from enhancing energy levels to improving the quality of meditation practices.
This reputation made the mushroom a much-sought-after commodity. Emperors, in their quest for eternal life, commanded their subjects to search far and wide for wild Reishi. Given its rarity in the wild, it often became a symbol of prosperity and longevity, only accessible to the nobility and monks.
Beyond China: Reishi in Japanese Tradition
While China served as the origin point for much of Reishi's historical reverence, its fame was not confined to Chinese borders. In Japan, it was associated with longevity and vitality. Monks incorporated it into their regimen, believing it aided in calming the mind, enhancing focus, and deepening their meditation.
It's also worth noting that the mushroom features prominently in many artistic depictions from the East, signifying its prominence in cultural consciousness.
From paintings to sculptures and even traditional garments, the iconic silhouette of the Reishi mushroom can be found, symbolising wellness, luck, and eternal life.
Modern Use and Research
The adoption of Reishi in the contemporary age reflects a confluence of tradition with modern technology. As scientific inquiry bridges the chasm between past beliefs and present understanding, Reishi has emerged in various readily consumable forms to cater to diverse user preferences:
- Powders: Often ground from dried Reishi, this form is versatile, allowing users to sprinkle it onto food, mix into smoothies, or brew as a tea.
- Teas: With its inherent bitter taste, Reishi teas often incorporate other ingredients, such as jujube fruits or goji berries, to balance the flavour.
- Capsules and Tablets: These offer convenience for those seeking a quick and easy way to incorporate Reishi into their daily regimen.
- Tinctures: These liquid extracts have become popular due to their ability to deliver a concentrated form of the mushroom's beneficial compounds.
- Topicals: In some regions, especially Asia, Reishi infused creams and lotions are emerging, believed to offer skin benefits.
While its roots lie in Asia, Reishi's reach today is undeniably global. In the UK, its popularity has grown exponentially, mirroring a broader worldwide trend towards natural wellness and holistic health. Health shops, both physical and online, frequently stock Reishi in various forms, speaking to its increasing mainstream acceptance.
Bioactive Compounds and Modern Research
The magic, so to speak, of Reishi lies in its complex composition. Modern research has honed in on several compounds believed to confer the mushroom's myriad benefits:
- Polysaccharides: These complex carbohydrates are often touted for their potential immune-boosting properties. They might help modulate the immune system, promoting its optimal functioning.
- Triterpenoids: These compounds may have anti-inflammatory and antihypertensive effects, and they contribute to Reishi's bitter taste.
- Peptidoglycans: These are being studied for their potential to bolster the body's defence mechanisms.
Diving Deeper: The Potential Benefits
- Immune System Support: Central to Reishi's appeal is its potential role in supporting immunity. By possibly enhancing the activity of certain white blood cells, it might fortify the body against infections and illnesses.
- Antioxidant Prowess: Oxidative stress, a modern-day health buzzword, is associated with premature ageing and several chronic diseases. Reishi's potential antioxidant capabilities suggest it might neutralise the detrimental free radicals responsible for this oxidative damage.
- Adaptogenic Qualities: In our relentless modern world, stress is ubiquitous. Some proponents believe Reishi has adaptogenic properties, meaning it might help the body resist and adapt to stressors, both physical and mental.
- Heart Health: Preliminary research indicates that Reishi might support cardiovascular health. From possibly lowering bad cholesterol to potentially reducing blood pressure, its role in heart wellness is a burgeoning area of study.
- Liver Health: The liver, our detoxifying powerhouse, might benefit from Reishi's hepatoprotective effects, guarding against toxins and possibly aiding in liver regeneration.
- Sleep and Relaxation: Anecdotal reports abound of Reishi's role in promoting better sleep quality. While scientific evidence is still accumulating, many believe that the mushroom may help in calming the mind and inducing restful sleep.
While these benefits are promising, it's crucial to approach them with a balanced perspective. Not all claims have yet been backed by modern research, although there is a rich historical use of these potentially medicinal mushrooms.
Reishi is incredible safe for the vast majority of people, however like all natural supplements, it's essential to be aware of edge cases:
Allergies: Although rare, some individuals might be allergic to Reishi mushrooms.
Blood-thinning Effects: Reishi might if you're on anticoagulant medications, antihypertensive or chemotherapy drugs.
Reishi mushroom is undoubtedly an intriguing element in the realm of traditional and herbal medicine. Its rich history, combined with the potential benefits attributed to it, makes it a topic of keen interest for both researchers and the general public in the UK and globally.
|
<urn:uuid:55c4d910-a232-4485-a317-afcc19b13ba6>
|
CC-MAIN-2023-50
|
https://jm-wholesale.co.uk/blogs/blog/a-complete-guide-to-reishi-mushrooms
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00607.warc.gz
|
en
| 0.94547 | 1,514 | 2.765625 | 3 |
Make sure you check out these swimming safety guidelines before you embark on any swimming trip, be it to the pool or sea.
It is important for all people to grasp the safety aspects involved in swimming, be it pool or open water, before they undertake it as a pastime. Although to many people, swimming seems to be a harmless pursuit, it can become life endangering if the rules are not followed.
The most basic rules of swimming safety can be applied to the pool environment, and involve the use of a little common sense. Firstly, never run near to the pool edge. One slip could result in a badly twisted ankle, or even a crack on the head, which might lead to unconsciousness and even drowning. Also, be aware of other people using the pool. This means checking the water below before diving in, and appreciating the whereabouts of others when swimming. Thirdly, you should never indulge in horseplay, especially with those with less ability as swimmers. So don’t ‘dunk’ a person’s head under the water and don’t dive-bomb people. Finally, and perhaps most importantly, never swim while under the influence of drink or drugs. It might seem like a good idea at the time, but your judgement and swimming ability can be greatly impaired.
When swimming in the sea, it is vitally important that you understand the role of currents. A lateral current runs parallel to the shore, and the danger when swimming in one of these is that you may get dragged into a rip current. Rip currents are strong flows of water returning to the sea. If you get caught in a rip current you shouldn’t panic but swim back to shore at a forty-five degree angle. If you are unable to do this, then swim parallel to the shore for a while, and then try the forty-five degree angle. If this fails, wave and call for help.
Backwash and shore break can be dangerous for youngsters near the waters edge. Backwash is the return of the water from the shore to the sea, and can be strong enough to drag a small person back into the sea. Shore break is even more dangerous, and is where a large wave breaks on the shore. If you are stood underneath such a wave you might sustain a nasty back injury. In the event that you cannot escape from an impending shore break the best thing to do would be to dive into the base of the wave.
Never swim alone in the sea, and don’t swim for long in cold water. Always check conditions with a lifeguard if in doubt. Also allow plenty of time for food to digest before you go swimming. It is also a good idea to check the direction of the tide. Follow these safety guidelines to ensure that wherever you decide to swim, you will always do so unharmed.
|
<urn:uuid:65c478a1-1b8d-4c60-b127-81faae763d14>
|
CC-MAIN-2013-48
|
http://www.allsands.com/sports/sports/swimmingsafety_vlr_gn.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163038307/warc/CC-MAIN-20131204131718-00083-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.956391 | 584 | 2.84375 | 3 |
Herbert Spencer, the famous 19th century philosopher, is often misrepresented as the father of social Darwinism and a precursor to the Eugenics movement. The idea of social Darwinism claims that Darwin's theories of biological evolution and natural selection can be directly applied to social organization. Those members of society that cannot survive should not survive, … Continue reading Herbert Spencer: Social Darwinist?
Among the theories and ideas of Karl Marx, we can find many weak points. Most important of these, perhaps, is the labor theory of value, because it is upon this that Marx proves that capitalists exploit the proletariat. This principle of exploitation in and of itself is what justifies the destruction of the capitalist order—without … Continue reading Major Weak Points in Karl Marx
|
<urn:uuid:f27d27e8-7237-4f2e-93ab-e2aff9a68b99>
|
CC-MAIN-2017-34
|
https://supererling.wordpress.com/2017/08/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105961.34/warc/CC-MAIN-20170820015021-20170820035021-00431.warc.gz
|
en
| 0.90695 | 151 | 2.5625 | 3 |
Tustin High was the first campus in Orange County to acquire a 3-D printer. Eight years later, it’s being utilized for a potentially life-changing project.
Juniors in the school’s T-Tech Technology and Engineering Academy recently employed the device to produce a prosthetic arm they designed for a seventh-grader named Nick.
Working under teacher Ed Hernandez, the students told us they spent about two weeks brainstorming the technical task before they got to meet Nick. With his input, the project became personal.
“In terms of designing the hand, we had to become way more specific with what we were doing,” says Derek, a junior in the T-Tech program. “We had to become more accurate with the measurements. We had to be more attentive to what he needed, and overall just taking him into consideration instead of just taking the design into consideration.”
“I think Nick has done more for us than we’ve done for him,” says Mr. Hernandez.
Click on the video above to watch this incredible story, which exemplifies both the power of STEM education and the spirit of Orange County’s One Billion Acts of Kindness campaign.
|
<urn:uuid:1e93a44f-e20c-4222-9fe0-45ed9be3f724>
|
CC-MAIN-2017-39
|
http://newsroom.ocde.us/kindness1billion-tustin-high-juniors-use-3-d-printer-to-create-prosthetic-arm-for-fellow-student/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818692236.58/warc/CC-MAIN-20170925164022-20170925184022-00601.warc.gz
|
en
| 0.977977 | 254 | 2.609375 | 3 |
Ornithology is a branch of zoology that focuses on the study of birds. Field Ornithology takes that observation of birds outdoors, and can be a fun and challenging hobby for anyone. Phinizy Center Education Department offers Field Ornithology courses meant to introduce the fascinating world of birds, and provide the tools and techniques required for each person to become a comfortable independent birder.
Our current ornithology classes take place on Wednesdays. Class times in the spring and fall are from 8am until noon and 9am until 1pm in the winter. Attendees are introduced to different birding areas here in the CSRA, and are asked to meet at or carpool to these locations throughout the course. Each class includes field lecture time, field study, discussion, and home-reading suggestions. No matter your skill level, these courses are a great opportunity to get out and enjoy nature and birding with others.
Registration fees include reference books and a class notebook with handouts. Binoculars and field guides are available for use during field trips. Participation for each course is limited: register early to ensure your space! Call the Education office at 706-796-7707 for more information.
Field Ornithology Basics
When: Wednesday’s, August 30th – November 30th, 8:00 AM – 12:00 PM
Cost: $275 per person – includes a class notebook, and you will become an Individual Friend of Phinizy . Already a Friend of Phinizy? Cost is $240. Are you a returning participant? Your cost is $225.
This 12 week course takes place in the fall and serves as an introductory course to many topics involved in field ornithology, including optics, field guides, birding ethics, bird groups, field identification marks and more. The perfect course for beginning birders! Trifold flyer 2017 fall Ornithology
Online Registration Closed – call 706-796-7707 for more information
Field Ornithology: Spring Breeding
This 8 week course takes place in the spring, from March to May. The course introduces participants to the fascinating world of breeding bird behavior while enhancing skills needed for quick field identification. Participants will gain a better appreciation and understanding of bird behavior, song, habitats, nesting, parental care, and much more. Great course for all experience levels!
Field Ornithology: Waterfowl
This 6 week course takes place in the winter, in January and February. The course focuses on the wintering waterfowl, and participants will travel to some of the best places in the CSRA to find them. The last field trip will include an all-day trip to the coast. This is a great course for all birding levels!
|
<urn:uuid:0a916b24-f575-45d9-b05c-e72dd30041fb>
|
CC-MAIN-2017-39
|
http://phinizycenter.org/field-ornithology/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693459.95/warc/CC-MAIN-20170925220350-20170926000350-00042.warc.gz
|
en
| 0.922902 | 567 | 2.53125 | 3 |
What Is Regulation T?
Regulation T is a collection of provisions that govern investors' cash accounts and the amount of credit that brokerage firms and dealers may extend to customers for the purchase of securities. According to Regulation T, an investor may borrow up to 50% of the purchase price of securities that can be bought using a loan from a broker or dealer. The remaining 50% of the price must be funded with cash.
- Regulation T governs cash accounts and the amount of credit that broker-dealers can extend to investors for the purchase of securities.
- Investors who want to purchase securities using broker-dealer credit need to apply for a margin account.
- Reg T mandates that an investor can borrow no more than 50% of the purchase price, or $500 and that the remaining balance must be paid in cash.
Regulation T (Reg T)
Understanding Regulation T (Reg T)
Buying securities with borrowed money is commonly referred to as buying on margin, which refers to assets that an investor must deposit with a broker-dealer to obtain a loan. Additionally, Regulation T promulgates payment rules on certain securities transactions made through cash accounts.
Regulation T, or Reg T, was established by the Board of Governors of the Federal Reserve System to provide rules for extensions of credit by brokers and dealers and to regulate cash accounts. An investor who has a cash account cannot borrow funds from a broker-dealer and must pay the purchase price of securities with cash.
Margin accounts, on the other hand, allow investors to obtain credit to fund a portion of their securities purchase. Because buying securities on credit can expose investors to sudden losses of a much larger magnitude compared to the same purchase using only cash, the Federal Reserve Board stepped in and promulgated a rule that limited the borrowing to be no greater than 50% of the securities purchase price. The 50% requirement is called the initial margin because it establishes a minimum borrowing level at the time of purchase. Certain brokers may have stricter requirements, with levels above 50%.
Regulation T limits the amount of credit an investor can get from their broker to buy securities on margin.
Reg T Example
An investor who wishes to purchase securities using broker-dealer credit must apply for a margin account that grants him borrowing privileges. When an investor borrows money in his margin account, he must pay interest based on the rate schedule established by his broker-dealer.
Suppose an investor wishes to obtain a loan from his brokerage firm to purchase 10 shares of a certain company with a price per share of $100, resulting in a total purchase of $1,000. Regulation T states that the investor can borrow no more than 50% of the purchase price, or $500, from the broker, while the remaining balance must be paid in cash.
While the primary goal of Regulation T was to govern margin, it also introduced transaction rules for cash accounts. Because it takes up to two days for securities transactions to settle and the cash proceeds to be delivered to the seller of securities, a situation can arise when an investor buys and sells the same securities before paying for them from his cash account. This is called freeriding, and it is prohibited by Reg T.
In such cases, the investor's broker must freeze the cash account for 90 days, requiring the investor to fund their securities purchases with cash on the date of the trade.
|
<urn:uuid:dc173e90-b2ac-4c04-9cbb-874ac42e1d6b>
|
CC-MAIN-2020-16
|
https://www.investopedia.com/terms/r/regulationt.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00253.warc.gz
|
en
| 0.954517 | 690 | 2.78125 | 3 |
Stead St Wharf
The Stead Street Wharf redevelopment is an enduring reminder of Invercargill’s maritime and railroad history.
This site, originally surrounded by the New River Estuary, was a threshold for many facets of Southland’s emerging economy.
It was 1860 when the Otago Provincial Government built the first jetty at the end of Tweed Street to serve the newly established township. The subsequent discovery of gold in the Wakatipu district saw Invercargill’s population climb from 3,455 to 9,545 between 1862 and 1863. In that year a variety of jetty improvements (including warehouses, tramrails and roads) were needed to cope with incoming goods from over 200 vessels.
The gold rush was short-lived. That, combined with constantly changing estuary conditions, dictated a gradual change in focus. Emphasis shifted from the estuary’s potential as a shipping harbour to its recreational opportunity. Dreams of a thriving port came to an end in 1930 when final closure of the Port Craig timber mill eliminated the only remaining source of cargo. 1939 saw the last port visit by a commercial vessel, leaving use of the jetty channel to pleasure-craft moorings.
The Invercargill jetty heralded the introduction of New Zealand’s first steam-powered locomotive, the Lady Barkly. To demonstrate how this 8 tonne curiosity ran on a wooden tramway, the locomotive was successfully trialled in 1863 on more than 300 metres of track along the jetty. Southland Provincial Councillors were impressed and authorised a loan for a wooden railway to Winton. Eventually track maintenance proved too costly and the line was closed in 1867.
A replica of the original wooden track with a gauge 4’8" has been installed in the paved pedestrian area at the redeveloped wharf.
A replica fishing cutter was officially "launched" on the reserve next to the Stead Street Wharf on March 5, 2008. The replica cutter has been named Southern Light. From the 1890s to the 1940s these boats were common in Invercargill estuary and were usually built on beaches from local timber. Cutters were versatile sailing vessels, used for fishing, oystering and carrying cargo and farm produce.
Stead Street Wharf is on the eastern bank of the New River Estuary, just 1.5km from Invercargill’s city centre. Follow signs to Otatara and the airport.
The wharf continues its tradition of providing a variety of opportunities for outdoor pursuits. These include a small beach, picnicking and fishing. A slipway for boat launching is available, subject to the tide. Interpretive panels with captivating photographs of the wharf’s history offer a glimpse of the original entry to Invercargill. Visitors should note that the nearest public toilets are in the city.
The nearby Invercargill Estuary Walkway provides a 4.7km walking/cycling track through the estuary margins and former landfill site.
|
<urn:uuid:0742b5d1-1642-4d5b-80d3-29e08b8c0f36>
|
CC-MAIN-2014-15
|
http://www.icc.govt.nz/ServicesA-Z/ParksAndReserves/VisitOurParks/SteadStWharf.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537186.46/warc/CC-MAIN-20140416005217-00026-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.963042 | 637 | 2.53125 | 3 |
What can I do to prevent oral health problems?
In most cases it is easier and more effective to stop problems before they start, rather than correcting them after they have already caused damage. Think of your mouth as a gateway to the wellbeing of the rest of your body. The health of your mouth is closely linked with systemic overall health issues; therefore, preventing oral health problems may help you achieve your best possible overall health.
Prevention typically takes place in two phases - the first phase is honoring your biannual in-office visits. The second phase is practicing good oral health tactics at home every day.
During your in-office visit, your dentist will thoroughly screen your mouth for any potential problems. You will also have a professional teeth cleaning, which removes hard-to-reach plaque and leaves your mouth feeling clean and refreshed. Your dentist will also advise you on ways to improve your oral health care routine. This may include recommendations on the best products and techniques to use.
Your daily at-home care is very important for prevention of illnesses like gum disease and problems such as tooth decay. Be sure to diligently brush twice daily and floss regularly. Ask your dentist about ways to improve your at-home care.
|
<urn:uuid:e39f603d-486c-4a25-89c8-b4160d205cec>
|
CC-MAIN-2017-26
|
http://www.mainefamilydental.com/faq/health-problems-oral-mouth-dentist/5220
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00633.warc.gz
|
en
| 0.963935 | 247 | 2.890625 | 3 |
Brown Rice and Its Fitness Blessings
The first process the grain undergoes is husking, that is, the removal of these outer layers, the result is husked or husked rice, generally known as brown rice, which is already edible. If it undergoes additional processing to cast off the outer seed coat, brown rice turns into white or delicate rice. Lightening is any other method that follows bleaching, which consists of sprinkling the grains with a layer of talc and glucose to lead them whiter and shinier. Maximum nutrients, minerals, fibre, and fatty acids are misplaced all through lightning.
The calories of rice are, common, as compared to those of other cereals. Specifically, brown rice offers 364 kcal consistent with one hundred grams, most of it in the shape of carbohydrates. Proteins are properly represented, and lipids are in the form of fatty acids, the maximum of which is unsaturated. Fibres are also well represented. Brown rice, unlike polished rice, also carries many minerals and vitamins that are lost during the sharpening procedure. In contrast, let us see the nutritional homes of brown and polished rice in detail.
Brown Rice and Polished Rice
We’ve visible that brown rice keeps almost the whole outer shell of the grain, even as polished rice or white rice is received not best after the elimination of the outer layers but also by means of cleansing and bleaching processes. It’s consequently natural due to mechanical and chemical treatments, the grain loses, at the side of the layers of the seed coat, part of its elements, that are frequently essential nutrients.
one of them is fibre, which is in more quantities of brown rice than in polished rice. The presence of a greater amount of fibre lowers the glycemic index of brown rice as compared to that of white rice, that’s why, for an instance, diabetics are suggested to devour brown rice and no longer white rice, which incorporates extra to assimilable starches.
Especially, the glycemic index of cooked brown rice is 50, even as that of boiled white rice is 73. Lipids and fats-soluble nutrients also are misplaced with the glazing system, alongside a number of the minerals found exactly inside the outer layers of the rice grain. Therefore, from a caloric point of view, there aren’t many variations between the 2 kinds of rice; these are a whole lot greater obvious from a dietary factor of view.
however, some of the vitamins lost in polished rice may be found in sure sorts of rice which have passed through only part of the refining system. This is the case, for instance, of semi-brown rice. In reality, after husking, brown rice can go through a mechanical treatment that permits the handiest part of the brain to be removed, consequently obtaining semi-entire rice, which, in addition to retaining a part of the fibres, also keeps part of the feature nutrients of brown rice.
The health benefits
As we recognize, rice is the most used and consumed cereal in the East. In western international locations, and specifically, in the ones of the Mediterranean region, that is much less the case due to the fact wheat is used more and, consequently, pasta. nevertheless, among cereals, after wheat, it is clearly the maximum utilized in our regions.
Indeed, rice has many fitness blessings, mainly its complete grain version. it is, therefore, additionally suitable for people with diabetes and hypertension. It’s also capable of preventing cardiovascular sicknesses and is a very digestible meal, which explains why it lends itself nicely to the weight loss program of youngsters and the elderly. Brown rice also consists of gamma oryzanol, a molecule with strong antioxidant houses, which is responsible for some of the homes of rice. Now let’s see in element all of the benefits of rice.
Rice is a very digestible cereal due to the fact the starch it contains is present in the shape of small granules. it’s also low in amylose, a carbohydrate found in pasta, which lengthens digestion time. It does not pressure the belly and intestines, so it’s miles suitable for human beings who have digestive problems or are going through a recuperation period after an infection of the digestive tract.
As a clearly gluten-unfastened cereal, rice is suitable for celiacs. Rice flour also can be used to prepare baked goods at domestic without resorting to pre-packaged foods. Rice is a cereal appropriate for human beings suffering from hyperuricemia, a situation resulting from extended uric acid in the blood. In fact, the starch in rice enables it to do away with uric acids.
Useful Towards Diabetes
As already stated, brown rice, unlike polished rice, is extraordinary for the diet of diabetics because the fibres it contains decrease the glycemic index and modulate glucose uptake through cells.
Brown rice has an antihypertensive impact because it consists of a molecule capable of inhibiting angiotensin II in one of its integumentary layers, a component that is understood to be liable for the improvement of pathologies along with high blood pressure and atherosclerosis.
As we referred to above, brown rice includes gamma oryzanol, a molecule with antioxidant movement, that’s beneficial in anti-inflammatory conditions, in particular those associated with the gastrointestinal gadget, performing, for an instance, as a gastroprotection. Gamma oryzanol offers brown rice its cholesterol-reducing effect by inhibiting the expression of proteins related to fat accumulation and the infection normal of the metabolic syndrome.
Brown rice promotes weight reduction because it includes lots of fibre and has a widespread satiating impact, that is why it’s miles extensively used in hypocaloric diets in which, even though in small portions, it gives a feeling of satiety.
visit the ADNOOR website to get the best lengthy-grain rice, golden Sella basmati rice, brown rice, white rice, Brown superb Kernel Basmati Rice, nuts, seeds, and dried end result. We take pride in announcing that we are the high-quality Basmati rice emblem in Canada and have been the importers, exporters, wholesalers, distributors, and co-packers of diverse nuts and grains in Canada for the final 25 years. So, without losing time, visit our website and order what you need.
|
<urn:uuid:74abd248-6db1-48db-b953-204b7622f24b>
|
CC-MAIN-2023-23
|
https://adnoor.ca/brown-rice-and-its-fitness-blessings/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00678.warc.gz
|
en
| 0.944518 | 1,375 | 2.734375 | 3 |
As numerous people around the world like to have kittens and cats as their pets. No doubt, having pet cats and kittens is a lovely thing, but protecting them from predators is also a huge task. However, cats can protect themselves against several predators, but kittens are unable to do. That’s why they are in primary danger against predators. But what about raccoons? Do raccoons eat kittens?
As raccoons are omnivores, that’s why they can eat kittens. Not only this, kittens are unable to defend themselves as they are weak, so for raccoons to hunt kittens are easy.
And as raccoons are always looking for a meal with less effort, that’s why a kitten can be a good source of readily available food for chickens.
However, let’s dig into this topic more about how we can keep raccoons away from kittens. And if you are curious to know about it, then navigate this article.
Table of Contents
Do Raccoons Eat Kittens?
Raccoons are not only omnivores animals, but they are opportunistic eaters. It means that they can eat both plant and animals base flesh, and also they are always looking for readily available food, and they prefer to eat which they can get with a little effort.
And because of it, their food consists of a wide variety, for example, they can eat fruits, nuts, seeds, insects, worms, snails, fish, frogs, vegetables, poultry, small rodents, reptiles, birds, eggs, pet’s food, human’s base food, etc.
As they can eat that variety of food, they always look for free or readily available food instead. And if there is a kitten in front of raccoons, then raccoons would surely like to eat it. However, there are certain reasons due to which raccoons prefer to eat kittens. Let’s discuss them in detail.
Firstly, kittens are feeble and unable to protect themselves against predators like raccoons. As for protection, they are dependent on their parents or us. And because of it, kittens are not only the prey of raccoons, but many other animals can also prey on them.
Secondly, raccoons are opportunistic animals means that they look for readily available food. And as kittens offer them a meal with little effort, that’s why raccoons prefer to prey on kittens.
Not only this, kittens offer no resistance to raccoons for hunting them that’s why they are the easiest prey and tasty meal for raccoons.
Thirdly, raccoons can eat plant base matter as well, but they need proteins for their good health. And as we know that meat is the best source of proteins for raccoons. That’s why to fulfill their protein need, and raccoons have to eat animals’ base flesh, which means meat.
And if they are getting a good freely available food in the shape of a kitten, they would like to avail that opportunity.
Read also: Do Raccoons Eat Deer?
How To Keep Raccoons Away from Kittens?
However, not only for your pets but raccoons can be a complete nuisance for your territory as well. That’s why keeping them away from your place and your kittens are necessary. But how can we do this? Let’s explore it.
Keep Your Kitten Inside:
However, from saving raccoons and other animals, the best thing we can do is to keep our kittens inside. As kittens are unable to defend themselves, that’s why it is the best choice not to leave them alone outside.
Moreover, you have to keep them inside during times because raccoons are nocturnal animals, and they come out from their dens during the night for food. And during night hours, we have to keep a special eye on our kittens.
Close Windows and Doors:
As raccoons are good climbers and raiders as well. That’s why they can raid your place from any open place like windows and doors if they see any kind of food source inside your house.
So if you have kittens around your area, make sure that you are not leaving open doors and windows, especially at night. And it is also a better way to protect your pets, including kittens.
No Food and Water Source in Your Yard:
However, it is the best way to keep raccoons away from your house. As raccoons always look for a portion of the free meal, that’s why they will surely raid your yard if they get any food source or water source.
That’s why make sure that your yard is not offering them any food source or water source. However, make sure that your trash bins are secure enough that raccoons are unable to open them.
Because they can also open the lid of your trash bin and scavenge the food from it. And raccoons are intelligent enough to have a clear idea of how to open the trash bin’s lid.
Keeping raccoons away from your place can be done easily if you have raccoons-proof fencing around your place. And a good fence not only keeps raccoons away from your place and also helps to keep your kittens safe as well.
Do Raccoons Eat Cats?
As raccoons are larger animals than cats, that’s why they can hunt and eat a cat whenever they get a chance to do so. However, cats are able to defend themselves as they have sharp teeth and claws, but raccoons are wilder than cats.
However, raccoons do not prey on cats if they have another food source, even raccoons can get along with cats very well if they are not starving or have another food source.
A Final Thought:
If you have kittens inside your house and raccoons in your area, then ever you think that do raccoons eat kittens? However, a precise answer to this query is yes. As raccoons can eat kittens, they can also prefer to eat them as kittens are free food with lots of proteins.
However, you can keep raccoons away from your place by placing a good fence, removing food and water sources, etc.
|
<urn:uuid:b7c0db70-933b-4463-9467-28f941844e8d>
|
CC-MAIN-2023-40
|
https://concept360web.com/pets/raccoons-eat-kittens/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00395.warc.gz
|
en
| 0.973064 | 1,323 | 2.625 | 3 |
Know the Tricks of Writing a Formal Letter
Just like verbal communication, writing as a mode expression also requires some skills. What makes communication effective? Many of us may say the one which leads to the desired impact on the listener. The same applies to written communication modes, such as letters. While writing a formal letter may seem an easy task to accomplish for many, but writing an impactful formal letter is an entirely different task, including minute details.
With numerous modes of communication being available, now one ought to wonder what makes a formal letter so significant even in today’s time.
The answer is quite simple. Even with the arrival of different new age modes of communication, formal letters’ popularity as a traditional medium of communication has not faded.
Purpose Served by Formal Letters
In academics starting from admission, leave application, academic papers submission in all schools and colleges, formal letters are irreplaceable.
Similarly, in any organization, hiring managers or other employees requires a lot of paperwork, including formal letters as a part of the process.
Even while applying for a job, letters are essential. For example, cover letters are forwarded with the curriculum vitae for the easy reference of the employer.
The nitty-gritty of writing a formal letteris taught to students from very early childhood as part of the syllabus. However, just as the rules, methods of making a letter impactful can also be learned following some easy steps.
Follow These Useful Tips While Writing a Formal Letter
- Less is more:
A formal letter should not be unnecessarily lengthy. Precision and to the point details are appreciated in any formal letter. Letters that are short and informative are easy to refer to by the readers.
The writer should keep in mind that the letter aims to express all the essential detail in an organized manner. However, one should be careful not to miss out on considerable detail.
Typically writing a formal letter includes the writer’s introduction, followed by a detailed discussion of the letter’s topic and concluding with a request or a concern raised.
- Choice of words:
The language of the letter is always preferably formal, whether the reader is known or unknown. Especially in a “To Whom It May Concern letter,” the writer’s impression depends mostly on the choice of his or her words. The words need not be ornamented and grand, but they must forward the message as desired by the sender.
Choose words that are easy to comprehend and, at the same time, do not make the sender look very pushy and demanding.
One must maintain the courtesy while writing a formal letter to any person of authority to represent the writer’s real personality. A polite and respectful letter works excellent for breaking the ice in long term communication.
- Format of the letter:
As it is known to us, each letter has a unique layout, be it an application, writing a cover letter, letter for finalizing a business deal, or submission of an academic paper. The writer needs to make sure that the chosen format is ideal for the letter.
The subject is, no doubt, the most vital thing in any formal letter. The letter’s subject provides a kind of overview of the entire letter to the reader without going through the message itself.
The responsibility lies on the subject that it aptly reflects the entire idea of the letter. The subject need not be lengthy, or a complete sentence, but the chosen words should be such that the reader can grasp the whole idea.
The salutations too vary according to the topic and type of letter. It is wise to replace the greetings like ‘Dear’ with ‘Respected’ as the latter sounds more formal. Nonetheless, plenty of examples can be found using ‘Dear Sir’ or ‘Dear Ma’am’ in the formal letter. Thus the use of salutation is as per the writer’s discretion.
In case the sender is unsure about the receiver, a ‘To Whom It May Concern Letter’ can be written. In all instances, the process of addressing should be followed appropriately.
- Personal details:
Before a face to face interview, the letter is what creates an image of the sender. In many cases, the letters are the only mode of communication between two parties.
The sender’s personal information should be carefully conveyed, keeping all these details in mind. It is especially true in case of an interview where skipping even one point may produce unfavorable results.
- Content checking:
Nothing spoils the first impression, like incorrect spelling and grammar errors. Not only that, but a silly mistake is also embarrassing. But thanks to the grammar checking tools available online, you can quickly rectify such careless mistakes and improve your writing.
The software helps people save their time of manual proofreading, which is a tedious task requiring the dedication of long hours. Before forwarding a final copy, one must go through the letter and look carefully for errors.
How to Prevent Content Plagiarism?
Content plagiarism is another issue that needs the attention of the writer. Often while writing a letter, we may gather information from various sources, including the internet, and include that as a part of our writing without any modification.
Such writing leads to the creation of plagiarized content. A content plagiarism checker helps the writer identify such flaws in the writing.
Writing plagiarism checkers, such as Copyleaks, alert the writer by highlighting the copied words, phrases, and sentences to prevent possible self-plagiarism. The anti-plagiarism tools are available for free of cost and are user-friendly.
The plagiarism checker tools provide the result and in-depth scrutiny. Thus, they provide an accurate result in just a few minutes. A plagiarism checker provides your letter the finishing touch by improving the quality of the writing.
|
<urn:uuid:22ef21dc-693f-409e-80a7-245a30a62134>
|
CC-MAIN-2023-40
|
https://copyleaks.com/blog/writing-a-formal-letter-here-are-some-things-to-keep-in-mind
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506423.70/warc/CC-MAIN-20230922202444-20230922232444-00193.warc.gz
|
en
| 0.928504 | 1,229 | 3.203125 | 3 |
A welfare state is where the government has a duty to provide some level of basic support for welfare of its citizens, including Social Security. In politics, conservatives are against welfare states.
Examples[change | change source]
Schooling can be free, and it can be a duty of state to help ill people. The government may give money to people who do not have as much as most other people. The state may also give homes to people who do not have them. To make this happen there may have to be taxes, and usually rich people have to pay most taxes. The taxes vary, however, to ensure that the less rich people can afford to pay them. For example, in the UK, poorer people have to pay a smaller part of their income as income tax than the rich. There are also taxes put on things that people do not have to pay if they do not do certain things, such as buying as much. This is called VAT (Value Added Tax), which typically deducts 20% so that there is no fixed amount of tax to pay. A Welfare State could also be paid for if the government borrows money from people, mainly by selling bonds.
|
<urn:uuid:269d2010-bd5d-4c11-bc00-3a6316d911c8>
|
CC-MAIN-2017-34
|
https://simple.wikipedia.org/wiki/Welfare_state
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106465.71/warc/CC-MAIN-20170820112115-20170820132115-00589.warc.gz
|
en
| 0.990312 | 238 | 3.8125 | 4 |
White-Nose Syndrome Webinar
White-nose syndrome, caused by the fungus Geomyces destructans, has had a devastating impact on bat populations in the United States and Canada. Watch and listen to the video below as NPS staff and our partners discuss efforts to enhance bat monitoring and surveillance, public education and screening, and other means to limit the spread of this deadly disease.
NPS and BCI Bats in Buildings Webinar| White-Nose Syndrome Webinar
Last Updated: January 10, 2013
|
<urn:uuid:844afd55-eda4-4ca6-bb99-f6d750a65f41>
|
CC-MAIN-2014-41
|
http://www.nature.nps.gov/multimedia/wns_webinar02/index.cfm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.12/warc/CC-MAIN-20140930004103-00254-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.943669 | 107 | 2.65625 | 3 |
With increasing daylight hours and spring right around the corner, now is a great time to explore the importance of the sun to our Earth. These lessons from Learning Lab help students of all ages understand the ways the sun provides energy, warmth and weather.
Through small-group collaboration, creative hands-on activities and public speaking scenarios, these three lessons provide engaging and meaningful opportunities for student learning:
- Kindergarten: Touched by the Sun, created by EcoRise and RIS. In this lesson, students craft hanging suns, and use their senses to learn about and describe ways in which the sun is valuable to us. Access the Spanish version.
- Grades 3–5: Where Does My Energy Come From?, created by Facing the Future. In this lesson, students work in small groups to classify energy sources as renewable or nonrenewable and design an energy trading card to present what they have learned to the class.
- Grades 7–8: What’s the Alternative? created by EcoRise and RIS. In this lesson, students research whether the five most common alternative energy resources are appropriate for their community, and present their findings to the “mayor.” Access the Spanish version.
|
<urn:uuid:2ee717ca-47f8-413d-84ac-30105b4c368a>
|
CC-MAIN-2020-34
|
https://centerforgreenschools.org/3-lessons-solar-energy-k%E2%80%9312-students
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737206.16/warc/CC-MAIN-20200807172851-20200807202851-00551.warc.gz
|
en
| 0.94336 | 251 | 3.953125 | 4 |
Women who hate to shed workplace tears have good reason to rein them in. The immediate response among co-workers is not empathy but downright awkwardness. In fact, studies suggest if the apparent reason for the tears wouldn’t cause the average person to cry – if it falls short of a discussion about a death in the family or an immediate firing, for example – then the next predictable response of female onlookers is disdain. As for male witnesses, a new study from the Weismann institute of Science shows that when males witness female tears in the workplace, testosterone levels plummet and brain cells associated with sexual arousal hit the brakes.
Are women biologically wired to cry?
What do we mean by crying – tearing up or sobbing? When tears hit cheekbones, regardless of accompanying noises, it’s considered “crying”. Tear expert Neurologist William Frey noted that women cry four times as often as men — an average of 5.3 times per month compared with 1.4 for men. When it comes to “never crying”, only 6 percent of women make that claim, compared to 50 percent of men who claim to always be able to hold back tears.
Frey also found that female tear ducts are anatomically different from male tear ducts, resulting in a larger volume of tears. “When men cry, 73 percent of the time tears do not fall down their cheeks,” he noted; hence, men are very capable of masking their emotional duress. With women, on the other hand, almost every crying episode involves wet cheeks.
How to handle workplace tears
The reality for women is that workplace tears can derail careers, change company dynamics, and reinforce male-friendly company politics.
