text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Gas pile-up, gap overflow, and Type 1.5 migration in circumbinary disks: general theory
Many astrophysical binaries, from planets to black holes, exert strong torques on their circumbinary accretion disks, and are expected to significantly modify the disk structure. Despite the several decade long history of the subject, the joint evolution of the binary + disk system has not been modeled with self-consistent assumptions for arbitrary mass ratios and accretion rates. Here we solve the coupled binary-disk evolution equations analytically in the strongly perturbed limit, treating the azimuthally-averaged angular momentum exchange between the disk and the binary and the modifications to the density, scale-height, and viscosity self-consistently, including viscous and tidal heating, diffusion limited cooling, radiation pressure, and the orbital decay of the binary. We find a solution with a central cavity and a migration rate similar to those previously obtained for Type-II migration, applicable for large masses and binary separations, and near-equal mass ratios. However, we identify a distinct new regime, applicable at smaller separations and masses, and mass ratio in the range . For these systems, gas piles up outside the binary’s orbit, but rather than creating a cavity, it continuously overflows as in a porous dam. The disk profile is intermediate between a weakly perturbed disk (producing Type-I migration) and a disk with a gap (with Type-II migration). However, the migration rate of the secondary is typically slower than both Type-I and Type-II rates. We term this new regime “Type-1.5” migration.
keywords:accretion, accretion discs – black hole physics – gravitational waves – galaxies: active
Understanding the co-evolution of binaries and accretion disks is fundamental in several fields of astrophysics, including planet formation and migration (Goldreich & Tremaine, 1980; Ward, 1997), patterns in planetary rings (Goldreich & Tremaine, 1982), stellar binaries, compact object, and binaries involving supermassive black holes (SMBHs).
Despite the long history of the subject, there are no self-consistent analytical models for the co-evolution of binaries and accretion disks, incorporating the fundamental physical effects over the long timescales on which the binary separation evolves. The standard –model of radiatively efficient turbulent thin accretion disks (Shakura & Sunyaev, 1973) relates the effective kinematic viscosity of the disk to the pressure . The viscous evolution of the disk, however, is often modeled without considering the pressure dependence of the viscosity (Lynden-Bell & Pringle, 1974). Similarly, models of the gravitational interaction between the disk, which describe the launching of spiral density waves in the disk that remove angular momentum from the binary, also do not account for the tidal heating of the disk and the corresponding feedback on the torque cutoff phenomenon (Goldreich & Tremaine, 1980).
The evolution of the circumbinary disk is sensitive to the above mentioned assumptions, especially when the mass of the secondary is large, and can strongly perturb the disk. For a massive secondary, the tidal torque clears a gap in the disk, and the viscous radial inflow of the gas pushes the object inward on the viscous timescale (Type-II migration). If the secondary mass, is larger than the local disk mass, , where is the surface density, then the migration slows down, as the spiral density waves cannot remove angular momentum away from the binary at a rate on which the gas flows in. This leads to the pile-up of gas outside the secondary’s orbit, in which the gas density increases by up to a factor , where and is the unperturbed local disk mass (Syer & Clarke, 1995). Once this steady-state level is reached, the viscous gas inflow velocity matches the inward migration of the object (secondary dominated Type-II migration).