If crying is a first or a usual response to moderate stressors, face it, ladies, professional development may be in order. There are desensitization techniques and new coping strategies that can be learned. A heightened understanding of emotional triggers, new ways of reframing situations, better threat assessment techniques, and role playing exercises to help you retrain autonomic responses may lift your spirits as well as your professional outlook.
More often, however, it’s the rare occurrence and unexpected pounce that brings tears to your eyes and a lump to your throat. For example, you are blindsided or unable to respond verbally to a perceived assault, such as when a supervisor unfairly criticizes your work in a public setting. Before you can even think, the waterworks start. In that case, decide to fully address the situation at another time, when you are more able to control an emotional response, and just get through the moment as best you can.
If you do cry, add an assurance that you do care very much about the project and let that be your final word for the moment. It is not the time to defend yourself; tears paired with a defensive posture is too often interpreted as manipulative. Instead, wait until you calm down to press your case or respond.
And a final thought: crying is human. We all cry – even tough, strong male CEOs. Tears lower hormone levels and toxins and leave us more “clear headed.” The key to professional growth, however, is to shed those tears in private.
Not sure how I feel about this. I have cried, publicly in my former workplace, because my female boss attacked my character and integrity. After being belittled and made to feel stupid, I could not just ‘get myself in check’ and walk away to address the issue at another time. I needed to defend myself and do not feel ashamed that tears accompanied that. My tears were not manipulation. They were anger fueled with frustration and hurt. I watched this happen to a male coworker who experienced the same thing with the same boss.
Just giving my two cents from a woman who cried at work, but maybe the title should read, “When people cry at work; it happens and shouldn’t be viewed as a bad thing.”
Even tough strong male CEOs cry? Oh my! – signed, a tough, strong female.
Also there could be a bit of education on these differences so that the responses of both men and women are better understood. That could create more empathy. Men could learn a thing or two about expressing emotions, and the cathartic effect of a good cry.
I agree with Rhonda, “it happens.” I don’t see any reason that “no crying” should be the default environment.
Yeah, this article makes me laugh. What is the point of it? When a woman cries at work…what? What should happen? What should we do? I see it’s in the tips and advice category of the blog…yet it contains no real tips or advice. In fact, it’s full of contradictions:
At first we’re told there are good reasons to reign it in, but then told women are biologicially wired to cried and that crying is human and everyone does it–even men!
Then, we’re told crying can derail careers (not quite sure how), but if we cry we should add assurance that it’s because we care deeply about a project.
Then we’re told professional development is in order to deal with crying, but that more often crying happens when you’re blindsided by an event, which professional development can’t address.
This article would’ve been much more helpful if it had gone into specific professional development techniques/strategies to apply if you’re a person that’s apt to cry over events you’re not blindsided by.
I’m confused at the direction of this article. Are we trying to create an environment of desensitized, emotionless workers? This natural human response to stressful situations shouldn’t have to be suppressed by anyone, man or woman. If a situation arises that causes someone to cry I think we need to take a step back and look at why these confrontations are occurring in the workplace, instead of focusing on the crying itself. Sacrificing emotions for potential professional development doesn’t add up in my mind.
I am so glad to read the comments! Thank you all. I can see a need for a follow-up column to take on some of the specific points raised from the generalized blog (all I have room to print weekly!). I agree with most of what readers say, in that dehumanizing a workforce or excusing rude “leadership” doesn’t lead to the most productive environment or one, frankly, I’d enjoy working in either. However, that said, the facts are that women are often discounted for crying — and yet seem biologically predisposed more often than male counterparts to cry. if the tears aren’t seen as legitimate given the circumstances, or if it is a default reaction to confrontation, then women may find their careers penalized.
The point could have been highlighted (again, wish I had more room to write!) that the SOURCE of the conflict matters, of course! Bullying or rude behavior, etc. are more inexcusable, in my opinion — and obviously in your opinions — than tears. I would consider that to be a high stress situation and not a moderate-stress situation as described above. What I was referring to, to offer just one specific example, would be a corrective suggestion from a boss, or a co-worker offering a different opinion about the direction of a project, which leads to a tearful outburst.
Again, thanks for commenting and reading the blog. I appreciate the feedback and the points you’ve raised or highlighted.
|
<urn:uuid:0010dfcd-7f81-4809-9ceb-40b20c32b080>
|
CC-MAIN-2023-23
|
https://blog.tdsbusiness.com/tips-advice/when-a-woman-cries-at-work/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00668.warc.gz
|
en
| 0.960631 | 1,604 | 2.8125 | 3 |
The address of this page has changed. Please bookmark the new URL for future reference.
If you're not redirected within a few seconds,
Brown Bear photos, pictures and photography
Click Here For More Wildlife Photos
Brown Bears - Ursus arctos
The Brown Bear is perhaps the most archetypal of all bear species and shows incredible geographical diversity, and the single species recognized today was at one point in history divided into 232 living and 39 fossil species and subspecies. Some of the more well-known subspecies of Brown Bear include the Grizzly Bear, named for its silver tipped fur, and the Kodiak Bear, the largest form of Brown Bear, which can weigh over 2,000 pounds, and is found on islands off southern Alaska.|
Today, the Brown Bear is most commonly hunted for sport, or poached for the commercial trade in bear paws and gall bladders. Hunting legislation varies between countries, but where permitted, it is controlled through the use of permits and maximum annual quotas. However, due to difficulties with the development of monitoring plans, the sustainability of quotas in some regions is questionable, and there are also significant problems with illegal hunting, such as in the Russian Far East and South East Asia.
Visit the Polar Bear and Black Bear pages to see photos of these awesome animals as well.
You can follow Mike on
to keep up with his travels and join him on his
If you would like to buy or license a print, please email Mike with your request.
|
<urn:uuid:54280ffb-5b10-4856-a230-dcabe86cb20c>
|
CC-MAIN-2023-40
|
https://michaeldanielho.com/grizzly-bears.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00571.warc.gz
|
en
| 0.953483 | 329 | 2.90625 | 3 |
Nanotechnology Journal will soon be publishing a research paper detailing the findings of several ECE students. The team, led by Dr. Aaron Hawkins and consisting of ECEn students Zach Walker, Tanner Wells, and Kalliyan Lay as well as collaborators Mohammad Sampad and Holger Schmidt from the UC Santa Cruz School of Engineering, created a new technique for fabricating membranes so thin that they measure their width exclusively in nanometers.
The technique they developed over the past two years materialized through applications of photolithography and microfluidics. Nanoscale membranes are extremely fragile and any abrupt changes to their shape can cause them to break. The team utilized the naturally forming shape of a liquid meniscus to provide a template for their membranes. They first use photolithography to create a wafer with strategically placed channels through which they flow SU8-2000.5 until it fills the trenches and forms a meniscus at the trench opening. Once the SU8 hardens, they grow a silicon dioxide membrane on top and removed the SU8 underneath, leaving the meniscus-shaped silicon-dioxide membrane inside of the channel. Membranes measure in at only fifty nanometers thick and produced a promising percent yield in a variety of channels hundreds of microns long. The results broke scientific ground. Synthetic membranes this thin rarely extend more than a few hundred nanometers in length or width.
The novel fabrication technique will enhance the progress of an even larger project based on synthetic nanpores. With NIH’s funding and support, the team ultimately wants to create a nanoscopic opening in their membranes through which particles could flow. The opening will act as a filter that can detect any kind of nanoscopic particle, including DNA from bacteria and virusus. Although the nanopore team developed their membrane fabrication technique for their own project, it can also apply to pressure sensors, thermal actuators, micromirrors, and various other MEMS devices.
|
<urn:uuid:b760f8a8-af73-4b08-b3f0-922e5a692568>
|
CC-MAIN-2023-40
|
https://ece.byu.edu/department-news/ece-students-borrow-from-nature-to-create-nanoscale-membranes
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00521.warc.gz
|
en
| 0.925812 | 397 | 3.265625 | 3 |
Hippos are extremely territorial creatures and are amongst the most aggressive animals in the world with their fights, sometimes ending with the Ԁᴇɑтһ of one of the participants.
Male hippos make a roaring noise to warn of intruders approaching their territory. When two male hippos start fighting, they will use their tusks to try and gore each other. This can be very Ԁɑпɡᴇгous, as the hippos can easily puncture each other’s organs.
Hippos will usually fight other hippos using their mouths. The creature’s impressive jaw measures two feet across and can be opened to 150 degrees. When two hippos fight, they usually face each other with their mouths open, attempting to inflict bites on the other, while using their mouths to block any bites directed at them. And the bite pressure of a hippo has been measured at an impressive 1,821lb – enough to split a small boat in half.
Many people think that hippos fight when they are in the water. This is not true.
Hippos do not like to be wet and will only get into the water when they feel like they have no other options, such as a hungry lion trying to eat them or a human with a gun looking to ᴋɪʟʟ them.
Fights between hippos occur on land, not in the water.
The real reason hippos fight is because they are very territorial. Hippos will mark their territory with their dung and then defend it against other hippos. They may also fight over a mate.
When a male hippo tries to court a female, he will become very aggressive with any other males near her. If another male tries to take over his territory, the two hippos will fight.
Hippos are also very protective of their young and can become aggressive if they feel their calf is threatened.
Because hippos are so big, their fights can be very violent. They battle on land with their strong legs and sharp teeth.
Their enormous weight, combined with the size of their tusks, makes it difficult for them to get back up after falling down. If a hippo is hurt in a fight, it may not get back up and could quickly become prey for other animals.
Yes, hippos can injure each other in fights. They can puncture each other’s organs with their tusks, and they can also get hurt if they fall down. Occasionally, a dispute will result in Ԁᴇɑтһ.
When two male hippos fight, there is no clear winner. The fight will usually go on until one of the hippos gets tired and runs away.
|
<urn:uuid:2342c723-b728-4bc8-b910-3a2e775eef7c>
|
CC-MAIN-2023-40
|
http://newslivelink.com/2023/05/03/watch-in-horror-as-two-hippos-fight-for-territory-in-a-life-and-death-battle/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00798.warc.gz
|
en
| 0.974296 | 579 | 3.390625 | 3 |
|Skip Navigation Links|
|Exit Print View|
|man pages section 1: User Commands Oracle Solaris 10 8/11 Information Library|
- locate a command; display its pathname or alias
which takes a list of names and looks for the files which would be executed had these names been given as commands. Each argument is expanded if it is aliased, and searched for along the user's path. Both aliases and path are taken from the user's .cshrc file.
source of aliases and path values
See attributes(5) for descriptions of the following attributes:
A diagnostic is given for names which are aliased to more than a single word, or if an executable file with the argument name was not found in the path.
which is not a shell built-in command; it is the UNIX command, /usr/bin/which
Only aliases and paths from ~/.cshrc are used; importing from the current environment is not attempted. Must be executed by csh(1), since only csh knows about aliases.
To compensate for ~/.cshrc files in which aliases depend upon the prompt variable being set, which sets this variable to NULL. If the ~/.cshrc produces output or prompts for input when prompt is set, which may produce some strange results.
|
<urn:uuid:5c144889-c091-4a2c-b3c6-751e02b6d1c5>
|
CC-MAIN-2014-15
|
http://docs.oracle.com/cd/E23823_01/html/816-5165/which-1.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535095.9/warc/CC-MAIN-20140416005215-00124-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.916737 | 269 | 2.765625 | 3 |
A lottery is a game of chance in which players win a prize based on the number or sequence of numbers drawn. The lottery is a popular pastime in the United States and many other countries, with a variety of games available. Some lotteries are run by private companies while others are state or federally run. Some people prefer to play scratch-off tickets while others like the speed and simplicity of pull-tab tickets. Regardless of how you play, there is one important thing to remember: the odds of winning are very low.
In the 17th century, public lotteries were popular in the Netherlands, and they were often used to raise money for a variety of purposes, including town fortifications and poor relief. The first recorded use of the word “lottery” in English was in the 15th century, and the term has since become synonymous with the drawing of lots to determine a winner.
One of the most popular forms of lottery is the state-run lottery, which raises money for a variety of uses. In the US, there are more than 50 state-run lotteries, each with its own rules and regulations. In the late twentieth century, there was a tax revolt in the US that inspired states to rely more on lotteries to bring in revenue. The popularity of the lottery increased throughout the country, and by the 1980s most states had a legalized form of gambling.
Shirley Jackson’s short story “The Lottery” is a bleak tale about the dangers of blindly following tradition. The story takes place in a rural village where the local population has an obsession with the lottery and its elaborate rituals. The villagers persecute anyone who is chosen in the lottery, even innocent children. The story illustrates how even the most well-meaning people can commit terrible acts if they do not think about their actions.
Whether or not you have won the lottery, there are some things you can do to improve your chances of winning in the future. For starters, don’t buy a ticket with any numbers that have sentimental value to you. Instead, choose random numbers that have no correlation to your birthday or other personal events. Buying more tickets will also increase your chances of winning, but be sure to budget your spending.
There is a certain inextricable human impulse to gamble, and that’s exactly what lotteries are designed to tap into. However, there are also other factors at play that can cause people to overspend. The big one is the promise of instant wealth, which can be very tempting for people with limited financial means or who live in a society that values material possessions. In addition, many people are influenced by the hype surrounding the lottery, such as billboards with huge jackpot amounts. This can lead to a cycle of debt and addiction. Ultimately, if you’re going to play the lottery, do your research and set realistic goals for yourself.
|
<urn:uuid:c18a2f97-c257-45c6-9d97-b821d370906c>
|
CC-MAIN-2023-40
|
https://momsintow.com/the-odds-of-winning-the-lottery-are-very-low/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00850.warc.gz
|
en
| 0.977096 | 601 | 2.890625 | 3 |
Bauhaus is a German expression meaning house for building. In 1919, the economy in Germany was collapsing after a crushing war. Architect Walter Gropius was appointed to head a new institution that would help rebuild the country and form a new social order. Called the Bauhaus, the Institution called for a new "rational" social housing for the workers. Bauhaus architects rejected "bourgeois" details such as cornices, eaves, and decorative details. They wanted to use principles of Classical architecture in their most pure form: without ornamentation of any kind.
Generally, Bauhaus buildings have flat roofs, smooth façades, and cubic shapes. Colors are white, gray, beige, or black. Floor plans are open and furniture is functional. Popular construction methods of the time—steel-frame with glass curtain walls—were used for both residential and commercial architecture. More than any architectural style, however, the Bauhaus Manifesto promoted principles of creative collaboration—planning, designing, drafting, and construction are tasks equal within the building collective. Art and craft should have no difference.
The Bauhaus school originated in Weimar (1919), moved to Dessau (1925), and disbanded when the Nazis rose to power. Walter Gropius, Ludwig Mies van der Rohe, and other Bauhaus leaders migrated to the United States. The term International Style was applied to the American form of Bauhaus architecture.
Shown here: The Bauhaus style Gropius House >>>
Learn more: Bauhaus Architecture in Dessau – Icons of modernism (in English) >>>
See more examples of Bauhaus and the International Style:
- The Seagram Building
- The Farnsworth House
- Philip Johnson's Glass House
- The Transco Building by Philip Johnson
- United Nations Headquarters by Le Corbusier
- The Miller House by Richard Neutra
- The Lovell House by Richard Neutra
- The Bauhaus Building in Dessau, Germany
- Furniture by Bauhaus Architects
|
<urn:uuid:32e93e0b-c753-46b3-8ac8-267069a62043>
|
CC-MAIN-2014-15
|
http://architecture.about.com/od/20thcenturytrends/ig/Modern-Architecture/Bauhaus.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202774.3/warc/CC-MAIN-20140423032002-00369-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.913018 | 428 | 3.65625 | 4 |
Playing Crusoe: The Earliest Cigarette Card Game?
Children played many games with cigarette cards over the years — Crusoe might be the first one that caught on nationally
Many collectors know that children collecting the earliest trading cards played a variety of games with them. The games were often seen as a form of gambling because they usually involved playing for either money or for the cards themselves.
I’ve yet to definitively track down the first of these games to be played. But the earliest one that I’ve seen documented in newspapers across the country is for a game called, Crusoe.
Crusoe was documented in the March 30, 1889 issue of the San Francisco Examiner. It was described as such:
- Each player ‘pitches’ a card towards a wall and the one landing closest to it is essentially the winner.
- The next closest player is second, the next third, and so on
- The player that was first then collects all the cards. He/She calls heads or tails and then throws all of the cards in the air. The ones that land in that manner (heads or tails) belong to that player. Heads were cards that landed face up — tails with cards showing the back.
- The player that was second then does the same with any remaining cards. Players take turns until there are no more cards left to win. If there are still cards left after all of the players have had a chance, players take turns again.
The thing that is intriguing to me is that the game spread presumably across the entire country. Several newspaper articles from all over the place referenced it and 1889 is the year where I found several articles relating to it. The game dates, then, at least back to then, and likely earlier if word of it had traveled across the country.
That last article was from San Francisco. But in June of 1889, The Fall River Daily Herald published a story that was in the New York Sun, talking about the same game being played in New York. It was described exactly as Crusoe, though technically, they just named the game as “Cards.” The New York article also gave more insight on how the cards were ‘pitched’ towards the wall, citing that it wasn’t a pitch but a ‘shoot.’ Cards were ‘shot’ with a knuckle, just as marbles were shot.
That article even mentioned some of the cards being played for, though the manufacturer names were left out.
“…the schoolboy has the actresses, the pugilists, the ball players, the striped-shirted oarsmen, the famously ugly beauties.”
Pugilists, ball players, etc. — those could mean just about any set. But the striped-shirted oarsmen reference was interesting to me. See, that seems like it could reference the rowers in the 1888 Allen & Ginter N28 set. Here are a couple of those — E.A. Trickett and Jacob Gaudaur. I immediately thought of these cards when reading that.
Another interesting thing is that the game was not just played by children for cards — it was also played for money. From that aforementioned San Francisco Examiner article:
“When we’s got money we play for coin, but den we got to keep on de lookout for coppers, for dey’d throw us in the cooler for gamblin’, Ketch on? Well, when we ain’t go no stuff we play for pictur’ cards just to keep our hand in.”
The game of Crusoe being played for cards, it should also be mentioned, seemed to be largely for the poor. In addition to that reference of playing for money, other newspaper articles of the time cited that the card game was for those who could not afford to play for money. A September 1890 article in The Indianapolis Journal provided one such mention stating that the use of ‘little picture-cards that come in cigarette boxes’ were used by children not wealthy enough to risk pennies. While I have no doubt that such a popular game was played by children of all social statuses, pitching cards for pennies seemed to be, more often than not, played by children with little money to speak of.
How did they get the cards? Well, as I’ve written in other articles, children basically made nuisances of themselves, pestering cigarette-smoking adults for the cards in the packs. Many certainly even built up large collections without spending a cent.
The game seemed harmless enough. Kids flipping cards — who cares, right? Well, I expect most games went off without a hitch. But sometimes, the losers didn’t give up their cards easily. The March 31, 1890 issue of The Brooklyn Citizen cited a story where a boy was badly stabbed and nearly died (he didn’t) over the game. Crusoe was not specifically cited by name but it mentioned a game that was similar to pitching pennies, which sounded a lot like our game.
“… it seems that the boys were gambling with pictures which come in cigarette packages, which they plan in a manner similar to pitching pennies. Komsuski, who was losing, accused Farren of cheating, which he later denied. During the quarrel which followed, Komsuski drew the knife and plunged the blade up to the handle in Farren’s breast.”
That’s Crusoe in a nutshell. But as a final point, the game also got me thinking about card condition.
Cards, of course, have sustained all sorts of damage over the years. But a game like this would immediately damage the cards as they would be tossed in the air with corners hitting what would presumably be hard surfaces of sidewalks/concrete, etc.
I’ve read a lot of discussion from collectors that insist some heavily worn corners are not caused by natural damage. And surely, not all. Some, I imagine, are the result of corners that have been clipped/cut and then worn down over time. But a game like this that was played frequently, surely over many years, with corners repeatedly hitting against hard surfaces also makes heavy corner wear somewhat easy to imagine.
Follow Pre-War Cards on Twitter and also be sure to like our page on Facebook.
|
<urn:uuid:a209ebb9-32f0-4007-85b8-4a0cc52a9588>
|
CC-MAIN-2023-23
|
https://prewarcards.com/2020/08/04/cigarette-card-games-tobacco-pitching-card-crusoe-rules-game-old-judge-allen-ginter/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00017.warc.gz
|
en
| 0.986369 | 1,325 | 2.984375 | 3 |
by Dr. Richard O’Connor, author of Undoing Depression: What Therapy Doesn’t Teach You and Medication Can’s Give You
For youth between the ages of 10 and 24, suicide is the third leading cause of death. It results in approximately 4600 lives lost each year. The top three methods used in suicides of young people include firearms (45%), suffocation (40%), and poisoning (8%). Each day in the United States there are an average of over 5,400 attempts by young people, grades 7-12. Four out of 5 teens who attempt suicide have given clear warning signs. Centers for Disease Control and Prevention (CDC)
No one has advanced a good theory explaining why teens are taking their own lives in greater numbers, but it’s important for everyone to be aware of the problem.
Research has found that the major risk factors of suicide among young people are depression, substance abuse,behavior problems, availability of a gun, previous suicide attempts, a family history of depression or substance abuse, and a traumatic event, such as being bullied.
If this lasts more than a week or so with no relief, and if there are other signs of depression — changes in appetite, activity level, sleep pattern; loss of interest in activities that normally give pleasure; social withdrawal; thoughts of death or punishment — it should be taken seriously.
Signs of developing depression in teens include:
- Gradual withdrawal into helplessness and apathy
- Isolated behavior
- Drop in school performance
- Loss of interest in activities that formerly were sources of enjoyment
- Feelings of worthlessness, hopelessness, helplessness
- Fatigue or lack of energy or motivation
- Change in sleep habits
- Change in eating habits
- Preoccupation with sad thoughts or death
- Loss of concentration
- Increase in physical complaints
- Sudden outbursts of temper
- Reckless or dangerous behavior
- Increased drug or alcohol abuse
- Irritability; restlessness
Parents are bound to have trouble understanding a depressed teen’s confusing signals; after all, who does not want to think of their child as happy and confident. But parents must pay attention to serious depression; the risks are too great if they don’t.
Sometimes teens try alcohol or other drugs to relieve depression. Unfortunately the drugs themselves have a depressant effect, and lower inhibitions against self-injury. Some young people who have never expressed a suicidal thought have taken their own lives when they got drunk to ease the pain of a disappointment or loss. But they only felt worse while drunk, and committed a rash, impulsive act which they wouldn’t have done sober.
Getting in trouble in school or with the law, fighting with parents, and other behavior problems are the third risk factor for suicide. We tend to think of potential suicides as sensitive, shy people who are overwhelmed by life. We don’t see the cocky, obnoxious adolescent as potentially self-destructive, even though his behavior — continually getting in trouble, keeping the world at arm’s length — has exactly that effect.
I recently re-read The Catcher in the Rye and was amazed to see Holden Caulfield, whom I had so identified myself with, from my now-adult perspective. Though I still felt sympathetic, I was struck by how depressed and self-destructive his behavior seemed.
Availability of a gun
This makes the consequences of an impulsive act much more lethal. Surprisingly, even when a child has made one attempt, parents often fail to remove guns from the home. How many fatal, impulsive decisions have been aided by the presence of a handgun in the home?
If you have a gun in your home, you are FIVE times more likely to have a suicide in your house than homes without a gun.
It is also important to limit the person’s access to large amounts of medication or other lethal means of committing suicide.
Previous suicide attempts
Half of all children who have made one suicide attempt will make another, sometimes as many as two a year until they succeed. The majority of suicide attempts are expressions of extreme distress and not just harmless bids for attention.
Other factors include a family history of depression or substance abuse, a recent traumatic event, and incarceration.
Some children who take their own lives are indeed the opposite of the rebellious teen. They are anxious, insecure kids who have a desperate desire to be liked, to fit in, to do well. Their expectations are so high that they demand too much of themselves, so are condemned to constant disappointment.
A traumatic event, which can seem minor viewed from an adult perspective, is enough to push them over the edge into a severe depression. Being bullied, breaking up with their girlfriend or boyfriend, failing a test, getting into an accident — they have the sense that their life is a delicate balance, and one failure or disappointment seems to threaten the whole house of cards.
No talk of suicide should be taken lightly. It indicates the need for immediate professional help. Any suicidal gesture, no matter how “harmless” it seems, demands immediate professional attention.
Risk getting involved. If you suspect suicidal thoughts or behavior ― ask the teen directly if she or he is considering suicide. Don’t avoid the subject or wait for the teen to come to you.
Be alert to the teen’s feelings. The severity of the problem should be judged from the teen’s perception, not by adult standards. If a teen perceives something as a problem, it is a problem.
Never agree to keep the discussion of suicide with a teen a secret. Agree to give help and support in getting professional help.
Never leave a suicidal person alone. Get help!
Imminent danger signs include:
- Talking about death and wanting to die
- Suicidal thoughts, plans, or fantasies
- Previous suicide attempts
- Friends who have attempted suicide
- Giving away personal possessions
- Telling a friend about suicidal plans
- Writing a note
Adults can help prevent suicide by fostering open, honest communication with teens. If a teen trusts you enough to come to you with a problem, take time to listen immediately. Delay may only fuel feelings of doom in the teen.
The following strategies may be helpful when dealing with teens and suicide:
- Talk about suicide in an open manner. Teens need to be given a chance to discuss suicide by voicing their thoughts and opinions. Candid discussion is important particularly when a teen suicide has occurred in a community.
- Let young people know about hotline and crisis line numbers and crisis intervention services that are accessible locally.
- Model healthy behavior and positive problem-solving approaches. Adults can be models for young people by dealing with their own stress in a constructive manner.
- Use TV shows, films, newspaper articles and other media as a trigger for a discussion of effective ways to deal with stress and depression..
- Provide opportunities for group support. Teens sharing problems with other teens who help find solutions can be beneficial.
Adults need to take the possibility of teen suicide seriously even if their community has not experienced one. Teen depression and thoughts of suicide are more common than many adults assume and there are as many as 50 to 100 suicide attempts for every young person who actually takes his or her own life.
|
<urn:uuid:97b01167-93ca-41cd-9bbc-c9c002fbfae2>
|
CC-MAIN-2017-47
|
http://www.focusas.org/issues/teen-suicide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809160.77/warc/CC-MAIN-20171124234011-20171125014011-00790.warc.gz
|
en
| 0.958859 | 1,513 | 3.390625 | 3 |
StoryCorps is an American non-profit organization whose mission is to record, preserve, and share the stories of Americans from all backgrounds and beliefs.
StoryCorps, born with the opening of a StoryBooth in Grand Central Terminal in New York City in 2003, is now an invaluable archive of stories related to such themes as identity, diversity, prejudice, relationships, with focuses on Latinos communities, LGBT cultures, September 11, indigenous peoples, and more.
Launched in 2008, StoryCorps’ Griot Initiative became the largest collection of African American stories collected in history. The Griot Initiative documents the varied voices of people with roots in the African Diaspora living in the United States.
StoryCorps founder Dave Isay was named the recipient of the 2015 TED Prize. The prize was used to launch the free StoryCorps App.
As written in the website, “StoryCorps’ mission is to preserve and share humanity’s stories in order to build connections between people and create a more just and compassionate world. The aim is to strengthen and build the connections between people, to teach the value of listening, and to weave into the fabric of culture the understanding that everyone’s story matters. At the same time, StoryCorps is creating an invaluable archive for future generations.”
On the website, you can also find animations, video-interviews, podcasts, as well as materials from StoryCorpsU, a year-long, cross-disciplinary youth development program designed to help students develop self and social awareness.
Read more here.
Find Dave Isay’s TED talk here.
|
<urn:uuid:e8fd8199-d58b-4695-9ea6-6dac50f71417>
|
CC-MAIN-2020-24
|
https://museumsandmigration.wordpress.com/2016/10/31/storycorps-teaching-the-value-of-listening/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347424174.72/warc/CC-MAIN-20200602100039-20200602130039-00367.warc.gz
|
en
| 0.958666 | 337 | 2.625 | 3 |
At the National High Magnetic Field Laboratory, we've teamed up science and athletics to invent a few new sports inspired by the cool things scientists study in high-field magnets.
Some of the things scientists study are spherical, like the golf, tennis and soccer balls we all know so well. It turns out that where there's a will — and a sphere and a little imagination — there's a new sport waiting to be thought up.
Our imagined pastimes probably won't replace the World Series or Olympics, but they do offer a glimpse into the amazing things scientists discover using high-field magnets. They might even inspire you to invent and play a science sport of your own.
So let's get this SciBall rolling!
Photo illustration by Caroline McNiel, based on a photo by Savage Frieze and an illustration of the crystal structure of a “1-2-20” thermoelectric material made of ytterbium, zinc and lanthanum.
Thermoelectric materials can conduct electricity if there is a temperature difference between the two ends (or conduct heating and cooling if there is a voltage difference). It's a nifty trick that few materials can pull off because the movement of electrons and of heat usually go hand in hand. But to have good thermoelectric performance, these two properties need to be decoupled. You want to encourage the movement of electrons for the current, while at the same time discouraging phonons from transporting heat. The heat gradient needs to be preserved to maintain the flow of electricity.
It's a challenging puzzle — sort of like figuring out how to transfer an object from one end of a playing field to the other without moving your feet. In the sport of Ultimate, players overcome that constraint by tossing the disc from teammate to teammate until, perhaps in a dramatic play called a layout, someone catches it in the end zone. Thermoelectrics are important because they can be used for everything from power generation in space to devices that recoup energy wasted in cars through heat.
At the National MagLab, scientists use high-field magnets to study compounds with these properties, including 1-2-20s, a promising class of materials with a round, cage-like structure that sidelines phonons while letting electrons fly through like a well-hucked disc.
Photo illustration by Caroline McNiel, based on a photo by Michael Mitchell. MOF illustration, based on a 1,2,4-triazolyl-carboxylate-based MOF, adapted with permission from Inorg. Chem. 2014, 53, 7, 3642–3654, copyright 2014 American Chemical Society.
You know how waffles have all those little nooks and crannies to soak up the maple syrup? So do special molecules known as metal organic frameworks — or MOFs (rhymes with moths), as the scientists who make and study these lattice structures call them.
Researchers are interested in MOFs in part because you can cram an astonishing amount of stuff inside them. In the sports world, an apt MOF analogy would be a hole-pocked, stuffable wiffleball. MOFs are designed to be quite porous and contain a remarkable amount of surface area. If you were to take all the surfaces hiding inside these tiny structures and lay them out flat, they could easily cover, say, an entire wiffleball field. This makes them great at absorbing, storing and transporting other compounds.
MOFs could be used in storing energy, gas and liquids, purifying water, catalysis, drug delivery, even carbon sequestration — a veritable science grand slam. It’s easy to see why MOF researchers come to the MagLab, the big league for strong and unique magnets. The lab is home base to the world’s most powerful nuclear magnetic resonance magnet, the 36-tesla Series Connected Hybrid, the sweet spot for analyzing complex structures like MOFs. With that kind of high-field advantage, scientists can’t help but hit it outta the park.
Photo illustration by Caroline McNiel, based on a photo by Franck Camhi. Illustration of a Fermi surface courtesy of Amalia Coldea, adapted after work performed in Phys. Rev. Research 2, 012055 (2020).
Many physicists are obsessed with a kind of electron they call Fermi electrons. In the systems they study, these are the MVP electrons — the ones that do interesting things, especially when exposed to high fields. While other electrons are sitting on the sidelines because they’re too tightly bound to a nucleus or too high in energy to interact in any relevant way, Fermi electrons are situated on what physicists call the Fermi surface. Think of the Fermi surface as the part of the field in American football where all the action is going on — the line of scrimmage.
Physicists can observe these electrons by putting the material they are studying in a very high magnetic field, running a current through it and measuring its resistance. They are looking for quantum oscillations — discrete jumps in the resistance that indicate that those Fermi electrons have jumped up from one quantum energy level to the next. Imagine the Fermi electrons as little quantum quarterbacks who need to chuck the pigskin one discrete unit downfield — the quantum equivalent of 10 yards — to earn a first down. The crowd goes wild, and physicists record a quantum oscillation.
Through some tricky math, physicists can then take their measurements and create a ball-like representation of it called a Fermi surface. It's a kind of topological map that tells scientists tons about these Fermi electrons' behavior and about the properties of the material they inhabit. For high-field physicists, it's an insight equivalent to a game-winning touchdown.
Photo illustration by Caroline McNiel, based on a photo by Boris Ryaposov.
One ball we've seen far too much lately is the SARS-CoV-2 virus, which causes COVID-19. Scientists around the globe, including at the National MagLab, have been working hard to snuff out the hated orb. Volleyball seems the most apt sports metaphor: Picture a player leaping at the net, arm stretched high, poised to spike (or kill, in the parlance of the sport) the spikey sphere.
At the National MagLab, scientists are using nuclear magnetic resonance (NMR) and magnetic resonance imaging (MRI) to study the virus in the hopes of contributing to its undoing. The lab's powerful magnets help them understand the structure and behavior of the constituent proteins, looking for a hole in the viral membrane's defense that a drug could attack. MagLab scientists and engineers are also developing COVID-crushing stem cell therapies that they plan to test in animal models using the world's strongest MRI machine for animal research. Together, these researchers form an imposing front row working to block the virus.
Photo illustration by Caroline McNiel, based on a photo by Dusan Petkovic. Illustration of lanthanum hydride molecule by Kevin John.
A superhydride is a molecule made up of a bunch of hydrogen atoms that form a cage, imprisoning one or more other atoms inside, like a sidelined hockey player waiting it out in the penalty box. When placed under enormous pressure, superhydrides have been shown to be superconducting at record-warm temperatures. Superconductors, unlike conventional conductors such as copper, can transport electricity with perfect efficiency because electrons encounter no friction whatsoever. You might say it's the difference between laboriously trudging through snow and skating effortlessly across a smooth sheet of ice.
Until relatively recently, all known superconductors worked only at cryogenic temperatures many times colder than a hockey rink. But superhydrides have dashed toward the milestone of room temperature with the blistering speed of a slap shot. Using the strongest continuous-field magnet in the world, physicists have been probing these extraordinary compounds and testing different recipes, hoping to find the right combination to finally cross the goal line they've been skating around for years.
Photo illustration by Caroline McNiel, based on a photo by FREEPIK2 and an illustration of a carbon nanocage.
In 1985, scientists zapped a pile of graphite with a laser and discovered a strange new molecule. Made of 60 carbon atoms, it resembled the white and black sphere known as a football in most of the world and a soccer ball in North America.
Its discoverers dubbed it a buckminsterfullerene (buckyball for short) after an architect who designed geodesic domes similar in shape. One of the many discoveries to come from that Nobel Prize-winning feat are carbon nanocages, molecules made of 80 carbons that encapsulate other atoms.
Scientists have kicked around ideas for different nanocage recipes. They vaporize varying mixes of graphite and other elements, then study the results in an ion cyclotron resonance mass spectrometer to better understand what they have created. Each variation has its own structure, properties and potential game-changing uses in health and energy. Some nanocages, for example, could transport tiny cargoes inside the human body, such as drugs or MRI contrast agents.
Now that's what we call using your head!
How to become a SciBall Superstar
Love these science sports? Want to make your SciBall trading card? Here's the play by play (a basic familiarity with PowerPoint, Google Slides or Keynote is needed).
- Step 1: Download one of the trading cards below.
- Step 2: Take a picture of yourself playing the sport. (Think catching, kicking, throwing or spiking or batting and invisible ball.)
- Step 3: Click on the name of the sport and temporarily drag that image layer to the side.
- Step 4: Right click on "Your Photo Here" and select “Change Picture” to insert your photo. Reposition or zoom in as needed. Reposition the image layer you dragged off to the side back into place.
- Step 5: If you need to reposition the SciBall, just click on it to drag it around to the perfect spot to complete your image.
- Step 6: Fill in your name, nickname and the team you play for. Get creative, nerdy, and silly.
- Step 7: Click on “File” then on “Export” to save your file as a jpg or other file format.
- Step 8: "Trade" your SciBall card with your friends on social media. Don't forget to tag @NationalMaglab and #SciBall.
- Step 9: Choose another SciBall sport and make another card! Collect 'em! Trade 'em! Post 'em!
Thanks to MagLab physicist and DC Field Facility Director Tim Murphy; MagLab chemist Andrzej Ozarowski; and MagLab physicist Kaya Wei, who served as science advisors for parts of this story.
Story by Public Affairs Team
|
<urn:uuid:d04750a8-18a6-4163-a5e5-477c6b4a01f3>
|
CC-MAIN-2023-40
|
https://nationalmaglab.org/magnet-academy/read-science-stories/left-fields/let-s-play-sciball/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00333.warc.gz
|
en
| 0.929818 | 2,311 | 3.390625 | 3 |
The primary motor cortex is the most posterior part of the precentral gyrus. Stud ies going back to the mid1950s show that the amygdala, located near the hippocampus in the front part of the tem poral lobe, serves as a type of watchdog to identify potential threats and danger. The role of the amygdala in dreaming yvonne blake department. The lymphatic tonsils pharyngeal, palatine, lingual, laryngeal, and tubal. Tiroides pineal utero colon transverso testiculoovario rotula rotula amigdala cer. The amygdala is a structure of the temporal lobe thought to be involved in assigning emotional significance to environmental information and triggering adapted physiological, behavioral and affective responses.
The synchronization of this functions and structures is the key for an human free of pathology. Ptsd, the hippocampus, and the amygdala how trauma. Ptsd, the hippocampus, and the amygdala how trauma changes. Amigdala synonyms, amigdala pronunciation, amigdala translation, english dictionary definition of amigdala. Visual, tactile, and motor activities of the left side of the body are directed predominantly by the right hemisphere and vice versa. Certain complex functions involve both hemispheres but are directed predominantly by one cerebral dominance. Cerebral function lost loss of all cognitive functions, reflexes intact may progress to bp, breathing brain stem vegetative state for 12 months are longer is associated with. The standard artificial cerebral spinal fluid acsf consisted of in mm 124 nacl, 2. Overview of cerebral function neurologic disorders merck. A large body of literature in animals and human implicates the amygdala in fear. Mens and womens learning styles and capacities christoph blumrich newsweek men women temporal lobe. The neurones of the forebrain control cognitive, sensory and motor function, as well as regulating reproductive functions, eating, sleeping and the display of emotion. In the last 100,000 years, the weight of the human brain has almost tripled, and most of this growth has been mainly by the cerebral hemispheres.
Pdf kognitif bozukluk, epileptik nobetler, sol amigdala. However, the actual function of the amygdala during dreaming is rather poorly understood, and this confusion is increased by the existence of various contrasting theories of dreaming. Amygdala consists of several nuclei and is a part of so called limbic system. Michel nawfal md, medical doctor and clinical psychologist cbt explains the neurobiology behind anxiety in arabic. Input, intraamygdala, and output projections are shown schematically. General term used for the amygdaloid body ta, which is thought to assess and assign emotional valence to somatic.
The amygdala is one of two almondshaped clusters of nuclei located deep and medially within. One of the two parietal lobes of the brain located behind the frontal lobe at the top of the brain. We then assessed whether these measures of brain acti vation and. In cognitively normal men, a tiny region of the temporal lobe behind the eye has about 10% fewer neurons than it does in women. Jul 16, 2018 the standard artificial cerebral spinal fluid acsf consisted of in mm 124 nacl, 2. This data indicates that most likely a common ancestor to vertebrates had a brain with a structure functionally. Surgical excision of the epileptogenic region in the anterior temporal lobe was performed, with total removal of the amygdala and hippocampus. Amigdala definition of amigdala by the free dictionary. Although these dream theories all suggest a role for the amygdala, little empirical research on its actual function in dreaming exists. Other functions, too, but scans for danger signals. The amygdala is part of the limbic sys tem, a primitive set of brain structures involved in emotion and arousal. Amigdala cerebral o complejo amigdalino amigdala lobulo. Get a printable copy pdf file of the complete article 2. Tumor intracraneal intramedular diafragmatico o toracico dorsal o lumbar diafragma abdomen.
There is also evidence that the amygdala can, through direct neural connections, modulate the function of cortical areas. Current bony fishes present brain structures with a cytoarchitecture and function very close to the am ygdala in mammals. In the early 19th century, burdach discovered an almondshaped mass of gray matter in the anterior portion of the mammalian temporal lobe, which he called amygdala burdach, 18191822. A complete picture of the functional roles of the amygdala is unavailable, and it has. Aug 12, 20 research blows away fear center myth by maggie koerth new revelations about your brains socalled fear center explain why its misleading to say this part of the brain does x. The limbic system, also known as the paleomammalian cortex, is a set of brain structures located on both sides of the thalamus, immediately beneath the medial temporal lobe of the cerebrum primarily in the forebrain. May 15, 2011 mens and womens learning styles and capacities christoph blumrich newsweek men women temporal lobe. Finally, we will offer a few suggestions for future research in this area. As a service to our customers we are providing this early version of the manuscript. Latin from greek, amygdale, almond, tonsil is one of two almondshaped clusters of nuclei located deep and medially within the temporal lobes of the brain in complex vertebrates, including humans. Dual and opposing functions of the central amygdala in the.
It is thought that this determination is based on how large an emotional response an event invokes. Pdf the emotional brain, fear, and the amygdala researchgate. It is inferred that the early development of the left amygdala functions to. Thus, damage to the motor cortex of one hemisphere causes weakness or. Mar 28, 2018 certain structures of the limbic system are involved in memory, as well. Individual differences in amygdala and ventromedial prefrontal. Amigdala definition of amigdala by medical dictionary. But in the brain of a person with ptsd, emotional distress could physically and perhaps even visibly change the neurocircuitry. Recent work in two manuscripts in this issue of biological psychiatry, add to our understanding of the breadth of amygdale function, and in particular, how chronic stress may. The amygdala is able to produce fearanxiety responses without the involvement of the cortex the amygdala can, in fact, override the cortex and influence or even control our thoughts and focus of attention the cortex can also initiate anxiety responses by alerting the amygdala to potential dangers. The primary motor cortex on one side controls all moving parts on the contralateral side of the body shown on a spatial map called a homunculussee figure homunculus. Research blows away fear center myth by maggie koerth new revelations about your brains socalled fear center explain why its misleading to say this part of the brain does x. The amygdala sends projections to the hypothalamus, the dorsomedial thalamus, the thalamic reticular nucleus, the nuclei of the trigeminal nerve and the facial nerve, the ventral tegmental area, the locus coeruleus, and the laterodorsal tegmental nucleus. Left bottom panel shows a diagram of a coronal brain section containing the cea.
The left and right cerebral hemispheres have different functions. Pain having a strong affective and emotional dimension, the amygdala, especially its central nucleus. Besides memory, the amygdala also seems to be an important brain region. Examination of these functions has allowed great progress in dissecting the neural.
The massive activation of receptors for the glucocorticoids secreted by the adrenal glands may cause a reduction in the volume of the hippocampus. In a normal brain, the interaction between the hippocampus and the amygdala is important for processing emotional memory. The amygdala has been recognized as the keystone in managing emotional information. In contrast, a recent fmri study that used fearful versus neutral facial expressions to study patients with more acute ptsd reported a positive correlation between amygdala and anterior cingulate responses. Considerable progress has been made over the past 20 years in relating specific circuits of the brain to emotional functions. Amygdala, medial prefrontal cortex, and hippocampal function in. Amygdala, medial prefrontal cortex, and hippocampal. Es una estructura presente tanto en animales vertebrados complejos como en humanos.
Sleep deprivation is known to impair a range of functions, including immune regulation and. For more about how the brain works and the effects of dementia, see the film at. It is involved in many processes, including appetitive behavior such as affiliation, sex, and drug abuse, but its role as an integral part of the fear circuitry may be the most fully described. The basolateral amygdala projects to the nucleus accumbens, including the medial shell.
The first anatomical description of the amygdala was made in 1867 by meynert. This is a pdf file of an unedited manuscript that has been accepted for publication. It supports a variety of functions including emotion, behavior, motivation. This dual and opposing function of the cea is encoded by opposing changes in the.
This is a pdf file of an unedited manuscript that has. Over the past decade, interest in the human amygdala has grown considerably, spurred on by the progress in animal studies and by the development of functional imaging techniques. Amygdala is a part of the brain in charge with the numerous functions. Reversible signal abnormalities in the hippocampus and. Amygdala consists of several nuclei and is a part of so called limbic. As part of visual recognition, signals are also passed to the amygdala. Certain structures of the limbic system are involved in memory, as well. This structure is almond shape and its approximate length is one inch. Examination of these functions has allowed great progress in dissecting the neural circuitry of emotion regulation. Other evidence suggests that the left amygdala plays a role in the brains. This lack of recall might be due to a stressinduced dysfunctionof the hippocampus. Some people who suffer from anxiety disorders cannot recall any traumatic event that might explain their condition. The amygdala is responsible for determining which memories are stored and where the memories are stored in the brain.164 38 1021 394 961 778 357 44 158 1329 843 1461 1475 876 102 1505 839 1039 227 923 893 793 532 1269 248 850 1001 198 499 830 1397 1400 240 1126 152 1347 211 1430
|
<urn:uuid:868b3d03-2136-4595-a4b5-e0e9b5d85b90>
|
CC-MAIN-2023-14
|
https://asisbigo.web.app/460.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00774.warc.gz
|
en
| 0.903225 | 2,201 | 2.78125 | 3 |
Troy Hunt, in his article “SSL is not about encryption,” says that SSL is about assurance and “establishing a degree of trust in a site’s legitimacy.” I have mixed feelings about the title, but agree with the points that Hunt makes. Here are some highlights:
- Users assume that high-profile sites (e.g., Facebook, Twitter, Dropbox) provide assurance even though they do not provide positive feedback of assurance. That is, although they use SSL, they do not present their logon pages over HTTPS and, as such, no positive security indicators are provided to the end-user.
- Some sites provide implicit assurance by providing an indication in the Web page (e.g., the ubiquitous padlock icon to indicate that the site is secure). This means nothing, can be misleading and create a false sense of security.
- Every major browser has the ability to proactively advise the end-user of the validity and authenticity of the site by providing positive explicit assurance.
- Due to man-in-the-middle attacks, not loading the logon form over HTTPS gives zero assurance of the authenticity of the site before submitting your credentials. This is further backed up by the OWASP SSL Best Practices.
- My favorite, “SSL is the only outwardly facing assurance that we have. It’s the one thing that’s ubiquitously used to create confidence in the integrity of the data and assurance of the site we’re transacting with.”
|
<urn:uuid:549c420f-3e17-4842-b376-abe1ef853189>
|
CC-MAIN-2014-23
|
http://www.entrust.com/ssl-is-about-assurance/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273350.41/warc/CC-MAIN-20140728011753-00359-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.923604 | 317 | 2.65625 | 3 |
Vaccines are the best way to protect yourself, your loved ones and even your community against many dangerous diseases. Vaccines are not just for children. In fact, according to data from the National Center for Health Statistics, vaccine-preventable diseases (such as flu and pneumonia) now kill more adults than children in the U.S. No one wants to get sick and miss weeks of work, school or spending time with family and friends. By getting vaccinated, you can stay healthier and prevent spreading disease to everyone around you. If your healthcare provider doesn’t bring up the topic of vaccines, be sure to ask. Here are some of the more Frequently Asked Questions about vaccines.
The CDC recommends that all adults receive:
You may need other vaccines as an adult based on factors the factors listed below.
In December, 2009 my sister Liza died of influenza. She was previously healthy and only 49 years old. She sought medical care early. She was cared for at a good hospital in a major city. She had no other infections. And she was unvaccinated. Read the story of Eliza (Liza) Anne Northrop Beale as written by her brother, Micahel Northrop, M.D.More
There’s a saying that “what you don’t know won’t hurt you.” It’s not true. What I didn’t know hurt me. It cost me the life of my son. My story begins on March 25, 1998. It is a day that my husband and I will never forget. It was the day our son, Evan, called from college to tell us that he had a migraine headache. Evan was 20 years old, a college junior and honor student, and a pitcher on his college baseball team at Georgia Southwestern University. After Evan died from meningococcal meningitis, we found out to our astonishment that a vaccine was available, a vaccine that would have saved Evan’s life…More
|
<urn:uuid:9995f6c5-595c-4c17-8a14-48e258ce3b0c>
|
CC-MAIN-2017-39
|
http://www.vaccinateyourfamily.org/adults/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686077.22/warc/CC-MAIN-20170919235817-20170920015817-00478.warc.gz
|
en
| 0.981974 | 415 | 2.78125 | 3 |
The Abkhaz have long populated the western Caucasus. They currently number about 100 000 people, speak one of the languages of the Abkhazo-Adygeyan (west Caufcasian) language group, and live in the coastal areas on the southern slopes of the Caucasian ridge and along the Black Sea coast. Together with closely related peoples of the western Caucasus (for example, the Abazins, Adygeyans and Kabardians (or Circassians)) they play an important role in the Caucasian ethno-cultural community and consider themselves an integral part of its future. At the same time, the people living in coastal areas on the southern slopes of the Caucasian ridge have achieved broader communication with Asia Minor and the Mediterranean civilizations than any other people of the Caucasus. The geographical position of Abkhazia on the Black Sea coast has made its people a major factor in the historical process of the western Caucasus, acting as an economic and cultural bridge with the outside world.
Georgians and Abkhaz have been neighbours from time immemorial. The Georgians currently number about 4 million people. The process of national consolidation of the Georgian nation is still far from complete: it includes some 20 subgroups, and the Megrelians (sometimes called Mingrelians) and Svans who live in western Georgia are so different in language and culture from other Georgians that it would be more correct to consider them as separate peoples. Some scholars, Hewitt, for example, suggest calling the Georgian nation not Georgians but by their own name, Kartvelians, which includes the Georgians, Megrelians and Svans. To call all the different Kartvelian groups Georgians obscures the true ethnic situation. Increasingly, scholars prefer to distinguish between Georgians, Megrelians and Svans, the Georgians being the population of eastern Georgia.
Historically, Georgian-Abkhaz interaction has alternated between close cooperation and bitter fighting. The beginning of the current Georgian-Abkhaz conflict can be traced back to the 1870s when, after the end of the Caucasian war, there was a mass fresettlement of Abkhaz to Turkey (the Mahajeers). As a result the Abkhaz territory along the Black Sea-divided into two parts, the north-west (Bzibean) and the south-east (Abjuan)-has since been populated by various nationalities, including Armenians, Greeks, Megrelians and Russians, thus giving modern Abkhazia its multi-ethnic character.
The Georgian nationalist movement that emerged in the 19th century defined the primordial Georgian territory as being that which lay within the borders of the medieval Georgian empire of the 10th-13th centuries. This ignored the initially multi-ethnic character of the state. The first attempts by the movement to base the development of the Georgian state on these historical lands were made after the Russian Empire disintegrated, during the period of the independent Georgian republic (1918-21). In Abkhazia and other ethnic minority areas a policy of assimilation began, with the mass resettlement of Georgians to Abkhazia and the declaration of Georgian as the state language. This policy combined with acts of violence and robberies by the Georgian armies caused many protests among the population of Abkhazia, including some of the local Megrelians. The establishment of Soviet rule in Abkhazia in March 1921 was, therefore, welcomed by the people and heralded as the end of national oppression and of the Georgian occupation.
In 1921 Abkhazia received the status of a Soviet Republic allied with Georgia by a special treaty, but its status was downgraded in February 1931 to that of an autonomous republic within Georgia with the aim of facilitating the assimilation of the Abkhaz by Georgians. Soviet Communist Party General Secretary Joseph Stalin (a Georgian) regarded the Abkhaz as a primitive people who were to be assimilated by the culturally advanced Georgians. The period from 1931 to the early 1950s was particularly tragic in the history of Abkhazia. It saw the Georgianization of Abkhazia, which for all intents and purposes meant the genocide of its indigenous population and included the physical extermination of the Abkhaz intelligentsia, the expulsion of Abkhaz from the management of all administrative and public organizations and state enterprises, the closure of Abkhaz schools and the forcible enrolment of Abkhaz children into Georgian schools, the prohibition of teaching in the Abkhaz language in high schools, the replacement of Abkhaz names with Georgian ones, restricted social security for persons of Abkhaz ethnicity, unwritten privileges for Georgians, the massive resettlement of Georgians into Abkhazia, the persecution of Abkhaz culture and the falsification of Abkhaz history.
All through the Soviet period the main goal of the Georgian leadership and of the Georgian nationalist movement as a whole was the creation of a consolidated Georgian nation in the shortest possible time. With Stalin in power, when the influence of the Georgian lobby in the Kremlin was at its greatest, this policy was carried out by repressive methods. Some peoples were deported from Georgia (Greeks, Kurds and Meskhetian Turks). Others, not even related to the Kartvelians, were declared part of the Georgian tribes and along with Svans and Megrelians were quickly assimilated.
After Stalin's death the Georgian lobby in the central Soviet Government remained but was weakened. From the mid-1950s the Georgian republican authorities were forced by the Soviet Government to stop the worst forms of discrimination against the Abkhaz, but the mass resettlement of Georgians to Abkhazia continued. As a result, at the end of the 1980s the share of Abkhaz in the 525 000-strong population of Abkhazia was reduced to 17.8 per cent while the share of the Georgian population reached 45.7 per cent. In the mid-1950s, in line with the ideological goals of the resettlement policy, a theory was fabricated declaring the true Abkhaz to be an ancient cultural Georgian tribe living on the territory of Abkhazia and describing the modern Abkhaz as descendants of backward highlanders, Apsuaers, who ostensibly moved into Abkhazia from the north in the 17th century. The thesis of the resettlement of the Apsuaers became part of a racist theory asserting a supposed primordial superiority of the civilized Georgians over their neighbours-a theory which dominated in Georgian science and public consciousness. Widespread promotion of this theory caused sharp protests from the Abkhaz intelligentsia and aggravated inter-ethnic relations. Tensions between Abkhaz and Georgians became particularly evident in 1957, 1964, 1967 and 1978 when there were mass protest actions by the Abkhaz population and only emergency intervention by the central government prevented further escalation of the conflict.
At the end of the 1980s, in conditions of a growing crisis of the central government, the contradictions between the Abkhaz and the Georgians assumed much sharper forms. The Georgian nationalist movement raised demands for national independence and the creation of a mono-ethnic Georgian state within its historical borders. The Abkhaz actively opposed Georgian separatism. The Abkhaz letter of 1988 formulated a demand for the restoration to Abkhazia of the status of Soviet Socialist republic it enjoyed in 1921-31.
In 1989-91 a wave of inter-ethnic conflicts swept through Georgia, behind which Georgian radicals saw the hand of Moscow. In fact the growth of inter-ethnic tensions could be attributed to the activists for Georgian independence, who called for policies of de-Armenianization and de-Azerbaijanization, the abolition of all autonomies, and even a state birth control programme to limit the expansion of the non-Georgian population. In 1990 the ultra-radical (later President) Zviad Gamsakhurdia elevated the idea of a mono-ethnic Georgian state into official policy. The autonomy of South Ossetia was abolished and open persecution of the non-Georgian population began.
In Abkhazia, following major clashes in 1989 between Abkhaz and Georgians, the conflict was reflected in legislation. Under the slogan of a return to the independent republic of 1918-21, Tbilisi annulled all legal acts of the Soviet period, including those on the allied status of Georgia and Abkhazia (1921) and on the autonomy of Abkhazia within the Georgian Soviet Socialist Republic (1931). In response, in August 1990, the Supreme Soviet of Abkhazia adopted a Declaration of the State Sovereignty of the Abkhazian Autonomous Soviet Socialist Republic. It declared Abkhazia a sovereign socialist state having all the power of authority on its territory except the rights voluntarily delegated by it to the USSR and Georgian Soviet Socialist Republic by the previous agreements. A war of laws followed: all Abkhazian legislation was annulled by the Georgian Government. As a result authority was increasingly paralysed in Abkhazia and Tbilisi rapidly lost control of the situation.
After Gamsakhurdia's overthrow in January 1992 the situation in Abkhazia deteriorated further . The war which broke out in 1992-93 was the peak of the conflict between Abkhazia and Georgia, characterized by the aspirations of the Abkhaz to secure their national and physical survival and by the desire of the Georgians to achieve national consolidation on the basis of their own ethnos and to create a mono-ethnic Georgian state on a territory with a multinational population and within completely artificial borders.
Originally Georgian propaganda justified the military intervention in Abkhazia by the need to protect the safety of the railways and to free Georgian officials taken hostage by followers of Gamsakhurdia. Realizing the absurdity of these allegations, President Eduard Shevardnadze later laid the blame for starting the war on Tengiz Kitovani, Minister of Defence for Georgia and a member of the Military Council that had overthrown Gamsakhurdia, alleging that Kitovani had ordered the army into Abkhazia without Shevardnadze's knowledge. Shevardnadze described the Georgian Army's actions in Abkhazia as intolerable: I will not even mention the inadmissible methods they used. Tanks, armoured vehicles, removal of the flag from the House of Government as if it were a foreign country . . . Much of what was done then cannot be justified and cannot be regarded as normal.
In fact there is no doubt that the Georgian-Abkhazian war was provoked not by the situation in Abkhazia-the situation there was calmer than in neighbouring Megrelia, where numerous armed gangs of Zviadists were operating-but by the situation in Tbilisi following the overthrow of Gamsakhurdia. It was probably the personal interests of the members of the Military Council (later the State Council of Georgia) that were behind the military campaign in Abkhazia. For each of them: A victory over Abkhazia could be a new important step in his political career. For Shevardnadze, however, this war could open much broader prospects. For the "new opposition he was a former opponent, a stranger; he was still a Russian citizen with a Moscow residence; his strength was the support he received from Moscow, but he could never achieve the admiration among the Georgian people that Gamsakhurdia enjoyed. For Shevardnadze therefore a war in Abkhazia was absolutely necessary without it, the consolidation of his personal power and defeat of his political opponents were inconceivable. In fact it was the war in Abkhazia that allowed him to put down public discontent in Megrelia, to strengthen his own position in Tbilisi, and to dismiss and then arrest those who had overthrown Gamsakhurdia and invited Shevardnadze himself to Georgia (for example, Djaba loseliani and Tengiz Kitovani). Thus the Georgian-Abkhazian war was the price which the population of Georgia paid for Shevardnadze's return to power.
Shevardnadze probably received approval for a military operation in Abkhazia from Russian President Boris Yeltsin. It was hardly coincidental that one day before fighting broke out Russia transferred tanks, helicopters, artillery pieces and other military equipment to the Georgian armed forces. However, in spite of its overwhelming superiority in arms and numbers over the Abkhaz militia, the Georgian Army failed to achieve a quick victory.
The massive and fierce resistance that the Georgian Army met came as a surprise for the Georgian leaders, but was completely natural: the Abkhaz population regarded the Georgian military intervention as a real threat to its very existence. The Abkhazian leadership, relying on the support of the public, also succeeded in quickly creating Abkhazian territorial armed forces. They received fast and effective help from the neighbouring peoples of the North Caucasus as a result of the traditional ethnic solidarity among the Abkhaz-Adygeya peoples. Furthermore, the activities of the Georgian leadership appeared so scandalous and unfair that there was a large influx of volunteers from different parts of the former Soviet Union, including Chechens, Ossetians, Russians and Ukrainians, to fight the Georgian Army. Usually these volunteers formed international brigades but the Cossacks from southern Russia formed their own units.
Initially the Abkhazian armed forces experienced an acute shortage of arms. There is widespread opinion in the West that they received their arms from the Russian military. In the view of the present author, based on numerous interviews with local veterans of the Georgian-Abkhazian war, arms were indeed often purchased from the Russian military but this was the result of private deals, reflecting the progressive disintegration of government authority under Yeltsin, and did not represent a refined Byzantine approach to the conflict on the part of the Russian authorities. Moreover, when the Georgian Army was defeated at Gagra in 1992 the Abkhazian Army seized a large amount of modern military equipment, including tanks, surface-to-air missile systems and artillery pieces, which eased their arms and ammunition shortage.
The Georgian-Abkhazian war lasted over a year and was very bloody and destructive. About 20 000 civilians died in Abkhazia; material damage was estimated at $11.5 billion. The war resulted in a fundamental change in the ethnic groups in the Georgian-Abkhazian conflict. Although the attitudes of Georgians, Megrelians and Svans differed, the local Georgian population on the whole supported the military action. Other ethnic groups, initially neutral in the conflict, later adopted a pro-Abkhaz position as a result of robberies and other excesses by the Georgian military. Thus, since 1992 the Georgian-Abkhazian conflict has assumed the character of a confrontation between the Georgian state and the local Georgian community, on the one hand, and the rest of the multi-ethnic population of Abkhazia, on the other hand.
II. The post-war situation
After the defeat of the Georgian Army and the flight of part of the local Georgian population from Abkhazia, the political position of the Abkhazian leadership solidified. The overwhelming majority of the population consistently supported independence and a strongly pro-Russian orientation. Internal political stability allowed Abkhazia leaders to resolve the country economic problems in spite of isolation from the outside world.
Abkhazia economic achievements were especially evident in comparison with Georgia. Its social and economic infrastructure was restored without foreign aid and relied entirely on Abkhazia's domestic potential. The greatest success was in the production of electric power. While in Georgia over the past eight years the energy crisis has resulted in restrictions on public electricity consumption (to six hours per day, and during the winter months of 2001 only one or two hours per day), in Abkhazia there were no such restrictions and electric power tariffs for ordinary consumers remained the lowest throughout the former Soviet Union. In 1999 Abkhazia harvested about 10 000 tons of tea and 1000 tons of tobacco, while exporting over 20 000 tons of citrus crops, achieving a positive trade balance for the first time since the end of the war.
After the breakup of the Soviet Union the leaders of Abkhazia considered reunion with Russia a priority task. An appeal of the Supreme Soviet of Abkhazia to the Supreme Soviet of the Russian Federation dated 23 March 1993 asked it to return the Republic of Abkhazia into the Russian fold, or to place it under the protection of Russia in the appropriate international legal form. A resolution adopted at a mass meeting held in Abkhazia on 16 April 1995 repeated the request to the Russian Government for a reunion of Abkhazia and Russia. However, there was no positive reaction to these requests. Russia policy was clearly pro-Georgian policy at that time, and the Abkhazian leadership was forced to work towards legalizing the state's independence. On 3 October 1999, along with the presidential elections in Abkhazia, a referendum was held in the country in which the overwhelming majority of Abkhazians (97.7 per cent of voters) supported the creation of an independent and democratic Abkhazian state. On the basis of the result, on 12 October 1999 Abkhazia adopted an Act of State Independence of the Republic of Abkhazia.
Understanding that in the circumstances it would be impossible to achieve de jure recognition of Abkhazia independence by the world community, the Abkhazian leadership agreed to possible coexistence with Georgia in a common state within the borders of the former Georgian Soviet Socialist Republic. At the same time Abkhazia rejected the status of autonomy and agreed to build relations with Georgia only on the basis of equality within a common state whose functions would be limited to foreign policy, defence, finance, border protection and customs services. Initially the Georgian leadership agreed with this approach. It was reflected in the joint Statement on Measures for a Political Settlement of 4 April 1994 in which Georgia and Abkhazia agreed to act as equal sides and pledged to resume official relations on this basis. Later, however, the Georgian leadership changed its position and refused to build relations with Abkhazia on the basis of equality.
The Georgian leadership did not blame Abkhazia secession on its own policies but interpreted it as an annexation and occupation of the primordial territory of Georgia and as aggression of international terrorism against a sovereign state. For Tbilisi the only acceptable resolution to the conflict was to grant Abkhazia the status of autonomy inside the unified Georgian state, and neither the future structure of the Georgian state nor a possible form of autonomy for Abkhazia were even discussed.
For the whole post-Soviet period Georgia policy of state-building has been conducted on the basis of rigid unitarism. The result of this policy was a profound economic crisis and the progressive disintegration of Georgia. The government in Tbilisi lost control over all the autonomies that existed during the Soviet period (Abkhazia, Adzharia and South Ossetia), over Javaheti with its compact 130 000 Armenian population, and over many mountain areas such as Svanetia and the Pankisi gorge, which is populated by Chechen-Kistins.
The ruinous character of the policy of building a mono-ethnic state in a country where the share of ethnic minorities in the population is over 30 per cent was absolutely clear. However, the majority of Georgian legislators continued to take a negative attitude to any measures that might undermine the unity of the Georgian state. The 1995 constitution proclaimed Georgia an independent, unified and indivisible state and the term federalism is not used in it. The constitution proclaims that citizens of Georgia regulate matters of local importance through local self-government as long as it does not encroach upon national sovereignty. It also states that when conditions are appropriate and self-government bodies have been established throughout the territory of Georgia, the parliament shall be formed with two chambers: the Council of the Republic and the Senate. In the future the Senate will consist of members elected from Abkhazia, Adzharia and other territorial units of Georgia as well as five members appointed by the President.
Consisting exclusively of ethnic Georgians, the political leadership of Georgia did not even consider the possibility of starting national construction on the basis of federalism rather than on the basis of a unitary state.
The Abkhazian problem remains the highest priority on Georgia security agenda and it influences its approach to other conflicts. As one South Ossetian leader observed, a Georgian-Ossetian settlement will hardly be possible before a Georgian-Abkhazian settlement as South Ossetia does not anticipate having a status lower than that of Abkhazia. It is also clear that Adzharia will adopt a similar position. Although the Adzharian Government has not formally declared its intention to secede, it operates in a completely independent way and disregards the Tbilisi authorities. The customs, the office of the public prosecutor, the courts, the police and the coastguard are under its full control. Posts with armed units have been set up on the administrative borders of Adzharia to prevent any armed infiltration from Georgia. The authorities of Abkhazia and Adzharia maintain constant contact, and during the Georgian-Abkhazian war Adzharia declared its neutrality. The Adzharian authorities take their own position on the issue of the Russian military presence in the South Caucasus. They oppose the withdrawal of the Russian troops from the territory of Adzharia and have openly declared a pro-Russia policy.
Tbilisi control over Javaheti is similarly only nominal. Its Armenian population is pro-Russian and pro-Armenian, and is increasingly demanding autonomy. With the progressive disintegration of the Georgian state, such compact national minorities living in Georgia as the Megrelians and Svans, and then Georgian sub-ethnic groups such as the Cahetians, Gurians, Khevsurs and Tushins, may also demand autonomy. The possibility of the country splitting into many different parts as it was in the 13th-18th centuries until Georgia became part of the Russian Empire may therefore again become a reality. This would mean not only the collapse of the Georgian state but also a tragedy for the Georgian people.
It is logical therefore that the Georgian Government is only ready to give Abkhazia autonomous status. It has concentrated all its diplomatic efforts on the Georgian refugee problem. The return of the Georgian population to Abkhazia, which the Georgian leaders insist on, will obviously result in a renewal of hostilities, as it is completely unacceptable for the people of Abkhazia and its leadership. Natella Akaba, an Abkhazian political analyst, writes that among those who fall under the definition of refugees:
There are many people who committed criminal and military offences in 1992-93. Abkhazia is a small country: everybody knows nearly everything about their neighbours; the names of those who in the late 1980s demanded the liquidation of the Abkhazian Autonomous Republic and who in August 1992 wrote to the Georgian leaders asking for Georgian troops (which ended in bloody clashes) are well known. If they come back, another war will be inevitable.
At the same time neither the population of Abkhazia nor its leaders object to a gradual, staged return of refugees, first of all to the Gali region. However, the leadership of Georgia is strongly against this mode of resolving the refugee problem. In the opinion of Russian political analysts these objections are raised because a staged return of refugees presents a threat [to Georgia] of their "political" assimilation and gradual integration into the Abkhazian state, in particular because the Sukhumi authorities are taking appropriate steps in this direction: among the deputies of the Abkhazian Parliament there are now two Georgians/Megrelians elected by the population of the Gali region.
The mass return of Georgian refugees on which the Georgian leadership insists does not mean a peaceful resolution of the Georgian-Abkhazian conflict but is actually intended to help to create favourable conditions for a new military campaign for the conquest of Abkhazia, and after that of other rebellious regions and peoples in Georgia.
III. The position of Russia
The official position of the Russian Federation on the Georgian-Abkhazian conflict is based on the recognition of the inviolability of Georgia territorial integrity, inside which Abkhazia should be given broad political rights. On the basis of this position Russia has acted as an intermediary helping the conflicting sides conclude the Memorandum of Understanding (December 1993), the Agreement on Refugees and the Statement on Measures for Political Settlement of April 1993. At the request of both sides, in July 1994 a Russian peacekeeping force numbering about 2500 soldiers moved into a security zone along the Georgia-Abkhazia border.
Soon after the deployment, Russian diplomacy ceased to take the interests of the Abkhazian side into account and began to act as a lobbyist for Georgian interests. The then Russian Minister of Foreign Affairs, Andrey Kozyrev, drew himself a plan for the economic suffocation of Abkhazia, having shown a good understanding for the specific features of its subtropical economy. Under this plan, in December 1994 the Russian Government established a special regime of economic and political relations with Abkhazia which actually meant a blockade of Abkhazia and its isolation not only from Russia but also from the rest of the world. The purpose of Russian diplomacy at that time was to force the Abkhazian Government to accept such conditions as would mean full capitulation to Tbilisi. However, the economic and political blockade of Abkhazia not only did not help resolve the Georgian-Abkhazian conflict; it strengthened the animosity of the population of Abkhazia towards Georgia. It did not, however, result in anti-Russian feelings: both the Abkhazian authorities and the general public viewed it as the result of diplomatic intrigues by Tbilisi with the Georgian lobby in Moscow and of Western pressure on Russia.
The blockade of Abkhazia completely contradicted Russia's national interests, and it was severely criticized in both houses of the Russian Parliament. It could have meant the destabilization of the situation and the undermining of Russia's positions in the entire western Caucasus. However, it was never completely implemented because of the progressive crisis of the Yeltsin Administration and its inability to persuade the regions to implement decisions taken at the federal level. Many subjects of the Russian Federation-Bashkortostan, Tatar-Stan, Krasnodar Krai (territory) and the republics of the North Caucasus-continued political and economic relations with Abkhazia against the wishes of the central government.
Georgian-Russian cooperation did not bring either side the expected benefits. It did not protect Russia's geopolitical interests and did not guarantee the preservation of its military bases in Georgia. The Georgian Government was extremely disappointed that Russia did not expand the powers of its peacekeeping force by giving it police functions over the entire territory of Abkhazia: according to Tbilisi's plans, Russia should first pacify Abkhazia and then return it to Georgian rule.
Long before Yeltsin departure from office in December 1999 the policy of Tbilisi turned anti-Russian. In the hope of military intervention by the West in the Georgian-Abkhazian conflict, Georgian diplomacy called for the creation around Russia of a belt of democratic states and actively supported the idea of creating a uniform Caucasus (without the participation of Russia); the policy aimed to destabilize the situation in the North Caucasus and remove Russia from the South Caucasus.
Many Georgian leaders are convinced that after the disintegration of the Soviet Union the confrontation between Russia and the West continues. They therefore pin their hopes on military intervention by the West in the Abkhazian conflict since, in their opinion, the Abkhazian problem is not only Georgia's problem but is linked to those world processes of which we are eyewitnesses; that is, the collapse of the Soviet Union and the beginning of a new redistribution of the world . . . Georgia becomes a stable partner of the West which, in its turn, tries to complete the process which has been started-to crush the Russian Empire by all possible means.
Such a policy adopted by Tbilisi could only worsen relations with Russia. It is sharply criticised by the Georgian opposition who regard it as unceremoniously ignoring Russia's national interests and as a manifestation of irrational Russophobia on the part of the Georgian Government.
With Vladimir Putin's rise to power, Russia ceased to consider Georgia as its political ally in the region. Its position on the Georgian-Abkhazian conflict also changed. In September 1999 Putin, then Russian Prime Minister, annulled the special regime on the border with Abkhazia, thus lifting the economic blockade. In November 2000, the President of Abkhazia, Vladislav Ardzinba. visited Moscow for the first time in several years for bilateral Abkhazian-Russian consultations on political and economic issues. In particular, discussions focused on the Abkhazian leaderships desire to maintain the Russian military presence in the South Caucasus as it is the one major factor for stability, and on its opposition to the proposed closure of the Russian military base at Gudauta in Abkhazia.
When frontier areas of Georgia were transformed into rear bases for Chechen separatists and there were allegations that official Tbilisi was supporting them, there was a crisis in Georgian-Russian relations. In December 2000 Russia (for the first time within the framework of the Commonwealth of Independent States, the CIS) introduced a visa regime for citizens of Georgia; however, the regime did not apply to Abkhazia and South Ossetia. The conclusion can be drawn that Russia has begun to develop a new system for addressing its interests in the South Caucasus. Active participants in this system are now not only Armenia, Azerbaijan and Georgia but also the unrecognized states in the region, including Abkhazia. Thus all the states in the South Caucasus that exist de facto may form important elements of stability and political balance in the region, which is a strategically important one for Russia.
IV. The position of the West
The Western countries support Georgia's territorial integrity and take a one-sidedly pro-Georgian position. During the Georgian-Abkhazian war the West did not condemn Georgia for excessive use offeree and did not express concern over the violations of basic human rights and individual freedoms perpetrated by the Georgian military. It approved the introduction of repressive sanctions against Abkhazia as the most effective means of achieving political peace, refused to consider the security needs of Abkhazia and concentrated all its criticism on the Abkhazian leadership. This unbalanced position only increased the mistrust between the conflicting parties and caused the Abkhazian Government to take a negative attitude to any Western diplomatic initiative.
Meeting the leaders of the three South Caucasus states at the UN Millennium Summit in New York in September 2000, then US Secretary of State Madeleine Albright made it clear that all future American Administrations will continue to consider the post-Soviet space a zone of the US strategic and vital interests. NATO's adoption in April 1999 of the concept of humanitarian intervention, which meant that military intervention by NATO in the internal affairs of foreign states would be permissible, raised hopes in Georgia that a military action similar to that carried out by NATO in Yugoslavia might be taken in Abkhazia.
Georgia has expressed its interest in replacing the Russian peacekeeping force with other foreign forces. Although this initiative found support in Turkey and Ukraine, the West refused to consider sending forces to Abkhazia as it could not risk sustaining losses there similar to those incurred in previous years by the Russian contingents participating in peace-making operations.
Hoping to attract the military intervention of the West in the conflict, Georgia expressed its determination to join NATO quickly. This appeared impossible. Conditions for the acceptance of new members include economic stabilization, the resolution of conflicts on the territory of an applicant, the attainment of NATO standards of military equipment and training, and constructive relations with neighbours. As a result, despite the constant expansion of cooperation between Georgia and NATO in the military sphere, the West has limited its activity in the Georgia-Abkhazia conflict to sending military observers.