In this paper, we focus on such systems, with , and point out that the Syer & Clarke (1995) steady-state level of gas pile-up cannot be reached for sufficiently large secondary masses , where . The enhanced viscous dissipation rate () can increase the disk temperature such that it becomes radiation pressure dominated. The enhanced pressure makes the disk puff up (), and reduces the relative gap size. Once the gas approaches within a distance less than the scale-height from the secondary, the torque that the disk exerts on the binary has a cutoff (Goldreich & Tremaine, 1980; Artymowicz, 1993b, a; Goodman & Rafikov, 2001) which limits the migration rate of the secondary. Once the gas enters the Hill radius, it can furthermore flow across the secondary’s orbit along horse shoe orbits or accrete onto the secondary. We derive an analytical quasi-steady-state model for the co-evolution of the disk and the orbital migration of the secondary, in which we combine a Shakura & Sunyaev (1973) disk with the theory of the binary-disk interaction by Goldreich & Tremaine (1980) self-consistently. In particular, we adopt the viscosity prescription of standard thin accretion disks proportional to pressure,111 Here and are respectively known as and -models. We formulate our problem for a general or -disk in Sec. 2, but then derive the analytical results for the special case of a disk viscosity. calculate the sound speed and vertical balance including both gas and radiation pressure ( and ), adopt the simple analytical approximation to the angular momentum exchange between the binary and the disk of Armitage & Natarajan (2002), consider the standard viscous and tidal heating of the disk (Lodato et al., 2009), and self-consistently account for the feedback on the pressure, viscosity, scale-height, and the torque cutoff near the secondary’s orbit. We generalize the steady-state model of Hourigan & Ward (1984), Ward & Hourigan (1989), and Liu & Shapiro (2010) by self-consistently including variations in the viscosity and pressure caused by the pile-up. We derive azimuthally averaged steady-state analytical disk models which recover the Goodman & Tan (2004) solution for arbitrary in the limit that the secondary mass approaches zero, but the disk structure is significantly modified by the secondary over multiple accretion timescales for larger .
The disk structure in this overflowing state with a pile-up is intermediate between the weakly perturbed case without a secondary and the case with a gap. Not surprisingly, the migration rate in such an intermediate state, which we label Type-1.5, is significantly different from the corresponding limiting cases of Type-I migration and the secondary-dominated Type-II migration. The transition between Type-I and Type-II migration as a function of the secondary mass was previously typically investigated by considering only the change in the surface density due to gap formation, but without investigating the feedback from the changes in viscosity and pressure (Hourigan & Ward, 1984; Ward & Hourigan, 1989; Korycansky & Papaloizou, 1996; Ward, 1997; Bate et al., 2003; Crida & Morbidelli, 2007). However, simulations show that migration is sensitive to temperature variations and radiation pressure (D’Angelo et al., 2003; Paardekooper & Mellema, 2006, 2008; Kley & Crida, 2008). We derive the Type-1.5 migration rate for the self-consistent radial profile including these effects when the pile-up is significant in an overflowing steady-state disk. As the secondary migrates inwards across the increasingly hotter inner regions of the disk, the gap opening conditions and the migration rate change even if one neglects the feedback on viscosity and temperature due to gas pile-up (Haiman et al., 2009; Kocsis et al., 2011), but here we show that the changes are significant over a much wider range of masses and radii in the self-consistent model. We discuss migration and gap opening for SMBH binaries in more detail in Kocsis et al. (2012), hereafter Paper II.
The remainder of the paper is organized as follows. In § 2, we lay out the basic equations governing the hydrodynamical and thermal evolution of the disk, as well as the migration of the secondary. We solve the equations numerically in § 3. We then derive an analytical solution in § 4. We summarize the results, and discuss how they depend on the most important physical parameters, in § 5. We offer our conclusions in § 6. A more detailed discussion and the implications for SMBH binary systems is presented in Paper II.
We use geometrical units , and suppress factors of and to convert between mass, length, and time units. Our basic notation for the disk and secondary parameters are depicted in Figure 1.
2 Thermo-hydrodynamical interaction between a disk and a secondary
We examine the evolution of the secondary and an azimuthally and vertically averaged Shakura-Sunyaev disk (i.e. axisymmetric one-zone disk) in local thermal equilibrium. Here we review the basic equations. First, we write down the continuity and angular momentum transport equations including the viscous torque and the gravitational tidal torque of the secondary. The back-reaction of the tidal torque changes the angular momentum of the secondary. The viscous and tidal torques depend on the disk surface density, viscosity, and pressure gradient (or scale-height). We derive the vertically averaged disk structure assuming that: (i) the local viscous plus tidal heating equals the radiative cooling with photon diffusion limited vertical radiative flux (i.e. negligible radial heat transport); (ii) the viscosity is proportional to either gas+radiation pressure (-disk) or just the gas pressure (-disk), and (iii) gas plus radiation pressure supports the disk against the vertical gravity. This yields a closed set of nonlinear partial differential equations for the disk and the location of the secondary in 1+1 dimensions. We present solutions in subsequent sections below.