In recent years the policy of Western countries in the Caucasian region has been increasingly influenced by the oil factor. In the mid-1990s the Western countries adopted a new energy security doctrine which called for the diversification of energy transport routes to Europe. The European Union (EU) introduced the TRACECA (the Transport Corridor Europe Caucasus Asia) and INOGATE (Interstate Oil and Gas Transport to Europe) projects. On this basis development began of a new system of transport routes for petroleum and gas to Europe from Central Asian and the South Caucasus. An oil pipeline from Baku to Supsa was laid through the territory of Georgia, its final section being close to the zone of the Georgian-Abkhazian conflict. The economic penetration of the West into the South Caucasus and Central Asia also led to an increase of its political influence in these regions.
The construction, with Western investment, of a new system of oil and gas pipelines that would bypass Iran and Russia was received with apprehension in Russia as it could deprive it of revenues from oil transit. Repeated statements made in Western countries to the effect that they refused to consider the region as part of the Russian sphere of influence, while at the same time regarding it as a zone of NATO's strategic interests, were recognized by Russia as clear proof of the West ambition to exclude it from the region.
At present the Georgian-Abkhazian conflict has little chance of being resolved politically: the interests of the conflicting sides are in complete contradiction. While political efforts to halt the fighting have so far been unsuccessful, the resumption of hostilities would cause the destabilization not only of Abkhazia but also of the entire west Caucasian region. It is unacceptable, therefore, either from the point of view of Russia interests (the threat of destabilization in the North Caucasus) or from that of the West (the danger of military operations spreading to the systems of oil and gas pipelines between Central Asia, the Caucasus and the outside world).
The political normalization of the conflict is impossible unless Georgia puts an end to its policy of unitarism. A single Georgian state within the borders of the former Georgian Soviet Socialist Republic is possible only as a federation of equal peoples like Belgium or Switzerland. Each people must be granted its own form- of statehood and representation in the central government. There should also be international guarantees of the rights of ethnic minorities and of the territorial integrity of Georgia. On the other hand, a continuation of the policy of unitarism may result in the further disintegration of the Georgian state; in that case Abkhazia may aspire to international recognition as an independent state.
Contradictions between Russia and the West in the South Caucasus present a serious potential danger. Under the existing conditions of general instability in the region, further escalation may be caused with the minimum of effort. Russia and the West should, therefore, be interested not in continuing their rivalry but in closer coordination of their regional policies. The basis of such cooperation might be mutual recognition of each others strategic interests in the region. The development of a coordinated policy might be an effective means of stabilizing the entire Caucasian region and creating a basis for the resolution of local conflicts, including the Georgian-Abkhazian conflict.
Coppieters et al. (note I)
1. Hewitt. G. (ed.), The Abkhazians: A Handbook, Peoples ot" the Caucasus Handbooks (St Martins Press: New York, 1999), pp. 13-16. See also Coppieters, B., Darchiashvili. D. and Akaba, N. (eds). Praktika Fnderali:ma: Poiski Aliernativ diva Gruzii i Abkha:ii [Practice of federalism: exploring alternatives for Georgia and Abkhazia] (Vesmir: Moscow. 1999) p. 21.
2. The names Georgia and Georgian most likely derive from the Persian Gurgistan and Gurg ("the country of wolves, "wolf). They first appear in Russian chronicles and documents in the 15th century. The Megrelians are the most numerous in the Kartvelian linguistic group: estimates range from 20% to 30% of the group. This is the primary factor which has prevented their rapid assimilation by Georgians.
3. Mehtiev, A., Baku i Tbilisi nuzhny drug drugu [Baku and Tbilisi need each other), e:avisimaya Ga:eta, 17 Sep. 1992; and Zhidkov, S., Brosok Malov Imperil [The spurt of a small empire) (Adygeya: Maikop, 1996).
4. Mescheryakov, N. V., Menshevistskom rayu: iz vpechatlenii poezdki v Gruziyu [In Menshevist paradise: from impressions of a trip to Georgia] (Gosizdat: Moscow, 1921); and Denikin, A., Ocherki russkoy smuty [Studies in Russian troubled times ] (Slovo: Berlin. 1925).
5. Stalin, 5.. Sochineniya [Works] (Politizdat: Moscow, 1946), vol. 2, pp. 350-51.
6. Russian Academy of Sciences, Institute of Sociopolitical Studies, O Bezopasnosti Rossii v Svyaii s Sobytiyami v Abkhazii [On Russia security in connection with events in Abkhazia], Analytical paper (Russian Academy of Sciences: Moscow, 1993), pp. 3-4.
7. Belaya Kniga Abkhazii: Dokumenty, Materialy, Svidetel stva [White book of Abkhazia: documents, materials, evidence] (Vnekom: Moscow, 1993), p. 30. The remainder of the population was made up of Armenians, Greeks, Russians, Ukrainians and others.
8. From the Abkhaz own name for themselves, Apsua.
9. Zorzoliani., G., Lekishvili, S. and Toidze, L., Istoricheskiye i Politiko-Pravovye Aspelay Konflikla v Abkhccii [Historical and politico-legal aspects of the conflict in Abkhazia] (Metsniereba: Tbilisi, 1995), pp. 12-13; and Pipia, B. and Chikviladze, Z., Raspyalaya Gruziya [Crucified Georgia] (Pechatny Dvor: St Petersburg, 1995), p. 9.
10. Vasilyeva, O., Gmziya kak Model Poskommunisticheskoy Transformatsii [Georgia as a model of post-communist transformation] (Gorbachev-Fond: Moscow, 1993), p. 31.
11. Abkhaziya v Sovetskuyu Epokhu: Abkhazskiye Pisma /1947-1989); Sbornik Dokumemov [Abkhazia during the Soviet epoch: Abkhaz letters (1947-1989): Collection of documents] (El-Fa: Sukhumi, 1992), vol. 1, p. 435. The appeals by Abkhaz political and public figures to the central Soviet Government known as the Abkhaz letters played an important role in the Abkhaz national movement and the history of inter-ethnic relations in Abkhazia. The story of the Abkhaz letters was published in this collection.
12. Vasilyeva (note 10), pp. 29-46.
13. Deklaratsiya o gosudarstvennom suverenitete Abkhazskoy Sovetskoy Sotsialisticheskoy respubliki: Prinyata X sessiyey Verkhovnogo Soveta Abkhazskoy ASSR 11 sozyva 25 avgusta 1990 goda [The Declaration of the state sovereignty of the Abkhaz Soviet Socialist republic adopted by the 10th session of the llth Supreme Soviet of the Abkhaz ASSR, 25 Aug. 1990], available at URL ; and Abkhaziya: Khronika Neob yavlennoy I&aoynu [Abkhazia: chronicle of undeclared war] (Luc&h: Moscow, 1992), part 1, pp. 12-15.
14. Kalinin. Yu., Zerkala separatizma: Eduarcl Shevardnadze vpervuye rasskazal o taynakh nachala gruzino-abkhazskoy voyny [Mirrors of separatism: Eduard Shevardnadze discloses for the first time mysteries of how the Georgian-Abkhazian war began), foskovskiy Komsomolets, 10 Feb. 1996.
15. Followers of Zviad Gamsakhurdia.
17. Gamsakhurdia was a Megrelian. and it is in Megrelia that the influence of his followers, the Zviadists, is strongest.
18. One month after the hostilities began the Presidium of the Supreme Soviet of the Abkhaz Republic adopted a special resolution which described mass terror, physical extermination of people, torture of prisoners and hostages carried out by the State Council of Georgia in Abkhazia as an act of genocide of the Abkhaz nation. On genocide of the Abkhaz nation. Resolution no. 10-127, Gudauta, 16 Sep. 1992.
19. Konfederatsiya gorskikh narodov Kavkaza vstupayet v boy [The Confederation of Caucasian Mountain Peoples joins the fight], Krasnaya Zve:da, 27 Aug. 1992, p. I: and Leontyeva. L., The path of war, Moscow News, 6-13 Sep. 1992.
20. Gru:iya/Abkha:iya: Narusheniya Zakonov Vedeniya Voyny i Rol Rossii v Konflikte [Georgia/ Abkhazia: violations of the laws of war and Russia's role in the conflict] (Human Rights Watch: Helsinki. 1995).
21. Slabili:atsiva Mezhetnicheskikh i Sotsiokuliurnykh Olnoshemi na Kavka:e [Stabilization of inter- ethnic and socio-cultural relations in the Caucasus) (Etnosfera: Moscow, 1999), p. 87.
22. Mukhin, V., Abkhaziya nikogda ne stanet avtonomnoy edinitsey Gruzii [Abkhazia will never become an autonomy of Georgia], Nezavisimaya Gazeta. 29 Sep. 2000.
23. The attitude taken by Megrelians towards the war is described in Zhidkov (note 3), pp. 236-37.
24. According to the Department of Statistics of the Government of Abkhazia, by 1995 the population of Abkhazia was reduced to 313 000, of which 29.1% were Abkhaz, 28.7% Georgians, 19.8% Armenians, 16.5% Russians, 2.6% Ukrainians, 1.1% Greeks and 2.2% others. Krylov, A.. Post-Sovelskaya Abkha:iya: Traditsii. Religii, Narod [Post-Soviet Abkhazia: traditions, religions, people] (OOAgent: Moscow, 1999), p. 11.
25. Mukhin (note 22).
26. Gruzino-Abkhazskiy Konjlikt: Proshloye, astovascheye. Perspective Uregulirovaniya [The Georgian-Abkhazian conflict: past, present and prospects of settlement] (Institute of Diaspora and Integration, Institute of the CIS Countries: Moscow, 1998), p. 27.
27. Obrashcheniye skhoda mnogonatsionalnogo naroda Abkhazii, posvyashchennogo 185-letiyu dobrovolnogo vkozhdeniya Abhazii v sostav Rossii [Appeal of the mass meeting of the multinational people of Abkhazia devoted to the 185th anniversary of the voluntary entry of Abkhazia into Russia], Sukhumi, 16 Apr. 1995 (copy in SIPRI archive).
28. See the Internet site of the Republic of Abkhazia (Apsny), URL.
29. Akt Gosudarstvennoy Nezavisimosti Respubliki Abkhaziya [Act of state independence of the Republic of Abkhazia], Sukhumi. 12 Oct. 1999 (copy in SIPRI archive).
30. The text of this Statement was published in Sukhumi on 5 Apr. 1994.
31. Gru:ino-Abkha:skiy Konflikt (note 26), p. 15.
32. Gru:ino-Abkha:skiy Konflikt (note 26), p. 15.
33. The Constitution of Georgia, available at URL .
34. Coppieters et al. (note 1), p. 48.
35. 35 Hanbabjan. A., Gruziya-Abkhaziya . . . Obsuzhdeniye konstuutsionnogo statusa samo- provozglashennoy respubliki chrevato seryoznymi posledstviyami [Georgia-Abkhazia. . . Discussion of the constitutional status of the self-proclaimed republic is fraught with serious consequences], ,e:a-visimaya Ga:eta, 19 Sep. 2000.
36. Soidze, O. and Berdzenishvili. D., Protivostoyaniye mezhdu Tbilisi i Batumi ili o problemakh sobrannosti natsii i polnote gosudarstva [Confrontation between Tbilisi and Batumi, or on problems of consolidation of the nation and completeness of the state], Tsentralnaya A:iya i Kavka: (Lulea), no. 2 (2000), p. 214. On the Russian military presence, see section III in this chapter.
37. Soidze and Berdzenishvili (note 36), pp. 217-18.
38. Akaba, N., Georgian-Abkhazian conflict: rooted in the past, resolved in future. Central Asia and the Caucasus (Lulea), no. 6 (2000), p. 119.
39. Gncino-Abkhazskiy Konfltkt (note 26), pp. 19-20.
40. The number of Russian peacekeepers in Abkhazia is not constant. Initially they numbered 2500. but by the end of 1996 that was reduced to 1500. By the end of 2000 the number of Russian peacekeepers in Abkhazia was 1747. Figure supplied by the Russian Embassy in Stockholm. 26 Feb. 2001.
41. Gruzino-Abkha:skiy Konflikt (note 26), p. 25.
42. Government of the Russian Federation Decree no. 1394. 19 Dec. 1994.
43. The dominance of the Georgian lobby in the Russian Ministry of Foreign Affairs was largely explained by a personnel heritage left by Eduard Shevardnadze, former Minister of Foreign Affairs of the USSR under Mikhail Gorbachev. Reflecting this, in the middle of 1990s a popular joke was to call the Russian Ministry of Foreign Affairs the Russian Ministry of Foreign Affairs of Georgia.
44. Resolution of the State Duma no. 1640, 2 June 1997; Appeal of the Federation Council to President Boris Yeltsin no. 166, 15 May 1997; and Appeal of the State Duma to the Government of the Russian Federation, 11 Jan. 1999.
45. Nadareishvili, T., Ya ne nadeyus chto abkhazskiy vopros reshitsya mirnym putyom [I do not believe that the Abkhazian problem will be resolved peacefully], Tseniralnaya Aziva i Kavkaz (Lulea), no. 2 (2000), p. 27.
46. Kobalia, V., Rossiya zakhlopnula dver k spaseniyu [Russia slams the door to rescue], ezavisimaya Gazeta, 24 Feb. 2001.
47. Government of the Russian Federation Decree no. 1029. 9 Sep. 1999.
48. O kharaktere rossiyskogo-abkhazskikh peregovorov [The character of the Russian-Abkhazian negotiations], Apsnipress (Sukhumi), no. 225 (22 Nov. 2000). In June 2001 the Abkhazian leadership initiated a blockade of the base at Gudauta, thus preventing its closure and withdrawal of military equipment from the base. TV1 (Tbilisi), 14 June 2001, in Georgia: Abkhaz foreign minister says Russian hardware should remain in Abkhazia, Foreign Broadcast Information Service, Daily Report-Central Eurasia (FB1S-SOV), FBIS-SOV-2001-0614, 14 June 2001; and Radio Free Europe/Radio Liberty (RFE/RL), RFE/RL Newsline, vol. 5, no. 127, Part 1 (9 July 2001).
49. Broladze, N., -Kuda ischezli narushiteli granitsy? [Where have border infringers disappeared?], Nezavisimaya Gazeta, 23 Nov. 2000; and Aleksandrov. V.. Na kholmakh Gruzii-bandity [Gangsters on the hills of Georgia], Tntd, 28 Nov. 2000.
50. Gntzino-Abkhazskiy Konjlikt (note 26), p. 25.
51. Coppieters et al. (note 1), p. 63.
52. Nuriev. E., No war, no peace in the Caucasus: the geopolitical game continues!, Central Asia and the Caucasus (Lulea), no. 6 (2000), p. 13.
53. Gruziya predlagayet peresmotret mandat mirotvortsev [Georgia propose to review the peace keepers mandatel, Segodnya, 24 Mar. 1997. p. 1. See also Lynch, D.. The Conflict in Abkhazia: Dilemmas in Russian Peacekeeping Policy (Royal Institute of International Affairs: London. 1998), pp. 31-36.
54. Coppieters et al. (note 1), p. 58.
55. Associated Press, Georgian leader hopes to join NATO, 29 Apr. 1999.
56. In the UN Observer Mission in Georgia (UNOM1G), tasked with verifying the compliance of both sides with the ceasefire agreement.
57. For details see the TRACECA Internet site, URL ; and the INOGATE Internet site, URL .
The Security of the Caspian Sea Region, Oxford University Press, 2001
Audi alteram partem
|
<urn:uuid:3462d9a2-9f38-4425-be00-4796bbdc747d>
|
CC-MAIN-2017-26
|
http://abkhazworld.com/aw/conflict/739-the-security-of-the-caspian-sea-region
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320257.16/warc/CC-MAIN-20170624101204-20170624121204-00059.warc.gz
|
en
| 0.930684 | 10,792 | 3.59375 | 4 |
In the late 1500s, merchants in England sought to ply the waters around Africa in an attempt to set up trade relation s with India. In a few years several trips were made, and, on literally the last day of the 16th century, they were granted a charter by the Queen to incorporate, given free rein to trade with the East.
This was not done in a vacuum, however. For well over a century European explorers had been laying the groundwork (OK, seawork) for this effort. Sponsored by their various governments, they explored the oceans and improved the technology and techniques needed for this to get done. At the time, this would’ve been impossible for private companies—too risky, and too expensive—so governments did the job. National pride was at stake, as well as military and trade advantages.
Like sea travel, space travel is not done in a vacuum—except in the literal sense. Like terrestrial exploration centuries ago, it’s expensive, difficult, technologically cutting-edge, and dangerous. For a young company, or even an established one, a single mistake could cost them a vast portion of their revenue, bankrupting them. In the video below [starting at 14:50], astronomer and space advocate Neil deGrasse Tyson makes this case. It’s something I’ve argued many times as well.
There are things governments, with deep pockets as well as other vast resources, can do that private business cannot. Starting a space program is an excellent example! Certainly, when the US joined the space race in the 1950s, successes were few and failures common. But as NASA learned how to do it better, that ratio flipped, and less than 12 years after the first satellite was launched into space, men were walking on the Moon.
Ironically, just three years later, the United States retreated from that lofty exercise. Politics and public opinion turned NASA toward the Space Shuttle, destined to orbit the Earth and no more, instead of pushing humanity farther out into solar system.
This was, in my opinion, a huge mistake. The Shuttle had early promise of getting to orbit cheaper, safer, and more efficiently…but honestly, when has the government done anything efficiently? It’s simply not something governments are designed to do.
But it’s precisely what private industry must do, to stay competitive. Breaking new ground (or, I suppose, space) is best done by governments; it’s difficult if not impossible for private industry to take on that kind of load. But once that path is cleared, then it’s time for private industry to step in, making it more efficient, cheaper, and profitable—something difficult if not impossible for government to do.
In a sense, we are at the same point we were in the 1960s, when the balance of success and failure was precarious. Back then NASA strode through that point, forced the balance to tip, and humans set foot on another world. Since then, though, our pace has slowed.
But private companies are beginning to take that one small step. SpaceX has launched a rocket into orbit and brought the first commercial craft back from space safely, and may in the next 2–3 years be able to put humans into orbit. Virgin Galactic promises to be launching humans into sub-orbital flights in the next year. Bigelow has already put inflatable habitats in orbit, with an eye toward—seriously—the space hotel industry. SpaceDev is working on a reusable Shuttle-like transport to orbit. The list goes on.
We are, at this very moment, at the time where the pace must be set. We are at the line where the risky exploration phase of space exploration makes way for our mastery of it, where we can do it more efficiently and cheaply.
This can go either way. This new industry wants to boldly go, but it’s still taking shaky footsteps. These private ventures still need government help, and NASA does in fact have commercial agreements in place with various companies to help them explore space. However, NASA’s funding is still on the chopping block, and it’s unclear what the future holds. With NASA’s budget being hammered out by Congress even as you read this, 23 astronauts felt strongly enough to write a letter to the government, asking them to make sure NASA has the money it needs to partner with private industry.
For Americans, NASA was once synonymous with innovation and inspiration. It lost that because it misstepped, faltered, turned its back on the adventure and embraced the mundane. It lost its way. But it’s time for NASA to move forward once again, to take the risks, make the bold steps, pave the way. Once that path is there, private companies can then come in and do what’s necessary to keep the roadway open.
History is filled with governments taking that first giant step. But it’s also filled with failed ventures where governments missed their chance to partner with private companies so that both could do what they’re best at doing. With space travel, we’re at that precise moment in time right now.
It’s time once again to walk the walk.
Phil Plait, the creator of the Discover blog Bad Astronomy, is an astronomer, lecturer, and author. He’s written two books, dozens of magazine articles, and 12 bazillion blog articles.
|
<urn:uuid:9d8ba916-05db-4a93-8837-ff744167815d>
|
CC-MAIN-2013-48
|
http://blogs.discovermagazine.com/crux/2011/11/13/lets-do-launch-how-nasa-private-space-cos-can-tame-the-final-frontier-together/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164040899/warc/CC-MAIN-20131204133400-00047-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.964666 | 1,119 | 3.46875 | 3 |
A Glimpse of the Machine – paintings
The work “a Glimpse of the Machine” started as a series of sketches, which were further developed into two paintings called respectively; “inward’ and “outward”, intended to depict a mental landscape. This landscape was based on a simple analogue algorithm, of thinking in the opposite direction. Comparable with the dialectical ideas as they were interpreted by Hegel in his “thesis” and “antithesis” but than strictly visual and abstractly executed. Each decision during the working process generated associations where the least logical decision would form the chosen solution. This resulted in a continuous evaluation of each individual step to formulate and offset associations which were consequently used to generate a cascade of new associations. Each new move, took all previous moves into account and formed a new base of working, which were constantly influenced by change and contradiction. The rule which was included to merge these seemingly chaotic moves, was a form of hyper perspective. An amplified use of perspective as could be experienced when a normal scale goes into a micro world. Things there tend to get more extreme. The “Gestalt” theory was always apparent in a continuous alternation, shifting consequently the “figure-ground relationships”. The work tries to provide a personal interpretation of philosophical theories, using a form of visual dialectics in order to investigate reality, consciousness or even existence. The works were initiating a process of different works with the same ideas behind it.
A Glimpse of the Machine – video
When the paintings were made a desire to keep on working on this theme grew, but moving in a different medium started to become inevitable. The paintings were obviously based on materials like acrylic paint, canvas and a wooden frame. Material and physical elements. A relationship between the material and physical world and the virtual and digital world became a quest. Could the latent and ephemeral world of ideas bridge the gap between the two realm? Would it be possible to merge the two worlds and let them coexist in a new reality. One which entails the qualities from both. The choice firstly was to breakdown the paintings in digital images, which were forming the building blocks to start working with. The images were further broken down in blow ups of specific details, which were processed in an animation. Again the same theoretical formula above mentioned of the least logical decision was applied in an animation. The paintings were coming alive and required sounds as well. Recordings of daily sounds, which were exploring a different scale of objects were generated and collected. The micro world of small entities like flies, dragging stones, metal sounds, and industrial soundscapes, in combination with a nuanced background noise formed the palette of the sound composition. each sound was synchronized with the footage. Here the algorithm of least logical decision was not working and a more traditional approach was applied.
The film is positioned in between the two paintings, on a screen which has the length of the images’ height. The film and the paintings are investigating questions of logic and existence through a set of formulas and anti-formulas. The set up for these formulas can change accordingly and can provide a different set of parameters which can change the working of the formulas and anti-formulas. Thus allow the project to grow polymorphic in different spatial directions and in a seemingly random order. The nature of the work allowed to question the substance of artworks. Could a traditional medium like a painting become equally valued as a digital work, projected on a LCD screen? Could a work grow in different directions, using new media to express itself? Using the emerging qualities which sound possesses. The questions were of such a nature that many works will follow which are researching and producing works in its extension to possibly find answers to this.
|
<urn:uuid:321362ef-29ce-4cf4-8a81-65e8787ede23>
|
CC-MAIN-2017-30
|
http://tonymaslic.com/a-glimpse-of-the-machine/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424239.83/warc/CC-MAIN-20170723022719-20170723042719-00044.warc.gz
|
en
| 0.978244 | 772 | 2.59375 | 3 |
Wrapping security around the Internet of Things is proving to be a complex proposition, and for one senior security analyst, the many definitions of IoT is the primary reason.
“IoT doesn’t have a universally accepted definition. When people think about IoT, they don’t have a clear device in mind,” said Bogdan Botezatu, senior e-threat analyst at Bitdefender.
“Some of them think of smartphones, others think of sensors, connected cameras, thermostats, and so on.
“The common denominator across all of them is that they run their own operating systems, they’re always connected, they exchange data with the world, and they’re all vulnerable to threats.”
Botezatu said what makes IoT security more important than traditional IT security is that it often relates to physical access and control of real-world assets.
“For example, companies are now producing smart ovens, which use electricity and convert it to heat. These could be remotely controlled, and whoever gains access to these devices can actually set your house on fire,” he told IoT Hub.
“Many IoT devices hide their APIs and are essentially ‘black boxes’, and nobody knows what operating system runs on them and nobody can install anything on these devices because they only way you can interact with them is via apps or via minimalistic interfaces.”
The dangers of smart home devices
Botezatu has particular concerns over the increasing proliferation of home appliance manufacturers integrating connectivity into traditionally ‘dumb’ devices.
“I don’t expect everybody to have an understanding of how their connected kitchenware works, for example,” he explained.
“The average consumer may ultimately end up with a kitchen full of appliances that connect to the Internet that they won’t have any control over, because they wouldn’t understand how they connect to the network.
“We’re already seeing fridges sending spam, major botnets using smart power plugs, and people being able to remotely unlock doors or hijack doorbells to obtain Wi-Fi passwords, and so on.”
He is also seeing a worrying trend amongst smart device manufacturers that too little emphasis is being placed on updating the software on their devices, preferring to release updates when the next generation of device is released.
“Version two of the software is usually only bundled with version two of the hardware, so unless consumers purchase the new product when it launches, they’re stuck with a vulnerable version of the software in their household,” he added.
Proximity no longer a prerequisite to attack
Botezatu has observed a worrying trend among smart home device security, in that a hacker no longer needs to be in range of the target network to launch an attack.
“Up until now, you had to be within the range of the user’s Wi-Fi to obtain a hardcoded password or to find a way in,” he said.
“Now, things are becoming more complicated, as smart home devices increasingly communicate with a server that in turn communicates to other smart devices around the world, and through our testing we’ve discovered that we can inject commands which the server can then send to every active device in the world.
“Hackers can now create a million-device botnet that can attack websites or perform other types of malicious activity.”
What can consumers do to protect themselves?
Botezatu said that the most important step for consumers to take to protect their devices and networks is to increase their awareness of the threats out there.
“First of all, they need to be aware of the danger. This is the most difficult part, that even now in 2016, people think of smartphones as regular phones, for example, and still treat them as a simple device, and not a portable computer,” he explained.
“The same thing goes with appliances. When the majority of consumers look at an intelligent washing machine, all they see is the washing machine, not the software, or the connection to the Internet.”
“Furthermore, even if you’re aware of what’s going on and that your devices could be compromised, there’s no easy way to determine if your devices are vulnerable on any given day, as new vulnerabilities for existing devices are being discovered all the time.”
He said that best way for consumers to ensure that their smart devices are as secure as possible is to subscribe to a service that can perform regular audits of their equipment and test them for vulnerabilities, or failing that, regularly checking manufacturer websites for security updates, if available.
|
<urn:uuid:8da2253e-93d4-40a0-b8ab-166a0df5be70>
|
CC-MAIN-2017-39
|
https://www.iothub.com.au/news/why-iot-security-is-so-complex-437883
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689615.28/warc/CC-MAIN-20170923085617-20170923105617-00705.warc.gz
|
en
| 0.94899 | 983 | 2.859375 | 3 |
SANITARY DRIER URGED
The day of the grimy roller towel is fast vanishing. Hotels, restaurants and other public places where washrooms are a necessity are installing the automatic hot-air drier shown at left.
The press of a foot pedal is all that is necessary to operate the device. A steady blast of hot air is forced from the nozzle. By massaging the wet hands for several seconds, the drying process is facilitated. The hands are thus dried faster and in a more thorough manner than if a clean towel were used.
Health authorities throughout the country are advising the installation of this machine in all public wash rooms. Prevention of a great amount of disease that is now spread through the use of unsanitary towels will thus be possible.
King Gillette’s Safety Razor
By Alfred Lief
A SALESMAN who wanted a business of his own, King C. Gillette tackled the dictionary to find an idea for something he could invent, make, and sell over and over again to the user. This was in the 1890’s, and his $6,000 a year was a pretty good salary. But he was 40 and restless.
Gillette had not gotten far into the alphabet when a personal need supplied an answer that literally hit him on the chin. He was shaving one morning with a straight-edge razor of the barbershop type; the blade was dull and useless and he had to go out and get it rehoned.
Science in Pictures
Push-Button Telegraph center permits messages to be typed only once, on a “printer perforator,” at point of origin. When messages reach the center, a clerk pushes a button for the city of destination.
Fishy Idea dreamed up by amateur inventor Dr. Carl Omeron, right, looks like a spark of genius. This is it: Tie balloons to a live “Judas” fish (which you catch the hard way). Put Judas back in the water and he’ll lead the way to the whole school.
New York Dairies Deliver Milk in Paper Bottles
THE OLD familiar milk bottle which greets the householder on the back stoop every morning bids fair to be replaced by a paper container which has several advantages over the glass bottle. In the first place, the new container cannot be shattered and it has no glass edges to be chipped off with consequent danger of foreign particles finding their way into the milk.
A PERFECT SALESMAN
THE IDEAL postal clerk who never gives five twos for two fives and never argues with patrons, is being tried out in the post-office in Washington, D. C. As might have been guessed, it is an automatic machine which dispenses stamps and makes change quickly without charge.
If the machine proves successful, it is probable that similar ones will be installed throughout the country by the government.
BLOW OFF STEAM
Early locomotives required hot fires to keep up enough steam to pull their cars. But when the engine ground to a halt, steam pressure rose rapidly. There were no safety valves and the engineer had to pull a hand lever and blow off steam to prevent an explosion. It was a fearful sight and observers likened it to a grand display of temper. Thus, blowing off steam grew into an expression for any type of outburst.
Lewis Waterman’s Fountain Pen
HE FOUND A WAY…
By Alfred Lief
LEWIS E. Waterman, by turns a short-hand instructor, book salesman and life insurance agent, was 46 years old in 1883 when he struck not oil but ink.
In those days a salesman often wore a vest chain with a small metal container holding a vial of ink in one pocket and a collapsible penholder in the other. Working in New York, Waterman gave up this bulky equipment and bought a writing contraption with its own ink reservoir. On his next call he handed this pen to an insurance applicant at the crucial moment.
Giant Mt. Rushmore Memorial Completed
HUGE faces of Washington, Jefferson, Lincoln and Theodore Roosevelt carved atop 6,200-foot Mount Rushmore in the Black Hills of South Dakota were recently completed, after 14 years of blasting and chiseling by famed Gutzon Borglum. The faces are of a size proportionate to men 465 feet tall. Borglum died last year and the great task was finished by his son.
Best for honeys like you – ever since Mother was a baby, too!
Asleep now, but soon his growing appetite will be demanding attention. He craves variety … and gets it from the four different-tasting Pablum cereals … so easy to digest . . . high in nutritional values so important right up through his third year.
“You sunk my salvo!” doesn’t have quite the same ring to it.
SALVO ~ A New Game of SKILL
SALVO! Here is a two-handed indoor game which is on a par with checkers and chess, in that the most mentally alert player wins.
The only requisites to play “Salvo” are two pencils and some scrap paper. Each player draws two fairly big squares (three by three inches or larger) and rules these off into 100 smaller squares, ten on a side.
To designate the vertical and the horizontal rows of squares, the vertical rows are indicated with letters at the top from A to J, and the horizontal rows from 1 to 10 at the left side.
|
<urn:uuid:c9b09fb1-6064-4c9d-8434-0efb588539de>
|
CC-MAIN-2017-39
|
http://blog.modernmechanix.com/category/origins/page/3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687447.54/warc/CC-MAIN-20170920194628-20170920214628-00610.warc.gz
|
en
| 0.952593 | 1,152 | 2.625 | 3 |
In the old days all vehicles whether a stage coach or a train or an automobile used springs for absorbing shocks taken by the vehicle off the uneven roads. The purpose of these springs (leaf or coil spring arrangement) was to prevent the people inside the vehicle from experiencing a sudden shock when it hit a bump. However, these springs while absorbing shocks were set into an oscillation which died after a considerable amount of time.
This means that the vehicle would continue to go up and down (as illustrated in the figure below) and as a result the ride was not what we could call, comfortable.
With time the automobiles started achieving newer speed limits which in turn meant that the ride comfort had to be compromised. Thanks to the engineers who thought about this beforehand and invented what we today know as a hydraulic shock absorber. In this shock absorber pressurised oil passes between the chambers (2-3) through valves that restrict its flow. This passage of the fluid through the valves and chambers causes the oscillations to damp or die out quickly and in turn the vehicle returns to its normal state much faster. The follwing figure depicts the damped oscillation.
In the recent past the after perfecting the IC engines for several decades the engineers turned their attention towards ride comfort. This impelled the spawn of newer sophisticated machinery and newer materials for shock absorbers. The latest 3rd generation shock absorbers available today, usually in some high end cars use something called a Magneto-Rheological shock absorber (MR Shock Absorber). Rheological, because it involves fluid motion, and magneto beacause it uses an electromagnet. Whats basically different with this type of shock absorber is that it does not require those tiny mechanical valves and chambers to create a restriction for the oil flow.
The MR systems were first incorporated into the GM’s Cadillac Seville STS. Later, several vehicles started using it but the system has actually been made popular by the Audi’s Magnetic Ride in the TT and R8 models. The MR Shock Absorber uses a special oil filled with micrometer-sized iron particles (20-40%) and an electromagnet piston. A fluid to prevent iron particles from settling down is also added to the mixture. The basic construction is similar to the conventional hydraulic shock absorber. The main difference being that the piston is an electromagnet with a passage in between through which the fluid flows. When the system is deactivated the fluid moves unrestricted through the passage and offers minimal ride comfort. However when the system is energized, the magnetic flux generated by the electromagnet causes the iron particles to form a chain like structure along the magnetic lines of force, just like the iron fillings that make a shape around a bar-magnet. This allignment of the iron particles causes the fluid to become more stiff or viscous and thus help in dampening the shock with a considerable celerity.
Now the main question, how does the ECU know when to switch on the electromagnet and how does it control the fluid viscosity? Well, the electronic sensors mounted on the car, to monitor the road conditions, along with the shock absorber send information to the ECU once every millisecond. The ECU responds by changing the amount of current output provided to the electromagnet. If the bumps on the road are not too severe the current passing through the electromagnet will be quite less, the magnetic flux produces will be less as well and hence the the MR fluid will have low viscosity (but quite much for a comfortable ride). On the other hand, if bumps are too severe the ECU will provide maximum current at the electromagnet’s end and hence the MR fluid will achieve its maximal viscosity. Hence at all times the ride comfort is taken care of.
As it has been mentioned before that viscosity can be changed by changing the current flow, many of you might be wondering how would you possibly change the amount of DC current, which infact is bound to be constant? The solution to this very problem is quite simple yet elegant and is called the PWM or Pulse Width Modulation. How it works is the realm of electrical and signals engineer, but in layman’s language the computer is just changing the ON time and OFF time of the output current pulse, and as an upshot of this witchcraft at the ECU’s end, the power gets controlled and the ride just gets better and better.
|
<urn:uuid:6f57b53d-7e07-4449-b615-b7dfe2b3b777>
|
CC-MAIN-2017-34
|
http://autospace.co/magnetorheological-shock-absorber-comfort-just-got-a-new-definition/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105297.38/warc/CC-MAIN-20170819031734-20170819051734-00108.warc.gz
|
en
| 0.950525 | 921 | 3.0625 | 3 |
The Test Sections of the ACT
Part of the ACT For Dummies Cheat Sheet
The ACT comprises several different test sections, and each section has its own time limit. The following table shows you how many questions each ACT section has and how much time you have to answer them.
|Test||Number of Questions||Time Allotted|
|Writing (optional)||1||30 minutes|
If you add up the numbers, you find that you have 216 questions to answer in 205 minutes You get one 10-minute break between the second and third tests (the Mathematics and Reading Tests). If you opt not to take the optional Writing Test, then you get to walk out right after the Science Test.
|
<urn:uuid:9476c7a2-0ed1-41dd-9c4a-ddd47755660f>
|
CC-MAIN-2014-23
|
http://www.dummies.com/how-to/content/the-test-sections-of-the-act.navId-323321.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267824.47/warc/CC-MAIN-20140728011747-00079-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.842834 | 144 | 2.859375 | 3 |
Last Updated: June 2001.
Motion Induced Blindness (MIB) is a phenomenon of "visual disappearance" in which salient visual stimuli disappear as if erased in front of the observers eyes. This demo demonstrates several properties of the MIB. It is implemented as a set of GIF animation and can only be appreciated if the apparent motion appears smooth or almost smooth. In general, fixate in the center or lower part of the screen without moving the eyes, pay attention to the moving pattern and observe what happens to the static yellow dots. For better results, download an executable version of the demo, available for Linux x86 and Windows systems. The demo is best perceived in the dark. >
Executable for Windows (405K)
The downloadable demo is an executable (not an installation package) that implements the same parts listed above. It runs without reading or writing any files. The demo was tested on Windows 95/98 and Windows 2000, with 24 and 16 bit color (doesn't work with 256 colors). Note that on some systems, the title text in each page might look flickering, but this should not disrupt the effect. When running, use left/right mouse buttons to toggle between demo parts, up/down arrow keys to speed up/down the mask, and Escape to exit. The effect is best visible in the dark.
Executable for x86 Linux (2.85MB) (use Shift-Select)
The demo was tested on RedHat Linux 6.2 in true color (24 bit) mode, but should probably work in other modes and Linux x86 versions. For download, hold the shift key and select. After download, use chmod +x, to make it executable. When running, use mouse left/right buttons to toggle between demo parts and up/down arrow keys to speed up/down the mask. The effect is best visible in the dark.
|
<urn:uuid:0480440a-8e80-496a-8197-6ea413da5153>
|
CC-MAIN-2014-41
|
http://www.weizmann.ac.il/home/masagi/MIB/mib.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663060.18/warc/CC-MAIN-20140930004103-00267-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.898437 | 386 | 2.671875 | 3 |
It’s a time-honored tradition between parent and child: a scrape or a cut that leads to the drying of tears, cleaning of the injury and application of healing medicine. A Band-Aid is the fi nal touch—after all the hard work that has been done to sterilize and treat the injury, the Band-Aid has traditionally been used to hold all of these initial steps together and to protect and allow the tissues to heal. Just as Band-Aids have evolved to incorporate modern medicinal advances such as the addition of antibiotics, so have bandage contact lenses.
Bandage lenses are used to protect the healing eye, and the drug/ device conversation has included these lenses in hopes of improving the effi cacy of certain drugs. Bandage lens use has become more widespread as a result of the increasing popularity of refractive surgery, as well as the technological innovations in contact lens materials. Knowledge of the importance, as well as the appropriate usage and care, is of the utmost importance for an eye care practitioner.
Bandage lenses are a group of soft, thin, highly oxygen permeable lenses of varying levels of water content that are typically fi t loosely over the cornea for various therapeutic purposes. They are mainly used post-surgically. Bandage lenses are part of a larger group known as therapeutic contact lenses, which encompasses an array of lenses with purposes varying from maintaining ocular surface hydration to providing a vehicle for drug delivery.
In the past, certain lenses were specifi cally indicated for therapeutic use; however, disposable soft contact lenses are frequently used today. There are four types of FDA-approved soft lenses for therapeutic use: Acuvue Oasys (Vistakon), PureVision (Bausch + Lomb), Air Optix Night & Day Aqua (Alcon) and Sof-Form 55 EW (Unilens Vision).
Bandage lenses can accelerate healing and reduce discomfort for patients with corneal injuries. These lenses not only protect the eye from the mechanical forces of blinking while the eye is healing below the lid, but they also protect delicate eye tissues from external sources of irritation, such as suture knots. The main disadvantage of their use comes with the risk of infection, especially with extended-wear lenses, as bandage contact lenses have been reported to be associated with a higher prevalence of polymicrobial keratitis.
The AOA recommends therapeutic contact lenses as ophthalmic bandages following corneal trauma or refractive corneal surgery.
In addition, the lens fi t should be frequently assessed; ideally after approximately 20 minutes and again after an hour, due to the possibility of lens dehydration effects. Checking on patients is crucial: a 24-hour follow-up, followed by a second visit in a week or less, and a third visit at one to three months, depending on the condition, is recommended.
There are certain shortcomings of eye drops for patients suffering from glaucoma, corneal ulcers and other ocular surface diseases, including a decrease in compliance. Unfortunately, only about 5% of a topically administered drug enters the anterior segment.
Drug/device combination lenses may be a solution to this issue. Not only are lenses an appropriate measure for healing eyes, they also add a combative one-two punch of effi cacy and therapy. Techniques investigated to integrate drugs and contact lens materials include soaking contact lenses in a drug, among others. The effi cacy of this technique was examined by Zvi Friedman, M.D., and colleagues who demonstrated that a hydrogel soft contact lens (Saufl on PW) soaked in acetazolamide 5% solution caused a 6.3 ± 0.4mm Hg mean reduction in intraocular pressure in albino rabbits.
Drug/device combination lenses are on the horizon for a wide array of indications, such as the contact lens with ketotifen (Vistakon Pharmaceuticals), designed for the contact lens-wearing patient with allergic conjunctivitis, as well as an antifungal contact lens containing econazole used to treat fungal keratitis, though both are yet to be FDA-approved.
Whether for healing purposes or drug delivery, it’s likely that therapeutic applications of contact lenses will continue to expand. It’s essential for eye care practitioners to stay knowledgeable about these innovations in order to maintain the best possible standard of care.
|
<urn:uuid:510271e6-ba9b-4d61-adb0-f99deabe1765>
|
CC-MAIN-2023-40
|
https://www.oraclinical.com/resource/the-other-side-of-the-lens/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00657.warc.gz
|
en
| 0.93642 | 910 | 2.984375 | 3 |
The UIC Occupational, Health and Safety working group has just published guidance on the safe use of mobile phones and other portable electronic communication devices by railway workers.
Mobile phones and other communications devices offer many benefits and can be integral to safe methods of working, but they can also introduce risk. Holding a conversation or using data services such as text messaging, e-mail, internet, video, etc. can distract those carrying out safety critical tasks such as driving or acting as a lookout or working in dangerous environments, potentially endangering themselves and others.
This document is intended to provide guidance on measures to manage and control these risks.
The document is available in three languages, in electronic as well as in paper format.
You can order it on request from: [email protected]
|
<urn:uuid:f1232bdd-1f80-4760-99f1-af6d94ec0fe7>
|
CC-MAIN-2014-10
|
http://www.uic.org/com/uic-e-news/287/article/occupational-health-safety?page=thickbox_enews&keepThis=true&TB_iframe=true&width=800&height=600
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010883242/warc/CC-MAIN-20140305091443-00060-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.950703 | 162 | 2.6875 | 3 |
Mrs. McNosh Hangs Up Her Wash
Submitted by LisaRead the book Mrs. McNosh Hangs Up Her Wash and then let your children hang up wash with clothespins
Submitted by TinaSet up a laundry room in your dramatic play area.
- Put up a clothesline with miniature clothespins
- Provide a miniature washer and drier
- Provide doll clothes for your children to pretend wash
- Cut cloth scraps in the shape of clothes for them to hang.
"The Grouchy Ladybug" Clock
Submitted by JenniTo help your children tell time make a clock to go along with "The Grouchy Ladybug"
Make a clock face on a round piece of red paper (draw numbers around one side of the circle). On the other side of the circle make ladybug spots. Attach black strips of paper for the legs and a black circle head. Attach the clock arms with a brass fastener. As you read the story have the children adjust the clocks to the time in the story.
Submitted by JulieMake sandwiches and use leaf cookie cutters to create leaf shaped sandwiches
Alternatively use Jell-O, to make Leafy Jigglers
Submitted by JulieIf you are planning on taking you kids to the zoo. Ask each child to make a lion mask from paper plates, construction paper, and yarn. Let them wear their masks at the zoo.
Submitted by JulieMake a large log cabin from an appliance box by simply laying the box on its side and cut out a large door and windows. Let your children make paper logs by brushing paint on the paper and then gluing them on. This will create a great log cabin your children can play in..
Submitted by an Unknown FriendMake Lasagna as a class and then have it for snack
Submitted by CindyFor decorating for fall. Take fresh fallen leaves and attach them to fishing line of different lengths. Attach the other end of the line to the ceiling with thumb tacks. It's a lot of work, but the children love their room.
These Alphabet Ideas Are Located At:Everything Preschool >> Alphabet >> The Letter L >> More
|
<urn:uuid:3a2fe8f8-4ebc-469b-b9cd-2e676c4aee27>
|
CC-MAIN-2014-23
|
http://www.everythingpreschool.com/alphabet/L/more.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510280868.21/warc/CC-MAIN-20140728011800-00215-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.921543 | 448 | 2.65625 | 3 |
What is cheese?
Most cheese eaten in Australia is made from the pasteurised milk of cows, sheep or goats. Cheese is generally made by adding a starter culture of bacteria to the milk. These bacteria digest milk sugar (lactose), producing lactic acid, which separates the solids from the liquid in milk. A soft, junket-like curd is formed, leaving the whey, which is drained off.
The curd can be used fresh, or heated, salted, dried, ripened or matured according to the type of cheese being made. For matured cheese, the enzyme chymotrypsin, found in rennet, is also added to the milk. For some types of cheese, the starter culture also contains selected moulds (e.g. white mould for camembert and blue mould for blue vein) or bacteria that produce gas (to form the ‘eyes’ in Swiss-style cheese), or particular flavours, aromas and colours.
There are 4 main groups of cheese categorised according to production techniques and maturity:
- fresh unripened, such as cottage, cream or neufchatel, ricotta, quark, mascarpone and feta;
- soft mould ripened, such as brie, camembert and blue vein;
- firm, such as cheddar and Swiss cheese; and
- hard, such as parmesan and pecorino.
Other types of cheese include stretched curd cheese (e.g. mozzarella and bocconcini) and washed rind cheese (e.g. gruyere).
Cheese as a food
Cheese is one of the most nutritious foods as it is a good source of protein, calcium and a range of vitamins and minerals. Despite being a compact nutrient package, cheese is often avoided because of its fat content. This can vary from about 50 to 85 per cent in mascarpone, which is made from cream, to 35 per cent in cheddar types and 5 to 10 per cent in cottage cheese and ricotta. Nowadays some cheeses are made from milk containing less fat and are labelled as ‘reduced fat’ cheese. In Australia this label means that the cheese contains 75 per cent (or less) of the amount of fat in the regular cheese of the same variety. They are characterised by being milder in flavour. If these cheeses are cheddar types they may still have a fat content of 25 per cent, which should be indicated on the label.
A serve of cheese (40 grams) is a good way to fulfil one of the 2 to 3 daily serves of dairy recommended for most people by the Australian National Health and Medical Research Council. Although rich in calcium, cheeses can be high in saturated fat, so reduced-fat varieties should be chosen where possible. Eat a variety of cheeses, saving the higher fat cheeses for treats.
Take note that low-fat soft cheeses, such as ricotta and cottage cheese, have much less calcium than hard cheeses, such as cheddar, and thus do not count as a full serve of dairy. Ricotta has more calcium than cottage cheese — three times as much per gram — but a regular cheddar cheese has about 10 times more calcium per gram than cottage cheese
Pregnant women and people with a weak immune system should avoid soft, semi-soft and surface-ripened cheeses (e.g. brie, camembert, blue, feta and ricotta), because of the risk of Listeria infection. This infection can seriously affect the unborn child and also people whose immune system is weakened by illness (e.g. cancer and AIDS) or medicines (e.g. after organ transplantation). Hard cheeses (e.g. cheddar and tasty), processed cheese and plain cottage cheese are safer alternatives.
Calcium and fat in cheese
The table below compares the calcium and fat content between samples of different types of cheese.
|Calcium and fat content of sample cheeses|
|Value per 100g cheese|
|Cheese type||Fat (g)||Calcium (mg)|
|Cheddar, cheese spread||24.7||470|
|Cheddar, reduced fat (approx 25%)||24.2||801|
|Cheddar, reduced fat (approx 15%)||15.1||950|
|
<urn:uuid:50df3b8e-4cee-4142-82af-3966cb346f2a>
|
CC-MAIN-2023-50
|
https://mydr.com.au/nutrition-weight/cheese-in-the-diet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00633.warc.gz
|
en
| 0.92553 | 913 | 3.296875 | 3 |
|Home > Functional description > Level 1 memory system > Cache behavior > Write streaming mode|
A cache line is allocated to the L1 on either a read miss or a write miss.
However, there are some situations where allocating on writes is not required. For example,
when executing the C standard library
memset() function to clear a
large block of memory to a known value. Writes of large blocks of data can pollute
the cache with unnecessary data. It can also waste power and performance if a
linefill must be performed only to discard the linefill data because the entire line
was subsequently written by the
To counter this, the L1 memory system includes logic to detect when the core has stores
pending to a full cache line when it is waiting for a linefill to complete, or when
it detects a
DCZVA (full cache line write to zero). If this
situation is detected, then it switches into write streaming mode.
When in write streaming mode, loads behave as normal, and can still cause linefills, and writes still lookup in the cache, but if they miss then they write out to L2 (or possibly L3, system cache, or DRAM) rather than starting a linefill.
The L1 memory system continues in write streaming mode until it can no longer create a full cacheline of store (for example because of a lack of resource in the L1 memory system) or has detected a high proportion of store hitting in the cache.
The following registers control the different thresholds:
|
<urn:uuid:0e142ff6-1f1c-4a35-a057-d618f16163cb>
|
CC-MAIN-2020-10
|
http://infocenter.arm.com/help/topic/com.arm.doc.100798_0400_00_en/lto1473834732563.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145438.12/warc/CC-MAIN-20200221014826-20200221044826-00377.warc.gz
|
en
| 0.879547 | 323 | 2.96875 | 3 |
The digital divide is a challenge of both access and the ability to effectively use information and communications technologies. Thus, inclusion can no longer just be seen as having a device and a connection. A report by Team Inclusion
There are significant and untapped opportunities to use technology better on behalf of citizens and communities. These include improved service planning, design and delivery, particularly to address the needs of disadvantaged groups and individuals.
The digital divide is a challenge of both access and the ability to effectively use information and communications technologies (ICTs). ICT consists of connectivity, computer hardware and software, content, services and education. Inclusion can no longer just be seen as having a device and a connection.
Stressing on linkages, Mihir Shah, Member, Planning Commission said, “inclusion and reform need to be taken very carefully together in an understanding of what we need, when we say that we want the benefits of growth to reach out to the large amount to the people of this country.”
He said genuine partnership and empowerment was needed by looking at Business Correspondent (BC) model, what is coming up in the UID Project, and more importantly, the modern technology offerings that are available today. Shah, who has covered a lot in terms of marrying the BC/BF model along with NREGS payments and the Panchayati Raj Institutions, said the entire notion of delivery needs to be questioned and replaced by notion of partnership. He pointed out that though “we have a great beginning with NREGA programme,” the incentives for banks to reach remote areas is not sufficient as on date and we need to have an estimate of the total cost of involvement as far as the project is concerned. He stressed on the viability of the BC model to make it a possibility in the long run.
At the heart of digital inclusion, however, lies the fundamental issue of IT accessibility. The concept is quite straight-forward: people cannot be included in something they cannot access. IT accessibility, a statement of IT capability or enablement, most commonly enables digital inclusion by addressing ability or age-related barriers that prevent a person from accessing or interacting with information or services that are delivered electronically. In addition, IT accessibility supports digital inclusion by helping remove barriers to using or benefiting from online information and services based on a person’s technical proficiency, native language, or literacy level.
“It was important that suitable capacity building steps were undertaken in the financial services industry, as a change in the mindset of industry people was essential”
— C Rangarajan, Chairman, Economic Advisory Council to the Prime Minister council to the Prime Minister
“Mere availability of branch network and penetration is no guarantee of access in financial inclusion. You can not have financial inclusion and access unless you have availability”
—V K Sharma, Executive Director, Reserve Bank of India
Incorporating accessible technology in governmental initiatives to develop digital communities helps agencies to improve productivity in municipal services and deliver better social and community outcomes.
Vijay Mahajan, CEO, Basix, said, “perhaps we need to offer a five-step process to get the excluded go all the way up to a lifestyle which can be digitally enhanced.” He spoke about the payment issue with the National Social Assistance Programme and the digital means for its implementation. “Between NREGA and the old-age pensions, the payments for pregnant women and those various types of payments that government is already making, the government should resolve that this shall be done only through digital mode and through a digital gateway,” he added.
Through digital inclusion we are trying to achieve some elements of providing services to the large mass of people in this country who are unreached, said K V Eapen, Joint Secretary, Ministry of Finance. One of the key services is financial services and bank accounts. Achieving financial inclusion is a concern and the BC/BF model needs to be tried out as mobile systems are yet to take off completely, he said adding that there is a need to look at the microfinance institution model.
There is growing evidence that digital technology can greatly enhance both quality of services and quality of life – particularly for the most disadvantaged citizens and communities
Revisiting Financial inclusion
Financial inclusion is not an option but a compulsion, as over 45.9 million farmer households in the country, that is a little more than 50 per cent, and 51.4 per cent of the total of 89.3 million households in the country do not access credit either from institutional nor from non-institutional sources. To widen the scope of financial inclusion, commercial banks, regional rural banks and micro-finance institutions need to develop a suitable mechanism to reach out to the underprivileged and the marginalised.
According to C Rangarajan, Chairman, Economic Advisory Council to the Prime Minister, to hasten steps for promoting greater financial inclusion, it was important that suitable capacity building steps were undertaken in the financial services industry, as a change in the mindset of industry people was essential. He said that it was also important that the industry simplify procedures to give the business/ banking correspondent model the push it needs. Simultaneously, it was important that financial institutions rework cost factor, making it worthwhile for the institutions, the intermediaries and the customers to accept such inclusion initiatives.
On his part, V K Sharma, Executive Director, Reserve Bank of India, mentioned how the Bangladesh Central Bank was supporting microfinance institutions in the country and the novel bank guarantee concept that they have implemented. He said that the RBI should make availability and access an integral component when allowing new bank branches. Detailing the RBI’s initiatives, he said that the central bank’s regional offices were seeking to identify about 160 villages, 7-8 for each regional office, to ensure 100 per cent financial inclusion not as a proof of concept but as a model that is sustainable and that can finally be upscaled to promote universal financial inclusion.
Pointing out that it was important for the financial institutions to understand the economic profile of the targeted people, their credit, savings and insurance needs, Jayshree Vyas, Managing Director, Shri Mahila SEWA Sahakari Bank Ltd, said that this was important as it would then enable them to design and market products more innovatively. “What is important in any inclusion initiative is that there is greater hand-holding between the institutions and the excluded. Such hand-holding, according to Alok Bharadwaj, Sr Vice President, Canon India, can only be facilitated with the use of appropriate technology initiatives. Such technology will also ensure sustainable spread of inclusive growth.
“Such hand-holding can only be facilitated with the use of appropriate technology initiatives. Such technology will also ensure sustainable spread of inclusive growth”
—Alok Bharadwaj, Sr Vice President Canon India
“What is important in any inclusion initiative is that there is greater hand-holding between the institutions and the the excluded”
—Jayshree Vyas,MD, SEWA Bank
Creating sustainable models for the bottom of the pyramid is something which needs to be very carefully looked at, said Dharma Krishnan from the Department of Information Technology. Any product that is targeted at this segment needs to be superior in price to performance ratio, as it is only this that will attract the excluded. In this context, he pointed out that the financial sector needs to come out with innovative hybrid models to promote greater financial inclusion, leveraging technology to ensure optimal delivery.
According to S S Tarapore, Distinguished Fellow, Skoch Development Foundation, the excessive obsession with the KYC (know your customer) norms was becoming a bottleneck in promoting greater financial inclusion. Here, bankers must use their own judgement, implementing only the mandatory norms to ensure greater accessibility. In this connection, he said that the government could consider granting banking licenses to post offices also, and take advantage of their spread to promote inclusive growth. Tarapore also urged the senior management of the financial institutions to undertake incognito visits to banks to obtain a first-hand account of the actual operations at the grassroots level. In this context, he emphasised that it was important for the organised banking sector to have closer links with the indigenous financial system.
“We need to look at digital inclusion more than financial inclusion. In addition, one needs to examine the issue of analogs, digital immigrants and digital natives and have clearly defined affordable technology solutions.”
—K Ramakrishnan, Chief Executive Indian Banks’ Association
“Technology has enabled us to reach out to the poor. We are exploring the feasibility and proliferation of mobile banking to have further outreach.”
—M V Tanksale, Executive Director Punjab National Bank
Sanjoy Mohanty, CEO, Zero Mass Foundation started with the Orissa project and then looked at the fixed cost model for the project to be implemented through a service provider mechanism. In two and half years Zero has covered 5.4 million people across 6,234 Gram Panchyats and disbursed nearly Rs 450 million. This project has cost them about Rs 250 million. They have received support both from NIC and DIT for this. Interoperability is an issue where they are working with RBI, IDRBT and IBA and the business model of the BC has undergone a sea change as far as the last few months are concerned and appropriate institutional architectures are being put in place. Certain minimum standards are definitely required to be evolved and the BC is to be literate enough to ensure that the operations are successful.
With regard to biometrically enabled technology leveraged delivery of payments, interoperability first has to happen at the backend and then at the front-end.
Deepak Phatak of IIT-B, Mumbai favoured conformance to standards and interoperability and said that several people who say that they are meeting the standards when you actually put together heterogeneous products, interoperability becomes an issue. He took smart card as an example of a project in which he was involved and finally said that for end-to- end multi-applications to be permitted on the deployed technologies it should be possible to ensure not only the mandatory fields, the additional fields also are able to comply with each other so that interoperability is assured. Finally he said that schemes which are completely self-viable are the schemes which in the long run will be able to take off.
Most of the analysts and experts referred to linkages between financial inclusion and digital inclusion. M V Tanksale, Executive Director, Punjab National Bank, stressed that the poor are also bankable. Giving the example of the 40 plus projects PNB has implemented with 6 million no-frills accounts, he said that these pilots today have upscaled, thanks to technological inputs. More importantly, the BC/BF model is an option which they are seriously looking at and BC agent to establish the credibility if this project is to be taken in the long run. The feasibility and proliferation of mobile banking is also something that the bank is exploring.
“Achieving financial inclusion is a concern and the BC/BF model needs to be tried out as mobile systems are yet to take off completely. There is a need to look at the microfinance institution model.”
—K V Eapen, Joint Secretary, Department of Financial Services Ministry of Finance
K Ramakrishnan, Chief Executive, Indian Banks’ Association said, we need to look at digital inclusion more than financial inclusion. In addition, one needs to examine the issue of analogs, digital immigrants and digital natives, and have clearly defined affordable technology solutions.
In fact, as the recent United Nations’ E-government Survey 2008 reveals, governments are increasingly looking towards e-government-as-a-whole concept, which focuses on the provision of services at the front-end, supported by integration, consolidation and innovation in backend processes and systems to achieve maximum cost savings and improved service delivery.
As the NeGP advances on the ground in terms of infrastructure, we need to look at issues related to change management, availability of applications, national integration of various services and players offering such services, among others. A critical challenge that e-governance movement in India today faces is that while the programme has been underwritten by the DIT, the drivers have to come from the respective domain ministries, both at the Central and State levels.
The social and economic benefits of digital technology can be profoundly empowering. Increasingly, technology supports every aspect of our lives – at home, at work, in the community, in how we communicate and in the services that we use. There is growing evidence that digital technology can greatly enhance both quality of services and quality of life – particularly for the most disadvantaged citizens and communities. Digital inclusion is fundamental if we are to maximise our potential for economic growth, prosperity and social cohesion.
The SKOCH State of Governance research process studies governance with a fine-toothed comb. For 2020, the impact of Covid-19 on administration has the most dominant theme. From District Administration and...
Inclusion is the first magazine dedicated to exploring issues at the intersection of development agendas and digital, financial and social inclusion. The magazine makes complex policy analyses accessible for a diverse audience of policymakers, administrators, civil society and academicians. Grassroots-focused, outcome-oriented analysis is the cornerstone of the work done at Inclusion.
|
<urn:uuid:005248e6-02d6-49c0-bb52-8f79133d98e9>
|
CC-MAIN-2023-40
|
https://inclusion.in/research-reports/2010/01/speeding-digital-inclusion/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00360.warc.gz
|
en
| 0.960073 | 2,761 | 2.84375 | 3 |
Books: New In Print
Just Schools: The Idea of Racial Equality in American Education, by David L. Kirp (University of California Press, 2223 Fulton St., Berkeley, Calif. 94720; 375 pages, $19.95).
In an analysis of race and education policy since the Brown v. Board of Education decision, Mr. Kirp traces the educational history of five California communities (San Francisco, Richmond, Berkeley, Sausalito, and Oakland). Calling the effort to achieve racial equality in the schools a "vexed, ... quixotic undertaking," he looks at the "history of enmity and indecision" as it relates to busing, community control, the meaning of equal opportunity, law and politics, decision making on the local level, and other issues.
In his recommendations for reforms to deal more effectively with race and schooling, Mr. Kirp advocates new roles for the courts, members of Congress, and local officials. Mr. Kirp is professor of public policy and lecturer in the Boalt School of Law, University of California, Berkeley.
Schools in Conflict, by Frederick M. Wirt and Michael W. Kirst (McCutchan Publishing Corporation, 2526 Grove St., Berkeley, Calif. 94704; 334 pages, $20.50).
A "major revision" of The Political and Social Foundations of Education that incorporates events of the last decade into its examination of the issues, pressure groups, and public policies that make up the politics of education. The authors look at federal, state, and local politics as they relate to school policies and treat such current issues as curriculum, finance, desegregation, new pressure groups, and the expanding role of the states in education decision making. Intended for practitioners, students, scholars, and policymakers. Mr. Wirt is professor of political science at the University of Illinois at Champaign-Urbana. Mr. Kirst is professor of education at Stanford University.
Special Education in America: Its Legal and Governmental Foundations, edited by Joseph Ballard, Bruce A. Ramirez, and Frederick J. Weintraub (The Council for Exceptional Children, 1920 Association Dr., Reston, Va. 22091-1589; 112 pages, paper $22.50).
Eight contributors trace the history of legislation and court decisions affecting special education, from the establishment of the first state school for the deaf in 1823 to the evolution of the Education for All Handicapped Children Act (P.L. 94-142). Written for policymakers and students majoring in special education, the book documents the federal provisions for a "free, appropriate public education" for exceptional children and identifies new areas in need of study by policymakers. A set of appendices provides information on federal laws and a list of special-education resources. The editors are members of The Council for Exceptional Children.
The Paideia Proposal: An Educational Manifesto, by Mortimer J. Adler, on behalf of the members of the Paideia Group (Macmillan Publishing Co., 866 Third Ave., New York, N.Y. 10022; 96 pages; cloth $6.68, paper $2.95).
American public education has failed to provide equal educational opportunity for all children, says Mr. Adler in his "manifesto" for parents, teachers, administrators, school-board members, and all those interested in the quality of schools. Calling for an "educationally classless society" that treats all children equally, he advocates a one-track system of schooling with the same objectives and the same course of study for all students. Differences among students would be handled by adjusting the program and administering it flexibly, he contends. The author also discusses higher education, the student's role in the workforce, and the roles of teachers and principals in the context of the Paideia Proposal. Mr. Adler is director of the Institute for Philosophical Research. (See story on page 9.)
Guides and Directories
Collective Enrollment Strategies, the Secondary School Admission Test Board and the Committee on Boarding Schools (The National Association of Independent Schools, 18 Tremont St., Boston, Mass. 02108; 61 pages, paper $4.00, $3.00 for member schools).
A guide for independent or private schools interested in combining their efforts to recruit students. Addresses minority recruitment, marketing and the media, the preparation of school publications, group travel, admissions presentations, and other aspects of admissions programs. Included in the appendices are sample letters, questionnaires, and press releases for recruitment events.
Finetuning Special Education Finance: A Guide for State Policymakers (Education Policy Research Institute, Educational Testing Service, Suite 300, 1800 Massachusetts Ave., N.W., Washington, D.C. 20036; 130 pages, paper $3.50).
Intended to help state education officials who work with special-education laws and regulations make decisions about policy and the allocation of resources. Acknowledging that states' practices differ, the authors identify common issues in administering state special-education programs and present various options for dealing with them. Those issues are: defining student eligibility, establishing a range of appropriate services, determining costs, developing funding sources, and instituting formulas for distributing funds. Appendices include information on related legislation and legal cases, state revenue sources, and finance formulas.
Assessing Teacher Performance, by Robert C. Hawley (Education Research Associates Press, Box 767-R, Amherst, Mass. 01004; 168 pages, paper $15.95).
Designed to help administrators evaluate teaching performance, Mr. Hawley discusses observing teachers in a nonthreatening manner, conducting teacher conferences, analyzing teaching competencies, writing reports, and other concerns. Also addresses the roles of administrator and supervisor and their effect on teachers' accountability.
Listening Skills Schoolwide: Activities and Programs, by Thomas G. Devine (National Council of Teachers of English, 1111 Kenyon Rd., Urbana, Ill. 61801; 61 pages, paper $6.50, $5.25 for N.C.T.E. members).
This workbook suggests ways that teachers can help students become better listeners. The author discusses the purpose of listening and such skills as confirming the speaker's purpose, grasping details, taking notes, distinguishing fact from opinion, and other techniques. For use in teacher workshops and inservice sessions, as well as by individual teachers.
Thinking About Preventing Nuclear War (Ground Zero, 806 15th St., Washington, D.C. 20002; 24 pages, $.50 per copy, $.25 per copy if ordering 25 or more).
How might nuclear war occur? How can we prevent it from starting? These and other questions are posed in this booklet, an education project of Ground Zero, a nonprofit citizens' group established last year to promote "nonpartisan" discussion about nuclear armaments. Designed for use by teachers, parents, and others interested in participating in that discussion.
|
<urn:uuid:da4ee45a-6ea5-45e9-b878-2f7fcbd65520>
|
CC-MAIN-2017-30
|
http://www.edweek.org/ew/articles/1982/11/03/02120006.h02.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424575.75/warc/CC-MAIN-20170723162614-20170723182614-00541.warc.gz
|
en
| 0.912152 | 1,449 | 2.96875 | 3 |
What Does Layer 2 Switch Mean?
A layer 2 switch is a type of network switch or device that works on the data link layer (OSI Layer 2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. It uses hardware based switching techniques to connect and transmit data in a local area network (LAN).
A layer 2 switch can also be referred to as a multiport bridge.
Techopedia Explains Layer 2 Switch
A layer 2 switch is primarily responsible for transporting data on a physical layer and in performing error checking on each transmitted and received frame. A layer 2 switch requires MAC address of NIC on each network node to transmit data. They learn MAC addresses automatically by copying MAC address of each frame received, or listening to devices on the network and maintaining their MAC address in a forwarding table. This also enables a layer 2 switch to send frames quickly to destination nodes. However, like other layer switches (3,4 onwards), a layer 2 switch cannot transmit packet on IP addresses and don’t have any mechanism to prioritize packets based on sending/receiving application.
|
<urn:uuid:38b9a8e2-4caa-40a2-8288-eb17f8ac294f>
|
CC-MAIN-2023-40
|
https://www.techopedia.com/definition/8011/layer-2-switch
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00113.warc.gz
|
en
| 0.884053 | 226 | 3.625 | 4 |
While human caregivers are on the front lines of the COVID-19 epidemic, they can sometimes count on the help of robotic companions who have the distinction of being immune to the virus but also the ability to perform a multitude of tasks and move independently or by being guided remotely. Several companies are using their current innovations, processes, and technologies to quickly put at the service of society in this health crisis.
The company XAG, manufacturer of drones and robots, specialized in spraying for the agricultural sector, has known how to adapt to the crisis by putting its machines at the service of street disinfection. It is estimated that XAG supported the Chinese government with more than 2,600 drones to disinfect areas infected by the coronavirus. And now, it is reported that an unmanned spray system can be introduced in the Russian as an aid in combating the spread of coronavirus, if necessary.
Another tool developed by XAG is an autonomous vehicle named R80. This small vehicle helps to access areas with a high risk of contagion without endangering human beings since its use replaces the manual sprayers.
Though originally designed as a farm robot, R80 can also be applied in various scenarios, such as disinfection. XAG has modified it to provide it with a tank with 80-liter disinfection liquid and a 360-degree high-speed intelligent JetSprayer. The XAG R80 is designed for remote management and monitoring; its technology gives it the ability to maneuver in tight spaces, avoid obstacles independently, adapt the disinfectant irrigation at different angles, and according to needs.
All these features have given the XAG R80 a great relevance in the fight against the coronavirus since it is used in emergency cases for the rapid and accurate disinfection of infected areas.
In simple words, XAG technology has been used to stem the outbreak of the virus that has spread throughout much of the world. The drones and XAG R80 robots are examples of autonomous vehicles that help disinfect contaminated areas without exposing humans.
In Russia, the developer of unmanned vehicles StarLine is ready to take on the matter, although participation of Yandex and MADI, any company that has the experience of unmanned vehicles, is not excluded.
|
<urn:uuid:b2265c90-9211-44f6-aa8f-621971acfae7>
|
CC-MAIN-2023-50
|
https://www.inceptivemind.com/xag-agricultural-robot-r80-conducts-disinfectant-spraying/12547/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00090.warc.gz
|
en
| 0.959028 | 452 | 2.59375 | 3 |
It’s wise to take precautions during cold and flu season, but experts say it’s possible to go overboard. While there is no specific number of times recommended for hand washing or surface cleaning during the day, here are some guidelines:
Consider your daily activities. If you’re only at your own work station, wipe down surfaces now and then, and wash hands after coming in contact with public areas such as restrooms. But if you’re job involves handling money or working directly with the public, wash more frequently.
If someone else at home is sick, it’s a good idea to disinfect surfaces daily, and wash hands.
Hand sanitizers are helpful in a pinch, but hand washing is best. Sanitizers can often dry the skin and cause cracking, and not all products protect against every virus.
Try to avoid close contact with people who are obviously sick.
Get vaccinated, eat healthfully, get plenty of sleep.
Sources: Steve O’Brien, Alta Bates Summit Medical Center in Oakland; Amy Nichols, UCSF Medical Center.
Contact Angela Hill at [email protected], read her Sunday Give ‘Em Hill column, or follow her on Twitter @giveemhill.
|
<urn:uuid:ddd9588a-f877-4ca1-8116-8e2ba661a2de>
|
CC-MAIN-2017-26
|
http://www.mercurynews.com/2013/02/12/cold-and-flu-season-precautions/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320438.53/warc/CC-MAIN-20170625050430-20170625070430-00019.warc.gz
|
en
| 0.92504 | 261 | 2.5625 | 3 |
While growing the adult petunia is relatively easy, beginning your plants from seeds can be a challenge. The key is to provide enough water, and enough light, to encourage your seeds to germinate and grow. Begin this project 10 to 12 weeks before you plan to plant your petunias. The seeds take a long time to develop.
Choosing Seeds and Planting
Look for seeds that are 1 year old. Seeds that sit on shelves for years do not tend to germinate well. Petunia seeds are incredibly small and difficult to handle, so make sure to do your planting in a well-lit area. Choose a plastic pot or tray with several holes in the bottom for drainage. Fill the pot with standard potting soil up to ¼ inch from the rim. Water this soil until it is damp, but not soggy. Sprinkle your seeds on top of the soil, and mist them with water. This water will help them work themselves down into the soil. Cover the pot with plastic wrap, and place it in a bright location. Do not place the pot in direct sunlight, but choose a bright room. This room should also be warm, between 75 and 80 degrees, for the best results.
In about 7 days, your seeds should be sprouting. Remove the plastic wrap, and place the trays in direct sunlight, in a slightly cooler room (about 65 degrees). The plants have no root system at this stage, so you'll need to water them daily. When each plant has three to four leaves, break the petunia cover into several smaller parts. Plant each portion in its own pot, with potting soil. Thin each stand so each petunia is 1 to 2 inches apart. Add a standard flower fertilizer to your water, and water these plants once per week. Gradually, the plants will grow tall and strong enough to be transplanted into your outdoor garden.
|
<urn:uuid:c667fdf9-7d45-4548-affb-c16862ff2bc4>
|
CC-MAIN-2013-20
|
http://www.ask.com/explore/how-plant-petunia-seeds
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383259/warc/CC-MAIN-20130516092623-00027-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.94687 | 388 | 3.234375 | 3 |
Fuel cells and hydrogen have the potential to transform the energy landscape, offering a range of solutions to the challenges around economic growth, decarbonisation, energy security and fuel poverty in a variety of applications.
In stationary market, fuel cells are an enabling technology for residential CHP with efficiencies in range of 80-90%. Over the next few years, fuel cell microCHP units will revolutionise domestic electricity production, room and water heating offering significant carbon emissions reductions. Already, over 11,000 stationary fuel cells have been deployed annually.
In transport, passenger fuel cell vehicles operating on fossil-derived hydrogen offer 50% reductions in carbon emissions when compared to conventional petrol vehicles, and produce no carbon when the hydrogen is derived from renewable sources. A mass produced fuel cell vehicle with 350-mile all-electric range is projected to cost less than plug-in hybrid and full battery-electric vehicle There are already more than 150 hydrogen refuelling stations operating worldwide.
Finally fuel cell powered portable equipment offers the benefits of silent operation, low weight, long run and no charging time. In 2008 alone, more than 10,000 portable fuel cell units were shipped worldwide.
Commercialisation is already underway in early markets and mainstream applications will become accessible in less than five years. During this critical period, the opportunities for knowledge sharing, stimulation of new collaborations and support for innovation which the Energy Generation and Supply Knowledge Transfer Network (EG&S KTN) can bring will be invaluable.
14:00 until 15:30The fuel cell materials handling market has been experiencing sustained growth for several years,...
09:00 until 17:00Collaboration Nation for Fuel Cell Manufacturing, and Competition Scoping Workshop: Wednesday...
To find out more about fuel cell and hydrogen activities within the EG&S KTN, please contact:
E: [email protected] , [email protected]
T: +44 (0) 1223 96 9790
T: +44 (0) 2032867816
|
<urn:uuid:0ea48d91-ab57-46a1-bf57-97b0d9ac5a4c>
|
CC-MAIN-2020-16
|
https://connect.innovateuk.org/web/fuel-cells-and-hydrogen
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00001.warc.gz
|
en
| 0.914848 | 423 | 2.765625 | 3 |
State Health Commissioner Warns that West Nile Virus Risk Remains
Virus Found in Increasing Number of Mosquitoes in New York City and Nassau and Suffolk Counties
ALBANY, N.Y. (August 5, 2010) — State Health Commissioner Richard F. Daines, M.D., today warned that West Nile Virus remains a risk and urged New Yorkers to protect themselves from mosquito bites after the virus was found in mosquitoes in New York City and Long Island at higher levels that is normally seen by this time of the summer.
"A warm, dry summer is triggering an increase in West Nile Virus in the mosquito population earlier than expected," Commissioner Daines said. "Nassau and Suffolk counties, as well as New York City, recently have detected West Nile Virus in mosquitoes at much higher rates than they have seen in the past several years at this time of the summer. In addition, there are a number of preliminary reports of possible human cases in Nassau and Suffolk counties that are being investigated."