2.1 Angular momentum transport
We denote the masses of the primary and the secondary objects by and , the surface density of the disk by (assuming axisymmetry), and the radial bulk velocity of the disk by , which is negative if gas accretes toward . The continuity and angular momentum equations for the disk are222In our notation, and . refers to torque, and are viscous and tidal torques as in Chang et al. (2010); Liu & Shapiro (2010). The angular momentum flux is . Central and surface temperatures are labelled with and .
where the total torque is due to viscosity and the gravity of the secondary, given by
Here is the torque per unit mass in the disk, approximately given by
, is the scale-height of the disk, and is a constant calibrated with simulations. This approximate formula for , introduced by Armitage & Natarajan (2002), accounts for the net contribution of all Lindblad resonances as well as the torque cutoff within (Goldreich & Tremaine, 1980; Ward, 1997), and guarantees that the torque vanishes at . Here outside the torque cutoff in Goldreich & Tremaine (1980), in Lin & Papaloizou (1986), and calibrated to match the gap opening conditions in Armitage & Natarajan (2002).333 Liu & Shapiro (2010) used Eq. (5) with . Chang et al. (2010) adopted a torque model, extrapolating Eq. (18) of Goldreich & Tremaine (1980) (with a modified constant prefactor of ), such that their torque density approaches a constant at . The linear perturbative analysis of Goldreich & Tremaine (1980) is not applicable if or (Meyer-Vernet & Sicardy, 1987; Ward, 1997; Korycansky & Papaloizou, 1996). We adopt a conservative value in our numerical calculations, but keep the terms general in all of our analytical formulas. Note that practically Eq. (6) assumes that the tidal torque density “saturates” instead of having a true cutoff near the secondary as long as the gas density is non-vanishing there (Artymowicz, 1993b), which accounts for the effects of shocks near the secondary (Goodman & Rafikov, 2001; Dong et al., 2011; Duffell & MacFadyen, 2012).444Recent simulations (Dong et al., 2011; Rafikov & Petrovich, 2012; Duffell & MacFadyen, 2012) have shown that the original Goldreich & Tremaine (1980) torque density is correct close to the secondary, but the actual torque decreases in amplitude and changes sign outside of . However the relative contribution of these outer regions to the total torque is negligible. 555We do not account for relativistic corrections to the tidal torque which are expected to be small at the separations in the gas-driven regime (Hirata, 2011a, b). However, this prescription might be inaccurate for a high-mass secondary forming a gap in the disk, where the tidal torques are due to spiral streams passing near the secondary on horse-shoe orbits (MacFadyen & Milosavljević, 2008; Shi et al., 2012; Roedig et al., 2012; Baruteau et al., 2012; Petrovich & Rafikov, 2012). We do not consider the torques inside the Hill radius, , assuming that gas reaching this region flows in across the secondary’s orbit. Outside this region, we use Eq. (4), assume that gravity is dominated by , and the orbital velocity is nearly Keplerian, , where .
After some algebra (Frank et al., 2002), Eqs. (1–2) simplify to
The total mass flux across a ring of radius is defined as
Eq. (7) along with the definition of the total torque in Eqs. (3–5) describes the evolution of the axisymmetric disk surface density and radial velocity as a function of radius and time.
The evolution of the secondary’s orbital radius, , is driven by the tidal torques of the gas and gravitational wave (GW) losses. The angular momentum of the secondary is so that
where is the recoil due to the torque exerted on the disk, Eq. (4), and with , the torque from the GWs is given by
Given and , Eqs. (7) and (9) provide three equations for the three unknowns: , , and .