While the virus can infect individuals of all ages, those over the age of 50 are at higher risk for severe disease. In the vast majority of cases, West Nile Virus is spread to humans through the bite of an infected mosquito. Commissioner Daines reminded all New Yorkers to remain vigilant by taking precautionary measures to protect themselves from West Nile Virus and the potential for serious illness.
Last year, more than 6,800 mosquito pools from across the State (excluding New York City) were tested, and 60 were positive. To date in 2010, with only 3,770 pools tested across the State, Nassau County already has 31 positive pools, and Suffolk County has 38. West Nile Virus usually increases in mosquitoes through the summer, so these early elevated levels are raising concerns that levels could go much higher in coming weeks, leading to increased risk of disease in people.
In response to Nassau County's request, Commissioner Daines has issued a threat declaration for Nassau County. The declaration enables Nassau County to more easily implement mosquito control measures in otherwise protected wetland areas and it simplifies the public notification process. In addition, the declaration will provide enhanced reimbursement payments should the County exceed its allocation for the season.
Both Nassau and Suffolk counties have been following integrated mosquito management principles, working to control breeding areas and applying larvicides to minimize the number of mosquitoes. These counties are currently applying chemicals to kill adult mosquitoes and are expected to do this over wider geographic areas. West Nile Virus also has been found in mosquitoes in Erie and Onondaga counties.
Although many counties perform aggressive mosquito control, New Yorkers should also take steps to protect themselves and their families from illnesses caused by mosquitoes, including wearing long-sleeved shirts and long pants to protect the skin and avoiding the outdoors during the peak mosquito activity periods between dusk and dawn.
The following precautions can decrease the risk of mosquito bites and reduce mosquito breeding sites:
- Dispose of all water-holding containers, including tin cans, plastic containers and ceramic pots.
- Remove all discarded tires on your property. Used tires have become one the most common mosquito breeding grounds.
- Drill holes in the bottom of recycling containers that are kept outdoors.
- Make sure gutters drain properly, and clean clogged gutters in the spring and fall.
- Turn over plastic wading pools and wheelbarrows when not in use.
- Change the water in bird baths at least every four days.
- Clean and chlorinate swimming pools, outdoor saunas, and hot tubs.
- Drain water from pool covers.
- Use landscaping to eliminate stagnant water that collects on your property; clean up leaf litter and similar organic debris.
- Make sure that all doors and windows have screens and that the screens are in good repair.
The federal Centers for Disease Control and Prevention recommend applying insect repellent containing DEET, Picaridin, or Oil of Lemon Eucalyptus for protection against mosquito bites. It is important to always follow the label directions when using insect repellent.
Facts about West Nile Virus in New York State:
- Since 1999, there have been 389 human cases of West Nile Virus in New York State.
- In 2009, there were seven human cases in the State, including New York City.
- Since 1999, the State Department of Health's Wadsworth Laboratory has tested more than 72,000 mosquito pools for the virus.
To learn more about West Nile Virus, please visit the Department's Web site at http://www.nyhealth.gov/diseases/west_nile_virus/.
|
<urn:uuid:31a8cb87-3363-4549-b348-30cf61b2722e>
|
CC-MAIN-2014-23
|
http://www.health.ny.gov/press/releases/2010/2010-08-05_comm_warns_west_nile_virus_risk_remains.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877693.48/warc/CC-MAIN-20140722025757-00048-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.943734 | 951 | 2.546875 | 3 |
Five new research projects announced today (27 September) by the Biotechnology and Biological Sciences Research Council (BBSRC) aim to overcome some of the fundamental limitations of photosynthesis the process by which plants harvest energy from the sun. This research could lead to major increases in crop yields for food, bioenergy and the production of renewable chemicals.
Just over 2M has been provided for these projects which complement four funded last year via an 'Ideas Lab' in collaboration with the National Science Foundation in the USA.
Together, the nine research projects span the whole photosynthetic pathway, from the shape of the crop canopy and the structure of individual leaves through to light capture at the molecular level and the production and storage of sugars.
The world faces significant challenges in the coming decades, and chief among these are producing enough sustainable and affordable food for a growing population and replacing diminishing fossil fuels. Even a small change to the efficiency of photosynthesis the process by which plants, algae and some bacteria use the sun's energy to make sugars could allow for considerably increased yields for food and bioenergy crops and so could make a huge impact on these problems.
Science Minister David Willetts said: "Food security is an important issue for governments and researchers worldwide, and it's great to see UK scientists contributing to such a valuable body of international research. If we can gain a better understanding of the scientific processes underlying food production, we are a significant step closer to being able to support an increasing global population in future."
Biochemist Professor Richard Cogdell FRS from the University of Glasgow acted as a mentor for the Ideas Lab and was a member of the assessment panel for this call for applications. He said "Trying to improve photosynthesis is challenging both scientifically in itself an
|Contact: Mike Davies|
Biotechnology and Biological Sciences Research Council
|
<urn:uuid:2a091bb0-ff36-4ecf-b1da-60d7813e90a6>
|
CC-MAIN-2014-23
|
http://www.bio-medicine.org/biology-news-1/Research-to-improve-photosynthesis-for-increased-food-and-fuel-production-21521-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776432195.33/warc/CC-MAIN-20140707234032-00025-ip-10-180-212-248.ec2.internal.warc.gz
|
en
| 0.929623 | 373 | 3.140625 | 3 |
The Pink Tower was designed by Dr. Maria Montessori and it still remains unchanged throughout all the 100 years and is a must have materials in all Montessori classrooms.
Anyone would just look at the Pink Tower and say ‘it’s just a stack of blocks’.
I have been asked so many times , so why pay so much for just a stack of blocks. Just buy blocks that cost just a fraction of the price and it can serve the same purpose.
But only those who have worked with this material will know that it’s actually so much more than just blocks.
The Pink Tower is a scientifically designed material in the Sensorial Area of the classroom or environment. Dr. Montessori believed that working with the Sensorial materials enables the children to refine their senses, have a clearer understanding of what they are seeing, feeling, touching or smelling, and helps with the development of intelligence.
Importantly, the cubes in the Pink Tower are all the same colour, shape and texture. This helps the child to focus on one important quality of the material which is size!
The Pink Tower aims to refine a child's visual sense by discriminating differences in dimension. As a child starts taking each cube (starting from the smallest) to a mat, they can feel the weight and progression of its size. As they build the Tower, they refine their voluntary movement. The child learns self-control by doing the activity precisely and exactly.
When a child first attempts to build the Pink Tower, they may not be able to do it exactly right, they may not be able to control their movements yet. Through repetition and development of their hand-eye coordination, the child is able to make their hands move in a precise way. This is the key to self-control. When the child masters the skill, they master themself, by mastering their actions.
Using their visual perception, the child can self-assess whether they’ve built the Tower in order. This control of error helps the child realize what’s wrong and correct any mistakes. Through this, the child grows more independent and confident.
|
<urn:uuid:1fb09feb-9cfb-4789-aeca-3d776c4196bc>
|
CC-MAIN-2023-14
|
https://righttolearn.com.sg/blogs/montessori-for-infants/montessori-activities-sensorial-materials
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00078.warc.gz
|
en
| 0.960311 | 437 | 3.34375 | 3 |
RELEASE: New Study in Nature finds governments and researchers have been underestimating the significance of land and diets to reduce climate change
PRINCETON, N.J.— When land shifts from producing corn to soybeans to kumquats, or from cropland to grazing land or bioenergy, or back to forest, does that help or hurt the world’s potential to mitigate climate change? A new paper in the December 13th edition of the journal Nature finds that typical methods used by policymakers and researchers to answer this question have not properly focused on the need to increase the efficiency of land to meet growing demands for both food and carbon storage. This limitation is particularly important because climate strategies require storing more carbon in forests and other native vegetation even as the world must produce 50 percent or more additional food per year.
“The fundamental problem is that policymakers and researchers have not truly confronted the fact that global land area is limited,” says lead author Tim Searchinger, Research Scholar at Princeton University’s Woodrow Wilson School and Senior Fellow at the World Resources Institute. “Using any hectare for one purpose comes at the cost of not using it for another, and these opportunity costs have not been truly counted.”
The paper finds that policymakers have failed to fully count the amount of carbon land could store in forests and other natural vegetation if not needed for food, and also failed to fully count the carbon needed to produce more food. Using a new method called the Carbon Benefits Index, the paper finds that many changes have different or much greater consequences than typically estimated, including:
- Diets: The average European’s diet is responsible for as many greenhouse gases over roughly 30 years (around 9 gigatons per year), as are normally calculated for each European’s consumption of everything else combined, including energy. That is many times more than typical estimates of the climate consequences of food consumption. Shifting from beef, lamb and dairy to other foods would reduce these emissions by 70 percent.
- Grazing: Improving grazing on a hectare of land in Brazil just from poor to medium level quality can increase the world’s capacity to store carbon as much as planting a hectare of forest in Europe or the United States. Many other analyses treat grazing land as expendable.
- Biofuels and Electric Cars: Using ethanol or biodiesel contributes two to three times the greenhouse gas emissions of gasoline or diesel over more than 30 years. By contrast, vehicles using solar-sourced electricity, even using today’s inefficient batteries, produce only a few percent of the greenhouse gases of using gasoline or diesel.
The paper,“Assessing efficiency of changes in land use for mitigating climate change,” was co-authored by Stefan Wirsenius, of Chalmers University in Sweden, Tim Beringer of the Humboldt Institute at Berlin, and Patrice Dumas of CIRAD (Centre de coopération Internationale en Recherche Agronomique pour le Développement (CIRAD).
“Given the need both for more food and carbon storage, if land is good at producing corn and bad at producing forest, we want the land to produce corn but also vice versa,” says Searchinger. “The need is to make more efficient uses of land for all purposes.”
The basic question the paper addresses is which changes in the uses of land contribute to solving climate change by increasing the global capacity to meet both food needs and to store carbon. This calculation can be challenging because land produces such different outputs, so the paper identifies ways to answer the question: ‘how much corn is worth how much kumquats and how much forest?’
The new method finds that the climate value of a kilogram or corn or vegetables can be based on the carbon lost from vegetation and soils to make them. Just as the economic value of such different products as a coat and a taxi ride can be compared based on the costs of producing them, so too can foods be compared to each other and to forests and bioenergy by the carbon costs of producing the foods. Policymakers, food companies and consumers can use this method to determine which changes help or harm efforts to solve climate change.
“It is important to increase both the efficiency of production on land and the efficiency of what we consume, such as what we eat, but it’s equally important that policymakers separate their efforts to influence each,” said Searchinger. “For example, beef is climate-inefficient and people can help the planet a lot by eating less, but so long as people demand beef, farmers can also help the planet by grazing beef more efficiently. Just discouraging a farmer from efficiently producing beef would hurt the climate because some less efficient farmer would likely produce the beef anyway.”
For more information contact Tim Searchinger at [email protected].
|
<urn:uuid:e24a2fa7-efd0-4583-bf9a-69c03f3f1bc5>
|
CC-MAIN-2020-29
|
https://www.wri.org/news/2018/12/release-new-study-nature-finds-governments-and-researchers-underestimating-significance-land-land-diets-reduce-climate-change
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882934.6/warc/CC-MAIN-20200703184459-20200703214459-00238.warc.gz
|
en
| 0.935274 | 1,017 | 3.609375 | 4 |
The first step to being moral is to realize how thoroughly we aren't.Wingerson subtly reminds us of our own shortcomings (read SIN) from this quote onward; I saw several allusions to the plank-in-your-own-eye teaching. To wit:
...[A]nswers [to the questions of what exact moral rules the Nazi doctors broke] do exist, but many people, especially specialists in genetics, don't like to look too closely at them. The answers tend to lead to a mirror.The Nuremberg principles themselves resemble the Ten Commandments, only reformulated specifically for biomedical ethics. They include informed consent without any coercion, an exhortation to use animals or some other means besides humans unless absolutely necessary, minimization of suffering, having risks be at most equal to benefits, and the ability of both researchers and subjects to end the experiment for a broad range of reasons.
Another quote, on examining what made the Nazi doctors do what they did (emphasis in original):
The discomfiting question "How could they have done it?" evokes an even more unpleasant one: "Could we do it?"Further on, in a discussion criticizing "the skewed logic of popular eugenics," is a telling statement that could apply to, among other things, embryonic stem cell research (emphasis in original):
...But this argument [one of the logical flaws] implies that if your science is valid, it is impossible to be immoral - just as some defendants at Nuremberg argued that their only obligation was to carry out the experiments competently. It does not address the question of whether eugenic efforts backed by valid science ought to be considered worthwhile.Finally, Wingerson talks briefly about the Tuskegee syphilis study, "a violation of the Nuremberg Code" (to understate) that took place between 1932 and 1972. Tacked on is a mention of another "of numerous examples" of violations: that "the U.S. Army [in the'50s and '60s] quietly released a chemical [zinc cadmium sulfide] into the air over cities and rural areas of the United States and Canada...in order to test the possible dispersion of biological weapons." Where is that in the history books?
On page 171, less related to the plank-eye motif, is a connection I can't resist, and with which I will leave you (emphasis mine):
[Psychiatrist Robert Jay] Lifton himself, however, did make an evaluation: that Nazi philosophy destroyed the boundaries between healing and killing, that it erased commonly accepted principles of medical ethics and replaced them (often forcibly, using law and police power) with a whole new philosophy of public health. The philosophy meshed perfectly with certain principles of science that had been gaining in popularity for many years, most notably natural selection and survival of the fittest. National Socialism, said Nazi party leader Rudolf Hess at a mass meeting in 1934, "is nothing but applied biology."
|
<urn:uuid:46a43b93-116a-46e8-91ec-33a3eabbf2d2>
|
CC-MAIN-2017-43
|
http://therenaissancebiologist.blogspot.com/2008/06/unnatural-selection-chapter-9.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825154.68/warc/CC-MAIN-20171022075310-20171022095310-00852.warc.gz
|
en
| 0.958763 | 614 | 2.5625 | 3 |
By Sandy Sweitzer, TLC Executive Director
This newsletter — Confluence — is named for the beautiful spot where the Deep and Rocky rivers come together at Triangle Land Conservancy’s White Pines Nature Preserve and join the Cape Fear River. The word conjures up connection, community, coming together. It’s also a spot that regularly floods.
This year, we have experienced another kind of confluence: a pandemic that has laid bare racial and economic disparities, a painful but much-needed racial reckoning, and incredibly destructive storms and wildfires. Each of these was a crisis that had been building on its own, but it wasn’t until they came together to cause a symbolic flood that everyone had to pay attention.
In June, I wrote a statement on behalf of TLC explaining why a land trust would and should care about racial equity. Our first step is to acknowledge that the history of land conservation, the very core of our work, has perpetuated systemic racism. Every acre of land in this country has a long, often unrecognized or forgotten, history of people who lived and worked there. Every acre in this country was stolen from Indigenous people so that white people could build wealth. On most of the land we protect in the Triangle, Black people were enslaved by white people, who benefited economically from this forced labor.
When the conservation movement started, white people removed Indigenous people from their homes to create national parks. Today, Indigenous people live on a fraction of their land, and Black and Brown people own less than 2% of farmland. For decades, white people have dominated the conversations around outdoor recreation and limited access to outdoor space for minority people.
TLC began telling these stories at Horton Grove Nature Preserve, where the trails are named after the descendants of the enslaved people who once lived and worked on that land. For years we have joined Stagville State Historic Site in celebrating Juneteenth with our community, including many descendants of those once enslaved on that land.
The second step is to continue open discussions about race, equity, and inclusion within our own organization (including with you!) and land trust community. Actively working to dismantle systemic racism is the only way TLC can fulfill our mission to bring the benefits of land conservation to every person in the Triangle.
The experience of opening a nature preserve and inviting people to enjoy the respite of public land in the shadow of a slave community pushed us to overcome our guilt, open our eyes and hearts, shift our perspective, and make changes. Several years ago, TLC staff and board began the long journey to become an anti-racist organization. Much of the work has been internal, like staff and board attending workshops, discussions, and webinars, doing our own reading, and changing processes and policies. We have updated hiring and board recruiting processes and incorporate racial equity into our new board and staff orientation and staff work plans.
As a white woman, I have found the process scary, exhilarating, depressing, and inspiring — often all at the same time! Personally, one of the most important lessons I’ve learned is that I’ll make mistakes. Of course, we all will! Just like all Americans (of every race and ethnicity), I’ve been swimming in the water of white dominant culture my whole life. Turning the tide of those floodwaters is central to our mission and will help us become a stronger organization protecting even more land across the Triangle.
Today you’ll see signs of this journey at Bailey and Sarah Williamson Preserve, which is now officially open (!!) with 9 miles of walking and biking trails and two farmers already hard at work. When you visit, please take time to read about the property’s long, complicated history on the signs in the breezeway of the White Barn.
Which brings us to the third step: to use our unique position and resources that we have as a land trust to ensure the benefits of land conservation are shared with everyone in our community. The pandemic has made clear the importance of nature for our wellbeing. We believe deeply that land conservation is critical to a healthier and more vibrant Triangle, but we also know the importance of recognizing the way systemic racism has shut out Black, Brown, and Indigenous people from the land conservation movement. In addition to TLC “regulars,” hundreds of new people have discovered the 44 miles of TLC trail made possible by our members. Many have even become members themselves (Welcome!).
I invite you to join us on the journey to become anti-racist individuals and organizations. On our website you can explore books, articles, webinars, podcasts, and videos TLC staff have found helpful in our journey. Most importantly, I invite you to learn, ask questions, and make mistakes. We can only hope that this confluence of death and destruction will turn into a flood of connection and community.
|
<urn:uuid:42f3f8b6-182a-4d62-a9b0-96627811696d>
|
CC-MAIN-2023-40
|
https://triangleland.org/confluence/join-us-in-our-journey
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00500.warc.gz
|
en
| 0.95972 | 1,001 | 2.515625 | 3 |
How many electrons are in the outer energy level of C? Carbon (Cstart text, C, ending text), as a group 14 element, has four electrons in its outer shell. Usually carbon shares electrons to achieve a complete valence shell, forming bonds with multiple other atoms.
How many electrons are in the outer energy level of F? Fluorine has seven of the eight potential electrons in its outer energy level, which is energy level II.
How many electrons are in the outer fundamental energy level? Note that the outermost level contains only one electron. As an example, a neutral gold (Au) atom has 79 protons in its nucleus and 79 electrons. The first fundamental energy level, which is closest to the nucleus, can contain a maximum of two electrons.
How many electrons are in the external energy? There are at most two electrons per orbital. Electrons in the outermost energy level of an atom are called valence electrons.
How many electrons are in the outer energy level of C? Related Questions
What electrons have the most energy?
Valence electrons are the highest energy electrons in an atom and are therefore the most reactive.
Why the third shell has 8 electrons?
In this sense, the third shell can hold 8 electrons. 4s2 is not the third shell, but the next 10 electrons enter the 3D orbitals that are part of the third shell but appear at the level of the fourth shell. So the third shell can be considered to have 8 or 18 electrons but in total the third shell can hold 18 electrons.
Why do electrons want a complete outer shell?
Atoms want a complete outer shell because it complements all the gaps on the outside. With no gaps, other electrons don’t want to fit into those voids. For example, a noble gas such as neon has a complete outer shell. It does not react with other chemicals because electrons from other chemicals cannot fall anywhere.
Is sulfur crust stable?
Sulfur has the electron configuration of 2,8,6. It must gain two additional electrons to have a stable outer shell. This means that sulfide ions will have two more electrons than protons and will have a negative charge.
How many electrons are in each level?
There are 2 electrons in the first energy level, 8 electrons in the second energy level, 8 electrons in the third energy level, and 1 in the fourth energy level. Explain that after the third energy level has 8 electrons, the next electron moves to the fourth.
Why does adding electrons release energy?
When electrons are added to an atom, the increased negative charge puts pressure on the electrons already present, causing the energy to be released. When electrons are removed from an atom, this process requires energy to pull the electron away from the nucleus. The addition of the electron releases energy from the process.
How many energy levels are there?
The model in the figure below shows the first four energy levels of an atom. Electrons in the I energy level (also called the K energy level) have the least amount of energy. The further away from the nucleus, the electrons at higher levels have more energy, and their energy increases by a constant and discrete amount.
What is the highest energy level?
What is meant by the highest occupied energy level in an atom? The highest occupied energy level in an atom is the main energy level containing the electron with the highest number.
What is the number of electrons equal?
The number of electrons in a neutral atom equals the number of protons. The mass number of an atom (M) is equal to the sum of the number of protons and neutrons in the nucleus. The number of neutrons is equal to the difference between the atomic mass number (M) and the atomic number (Z).
How many electrons are in each energy level of oxygen?
Oxygen has eight electrons. The first two electrons will go in the n = 1 level. Two is the maximum number of electrons for the level, so the other electrons have to go in a higher energy level. The n = 2 level can hold up to eight electrons, so the remaining six electrons will go to the n = 2 level.
What is the maximum number of electrons in n 4?
Here n is the basic quantum number describing the energy envelope. This means that the fourth energy shell can hold a maximum of 32 electrons.
What is a KLMN shell?
K denotes first casing (or energy level), L second casing, M, third casing, and so on. In other words, the KLMN (OP) notation only indicates the number of electrons an atom has with each principal quantum number (n). The SPDF notation divides each shell into its subsections.
Which electrons have the least energy?
Electrons in the first energy level (energy level 1) are closest to the nucleus and will have the lowest energy. Electrons farther from the nucleus will have a higher energy. The electron shell of an atom can hold 2n2 electrons, where n is the energy level.
Which has the higher energy, 5f or 6p?
The correct choice is: (1) 5f>6p>5p>4d (2) 6p>5f>5p>4d or (2) 6p>5f>4d>5p (4) 5f>6p>4d>5p. orbital energy. 6p will have a lower energy than f, due to the lower value of (n + l).
What is the electronic configuration of oxygen 8e -)?
Looking at the periodic table, you can see that oxygen has 8 electrons. Depending on the order of filling above, these 8 electrons will fill in the following order 1s, 2s, and then 2p. So the electron configuration of oxygen will be O 1s22s22p4.
What is the base 8 8 in chemistry?
There is a 2-8-8 rule for these items. The first shell is filled with 2 electrons, the second is filled with 8 electrons, and the third is filled with 8. You can see that sodium (Na) and magnesium (Mg) have two extra electrons. They, like all atoms, want to be happy.
Is the third crust 8 or 18?
The shell closest to the nucleus, 1n, can hold two electrons, while the next shell, 2n, can hold eight, and the third shell, 3n, can hold up to eighteen.
Why does the number of electrons in the third shell suddenly change from 8 to 18?
Explain why the number of electrons in the third shell suddenly changes from 8 to 18 between the element calcium, Ca, and gallium, Ga? Since there are 10 traces between Ca and Ga 8. In the Electron Shells Table Bulletin, complete the lower section to describe the ionic properties of each group.
Why the full outer shell more stable?
An element’s properties are determined by its outermost electrons, or those in a higher energy orbital. Atoms without complete outer shells tend to gain or lose electrons, resulting in a complete outer shell, and thus stability.
What does sulfur do to become more stable?
For a particle to be stable, it must possess eight or eight fully-paired valence electrons. Sulfur would need to gain two electrons in order to achieve an octet configuration. Therefore, sulfur will gain two extra valence electrons.
What does S do to become stable?
The valence shell (the 3s and 3p sublevels) has six electrons, but it needs eight to become stable. So the sulfur atom will gain two electrons to form a sulfide anion with a charge of 2−, with symbol S2−.
|
<urn:uuid:a278c5b7-2abe-47c8-a96f-1904a6ea42e8>
|
CC-MAIN-2023-40
|
https://www.bizzieme.com/how-many-electrons-are-in-the-outermost-energy-level-of-c/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00079.warc.gz
|
en
| 0.914335 | 1,609 | 3.484375 | 3 |
Author: Elisha Kayne
Toward the end of the Yayoi period of Japan, the population had boomed and tension between landowners grew. By the early 3rd century AD, there were more than one hundred communities established in the region known as Yamatai. Though they had established Emperors before this time, infighting amongst families had been raging for almost a century with no formal agreed upon ruler. It was Himiko, a shaman queen, who stepped in and gained control over the kingdom.
Possible Wu Origins of the Yayoi and Yamatai
Most of the historical documentation about the Japanese islands during this time were written by administrators in China during the late Han dynasty and Three Kingdom Period. From 220 to 280, China was divided into three states. The Wei, Shu and Wu. In most of these writings, the lands held by Himiko are referred to as Wa. While many theories exist about the origins of the Yayoi people before reaching Japan, many scholars have accepted a possible connection with the Wu Kingdom located near the Yangtze River. One source of evidence for this is a Kyushu record dating from 450 BC which reads “Wajin the self-named descendants of Zhou.” The ancient Wu were considered a state of the Western Zhou Dynasty from 1,000 BC to 473 BC, which fits well in the timeline of migration of the Yayoi, who began arriving in Japan sometime before 300 BC.
Interestingly, the Chinese word “Wu”, can be translated as shaman or sorceress. In an ancient Chinese dictionary of character meanings (Shuowen Jiezi), the term is described as a “sacrifice; prayer master; invoker; priest”. The Jomon, Yayoi and early Yamato Japanese peoples practiced animism, and shamans played a vital role in the daily survival of their communities. Villagers relied on the ceremonies and rituals of the shamans to ensure successful hunts, agricultural prosperity and personal health.
We know that Himiko was a shaman and elected leader of the Yamatai because of the Records of the Three Kingdoms, written in 297. Inside is an entire section on the “Accounts of the Wa People”, and it states that “The people of Wa dwell in the middle of the ocean on the mountainous islands southeast of Tai-fang. They formerly comprised more than one hundred communities. During the Han dynasty, Wa envoys appeared at the Court; today, thirty of their communities maintain intercourse with us though envoys and scribes.” It goes on to eplain that “The country formerly had a man as ruler. For some seventy or eighty years after that there were disturbances and warfare. Thereupon the people agreed upon a woman for their ruler. Her name was Himiko. She occupied herself with magic and sorcery, bewitching the people. Though mature in age, she remained unmarried. She had a younger brother who assisted her in ruling the country. After she became the ruler, there were few who saw her. She had one thousandn women as attendants, but only one man. He served her food and drink and acted as a medium of communication. She resided in a palace surrounded by towers and stockades, with armed guards in a state of constant vigilance.”
Himiko first sent emissaries to the Wei in 238 to pay tribute to their rulers and establish a political relationship with their leaders. She gifted them with slaves and fine cloth. The Emperor was impressed at her portrayel of loyalty though she ruled a kingdom that was a far distance away. In exchange, he bestowed her with the title “Queen of Wa Friendly to Wei” which was placed on a gold seal with purple ribbons. It was said that her younger brother ran the daily affairs of the state, while Himiko herself remained largely in isolation, heavily guarded by soldiers and attendants.
When she died, a large burial mound was constructed in commemoration, and is the earliest mention of “Kofun” style funerary rites. A new king claimed rulership over the people, but a violent revolt soon followed resulting in more than a thousand casualties. Eventually, a thirteen year old relative of Himiko named Iyo was chosen to be the next shaman queen in succession. The oldest existing Japanese histories, the Nihon Shoki and Shojiki, do not name Himiko, but do describe multiple powerful Empresses from earlier periods. Many debates have ensued to determine the exact historical figure that matches the Wei and Han descriptions. However, modern portrayals of her run the spectrum, from demon conjuring dark magician to sexy seductresses. Her namesake can still be found around Japan in unexpected places, like trains, water taxis, restaurant menus and video games.
0 comments on “The Powerful Shaman Queen of Pre-Classical Japan”
|
<urn:uuid:bc91db96-05f0-4dad-94e9-dbdeec3d9b55>
|
CC-MAIN-2023-23
|
https://hwyn.org/2019/05/19/the-powerful-shaman-queen-of-pre-classical-japan/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00783.warc.gz
|
en
| 0.980293 | 1,009 | 3.3125 | 3 |
Shari Rudavsky, Indianapolis Star
Published 1:30 p.m. ET Nov. 25, 2019 | Updated 1:35 p.m. ET Nov. 25, 2019CLOSE
When HIV exploded in the 1980s, scientists had no idea what was making patients so sick. So, what have scientists figured out since then? We explain.
Just the FAQs, USA TODAYA Northern Indiana hospital is facing legal action after it potentially exposed more than a thousand patients to blood-borne viruses such as HIV and hepatitis by failing to properly sterilize surgical equipment.A lawsuit filed Friday in Elkhart County Superior Court and brought on behalf of a single patient aims to become a class action against Goshen Health.Earlier this month the hospital sent letters to what officials termed a “small portion of surgical patients” who could have been exposed to blood-borne viruses through the unclean instruments from April to September.The problem dates to April, when one of seven sterilization technicians working at the hospital failed to complete one step in a multistep cleaning process of surgical equipment, according to a statement from the hospital posted last week.Goshen Health officials said in a statement that the chance of infection was “extremely remote,” but the letters recommended that patients be screened for HIV as well as hepatitis B and C. The hospital’s president and chief executive officer, Randal Christophel, and chief medical officer, Daniel Nafziger, signed the letter.While the hospital acknowledged skipping a step in sterilizing the instruments, it said in the statement that the equipment did undergo cleaning with chemicals, disinfection with a machine washer or ultrasonic cleaner and high steam temperatures and pressure. However, the lawsuit says that the notification that instruments used during a June surgery “may or may not have been sterile” caused plaintiff Linda Gierek to suffer extreme emotional distress that could continue for years.A single test will not necessarily allay fears of infection, said Steven Alvarez, an attorney with the Alvarez Law Office in Crown Point, which filed the lawsuit. HIV and hepatitis viruses can take months to show up in screening, so those affected may need to undergo multiple tests to ensure that they are healthy.In addition, Alvarez said, it is not just patients who could be affected but their spouses and sexual partners because those viruses can be transmitted through sex.Since learning of the breach in procedure, the hospital has bought new equipment, used in only a few other hospitals, to reduce the chance of human error, Goshen’s statement said. It also set up a call center to help answer patients’ questions about screening.“While the testing and communication goes beyond what may be needed, we want to take every precaution to ensure the safety and well-being of our community,” the statement said. “When we make a mistake, we want our community to be confident that we will not hide from our failure, but take action to correct the error and ensure that it does not happen again.” Contact IndyStar reporter Shari Rudavsky at 317-444-6354 or [email protected]. Follow her on Facebook and on Twitter: @srudavsky.Read or Share this story: https://www.indystar.com/story/news/health/2019/11/25/indiana-goshen-hospital-potentially-exposes-1000-surgical-patients-hiv/4298063002/
Indiana manipulated death report to lure HQ2, Reveal says
Nov. 25, 2019, 4:10 p.m.
1,000 patients potentially exposed to HIV
Nov. 25, 2019, 1:35 p.m.
Buying a home in Greenwood is out of reach for many
Nov. 25, 2019, 9:44 a.m.
IPS cuts ties with Charter Schools USA
Nov. 24, 2019, 6 a.m.
IU can’t fire controversial professor, and not because of tenure
Nov. 25, 2019, 8:59 a.m.
U.S. Rep. Pete Visclosky endorses Buttigieg
Nov. 25, 2019, 12:52 p.m.
|
<urn:uuid:6d8d6f1d-879c-4a70-bd94-16492a774eca>
|
CC-MAIN-2020-29
|
https://bioreports.net/indiana-hospital-sued-after-more-than-1000-patients-potentially-exposed-to-hiv-or-hepatitis-usa-today/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655881984.34/warc/CC-MAIN-20200703091148-20200703121148-00020.warc.gz
|
en
| 0.937218 | 879 | 2.625 | 3 |
Let’s say you ask your partner or child: did you sleep well? What exactly do you mean? What does it mean to get quality sleep?
We’ll answer these questions in this article.
Let’s dive in!
What is sleep quality?
The quality of sleep is characterized by a few important factors.
If you use a fitness tracker or app, you might get something like I did:
On a very good day, you’ll get the breakdown of how you did in the four stages of sleep.
These data are a good start. Let me explain.
There are four cycles or stages of sleep and deep sleep typically occurs around stages 3 and 4.
- Stage 1 (now “N1”): Although you have your eyes closed, you’re also aware of your environment. You have slow eye movement, your body begins to relax and your brain wave activity gradually slows down.
- Stage 2 (now “N2”): Your slow eye movements stop. You’re not easily disrupted and your brain wave activities are still winding down.
- Stages 3 and 4 (now “N3”): Deep and restorative sleep occurs. The brain produces slow waves.
- REM: Your eyes move quickly. Twenty-five percent of sleep is at this stage.
These data only tell us a part of the story of quality sleep.
How do you know if you are having quality sleep?
Let’s dive into some essentials of quality sleep so you get the full story.
1. Number of hours you sleep
One of the important pillars of quality sleep is the hours you sleep.
Sleeping fewer hours leads to sleep debt. Sleep debt is the amount of sleep you need to make up for the sleep you should have gotten.
The National Sleep Foundation gathered some of the brightest leading scientists.
After the scientists reviewed over 300 scientific studies, the researchers found that the hours of sleep a person needs varies based on the age of the person.
In general, the study suggests seven to nine hours of sleep for people above 18 years. Preschoolers, infants, toddlers, and newborns need more hours of sleep.
So you’re only sleeping for about 4 hours each night, your sleep debt each night is 3 hours at the very least.
The concept of sleep debt is similar to any kind of debt. If left unchecked, the debt and its interest compound, and soon, it becomes insurmountable.
According to one study, for each hour of lost sleep, it takes up to four days to recover.
2. Ease of falling asleep quickly
Tossing and turning in bed for hours is not only frustrating. It’s a common sign of several sleep disorders.
The circadian rhythm is our body’s timekeeper for sleep.
And it helps our bodies to respond to environmental cues that inform our bodies to feel sleepy or awake.
When it’s dark, our brain receives the signal to wind down and fall asleep.
One study found that over 40 percent of people with insomnia have trouble falling asleep.
True, most have us don’t fall asleep immediately we get to bed. It takes a few minutes.
3. Level of restorative sleep
There are four stages to our sleep cycle. Stage 3 is the stage where the body restores itself through muscle and tissue repair.
Insomniacs often don’t get enough sleep at this stage. This is why they wake up and still not feel refreshed or rested.
In one study, nearly 50 percent of over 1,000 adolescents reported nonrestorative sleep. And that could lead to more fatigue after waking up.
This lack of restorative sleep is also linked to sleep paralysis. It affects productivity during the day and may impair cognitive ability to do simple tasks.
4. Ability to focus and concentrate during the day
Sleep is not only an end in itself, but it is also a means to another end. This other end is how we perform after sleep.
We not only want to feel refreshed and rejuvenated after sleeping, but we also want to be sharper, more energized, and more productive.
Studies show that insomnia has negative effects on cognitive performance.
This is because of the constant loss of sleep.
One study showed that losing even one night of sleep affects our ability to perform on cognitive tasks.
The post 4 Things to Stop Ignoring If You Want to Get Quality Sleep appeared first on Daily Healthy Body.
|
<urn:uuid:da941372-5475-453c-a4d8-d37f827252c6>
|
CC-MAIN-2020-34
|
https://weightlossradar.com/index.php/2020/07/27/4-things-to-stop-ignoring-if-you-want-to-get-quality-sleep/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738595.30/warc/CC-MAIN-20200809222112-20200810012112-00009.warc.gz
|
en
| 0.943227 | 940 | 2.578125 | 3 |
For my Digital History class last week I was assigned a reading by Angeliki Antoniou, George Lepouras, and Costas Vassilakis entitled “A methodology for the design of online exhibitions.” Generally speaking, the authors have a lot of good ideas for museum exhibit designers, and the article is solid. They correctly point out that when creating a museum exhibit–whether physical or virtual–designers must take into account the audience they want to cater their content to. Within the minds of a museum audience lies a collection of competing desires for learning, entertainment, and socialization from exhibits. These needs drive an audience’s purpose for attending a museum in the first place, and I get the impression from this article that the implementation of digital technology into a museum’s exhibits has brought a sharper focus to the question of how a museum meets the needs of its audience. Whereas museums of the late 19th and early 20th century could often put a large collection of artifacts on display along with a descriptive label to fulfill the museum “experience” (making personal discoveries about the past), modern museum exhibit designers understand that their audiences often seek connections to artifacts through digital technology. Audiences have expectations about what they want to learn and how they want to see information, and finding that correct balance between tangible and virtual must always be on the designer’s mind. Furthermore, designers understand that digital technology has the potential to enhance or harm the quality of their exhibits, depending on how that technology is used.
The authors also attempt to create specific exhibit design methodologies for different types of museums (Zoos, Archaeological, Art, Science, History, etc.). They correctly argue that visitors’ perceptions and expectations of a museum are largely dependent on the type of museum they visit, and that these perceptions will determine whether learning, entertainment, or socialization will be the primary focus of a museum’s physical and digital exhibits. In order to differentiate these museum types, the authors utilize the term museumness in their discussion:
The term museumness is introduced in order to describe visitors’ perceptions on a certain physical or virtual space and whether this space forms a typical museum or not. Museumness does not form a yes or no category; rather it suggests a continuum that different museum types can have higher or lower scores. For example, visitors might consider both an archaeological museum and an art gallery as museums, but of different degree of museumness, since the former collects all the stereotypical characteristics that form the notions of museums and the latter contains fewer of those characteristics.
And now I’m lost.