We examine steady-state solutions to these equations where and so that is a constant.666As stated above, we neglect the accretion onto the secondary for simplicity (however, see Lubow et al. 1999). Note that in general the disk need not be in steady-state. However, in many cases the inflow rate of gas may be much faster than the radial migration speed of the secondary . If this is satisfied in a wide range of radii up to the outer edge of the disk, then, the secondary is effectively stationary in the azimuthally averaged picture, and the radial profile of the disk might be expected to relax to a steady-state, independent of the initial condition of the disk. We propose that the secondary then migrates slowly through a sequence of quasi-steady-state configurations of the disk with a fixed . Then, Eq. (8) becomes
This is a first-order ordinary differential equation for , once is specified for a specific disk model.
2.2 Boundary conditions
We distinguish two types of inner boundary conditions corresponding to whether or not the perturbation is strong enough to lead to a truncated disk with a wide hollow circular cavity. Here, “wide” means wider than the Hill radius (see below).
If all the way to the innermost stable circular orbit of (i.e. the disk does not have a cavity), we require a zero-torque boundary condition (Novikov & Thorne, 1973; Penna et al., 2010; Tanaka, 2011; Zhu et al., 2012),
Starting with this boundary condition, we obtain, among other properties of the steady-state disk, the gas velocity profile . As stated above, if this inflow velocity is much faster than the migration velocity of the secondary over a large range of radii, then one might expect that the disk approaches this steady-state configuration, independent of the initial condition. In the opposite case, the steady-state assumption may be violated by the time-dependent migration of the secondary. As we will show, the steady-state solution with a fixed requires a large build-up of gas outside the secondary for the viscosity to overcome the tidal barrier of the secondary. We refer to these solutions, in which the disk is not truncated outside the secondary as “overflowing”.
If the tidal torques dominate over the viscous torques near the secondary, gas is expelled from the region near the secondary and a wide gap forms. Assuming that the characteristic radius , where the tidal torque is exerted on the disk near the edge of the gap, tracks the inward migration of the secondary with where is a constant, we require that the gas velocity at that radius satisfy (Syer & Clarke, 1995; Ivanov et al., 1999)
Note that is not specified by hand ab-initio; it is found by assuming steady-state in our solutions below. This condition can be understood intuitively, since the secondary cannot “run away” and leave the outer disk behind (if it did, it would cease to be able to torque the disk and would have to slow down). Likewise, the gap edge cannot get closer to the secondary (if it did, gas would pile-up and the gap would eventually close). Although the disk is not in steady-state near its boundary, we assume at (see discussion in § 4.1.4 below).
Note that here and throughout the paper by “gap” we refer to situations where the gas density becomes effectively zero outside the secondary, such that the inflow of gas from the outside pushes the secondary inward according to (13). In these cases, we assume that inflow across the orbit is insignificant, and in particular, we neglect torques from the gas interior to the orbit. In our calculations, a gap is effectively a hollow circular cavity in the disk, which is supported by the tidal torques of the secondary. However we emphasize that we do not rule out the presence of a local density decrement, resembling an annular gap, with a significant mass flux across the gap.
In practice, we attempt to find a solution with either of the above two boundary conditions, and then check whether the solution is self-consistent. By construction, only one of the two boundary conditions will lead to a self-consistent solution as confirmed below.
2.3 Physical conditions in the disk
2.3.1 Vertical balance
Let us first derive the scale-height, . If the vertical gravity is dominated by , (i.e. ), then in vertical hydrostatic equilibrium where is the local midplane sound speed and is the pressure due to the gas and radiation777Note that the gas is not degenerate and is not isentropic, therefore the assumption of or made in most numerical simulations of accretion disks is inappropriate. In fact, for a radiation-pressure dominated standard Shakura-Sunyaev disk with no secondary., , , where is the central temperature, is the radiation constant, is the Stefan-Boltzmann constant, is the proton mass, and is the mean particle mass in units of . Since , so that . The pressure can be expressed as , where . If photons are transported to the surface by diffusion then the mean radiation flux is
Here is the surface temperature, is the optical depth from the midplane to the surface, where is the opacity assumed to be dominated by electron-scattering. We do not investigate changes caused by free-free opacity at large radii for simplicity. and neglect deviations from blackbody radiation (see e.g. Tanaka & Menou 2010 for more a detailed model). Thus, , so that , and we have
Note that Eq. (16) is valid in general for radiation flux limited, geometrically thin disks, independent of the source of dissipation and viscosity.888One possible source of inconsistency is that convective vertical heat transport is conventionally neglected here. This may be significant for optically very thick, radiation pressure dominated disks (especially so-called disks) with a large vertical temperature gradient (Blaes et al., 2011). The heat transport in this regime may be analogous to the convection zones of stars.