I understand that there are different types of museums that exist, but what’s the point of giving them higher or lower “scores?” It appears to me that the authors are being contradictory in suggesting that a “typical museum with stereotypical characteristics” even exists while arguing that there are many different types of museums. It is also rather presumptuous to suggest that museums are some sort of static entity that never changes over time. When we speak of “typical museums” and “stereotypical characteristics,” what time period are we referring to? What was the “typical museum” to an average visitor in the 20th Century and what does it mean to us today? What are the “stereotypical characteristics” of a museum, especially when acknowledging the wide diversity of museums that exist? What are the “stereotypes” that visitors hold about museums, and how accurate are those stereotypes in actuality? How can an archaeological museum have a higher degree of “museumness” than an art museum, and why is such a distinction necessary? How can such a point be qualified, quantified, or verified? If, say, a zoo’s primary mission is to entertain, rather than educate, does that somehow make it less of a museum than an art museum? Haven’t museums always sought to entertain their audiences to some degree? Does entertainment somehow cheapen the museum experience?
I could go on, but I digress. In sum, we’ve been given a new term without having it properly defined and explained to us. I have no idea what these people are trying to argue or why I should add the word “museumness” to my lexicon. Again, I understand that different museums have different audiences and different needs that should be filled by the exhibits created by a specific museum, but I don’t know how ranking these museums based on a high or low “museumness” scoresheet helps me accomplish that goal. This article helps us think of ways in which we can create more effective museum exhibits physically and online, but the authors do a poor job of defining the key terms used in their argument, which compromises the overall quality of their essay, in my estimation. If you’re going to use new, revisionist terms in your argument, you must make every effort to define, explain, and clarify to your audience what exactly you’re trying to say.
Perhaps I am missing something here. Any feedback is appreciated.
|
<urn:uuid:7161dc0e-fe03-49a6-93d7-430ad58ede83>
|
CC-MAIN-2017-30
|
https://pastexplore.wordpress.com/2013/02/20/what-does-it-mean-to-have-museumness/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426629.63/warc/CC-MAIN-20170726202050-20170726222050-00591.warc.gz
|
en
| 0.954297 | 1,062 | 2.703125 | 3 |
Can someone verify that this answer is correct? Why do cash flows increase; I thought that depreciation had no effect on the cash flow statement because it is a non-cash expense.
If a company incurs $10 (pretax) of depreciation expense, how does that affect the three financial statements?
This is a fairly common technical question which attempts to test your understanding of how the three financial statements (income statement,, cash flow statement) fit together. Note that you may get some variation of this question (e.g. a number other than $10 or an item other than depreciation). To answer this question, take the 3 statements one at a time.
First, the income statement: depreciation is an expense so operating income (EBIT) declines by $10. Assuming a tax rate of 40%, net income declines by $6. Second, the cash flow statement: net income decreased $6 and depreciation increased $10 so cash flow from operations increased $4. Finally, the balance sheet: cumulative depreciation increases $10 so Net PP&E decreases $10. We know from the cashflow statement that cash increased $4. The $6 reduction of net income caused retained earnings to decrease by $6. Note that the balance sheet is now balanced. Assets decreased $6 (PP&E -10 and Cash +4) and shareholder’s equity decreased $6.
You may get the follow-up question: If depreciation is non-cash, explain how this transaction caused cash to increase $4. The answer is that because of the depreciation expense, the company had to pay the government $4 less in taxes so it increased its cash position by $4 from what it would have been without the depreciation expense.
|
<urn:uuid:30aace35-c6cc-4c0f-b0cd-3f841c6a20ab>
|
CC-MAIN-2013-20
|
http://www.wallstreetoasis.com/forums/accounting-question-help
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701370254/warc/CC-MAIN-20130516104930-00063-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.942967 | 350 | 3 | 3 |
A rare mineral inside the teeth of a chiton, a large mollusk found along rocky coastlines, led to a bioinspired ink for 3D printing and also may one day be used in the emerging field of soft robotics, according to researchers who made the discovery while working at the U.S. Department of Energy’s (DOE) Argonne National Laboratory.
Using Argonne’s Advanced Photon Source (APS), a DOE Office of Science User Facility, a research team from Northwestern University discovered an iron mineral, called santabarbaraite, which previously was only documented in rocks. The finding helped researchers understand how the whole chiton tooth — not just the ultrahard, durable cusp — is designed to endure grazing on rocks to feed.
“Having access for these experiments was incredibly invaluable. And there was no other location that offered what we needed.” — Derk Joester, associate professor of materials science and engineering at Northwestern University
The rare mineral was discovered with the use of the APS, which produces ultrabright X-rays that can penetrate thick samples of material. Two different X-ray methods provided a detailed and accurate determination of the mineral’s properties. It was exactly what the team required to make the discovery, said Northwestern’s Derk Joester, one of the researchers and an associate professor of materials science and engineering in Northwestern’s McCormick School of Engineering.
“Having access for these experiments was incredibly invaluable,” said Joester of working at APS. “And there was no other location that offered what we needed.”
Santabarbaraite was only previously observed in geological specimens in very tiny amounts and was never seen in a biological context. It has high water content, which makes it strong with low density. The discovery led to using this mineral to create an ink that can be used for 3D printing of durable materials. The ink is for composites that have hardness and stiffness in the range of such materials as concrete, brick, glass, carbon fiber reinforced plastics or stainless steel. In the future, it could be used in the emerging soft robotics field, which includes new technologies ranging from space devices for NASA to prosthetics for humans.
“Just use your imagination,” Joester said.
The research team’s findings were published in the Proceedings of the National Academy of Sciences of the United States of America.
The group used many different X-ray methods at the APS, and they all pointed to this same unusual mineral, said Matt Newville, a University of Chicago research associate professor and beamline scientist at the university’s Geo Soil Enviro Consortium for Advanced Radiation Sources (GSECARS). He was also acknowledged for his work in the article.
“Another amazing part of this work is that at the APS we have all of these very sophisticated instruments that are the result of decades or even centuries of steady scientific innovation,” said Newville. “As we use the latest technological achievements, we continue to discover new and amazing things in nature. Whether that’s the molecular structure of the spike protein in SARS coronavirus or that these ancient mollusks can synthesize these very hard materials, we’re still learning chemistry and material science.”
Esen Ercan Alp, a senior physicist at Argonne’s X-ray Science Division and a co-author on the paper, pointed to the APS’s Mossbauer imaging capability, which can give precise information about the chemical, structural, magnetic and time-dependent properties of a material.
“These techniques are available in three other locations around the world, but none of them put it together with a microscope like at the APS,” said Alp.
Joester’s team collaborated with Alp to use the APS, and worked with Paul Smeets, a postdoc working with Joester, to use transmission electron microscopy at Northwestern’s Atomic and Nanoscale Characterization and Experiment (NUANCE) Center.
They found santabarbaraite dispersed throughout the chiton’s upper stylus, a long, hollow structure that connects the head of the tooth to the flexible radula membrane. The stylus is like the root of a human tooth, which connects the cusp of our tooth to our jaw. It’s a tough composite material composed of extremely small nanoparticles in a fibrous matrix made of biomacromolecules, like bones in the human body, according to Northwestern.
Linus Stegbauer of Northwestern, the first author of the study, challenged himself to recreate this material but at a larger scale. To this end, he designed an ink for 3D printing. Stegbauer developed a reactive ink comprising iron and phosphate ions mixed into a biopolymer derived from the chitin. The Northwestern team found that the ink printed well when mixed immediately before printing.
A version of this story was originally published by Northwestern University.
About the Advanced Photon Source
The U. S. Department of Energy Office of Science’s Advanced Photon Source (APS) at Argonne National Laboratory is one of the world’s most productive X-ray light source facilities. The APS provides high-brightness X-ray beams to a diverse community of researchers in materials science, chemistry, condensed matter physics, the life and environmental sciences, and applied research. These X-rays are ideally suited for explorations of materials and biological structures; elemental distribution; chemical, magnetic, electronic states; and a wide range of technologically important engineering systems from batteries to fuel injector sprays, all of which are the foundations of our nation’s economic, technological, and physical well-being. Each year, more than 5,000 researchers use the APS to produce over 2,000 publications detailing impactful discoveries, and solve more vital biological protein structures than users of any other X-ray light source research facility. APS scientists and engineers innovate technology that is at the heart of advancing accelerator and light-source operations. This includes the insertion devices that produce extreme-brightness X-rays prized by researchers, lenses that focus the X-rays down to a few nanometers, instrumentation that maximizes the way the X-rays interact with samples being studied, and software that gathers and manages the massive quantity of data resulting from discovery research at the APS.
This research used resources of the Advanced Photon Source, a U.S. DOE Office of Science User Facility operated for the DOE Office of Science by Argonne National Laboratory under Contract No. DE-AC02-06CH11357.
Argonne National Laboratory seeks solutions to pressing national problems in science and technology. The nation’s first national laboratory, Argonne conducts leading-edge basic and applied scientific research in virtually every scientific discipline. Argonne researchers work closely with researchers from hundreds of companies, universities, and federal, state and municipal agencies to help them solve their specific problems, advance America’s scientific leadership and prepare the nation for a better future. With employees from more than 60 nations, Argonne is managed by UChicago Argonne, LLC for the U.S. Department of Energy’s Office of Science.
The U.S. Department of Energy’s Office of Science is the single largest supporter of basic research in the physical sciences in the United States and is working to address some of the most pressing challenges of our time. For more information, visit https://energy.gov/science.
|
<urn:uuid:62f3090d-5aca-47b4-9803-4f98f92498f1>
|
CC-MAIN-2023-23
|
https://www.anl.gov/article/science-with-teeth-researchers-use-xrays-to-find-rare-mineral-in-mollusk-tooth
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00707.warc.gz
|
en
| 0.932358 | 1,575 | 3.796875 | 4 |
Viewers will be able to scroll around a three-dimensional representation of the gallery with a computer mouse, to look at high resolution images of works such as Las Meninas by Velázquez; The Annunciation by Fra Angelico or The Third of May by Goya.
A Google spokesman said: "The paintings have been photographed in very high resolution and contain as many as 14,000 million pixels (14 gigapixels).
"With this high level resolution you are able to see fine details such as the tiny bee on a flower in The Three Graces (by Rubens), delicate tears on the faces of the figures in The Descent from the Cross (by Roger van der Weyden) and complex figures in The Garden of Earthly Delights (by El Bosco)."
She added of what Google Earth is calling the "Prado layer": "The Google Earth Prado layer also includes 3D models which allow you to fly around the Prado buildings to experience the museum as if you were actually there."
Google Earth is a piece of mapping software that enables web surfers to look at satellite images of almost any part of the surface of the globe.
The company is building more and more applications or 'layers' into the product, enabling it to target viewers with tailor-made advertising.
|
<urn:uuid:05c02f17-8a85-4957-993c-a942721f17ad>
|
CC-MAIN-2014-35
|
http://www.telegraph.co.uk/culture/art/4229375/Google-Earth-launches-online-Prado-art-gallery.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500801235.4/warc/CC-MAIN-20140820021321-00410-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.957125 | 267 | 2.515625 | 3 |
Authorship is a crucial aspect of scientific research, as it serves as a way to credit and recognise researchers who have contributed to a study, while also maintaining the ethics, integrity, and accountability of the research process.
Authorship provides an opportunity for researchers to receive recognition and credit for their contributions to a study. This recognition can be important for career advancement, funding opportunities, and professional reputation. Still, what are the rules for co-authorship?
Following established guidelines
When crediting authors in a scientific article, it is important to follow established guidelines and best practices to ensure that all contributors are appropriately recognised and credited for their work. Here are some general principles to keep in mind:
- Authorship criteria: The International Committee of Medical Journal Editors (ICMJE) has established criteria for authorship that are widely accepted in the scientific community. According to these criteria, authors should have made substantial contributions to the conception, design, analysis, interpretation, or writing of the article. All authors should also take responsibility for the content of the article and agree to be accountable for any issues related to accuracy or integrity.
- Order of authors: The order in which authors are listed should reflect the relative contributions of each author to the work. Typically, the first author is the person who made the greatest contribution to the work, while the last author is often the senior author who oversaw the project. However, it is important to note that there may be variations in author order depending on the norms of the particular field or research group.
- Acknowledgments: In addition to listing authors, scientific articlesoften include an acknowledgments section to recognise contributions that do not meet the criteria for authorship. This may include assistance with data collection or analysis, funding support, or other forms of assistance.
- Conflicts of interest: Scientific articles should also disclose any potential conflicts of interest that may have influenced the research or its findings. This may include financial relationships, employment or consulting arrangements, or other factors that could influence the research.
By following established guidelines and best practices, authors can help to ensure that their work is properly credited and recognised within the scientific community.
Some additional best practices
There are some additional best practices to keep in mind when crediting authors:
- Communicate authorship roles and responsibilities: It’s important for authors to discuss and agree on authorship roles and responsibilities early on in the research process. This can help ensure that all contributors understand their role and are appropriately credited.
- Use a contributorship model: Some journals and research groups use a contributorship model, which allows for more nuanced authorship credit. In this model, authors are listed with specific contributions (e.g. data collection, analysis, writing, etc.) next to their names.
- Consider equal authorship: In some cases, multiple authors may have contributed equally to the work. In these cases, it may be appropriate to list the authors in alphabetical order or to indicate that they contributed equally.
- Ensure accuracy in authorship credit: It’s important to ensure that all authors are credited accurately and appropriately. This may involve verifying authorship roles and contributions with all contributors, as well as ensuring that all authors are included and listed in the correct order.
- Be transparent about changes to authorship: If changes to authorship are made after the article has been submitted or published, it’s important to be transparent about these changes and to provide an explanation for why they were made.
Should PhD candidates be credited?
PhD candidates can be credited as authors in scientific papers, provided they meet the established authorship criteria. The International Committee of Medical Journal Editors (ICMJE) guidelines for authorship, for example, state that individuals who have made substantial contributions to the conception, design, analysis, or interpretation of data for the work may be credited as authors.
In many cases, PhD candidates make significant contributions to the research that is published in scientific papers. They may contribute to the design of the study, collect and analyse data, and help to interpret the results. As such, it is appropriate for them to be credited as authors if they meet the authorship criteria.
It’s worth noting that simply being a PhD candidate or graduate student is not sufficient to qualify for authorship. However, if a PhD candidate has made a significant contribution to the work that meets the authorship criteria, then they should be included as an author. Additionally, it is important to ensure that all contributors to the work are appropriately credited, including PhD candidates and other junior researchers.
Overall, the decision to credit PhD candidates as authors in scientific papers should be based on their contributions to the work, as well as established authorship criteria.
|
<urn:uuid:1cd5c420-da3e-4ab8-a8c9-4cd18ce01191>
|
CC-MAIN-2023-23
|
https://lari.lu/updates/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00025.warc.gz
|
en
| 0.95287 | 961 | 3.15625 | 3 |
The latest news about space exploration and technologies,
astrophysics, cosmology, the universe...
Posted: Jul 10, 2014
New report flags up non-space breakthroughs that could enable future space missions
(Nanowerk News) The European Science Foundation (ESF) has released a new report on 'Technological breakthroughs for scientific progress'. While the sector is known to be a key driver of society-benefiting innovation, both ESF and the European Space Agency are banking on part of its future lying in non-space technologies.
It is no secret that investment in space is a priority in Europe. The ESA and national space agencies have a total annual budget of over EUR 9 billion, whereas some EUR 1.5 billion will be spent in space research under Horizon 2020. A questionable investment? That would be ignoring the fact; for instance, that the United States' GPS was originally designed as a military surveillance system. Now, everyone can access localisation services from a car or a smartphone and the GPS market is expected to be worth USD 26.67 billion (EUR 19.62 billion) by 2016. The same goes for many technologies originally developed for the space sector but ultimately benefiting society as a whole.
In the face of increasingly complex challenges, however, the space sector will need to think outside of the box. And as two (or more) heads are better than one, it might as well cast an eye over innovations in other sectors and seek partnerships.
The ESF report, entitled Technological Breakthroughs for Scientific Progress (TECHBREAK), looks into five challenges or 'overwhelming drivers' the sector is currently facing: reducing mass while maintaining stiffness, building spacecrafts that can last over 50 years, deploying a 30m+ telescope into space, achieving an autonomous geophysical survey of planets and enabling humans to remain in space for over two years - and eventually reach Mars. The report is a result of the joint ESF-ESA 'TECHBREAK' project, the goals of which were to forecast the development of such breakthrough technologies in order to enable novel space missions in the 2030-2050 timeframe and to identify valuable partnerships through synergies with non-space specialists.
Over its 116 pages, the report identifies the current status of research in various domains and flags up innovations to keep an eye on, based on the EU's concept of 'key enabling technologies' (KETs). These include current research in the likes of robotics, hibernation, synthetic life, photovoltaics, flexible electronics, nanomaterials, 3D printing and water purification technologies.
For the European Space Agency, keeping in touch with developments in these areas with appropriate communication channels and further expanding their potential use through joint programmes could be key to meeting the sector's challenges, the ESF concludes.
|
<urn:uuid:e46de3e9-1648-41ba-8536-56eb63d95706>
|
CC-MAIN-2017-43
|
https://www.nanowerk.com/news2/space/newsid=36487.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826049.46/warc/CC-MAIN-20171023130351-20171023150351-00250.warc.gz
|
en
| 0.930945 | 576 | 2.78125 | 3 |
Q. Is mesothelioma a type of lung cancer? I thought so, but my cousin has been diagnosed and he said it isn't.
Mesothelioma is a rare form of cancer which develops in the lining of the chest and lung. It is not lung cancer which is a cancer that normally forms within the lobes and interior structure of the lung and is one of the most prevalent cancers diagnosed today. Being exposed to airborne asbestos particles can increase the risk of mesothelioma. Learn more about mesothelioma through the National Cancer Institute’s Malignant Mesothelioma Treatment (PDQ®).
The Mesothelioma Applied Research Foundation also provides information and patient stories.
If you would like additional information, resources or emotional support, please call 800-813-HOPE (4673) to speak with an oncology social worker at CancerCare.
|
<urn:uuid:ccbc362d-48a1-4627-adc2-8aae6b79ce6a>
|
CC-MAIN-2014-23
|
http://www.cancercare.org/questions/195
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997869778.45/warc/CC-MAIN-20140722025749-00215-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.927361 | 190 | 2.671875 | 3 |
copyright 2013() Freeman Presson, all rights reserved
Stonehenge has probably pulled ahead of Atlantis in the race to inspire the most speculation. The latest article, complete with audio files, demonstrates the acoustic properties of the bluestones which formed the first stone circle erected at the site. Do listen to at least some of the audio: I was wondering if they were exaggerating, but found these stones truly awe-inspiring chimes.
I have noticed that each story written about a new proposed use of Stonehenge claims, explicitly or not, to be the explanation for the stone circles. I don’t know if the seeming tendency to look for a singular explanation is an artifact of reporting and editing, but I am pretty sure that the megalith builders were very intelligent people. They could have had more than one purpose in mind at a time.
If a people are going to put that kind of energy into building something this complex, they are most likely going to put it to various uses. The celestial alignments speak of seasonal festivals; the archaeology hints at a healing center (a Neolithic Lourdes, so to speak); and the acoustics add the likelihood of making the whole plain ring with the prehistoric equivalent of Bach’s organ music.
I find it quite probable that the acoustics and the musical bluestones enhanced both seasonal rituals and healing work. Some stone-age Pythagoras probably figured out the details of what tones to use for what.
Did we lose all of their work in the mists of time, or was some of it carried far away to the Mediterranean, where it could have influenced traditions of which we still hear the echoes?
We don’t know. We don’t know for sure what their spiritual practices were, or anything about their mythology beyond the guess that it was an archetypal ancestor of ours, but we can say that their tech was impressive and imagine that their sensitivity was quite keen as well.
|
<urn:uuid:9fe0997d-3895-4f8f-b2c5-4ec84e471159>
|
CC-MAIN-2014-23
|
http://freemanpresson.wordpress.com/2013/12/14/one-more-stonehenge-clue/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274979.56/warc/CC-MAIN-20140728011754-00366-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.973369 | 406 | 3.015625 | 3 |
Ayurveda is the most ancient medicine which defines a behavioral way to apply to prevent health and cure.
It balances the body through an adapted and personalized lifestyle, but also through the use of plants and other natural remedies.
Ayurveda is incredibly true in its definition of our being and it gives us the keys to live in harmony.
It provides this deconditioning to bring us back to our true self, according to our physical, mental and spiritual needs!
But what is Ayurveda?
Ayurveda, more than 4000 years old and then written in several medical treatises, is both a medicine for all but also a technique of personal development in itself. It has been recognized by the WHO since 1982.
And today we find its procedures in the field of personal development, already defined 4000 years ago! (Meditation, yoga, culture of the present moment…)
It is a holistic and preventive medicine that diagnoses imbalances in the body and mind. These imbalances can manifest themselves as illnesses or other symptoms in the short, medium or long term. It guides you to readjust your lifestyle and be in better health.
Ayurveda is the science of life, it is the health system of eternal India but it is also a knowledge that goes beyond the purely medical sphere.
Ayurveda is a personal and personalized medicine
It gives us access to the understanding of human nature which also integrates the Soul or consciousness.
It is the consciousness that creates the energy and the information that then manifests itself in thought and matter.
Any imbalance in the physical body is a reflection of disturbances in the mental, emotional and environmental levels.
Our lifestyle (stress, lack of peace, rest, clarity of mind and awakening of our consciousness) and our diet are also the causes of our imbalances.
She invites us to dive deeply into ourselves in order to eliminate the cause of these imbalances imprinted in our consciousness and our body and to live the healing.
How Does it work?
Ayurveda defines the pillars of prevention and healing on a daily basis and according to the seasons:
Its pillars of healing are:
– Ahaar: diet
– Vihaar: lifestyle
– Achar: the routine of life
– Vichaar: thoughts
In addition to nutrition, lifestyle, and managing one’s mind, emphasis is placed on methods of cleansing the inside and outside of the body.Ayurveda is the most complete medicine. It prevents, heals and cures the mind. Each prescription is personalized unlike the more standardized allopathic medicine.
Take care of yourself
|
<urn:uuid:e74168f2-8e4e-43a7-9d2d-1ed8dffd6544>
|
CC-MAIN-2023-14
|
http://www.yoga-and-lifestyle-medicine.com/en/home/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00041.warc.gz
|
en
| 0.932794 | 548 | 2.734375 | 3 |
Teaching your child a few simple calm down strategies can make a big difference. The most basic one and perhaps the most important is breathing. Calm down breathing is a skill that is very effective when a child is under stress, struggling with anxiety or having a meltdown.
Deep breathing has been scientifically proven to combat stress and anxiety. It is used in meditation and yoga. With children, calm down breathing is an essential technique to learn to help with self-regulation.
When a child goes into their fight, flight or freeze response, their heart rate increases and their breathing becomes rapid and shallow. This decreases the oxygen to their cells, which obviously does not improve brain function in the moment. This makes it all the more important to practise good breathing technique and get that oxygen flowing well again.
These three calm down breathing techniques are extremely effective and easy to learn.
3 calm down breathing techniques:
- Have your child put their hand on their stomach and feel the rise and fall while they breathe.
- Have them inhale for 4 seconds, trying to fill their “belly balloon” with air, hold the breath for 2 seconds and then exhale.
- Teach them to breathe slowly in through their nose, out through their mouth. The best way to teach this method is to have them make eye contact with you and do it at the same time as you while you give them the verbal cues of “in through your nose” and “out through your mouth”. I find this one especially helpful during a meltdown.
Teaching breathing techniques should be done while your child is already calm and can concentrate. Ideally, if you practise breathing techniques often enough, they become motor muscle memory and will be easier for your child to access during times of distress.
When they are distressed, you can give them scripts (“in through your nose, out through your mouth”, “fill your belly balloon” or “let’s breathe”) to help them along. These should be short and simple.
Blowing bubbles through a bubble wand or doing bubble painting is another way to practise calming breathing so that that motor muscle memory kicks in when those moments of fight-flight-freeze occur. Blowing softly to spin a pinwheel is another good way to practise calm down breathing.
Join me for a free 5 part email series, Little Hearts, Big Worries offering resources and hope for parents.
You can read about other calm down methods for kids here and get the relaxation prompts which are so helpful once your child learns how to use them.
|
<urn:uuid:f048c37b-24ba-4dda-8ab5-b75a3fbe9b3e>
|
CC-MAIN-2020-16
|
https://www.thechaosandtheclutter.com/archives/calm-down-breathing-for-kids
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370508367.57/warc/CC-MAIN-20200402204908-20200402234908-00148.warc.gz
|
en
| 0.960547 | 529 | 3.453125 | 3 |
Rituals, ceremonies, dances and « incantations » were celebrated to « seal deals » with the gods. Whoever broke the law was interfering with sacred circuits and could be sentenced to death. « Uru » (breadfuit), « taro » (yam), « fe’i » (banana plantain) formed the basis of the Polynesians’ diet, out of season of abundance i.e. from April to October, fruits were transformed in paste or fermented and stored in the ground.
This traditional sustainable use plan of ressources disappeared when Polynesian diet was looked down and replaced by imported food from Europe. Only back in 2000, people from Austral islands and Maiao, followed by Teahupoo on the Southwestern coast of Tahiti reinstated the ‘rahui’.
|
<urn:uuid:1f415f2e-422d-404a-b4d0-78489196a23a>
|
CC-MAIN-2023-40
|
https://eimeoclothing.com/rahui-sustainable-management-of-ressources-designed-by-our-ancestors/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00394.warc.gz
|
en
| 0.943994 | 171 | 3.046875 | 3 |
A few weeks ago, we discussed how the Official Poverty Measure has been the standard statistic used to measure poverty in America for the last 50 years. Today, we’ll introduce our second wonky word related to the topic of poverty measurement, the Supplemental Poverty Measure, and discuss why it’s a more comprehensive tool.
The Supplemental Poverty Measure (SPM) was created in 2011 as a complimentary statistic to be used along with the Official Poverty Measure in order to provide a better picture about poverty rates in America. Unlike the OPM, which only looks at a family’s pre-tax cash income, the SPM paints a clearer picture about the actual cash on hand a family has. The SPM assesses a family’s income, excluding expenditures on necessities like food, clothing, shelter, and utilities and expenses like federal and state taxes, transportation, child care, and out-of-pocket health care costs. In effect, the SPM shows what cash a family actually has on hand to make ends meet.
Further, the SPM factors in federal in-kind benefits (like SNAP and TANF cash benefits) and tax credits like the earned income tax credit, all of which help increase a family’s net income and allow them to rise above poverty levels.
So why is the SPM a more comprehensive and appropriate tool to measure poverty today? Statistics are most useful when they can tell a story over time. However, using the OPM alone to understand poverty rates between the 1960s and today is misleading.
The OPM does not take into account any of today’s poverty relief efforts and does not account for different costs of living across the country in the same way that the SPM does. For example, when estimating how many individuals are lifted out of poverty in 2011, the SPM captured about 12,500 more people than the OPM because it accounted for non-cash benefits and tax credits like SNAP and the earned income tax credit, which boost income levels. Therefore, the SPM indicates slightly higher poverty rates in any given year compared to the OPM, but shows greater reduction in poverty rates over time (graph below).
So far, the SPM will not be used to determine eligibility for government programs like SNAP or TANF in the same way that the OPM is. Instead, the SPM will be an additional measure to compliment the longstanding OPM. So the OPM tells us about work and before-tax earnings among low-income families, and the SPM allows us to see whether policies and government programs help families over time. Together they provide a richer insight and hopefully aid in our efforts to alleviate poverty in our communities.
MBPC is a nonprofit organization focused on providing credible and timely research and analysis on budget, tax, and economic issues that impact low- and moderate-income Montana families.
|
<urn:uuid:5c54fd96-308c-4fdf-bb29-818bde147eb9>
|
CC-MAIN-2020-29
|
https://montanabudget.org/post/wonky-word-wednesdays-supplemental-poverty-measure
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886865.30/warc/CC-MAIN-20200705023910-20200705053910-00102.warc.gz
|
en
| 0.934662 | 584 | 3.40625 | 3 |
The World Peace Plan
Our plan for world peace is based on two proven
concepts—the U.S. Constitution and the cooperation of nature. The U.S. Constitution has kept a land of diverse cultures and religions at peace for over 230 years, and nature has functioned perfectly for billions of years, creating a sense of abundance for all.
The World Peace Plan creates an international
government based on fair and equitable practices, an additional layer of government over what already exists. It does not attempt to change what now exists in any country. Change must come from within the country, when the people have evolved to that point that they see the need to change. Every nation,
culture, religion and individual has the right to be respected.
Disputes between nations will be settled in a legitimate and transparent court system rather than the battlefield, and the resources now wasted on war will go to help the people instead.
The power a nation has will be based on its population, which will encourage the governments to turn their focus inside of their country to enable the people to prosper.
The economic structure will be based on win-win agreements, which builds trust and sets the stage for future agreements.
Issues, such as the environment and commerce, will be handled by the departments of the One World Government, taking politics out of the issues.
Shared research will ensure solutions to the issues will be found.
The international government guarantees to every person on the planet our inalienable rights to be able to create our life without interference, to be treated fairly and equally, and have a voice in our government.
Like the plan? Add your name to our affiliate membership list!
|
<urn:uuid:10e1307e-4c99-478a-84f2-eaed8489abdf>
|
CC-MAIN-2013-20
|
http://www.oneworldgov.org/home.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703298047/warc/CC-MAIN-20130516112138-00089-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.945714 | 344 | 3.1875 | 3 |
Habeas corpus: Usually the last legal effort by a prisoner after all appeals are exhausted to challenge the authority of the prison or jail warden to continue to hold him. The prisoner is given a chance to argue his case on the grounds of illegal confinement if the judge grants the “writ of habeas corpus.”
Homicide: the crime of murder; killing of another human being.
Hearsay: Statements by a witness who did not see or hear the incident in question but heard about it from someone else. Hearsay is usually not admissible as evidence in court.
|
<urn:uuid:3da5b7a5-492a-44d0-896b-987431316271>
|
CC-MAIN-2013-20
|
http://www.consultwebs.com/glossary/glossary-of-criminal-defense-terms/H
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706624988/warc/CC-MAIN-20130516121704-00016-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.957543 | 122 | 2.796875 | 3 |
Electrification has become popular term within the renewable energy industry. This is due in part to its significant and powerful capabilities. With the right resources, electrification has the potential to alleviate the impacts of climate change. As electrification becomes more prevalent, it is important to understand what it means and why it matters.
What is electrification?
Electrification is the process of replacing technologies that use fossil fuels such as coal, oil and natural gas with technologies that use electricity generated from renewable sources to produce clean energy. Clean energy used in this process can come from renewable sources like wind or solar power.
Why is electrification important?
Electrification is important because of its potential to reduce carbon dioxide emissions and thereby decarbonize the economy and mitigate climate change. Transportation, building and industrial (such as steel mills) sectors account for the majority of greenhouse gas emissions the U.S. Implementing electrification has the power to reduce emissions in each of these sectors. Electrifying vehicles, building heating and cooling systems and industrial processes are small steps that can be taken towards decarbonizing the planet.
Decarbonizing key economic drivers and therefore the economy describes the phasing out of the use of fossil fuels that produce carbon dioxide emissions in major industries. This is an important step towards a net-zero economy which is a current goal the U.S. is striving towards. Decarbonizing does not mean zero carbon emissions, but that whatever carbon is emitted is offset or taken back out of the atmosphere with environmental efforts.
Benefits of electrification
This process provides many benefits for the environment, country and the people implementing it. As for the environment, reducing carbon emissions from transportation, building, industrial and other sectors where fossil fuels are used today will help to combat climate change and work towards net zero carbon emissions.
For the good of the country and community, the electrifying process will also create more jobs, especially in the transportation and building sectors. For example, a transition to all-electric buildings in California is predicted to create over 100,000 full-time equivalent jobs in various economic sectors.
People, organizations and businesses stand to benefit from cost savings due to reduced energy use by electrified technologies. Some examples of efforts include electrifying vehicle fleets such as school buses and replacing gas water heaters with electric water heaters.
Interested in electrifying your facility?
If you are interested in electrifying your facility, consider partnering with EnergyLink. Our team are experts in design, build and funding stages and will be an asset to you in your next renewable energy endeavor. To get started on an electrifying renewable energy project click the button below and see if you qualify for a free energy audit. Once the energy audit is complete a full building analysis will be conducted to explain areas of weakness in your facility’s energy use and ways to improve. If you’d rather speak to a team member, dial (866) 218-0380.
|
<urn:uuid:85f631fa-dd3e-4e74-b13b-edc12aa25c7f>
|
CC-MAIN-2023-23
|
https://goenergylink.com/blog/why-is-electrification-important/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644907.31/warc/CC-MAIN-20230529173312-20230529203312-00114.warc.gz
|
en
| 0.939807 | 598 | 3.59375 | 4 |
Night, Night! Dr. Hull's Common Sense Sleep Solutions©
Help for sleepless parents
Unlimited personal help
Head lice (pediculosis capitis) is an infestation of the scalp and hair with, well, lice. They are small but in contrast to the scabies mite can be easily seen with the naked eye. What people usually notice first is the nits, or little white egg cases the louse leaves glued to the hair shaft. The infestation is very common in the winter months among school age children. (They put their coats in the cloakroom and the lice crawl from coat to coat.)
Parents and teachers generally freak out at the thought of lice but they are a nuisance, not a plague. The head louse does not transmit any serious diseases. (It is doubtful they transmit any human diseases at all - that role is played by the body louse, a different critter.) Treatment of head lice is straightforward: kill the buggers and all their children. We once used lindane, an insecticide, on the scalp. It is still available, however this chemical does a poor job of killing the eggs (nits) and it has been associated in rare cases with brain toxicity in small children when greivously misapplied.
Prescription Ovide® (malathion) is significantly more effective than lindane or permethrin pediculicides such as Nix®. It has the disadvantage of being significantly more expensive than permethrin-based treatment, and because it is an organophosphate insecticide, there is at least some concern about safety for use on children under 6. Nix®, Rid®, or A-200 Pediculicide®, are permethrin pediculicides available without prescription.
To get a formerly louse-infested child back in school, you've got to generally get the nits out of the hair - not because of danger of infestation, but because the school usually has a rule of zero tolerance for nits, whether they are live eggs or just the "empties." For that you need either Step 2® nit removal system or plain distilled white vinegar - either one will dissolve the glue that keeps the nit on the hair shaft and allow you to more easily comb them out. You will need a special nit comb to do that. (By the way: remember that any nit more than 1/8 inch from the scalp on the hair shaft is EMPTY and not infective.)
Cleaning up the house is important for getting rid of head lice. This includes spraying the sofa cushions, washing the bedding, spraying any hats worn, boiling combs and brushes or throwing them away.
Resistance to permethrins and even malathion has become common in most parts of the country. Here are some other ways I have read about to kill these resistant lice:
Sometimes, things that appear to be nits are not. In head louse outbreaks, teachers and school nurses may send home children with anything in the hair that remotely resembles a nit. Examination under magnification easily identifies these "pseudonits." These hair and scalp conditions (humorously referred to as zebras) that are sometimes confused with nits include
Now, to get even more information than you ever thought possible (and even stuff and gadgets like the LiceMeister® nit comb) hop to the National Pediculosis Association Homepage. Isn't the Internet grand!
I have read of a library louse that infests old decaying books and can get on humans. It is picked up, naturally, at the library and is killed by Nix but keeps coming back until someone thinks to check the library.
|
<urn:uuid:613ab28c-5d31-4867-bb78-2ced47580dfd>
|
CC-MAIN-2014-23
|
http://www.drhull.com/EncyMaster/L/head_lice.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270313.12/warc/CC-MAIN-20140728011750-00348-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.951267 | 769 | 2.6875 | 3 |
Nowadays, the kids are pretty curious about things associated with technology. There is no doubt that anything related to the robot will capture their interest as well. In fact, making the kids closer to technology will not bring any bad effect at all. In the future, there will be more technologies which will be involved in a human’s life. Meanwhile, the kids can really have fun with the robots so there is nothing wrong to consider the robotic kits below as the gift for the kids. It can be a perfect way not only for improving the basic building as well as programming skills but also for stimulating creativity.
The Smithsonian’s Robotic Spider Kit
Some parents might have a big question about the right time for introducing the kids to the robotic technology. In fact, the kids actually can know this technology as soon as possible. The robotic spider kit by The Smithsonian can be a great way for introducing the kids to this technology. It is perfect for beginners in the robotic world. It can be given to the kids from age six. They will have fun learning more about the way the robotic joints work. All that they have to do is just assembling the robot kit. Next, they can turn on the motor and the robot can move. There will be eight multi-jointed legs which can be found from the assembled robot. The movement of the robot will be pretty similar to the real spiders walking motions. That is why it is important to pay attention carefully for the kids that have arachnophobia.
4M Doodling Robot
The robot might have a very close relation to the engine but it does not mean that it cannot be associated with something artistic. The kids surely will love the mechanical artist which they can build. They will love 4M Doodling Robot as a gift not only because they love robot but also because they love doodling very much. This robot is considered pretty simple for the beginners started from age eight. With this robot, they will be able to figure out various things on their own. They can adjust the pens height and angle on the robot. That is why they will be able to create various designs by making those adjustments with the robot.
The littleBits Star Wars Droid Inventor Kit
When reading the name of this robot, there is no question that the big fans of Star Wars will get interested in the product right away. However, the robotic enthusiast who loves robot will be attracted to the robot as well. It is getting more interesting because this robotic kit wins the 50-plus toy awards. There must be something special which can be found from this robot. The inspiration of this robot can be found from the movie after all. The design is taken from R2-D2. It will be a great gift for the kids because the droid can be brought to life. At the same time, the kids will also learn about the coding skills based on the block. By using the app on the smartphone, the kids will be able to be the C-3P0 for the robot which can be their new friend.