2.3.3 Local thermal equilibrium
We assume steady-state thermal equilibrium in which heat generated by viscosity and the dissipation of the spiral density wave escapes the optically thick disk in the vertical direction by photon diffusion. The vertical radiation flux is . The viscous dissipation rate per disk face element is
We assume that the density waves generated by the tidal torque are dissipated locally in the disk and turned into heat, yielding the rate . This is expected to be an adequate approximation based on analytical arguments (Goldreich & Tremaine 1980, Eq. 97 therein) and numerical studies (Dong et al., 2011; Rafikov & Petrovich, 2012; Duffell & MacFadyen, 2012), especially in the regime where the disk is strongly perturbed.
Following Goodman & Rafikov (2001) and Lodato et al. (2009)999We add a factor of 2 that appears to be missing in Lodato et al. (2009); this enters because of the two disk faces.,
The total vertical flux or total dissipation rate is
Using the above equations we derive and for a given and at each radius (see Appendix A).
Combining the previous expressions, we obtain
All other disk parameters can be derived from these relations. For example, the scale-height and the quantity that determine the torque (Eq. 11) are given by Eqs. (16) and (18). In particular, the limiting cases for are
In the limit that the only source of heat is viscosity in a Keplerian disk, , we recover the solution of Goodman (2003) up to a constant of order unity.101010We find a small difference in the density and temperature normalization constants, due to Goodman (2003) neglecting a prefactor in the vertical diffusion equation .
More generally, Eqs. (16), (21), and (23), along with the definition of and in Eqs. (18) and (20), and the angular momentum flow equation (11) provide a closed set of equations for the stationary disk, valid throughout the gas and radiation-pressure dominated regions for and disks. The solution is self-consistent if for all , the disk is thin (), the radiation flux is sub-Eddington (), the radial accretion velocity is subsonic (), radial heat transport is negligible, the self-gravity of the disk is negligible and the disk is stable against fragmentation (), the disk is optically thick (), and the boundary conditions are satisfied (implying in particular that across a wide range of radii for overflowing solutions, see § 2.2).111111 The model is furthermore self-consistent only outside the secondary’s Hill sphere since the gravity of the secondary is accounted for as a perturbation to the primary’s gravitational field, and the equations are linearized in the derivation of the torque formula. The tidal torque model is nevertheless often interpolated to within this region, as well (e.g. Goldreich & Tremaine, 1980; Armitage & Natarajan, 2002). Here we avoid this extrapolation by excising the region within the Hill radius from our domain, assuming that gas entering this region flows across the secondary orbit. We verify that these conditions are indeed satisfied for the overflowing solutions below.
3 Disk structure – Numerical solutions
First we generate numerical steady-state solutions for tidally and viscously heated disks assuming that the migration rate is much smaller than the radial accretion velocity in the disk. These numerical solutions are useful to verify the detailed analytical estimates presented in the following section.
We proceed along the following steps:
Obtain the ratio of gas to total pressure, , by inverting Eq. (23). A unique solution is guaranteed by the intermediate value theorem, since the left hand side is a monotonic function of , mapping to all positive real numbers, while the right hand side is positive and independent of .
Substitute into Eq. (11), to obtain an expression for a fixed . Solve this differential equation for .