ELEGOO UNO Smart Robot Car Kit
The toy car is brought further with the robotic technology. There is no doubt that the toy car becomes one of the most favorite toys for the kids but there might be too many cars in their toy box already. That is why giving ELEGOO UNO Smart Robot Car Kit can be considered when people are looking for the special gift for the kids. This is the toy car which is perfect for the EV generation of self-driving. The kids will get the opportunity for programming Arduino when building the robot car. Building the toy car is not the only interesting activities which can be done by the kids with this product. They even can control the car to move once it is assembled.
The movement control of the robot car will be done through Bluetooth. In fact, this car can get more and more sophisticated. There is no need to worry that the robot car will be broken or damaged when it is controlled by the kids. It comes with the smart mode after all. When it is turned on, the smart mode will help the robot car to detect the obstacles. It means that it will also automatically avoid them. There is no need to worry about the damage to this precious robot after all.
|
<urn:uuid:9cb0fa8f-1a0b-42f8-b514-e5b92167d2e7>
|
CC-MAIN-2020-10
|
https://www.techupdatepro.com/2019/01/24/robotic-kits-for-kids-gift/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145708.59/warc/CC-MAIN-20200222150029-20200222180029-00023.warc.gz
|
en
| 0.962741 | 874 | 2.953125 | 3 |
Introduction to Mathematical Programming: Applications and Algorithms: Volume 1
Wayne L. Winston
4 Rev ed
Authors Wayne Winston and Munirpallam Venkataramanan emphasize model-formulation and model-building skills as well as interpretation of computer software output. Focusing on deterministic models, this book is designed for the first half of an operations research sequence. A subset of Winston's best-selling OPERATIONS RESEARCH, INTRODUCTION TO MATHEMATICAL PROGRAMMING offers self-contained chapters that make it flexible enough for one- or two-semester courses ranging from advanced beginning to intermediate in level. The book has a strong computer orientation and emphasizes model-formulation and model-building skills. Every topic includes a corresponding computer-based modeling and solution method and every chapter presents the software tools needed to solve realistic problems. LINDO, LINGO, and Premium Solver for Education software packages are available with the book.
Out of Stock
Sorry but this item is out of stock, please check back again soon.
|
<urn:uuid:07b6cf41-fb6e-484c-9ac7-83b28aa7c0b0>
|
CC-MAIN-2017-26
|
https://www.zookal.com/introduction-to-mathematical-programming-applications-and-algorithms-volume-1-9780534359645/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00484.warc.gz
|
en
| 0.865307 | 222 | 2.53125 | 3 |
Discover the cosmos! Each day a different image or photograph of our fascinating universe is featured, along with a brief explanation written by a professional astronomer.
2004 March 19
Explanation: Dynamic jets of gas and dust surround one of the most active planetary surfaces in the solar system in this wild-looking picture of a comet nucleus. The comet's designation is 81P/Wild 2 of course (sounds like "vilt 2"), and the picture is a composite of two images recorded by the Stardust spacecraft's navigation camera during its January 2nd flyby. The composited images consist of a short exposure recording startling surface details of Wild 2's nucleus and a longer exposure, taken 10 seconds later, revealing material streaming from the surface. The left edge of the nucleus appears extremely jagged due to a strong shadow. Pitted and eroded after billions of years of outgassing and meteorite impacts, the nucleus pictured is only about 5 kilometers in diameter, while the jets of dust and gas ultimately leave trails millions of kilometers long. Stardust is scheduled to return samples of Wild 2's cometary dust, picked up during the flyby, to Earth in January 2006.
Authors & editors:
NASA Web Site Statements, Warnings, and Disclaimers
NASA Official: Jay Norris. Specific rights apply.
A service of: LHEA at NASA / GSFC
& Michigan Tech. U.
|
<urn:uuid:937b3f24-4982-4e68-b37c-2b2936b570e9>
|
CC-MAIN-2013-48
|
http://apod.nasa.gov/apod/ap040319.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164754111/warc/CC-MAIN-20131204134554-00065-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.917076 | 286 | 3.75 | 4 |
Over the span of January to March, in response to the worldwide spread of coronavirus (COVID-19), U.S. citizens say they are now increasing their awareness about the virus and finding ways to prevent its spreading. World health officials place the total number of infected persons at over 100,000 people with over 3,802 deaths. In the United States, the Centers for Disease Control and Prevention has reported around 400 cases in 33 states, with 21 deaths. The states with the most cases reported are Washington State, New York, and California. As of the first week of March, no known cases have been reported in Louisiana, however, in neighboring Texas, there have been eight reported cases of positive testing.
“The coronavirus is honestly scary. There is no telling how and when the virus can be spread to our city,” said Christina Williams, an Uptown, New Orleans resident and youth mentor. “Nor is there a way to know what has caused this virus,” Williams said, adding that: “The fact that this virus could come, and people not know about it is nerve-wrecking.”
Workers in the city said that many workplaces have restricted travel for employees, and schools have sent notifications to parents of the possible threat that the virus poses, and to encourage enhanced hygiene.
“We just finished Mardi Gras season with hundreds of thousands of people visiting our city. I pray that no one has brought the virus here,” said Tyler Townsend, a senior biology major at Xavier University of Louisiana, who is a native of Los Angeles, Calif. “It’s like we were an open target for the coronavirus,” Townsend said, given the city’s many festivals and events that attract tourists from all over the world. “I am ready for the coronavirus, but it is no secret that I am still nervous about it as well,” he added.
The increase in concern about the spread of the virus to each state has led to a shortage of face masks, hand sanitizers and household cleaning products at major retail outlets in the city, residents noted.
“The coronavirus is real and spreading, but I don’t really know what more there is for me to do except playing my part by washing my hands and being mindful of my daily activity in terms of hygiene,” said Shania Campbell, a Dillard University student. “People are afraid of this virus, but in reality, there are so many other dangers at hand. Everything needs awareness, not just this,” Campbell said.
While some residents said they are taking new precautions, others said they are used to preparedness and disruptions to the routine that come with other hazards the city faces each year.
“Being the normally hygienically aware individual that I always am, any other efforts are speculative at best,” said Percy Marchand, a Mid-City resident and business owner. “Also, I am stocked up on goods just in case, but again, living in New Orleans, we are always stocked up and prepared for a disaster,” Marchand said.
Residents said they felt some attention has been taken away from yearly viruses such as the flu, which is the more prominent virus of the two. For Louisiana, while there have not been any reported cases of the coronavirus, the virus is still being spread in the midst of influenza season, which runs from October to April. Last year, state officials reported that there were 14,000 hospitalizations and around 1,400 deaths from the flu.
“Honestly, I’m not really worried about the virus. To me, it’s just another running case of something to be worried about,” said Ernest Lumpkins, an Uptown New Orleans resident. “Every year, it’s something different. Before it was the Swine Flu (H1N1), now it’s this. This doesn’t bother me at all,” Lumpkins added.
Still residents said they will continue to take steps to protect themselves and their families.
“All measures of safety are appreciated. This is a serious time and nothing to play with,” said Marianne Alexis, a New Orleans East resident. “You can never be too safe. I take precautions every day by washing my hands and being aware of my surroundings,” Alexis added.
|
<urn:uuid:32744d1f-22a2-4d1c-85f0-3ab4f06c3576>
|
CC-MAIN-2023-40
|
https://ladatanews.com/new-orleans-residents-respond-to-the-spread-of-the-coronavirus/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00508.warc.gz
|
en
| 0.970279 | 927 | 2.796875 | 3 |
The Importance of Vacuuming
Vacuuming is an essential part of household cleaning that is often overlooked. Many people still rely on traditional vacuum cleaners, which can pose health hazards and do not provide the thorough cleaning that is required. Dust is a major allergen, and traditional vacuum cleaners can leave it behind, adversely affecting air quality and causing respiratory issues.
Regular vacuuming can provide many benefits for your health and the cleanliness of your home. By vacuuming often, you can remove dirt and dust that accumulate on carpets, rugs, and other surfaces. This not only makes your home look clean but also helps to maintain a healthy environment. It is important to note that improperly vacuuming can worsen the indoor air quality in your home, which can cause health issues, especially for individuals with asthma or allergies.
Some traditional vacuum cleaners can cause more harm than good. For instance, higher energy consumption or loud noise can cause stress or even disturb the peace in the household. Additionally, some of them fail to get into tight spaces, leaving some areas of the house unclean. Others are inefficient at cleaning carpets and rugs, which are some of the most common breeding grounds for dust mites and other allergens.
Consequently, switching to a smart vacuum cleaner can significantly improve the quality of air in your home and keep health hazards at bay. It can effectively remove dust particles and other contaminants, such as pollen or pet dander, from your floors and other surfaces. Its advanced features allow it to navigate tight spaces and provide precise cleaning. And since there is no need to handle dust and debris, smart vacuum cleaners are overall more hygienic and cause less physical strain.
Vacuuming offers a lot of benefits for both the environment and our health. With smart vacuum cleaners, the process becomes more effective, less stressful, and more accessible for everyone. Smart vacuum cleaners are an excellent investment to make, delivering long-term benefits for your home and saving time on cleaning activities.
Health Hazards of Traditional Vacuum Cleaners
It might come as a surprise to many, but traditional vacuum cleaners may not be as beneficial to our health as one might think. In fact, they can pose several health hazards that can impact our well-being in many ways. From air pollution to the spread of allergens, traditional vacuum cleaners can cause more harm than good. Let’s take a closer look at some of the health hazards associated with conventional vacuum cleaners.
Breathing fresh air is one of the most essential things for good health. However, indoor air can be more hazardous than the outdoor air we breathe. Traditional vacuum cleaners contribute to this problem by dispersing fine dust particles and other pollutants into the air. The air pollution caused by these machines can lead to a range of health issues, including respiratory problems, coughing, and itchy eyes.
To understand the significance of air pollution due to traditional vacuum cleaners, we need to know how these appliances work. Most traditional vacuum cleaners use a bag or filter to trap dust and other particles sucked in from your floors, carpets, and other surfaces. Unfortunately, this process doesn’t catch every particle, and some of them escape back into the air via the vacuum cleaner’s exhaust system.
Additionally, older vacuum cleaners can release harmful chemicals such as lead, mercury, or other toxic gasses during usage. These pollutants can cause serious health issues and can be detrimental to the environment.
To help you sort out the effects of the traditional vacuum cleaner on your health, below is a table that shows the consequences.
|Problem||Effect on Health|
|Increases tiny dust and particle concentration in air||Can cause respiratory problems, coughing, itchy eyes|
|Release of toxic chemicals||Can be detrimental to the environment and your health|
Switching to a smarter vacuum cleaner that uses high-efficiency particulate air (HEPA) filters can significantly reduce the harmful effects of traditional vacuum cleaners on your indoor air quality. HEPA filters capture 99.97% of particles down to 0.3 microns, significantly improving air quality and reducing health risks.
Spreading Dust Mites and Allergens
One of the major disadvantages of traditional vacuum cleaners is that they can do more harm than good when it comes to spreading dust mites and allergens around your home. Dust mites and allergens thrive in carpets, upholstery, and bedding, and when you use a traditional vacuum cleaner to clean these surfaces, they can easily become airborne and spread throughout your living space. This can result in increased exposure to these allergens and dust mites, which can trigger respiratory problems such as asthma and allergies.
Additionally, the filters in traditional vacuum cleaners may not be effective in trapping small particles such as dust mites and allergens. They may not provide adequate protection against these harmful particles, which can eventually cause health issues.
Another issue with traditional vacuum cleaners is that they can actually stir up dust and debris during the cleaning process, making the air quality in your home worse. As dust and allergens are circulated in the air, they can settle into your lungs and trigger respiratory problems. This can be especially problematic for individuals who already suffer from respiratory issues or have weakened immune systems.
However, with a smart vacuum cleaner, these hazards can be avoided altogether. These innovative cleaning devices are designed to contain dust and allergens within a closed system, minimizing their spread throughout your home. Smart vacuum cleaners incorporate advanced technology such as HEPA filters and powerful suction, which ensures that all dust, dirt, and allergens are effectively removed from your indoor environment.
Switching to a smart vacuum cleaner is a wise choice, especially if you or a loved one suffers from allergies or respiratory issues. By reducing the spread of dust and allergens, you can protect your health and breathe easier in your own home.
Indoor Air Quality
The quality of indoor air has been an area of increasing concern for many people. One common culprit for poor indoor air quality is the traditional vacuum cleaner. So why exactly do traditional vacuum cleaners negatively impact indoor air quality?
Here are the reasons:
- Distribution of fine dust particles: Traditional vacuum cleaners tend to distribute fine dust particles in the air when they are being used. These particles can stay suspended in the air for hours, significantly reducing indoor air quality in your home.
- Inefficient filtration systems: Traditional vacuum cleaners often come with inefficient filtration systems, which allow particles like pet dander, mold spores, and dust mites to escape from the vacuum cleaner back into the air, causing respiratory problems and allergies.
- Blowing out dust: Traditional vacuum cleaners have a tendency to blow out dust and debris as they are being used. This is especially problematic for people with allergies or respiratory issues, as this can cause irritation and discomfort.
- Chemicals and fumes: Many traditional vacuum cleaners come with chemicals and fumes that can be harmful to indoor air quality. For instance, some vacuum cleaners emit formaldehyde, benzene, and other harmful chemicals.
All of these factors can contribute to poor indoor air quality, which can cause a range of health problems from allergies to respiratory issues. Switching to a smart vacuum cleaner can improve indoor air quality and contribute to a healthier living environment for you and your family.
When using traditional vacuum cleaners, inadequate cleaning is one of the major health hazards that people often overlook. This is attributed to the fact that traditional vacuum cleaners do not have efficient suction power and filters, therefore, they are not capable of removing small particles from surfaces. Here are some of the reasons why inadequate cleaning can cause health hazards:
|Dirt and Debris Accumulation||When a vacuum cleaner lacks suction power, it is unable to remove dirt, debris, and other small particles from surfaces. This accumulation of dust and dirt can make it difficult for people to breathe, especially for those with respiratory problems such as asthma and bronchitis.|
|Bacterial Growth||When dirt and debris accumulate on surfaces, there is a high chance of it harboring bacteria and other germs. This can lead to the spread of diseases and illnesses among family members and pets.|
|Increased Allergy Symptoms||Traditional vacuum cleaners are not effective in removing airborne allergens such as pollen, dust mites, and pet dander. When these allergens accumulate on surfaces, they can trigger severe allergic reactions, causing sneezing, runny nose, itchy eyes, and even asthma attacks.|
|Decline in Indoor Air Quality||When dirt and debris accumulate on surfaces, they can easily become airborne, reducing the quality of indoor air. This can lead to respiratory problems and worsening of allergies.|
It’s essential to switch to smart vacuum cleaners that have powerful suction and high-efficiency filters to ensure thorough cleaning of surfaces. By doing so, you can significantly reduce the health hazards associated with inadequate cleaning and improve the quality of air in your home.
Physical Health Issues
The use of traditional vacuum cleaners can have serious physical health issues for users. Here are some of the most common problems caused by these types of vacuums:
- Back Pain: Traditional vacuum cleaners are often heavy and require the user to push and pull them repeatedly. This can cause back pain and strain, especially if the user needs to vacuum for an extended period of time.
- Asthma and Allergies: Traditional vacuums can stir up dust and other allergens, aggravating asthma and allergies in some people. This can make it difficult for people with these conditions to use a vacuum without causing respiratory problems.
- Repetitive Strain Injuries: The repetitive motion of using a traditional vacuum cleaner can cause tendonitis, carpal tunnel syndrome, and other repetitive strain injuries, especially in the hands and wrists.
These physical health issues can cause significant discomfort, and in some cases, even lead to chronic problems. Luckily, smart vacuum cleaners offer a solution to these problems. By automating the vacuuming process, they take the strain off your body, requiring minimal physical effort. This can reduce the risk of back pain and other repetitive strain injuries.
Smart vacuum cleaners can filter and clean the air while they work, removing dust, pollen, and other allergens from the air. This significantly reduces the risk of respiratory problems caused by vacuuming with a traditional vacuum cleaner. Switching to a smart vacuum cleaner can be a great way to eliminate physical health issues that may come with traditional vacuuming methods.
How Smart Vacuum Cleaners Benefit Your Health
While we already know that vacuuming is important for maintaining a clean and healthy home, not all vacuum cleaners are created equal when it comes to promoting good health. Traditional vacuum cleaners can actually contribute to a number of health hazards that most people are completely unaware of. This is where smart vacuums come in. By utilizing the latest technology, smart vacuum cleaners offer several benefits that significantly improve your health and overall well-being. Let’s explore these benefits in greater detail.
Better Indoor Air Quality
One major health benefit of using smart vacuum cleaners is the improved indoor air quality that they offer. Unlike traditional vacuum cleaners that tend to circulate and stir up dust and allergens, smart vacuums are designed to capture and contain these contaminants.
Smart vacuums come equipped with highly efficient filters that capture and trap a wide range of tiny particles, including allergens, pet dander, and dust mites. These filters can trap particles as small as 0.3 microns – much smaller than what traditional vacuum cleaners can capture.
By filtering out these particles, smart vacuums help to improve the overall air quality of your home. This is especially important for those with respiratory issues like asthma or allergies, as poor indoor air quality can exacerbate these conditions.
Additionally, many smart vacuums also feature sensors that detect air quality and adjust their cleaning patterns accordingly. This means that they will automatically increase suction power and cleaning frequency in areas where air quality is poor, ensuring that your home remains healthy and clean.
The improved indoor air quality provided by smart vacuum cleaners is a crucial consideration for anyone looking to improve their health and wellbeing at home. By investing in a smart vacuum that can capture and contain allergens and other contaminants, you can create a much healthier and more pleasant living environment for yourself and your family.
Dust and Pollen Allergen Removal
One of the major benefits of using a smart vacuum cleaner is its ability to remove dust and pollen allergens from your home. Here are some of the ways in which it does so:
- Cyclone Technology: Many smart vacuums use advanced cyclonic technology that creates a powerful force to suck up even the finest dust particles and pollen allergens from your floors.
- High-Efficiency Particulate Air (HEPA) filters: These filters can trap up to 99.97% of all particles larger than 0.3 microns. This includes dust, pollen, and other allergens that can trigger allergies and asthma. Smart vacuums with a HEPA filter ensure that these particles are not released back into the air, resulting in cleaner and healthier indoor air quality.
- UV-C Light: Some smart vacuum cleaners use UV-C light technology to kill harmful allergens and bacteria, and prevent them from spreading. The light helps sterilize the surfaces that the vacuum is cleaning, so you can be sure that your home is truly clean and healthy.
- Sensor technology: Many smart vacuum cleaners utilize sensors that detect and focus on areas with higher dust and allergen concentration. This ensures that these areas are given extra attention, resulting in a deeper clean and better removal of allergens.
The dust and pollen allergen removal function of smart vacuum cleaners not only benefits those with allergies or asthma, but also everyone in the household. Eliminating these allergens improves the overall indoor air quality of your home, reducing the risk of respiratory illnesses and enhancing your overall health and wellbeing.
No Need to Handle Dust and Debris
Smart vacuum cleaners have revolutionized the cleaning industry by introducing advanced technologies that eliminate the need for physical labor. One of the significant advantages of smart vacuum cleaners is that they don’t require you to handle the dust and debris manually.
No Risk of Inhaling Dust
Traditional vacuum cleaners require you to remove the dustbin and dispose of the dust and debris manually, which can pose a significant health hazard. Dust and debris contain allergens, bacteria, and viruses that are harmful to your health. Additionally, inhaling dust while disposing of it can cause respiratory problems, especially for people suffering from allergies or asthma. With a smart vacuum cleaner, you don’t have to worry about inhaling dust or other particulate matter while cleaning your floors.
Smart vacuum cleaners come equipped with a dustbin that collects all the dust and debris while cleaning. The dustbin is easy to remove and dispose of, ensuring a hygienic cleaning process. Additionally, many smart vacuum cleaners come with a self-emptying dustbin feature that allows the vacuum cleaner to empty the dustbin into a larger bin or bag, reducing your interaction with the dust entirely.
Traditional vacuum cleaners can create a lot of mess while cleaning, which usually requires additional cleaning using a broom or a mop. Smart vacuum cleaners eliminate the need for such additional cleaning and leave your floors spotless. The dust and debris collected by the smart vacuum cleaner are sealed in the dustbin, preventing any chance of particles escaping while you clean.
Smart vacuum cleaners eliminate the need for manual labor during cleaning and provide a more hygienic and efficient cleaning process. With a smart vacuum cleaner, you no longer have to worry about inhaling dust or spreading allergens while disposing of dust and debris. Choose a smart vacuum cleaner today and enjoy a cleaner and healthier home.
|Eliminates need for physical labor||May be more expensive than traditional vacuum cleaners|
|Reduces risk of inhaling dust and debris||May have a smaller dustbin capacity|
|Provides hygienic cleaning||May require a power source or charging|
|Less mess and additional cleaning||May have a shorter battery life|
Reduced Physical Strain
One of the biggest advantages of smart vacuum cleaners is reduced physical strain, which is especially important for people who suffer from mobility or joint issues. Traditional vacuum cleaners require dragging a heavy and bulky machine around the house, which can be exhausting and painful for some individuals. Pushing and pulling the vacuum repeatedly can lead to muscle strain and soreness. On the other hand, smart vacuums are designed to be compact and lightweight, making them easier to move around and carry from room to room.
To further alleviate physical strain, smart vacuums are equipped with advanced features such as self-navigation and voice control. With self-navigation, the device can move around the house on its own, avoiding obstacles and adjusting to different surfaces. This means that you don’t have to constantly bend down to adjust the vacuum’s height or direction, which can put a strain on your back and neck. Voice control, on the other hand, allows you to command the vacuum to start or stop cleaning without having to reach for the device or bend down to press buttons.
To compare the physical strain caused by traditional and smart vacuum cleaners, take a look at the following table:
|Traditional Vacuum Cleaners||Smart Vacuum Cleaners|
|Weight||Heavy and bulky||Compact and lightweight|
|Mobility||Require dragging and carrying around||Equipped with self-navigation|
|Interaction||Require constant bending down to adjust height and direction||Can be controlled by voice commands|
As you can see, smart vacuum cleaners offer several benefits that reduce physical strain and make cleaning easier and more comfortable. If you suffer from mobility issues, joint pain, or muscle soreness, switching to a smart vacuum cleaner can significantly improve your quality of life.
Additional Advantages of Smart Vacuum Cleaners
As if the improvements to your indoor air quality and physical health weren’t enough, smart vacuum cleaners come with a host of additional advantages. When compared to traditional vacuum cleaners, these innovative machines are truly ahead of the game. Here are some of the extras you can reap by switching to a smart vacuum cleaner.
Improved Technology and Efficiency
Smart vacuum cleaners use advanced technology to enhance their performance and efficiency compared to traditional vacuum cleaners. These vacuum cleaners are equipped with various sensors, intelligent algorithms, and AI technology to improve their effectiveness and automate tasks, making cleaning a breeze.
One of the significant advantages of smart vacuum cleaners is their enhanced suction power. They can pick up dirt and debris more effectively than traditional vacuum cleaners, even from hard-to-reach areas. Another technological advancement is the mapping feature which creates a virtual map of your home and helps the vacuum cleaner navigate around obstacles without getting stuck. This technology also helps to ensure complete cleaning in a particular area without missing any spot.
Smart vacuum cleaners also come with innovative features such as voice control, mobile app control, and scheduling options that offer a seamless cleaning experience. You can easily control the vacuum cleaner from your smartphone, which allows you to schedule cleaning while you’re away. This technology helps you to save time, and energy, allowing you to focus on other essential tasks.
Smart vacuum cleaners have a high-capacity dustbin that can collect dirt and debris without you needing to clean it frequently. They also have efficient filters that capture bacteria, dust, and allergens and automatically change them when needed, ensuring your home stays clean and healthy. Most of the smart vacuum cleaner brands have HEPA filters that trap small particles, making them more suitable for people who have allergies and asthma.
Smart vacuum cleaners are more efficient and offer better cleaning power, easy control, and low maintenance, making cleaning a stress-free experience. By investing in a smart vacuum cleaner, you can save time, energy, and money in the long run while enjoying a cleaner home environment.
User-Friendly and Convenient
Smart vacuum cleaners are not only good for your health, but they’re also very user-friendly and convenient. These high-tech devices are designed with the user in mind, and as such, they’re extremely easy to operate, even for first-time users. Here are some of the ways in which smart vacuum cleaners are user-friendly and convenient:
|Simplified Controls||Mobile App Support||Voice Control|
|Smart vacuum cleaners feature simple and easy to understand controls. Unlike traditional vacuum cleaners with numerous buttons and functions that can be overwhelming, smart vacuums come with intuitive controls that are easy to navigate.||Most smart vacuums have mobile app support which allows you to control the device remotely. You can start, stop, and even schedule cleaning sessions from your smartphone, even when you’re not at home.||Voice control is another impressive feature of smart vacuums. With virtual assistant integration, you can control the device using voice commands. This is especially helpful for people with disabilities, or those who prefer hands-free operation.|
|Automatic Charging||Easy Maintenance||Custom Scheduling|
|Smart vacuum cleaners are designed to automatically return to their docking station for recharging. This means that you don’t have to worry about monitoring the battery level, or manually recharging the device.||Maintaining a smart vacuum cleaner is easy and hassle-free. The device comes with self-cleaning brushrolls, and filter replacements are infrequent. All you need to do is empty the dustbin regularly and clean the device from time to time.||You can easily schedule the device to clean your home at specific times of the day, or on specific days of the week. Just set it and forget it. This feature ensures that your home is always clean and free of dirt and debris.|
With all these user-friendly and convenient features, it’s easy to see why smart vacuum cleaners are becoming increasingly popular. They are designed to make your life easier, while still ensuring that your home is clean and free of health hazards. With smart vacuum cleaners, cleaning has never been easier!
Smart vacuum cleaners are a great addition to any home, and one of the advantages that you won’t want to overlook is that they require low maintenance. Unlike traditional vacuum cleaners that require regular bag changes, hose unclogging, and filter replacements, smart vacuum cleaners are designed to be much easier to maintain.
One way in which smart vacuums are low maintenance is that they don’t use bags to collect debris. Instead, they use a dustbin that can be easily removed and emptied into the trash. Most of these bins have a capacity of around 0.5 liters, which is large enough to hold a week’s worth of dirt and debris.
Smart vacuums use advanced filtration systems that require less frequent cleaning or replacement. HEPA filters are common in smart vacuums and capture 99.97% of tiny particles, including dust, mold, and pet dander. These filters only need to be replaced every six months or so, meaning less maintenance for you.
Smart vacuums have self-cleaning brushes and sensors, which means that you won’t need to manually remove tangled hair or pet fur. The brushes are equipped with sensors that detect when they are tangled and automatically stop to reverse the direction and untangle themselves. This feature ensures that your vacuum cleaner can continue to perform at optimal levels, with minimal maintenance required from the user.
Here’s a table that summarizes the low maintenance benefits of smart vacuum cleaners:
|Traditional Vacuums||Smart Vacuums|
|Require frequent bag changes||Use a dustbin that can be easily emptied|
|Filters require frequent cleaning||Advanced filters that require less cleaning or replacement|
|Brushes become tangled and require manual cleaning||Self-cleaning brushes and sensors|
Conclusively, smart vacuum cleaners offer a variety of benefits that make them an appealing alternative to traditional vacuum cleaners. With minimal maintenance requirements, advanced filtration systems, and self-cleaning brushes and sensors, they are not only healthier for you but also more user-friendly and convenient. If you want to improve your indoor air quality and reduce your physical strain while maintaining a clean home, a smart vacuum cleaner may be the perfect choice for you.
How to Choose the Best Smart Vacuum Cleaner for Your Home
Choosing the right smart vacuum cleaner is crucial for ensuring that you get the best results possible. Here are some factors you should take into consideration when making your choice.
Type of Flooring: The type of flooring in your home plays a vital role in determining the best smart vacuum cleaner for you. If you have mainly hardwood floors, you may want to opt for a model that has a hard floor mode. On the other hand, if your home has carpets or rugs, you’ll want to look for a smart vacuum cleaner that’s specifically designed for cleaning them.
Filtration System: The filtration system of a smart vacuum cleaner is responsible for trapping allergens and dust particles while expelling clean air. If you or any of your family members have allergies or asthma, choose a smart vacuum cleaner with HEPA filters that can remove particles as small as 0.3 microns. A good filtration system can also improve the overall air quality in your home.
Battery Life: If you have a large home, you’ll want a smart vacuum cleaner with a long battery life. This will ensure that you don’t have to stop cleaning mid-way to recharge the battery. Look for a model with a battery life of at least 60 minutes to cover larger areas effectively.
Noise Level: Noise level is another important factor to consider, especially if you have small children or pets at home. You don’t want to disturb them with a loud smart vacuum cleaner. Choose a model that has a quiet operation, preferably below 65 decibels.
Smart Features: Smart vacuum cleaners come with a range of additional features such as voice control, mobile app compatibility, and mapping technology. Consider which features are important to you and look for models that offer them.
Warranty and Customer Support: Finally, it’s always a good idea to check the warranty and customer support provided by the manufacturer. A good warranty will ensure that you’re protected against any defects or faults in the machine. Also, make sure that the manufacturer offers responsive customer support in case you run into any issues during use.
By keeping these factors in mind, you’ll be able to choose the best smart vacuum cleaner for your home that meets your cleaning needs, budget, and personal preferences.
In conclusion, switching to a smart vacuum cleaner is not only a wise choice for the sake of convenience and efficiency, but also for your health. By eliminating the health hazards associated with traditional vacuum cleaners, smart vacuums can contribute to improved indoor air quality and help protect against respiratory problems, allergies, and other physical health issues.
So, don’t hesitate to make the switch today and start enjoying the benefits of a clean home without compromising your health. Keep in mind that the market offers a variety of smart vacuum models, each with unique features and capabilities, so make sure to do your research and choose the one that best fits your needs and lifestyle.
Your health and well-being should always be a top priority, and by switching to a smart vacuum cleaner, you are taking an important step towards a healthier and happier life. So, say goodbye to the potential health hazards associated with traditional vacuums and hello to a cleaner, healthier home with a smart vacuum cleaner.
Frequently Asked Questions
What is the importance of regular vacuuming?
Regular vacuuming helps to remove dust, dirt, and allergens from your home, providing a clean living environment and improving indoor air quality.
What are the health hazards of using traditional vacuum cleaners?
Traditional vacuum cleaners can cause air pollution, spread dust mites and allergens, worsen indoor air quality, inadequately clean surfaces, and lead to physical health issues.
How do traditional vacuum cleaners cause air pollution?
Traditional vacuum cleaners can release dust and pollutants back into the air through their exhaust system, contributing to indoor and outdoor air pollution.
Can traditional vacuum cleaners worsen indoor air quality?
Yes, traditional vacuum cleaners can kick up dust particles and allergens, which can then circulate and settle throughout your home, worsening indoor air quality.
What physical health issues can result from using traditional vacuum cleaners?
Physical health issues such as back pain, shoulder strain, and wrist injuries can result from the repetitive motions and strain required to use traditional vacuum cleaners.
How can smart vacuum cleaners benefit your health?
Smart vacuum cleaners can improve indoor air quality, remove dust and pollen allergens, eliminate the need to handle dust and debris, and reduce physical strain.
What is the advantage of improved technology and efficiency in smart vacuum cleaners?
Improved technology and efficiency in smart vacuum cleaners can lead to deeper cleaning, easier maintenance, and less energy consumption.
How are smart vacuum cleaners user-friendly and convenient?
Smart vacuum cleaners can be controlled and scheduled through smartphone apps, making it easier to maintain a clean home and monitor cleaning progress.
What is the benefit of reduced physical strain from using smart vacuum cleaners?
Reduced physical strain from using smart vacuum cleaners can help to prevent injuries and make cleaning an easier and more enjoyable experience.
How can I choose the best smart vacuum cleaner for my home?
You can choose the best smart vacuum cleaner for your home by considering factors such as your budget, cleaning needs, and desired features such as autonomous cleaning and voice control.
|
<urn:uuid:2c5bc475-8579-4ae9-a6aa-9302a22b64ba>
|
CC-MAIN-2023-23
|
https://robotsnavigator.com/health-hazards-vacuum-cleaners/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00345.warc.gz
|
en
| 0.940088 | 6,159 | 2.71875 | 3 |
Coastal mangrove forests are known as one of the most productive ecosystems and efficient carbon (C) sinks on the planet. Mangroves store a substantial amount of organic C in below-ground sediment, which is known as “blue carbon (C)”. As anthropogenic factors have caused greenhouse gas (GHG) emissions and sea levels to increase, mangrove blue C has become a part of global climate change negotiations due to its potential for storing C and mitigating GHG emissions. However, these coastal forests are also currently under threat from major land-use and land-cover changes (LULCC) for aquaculture and agriculture, resulting in large amounts of deforested and degraded mangrove areas globally. Little is known about the range of impacts different LULCC have upon mangrove C dynamics (e.g. C storage, emission and sequestration). This systematic review protocol outlines the methodology to identify and quantify the impacts of LULCC upon the C dynamics of global mangrove forests. The forthcoming review will assess the magnitude of LULCC on natural and impacted mangroves and identify where research gaps remain on mangrove C dynamics
Topic: mangroves, coastal areas, carbon, ecosystems, climate change, systematic reviews
Series: CIFOR Working Paper no. 211
Publisher: Bogor, Indonesia, Center for International Forestry Research (CIFOR)
Publication Year: 2016Creative Commons Attribution 4.0 International License.
|
<urn:uuid:bf0ed957-a52f-4049-9608-4b9da38ce592>
|
CC-MAIN-2017-39
|
http://www.cifor.org/library/6225/carbon-stocks-and-fluxes-associated-with-land-use-and-land-cover-change-in-mangrove-ecosystems-a-systematic-review-protocol/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685993.12/warc/CC-MAIN-20170919183419-20170919203419-00650.warc.gz
|
en
| 0.909296 | 305 | 3.21875 | 3 |
When you think of online security, hopefully by now two-factor authentication springs to mind. WIRED certainly pushes the feature every chance we get. And for good reason! It's a solid protection against common web attacks like phishing and credential stuffing. But when Chris Coyne and Max Krohn, who previously cofounded OKCupid, launched their own digital identity and encrypted chat platform in 2014, they decided against using 2FA at all. Which is less radical than it sounds.
The company, called Keybase, is open source and audited by (paid) third parties, but users and two-factor authentication advocates often ding the company for not offering 2FA. Keybase says, though, that conventional two-factor wouldn't protect Keybase accounts in the way you might think. And if you look closely, you'll notice that many similarly sensitive products, like password managers or secure messaging apps like Signal, often don't offer conventional two-factor either.
"The two-factor authentication people usually talk about just doesn't make sense with the model of how Keybase works," says Krohn.
Two-factor authentication is a specific tool with a lot of important uses, but it's not a one-size-fits-all solution to every data security issue. "People have misconceptions of how 2FA works in the context of encryption or things like password vaults," says Maximilian Golla, a researcher at the Max Planck Institute for Cyber Security and Privacy in Germany. "If this tells us anything, it's that the topic is rather complicated. I don't expect most people to automatically understand what's going on here."
You probably intuitively know how most web services are set up. Data typically lives on an internet-connected server that you access through a web browser. If it's sensitive data, a password protects it so that only authorized people can access it, but they can still pull it up on the go. The magic of the internet!
When you provide those login credentials to a server, you are "authenticating" yourself, essentially saying "It is I! A person who is allowed to access this data." The server checks the password you provide against the password it has on record next to your name—like a bouncer at an exclusive club—and if they match, you're good.
You almost certainly know from experience that this system is very flawed. It's hard to store a lot of passwords in your head, so you choose things that are easy to remember, or use the same password again and again. (Don't do that.) And if someone can steal or guess your password—pretty easy when you reuse one, or set it as your birthday and pet's name—they can use it to log in as you. Which is bad.
So over the years a solution has evolved: a second level of authentication after the password. And by the time the idea took hold, a lot had changed in the digital world. Namely, smartphones. So the two factors of web authentication became "something you know," your password, and "something you have," a phone that gives you a numeric code from a text message or a code-generating app.
This authentication setup still has problems—for example, you can still be tricked into handing over both your password and your two-factor code to clever phishers—but overall it's a huge improvement. It's just not the only improvement. The rise of smartphones and other technological advances have also made it possible to fundamentally set up web services differently, allowing people to move past the old concept of passwords and two-factor altogether. Instead of being on the bouncer's list at the club, all you need to know is how to throw a good house party.
Keybase is end-to-end encrypted, meaning that data is only ever understandable at either end of an interaction, like the two smartphones in a messaging thread. The rest of the time, whether the data is in transit across the web or sitting on Keybase's servers, no one—including Keybase—can read it. (Some encrypted platforms, like Signal, go a step further by not storing data at all.) Instead, you need the ability to decrypt data locally on your devices. That's the house party.
|
<urn:uuid:2e7bff7d-dff2-46c1-91ee-b80ce8f613af>
|
CC-MAIN-2020-05
|
https://www.wired.com/story/keybase-two-factor-authentication/?itm_campaign=BottomRelatedStories_Sections_2
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607118.51/warc/CC-MAIN-20200122131612-20200122160612-00359.warc.gz
|
en
| 0.962134 | 872 | 2.625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.