The complexity is related to the nonlinearities in steps 1, 3, and 5. Nevertheless, the solution exists and is unique in steps 1 and 3. However, step 5 is a boundary value problem of a nonlinear first-order differential equation, which can have many solutions. We solve the differential equation numerically upstream from an initial value . Without the secondary, the solution is simply , which leads to the Shakura-Sunyaev disk. If , then the secondary creates a small dip in in its neighborhood, where the depth of the minimum increases with . For larger , becomes very small positive approaching the secondary from downstream, and the surface density approaches zero. In this regime, tidal heating dominates over viscous heating, and , implying that the pressure gradient shifts the torques out of resonance, and the torque is suppressed according to Eq. (5). Since the adopted torque model is valid only outside the secondary’s Hill radius, we stop the calculation at , and restart it at assuming that121212The tidal torque is monotonically increasing and decreasing, interior and exterior the secondary, respectively. The solution is uniquely determined by the initial value and in the two domains. However, can be arbitrary as long as .
This has a similar effect to smoothing the torque interior to the Hill radius as done previously in Lin & Papaloizou (1986), Syer & Clarke (1995), and Lodato et al. (2009).
The solution is approximately self-consistent if the migration rate is slower than the radial gas velocity outside the secondary. However, if this is not satisfied, a cavity opens and the disk becomes truncated. In this case, we seek a different solution in step 5, which satisfies the boundary condition in Eq. (13). This is possible by increasing in Eq. (25) where , until Eq. (37) is satisfied. Here can be identified as the truncation radius at the inner edge of the disk. We distinguish the characteristic truncation or gap radius to reside at where the tidal effect is exerted on the disk, more specifically the boundary where the tidal torque density becomes subdominant and use in the boundary condition, Eq. (37).131313 In practice, we generate solutions for many different . We seek the radius at which the tidal torque cuts off in the numerical solution: where and is where attains its maximum. We use this value as the gas velocity in Eq. (37). We find that the gas velocity is nearly constant in the neighborhood of and the surface density is near its peak, so the solution is insensitive to the details of this convention. The surface density increases rapidly within has a maximum and decreases thereafter. We assume that the disk is truncated interior to if a gap forms with .
4 Disk structure – analytical solutions
Here we derive an analytical solution to the nonlinear equations in § 2. Such solutions can be derived asymptotically far from the secondary or near the secondary, where either the tidal torque or the viscous torque dominates, or where the angular momentum flux is negligible. We therefore distinguish the corresponding far, middle, and near zones (see Figure 1). The far zones are well inside and well outside the secondary, where the effects of the secondary are negligible. The middle zone is the region outside the secondary where the tidal effects (i.e. torque and heating) are locally negligible compared to the viscous effects, but where the gas pile-up is significant and the disk profile is modified. The near zones are just inside and just outside the secondary’s orbit, where the tidal effects of the secondary dominate over the viscous effects. We restrict the near zone to outside the Hill radius, where the adopted tidal torque formula is valid. In addition to providing a basic understanding of the disk structure, the approximate analytical solutions allow us to infer the migration rate of the secondary.
To keep track of the approximations and notations introduced for the various zones below, we provide Table 1 for convenience. Note that the far/middle/near zones divide the disk into five radial slices, and the asymptotic behavior further depends on whether the disk becomes truncated forming a wide gap (in the middle zone) and whether the torque is saturated by the condition on the radial distance from the secondary is (in the outer near-zone). Each row in the Table corresponds to one of these disk regimes, discussed in a corresponding subsection below, and shows which terms are relevant in Eq. (11). The subdominant terms are marked with a “0”. The column with shows functions we introduced related to the viscous torque, and shows the scaling of the specific tidal torque in Eq. (5).
|Mid. with gap||4.1.3||0||0|
|Near ext. uns.||4.2.2||0|
|Near ext. sat.||4.2.3||0|
In the following we mostly focus on –disks (i.e. ) and examine both radiation and gas pressure dominated disks, but it is straightforward to derive analogous formulas for –disks in the same way. We also note that in the radiation-pressure dominated regime, the viscosity of –disks is larger by a factor of . This would generally lead to stronger overflows for a smaller gas pile-up, and the cavity would close for a wider range of parameters than we find below for disks.
4.1 Far and middle zones
First we examine the region sufficiently far from the secondary, either inside or outside of its orbit, where
In this region, Eq. (11) can be integrated and substituted in (18)
where is an integration constant determined by the boundary condition near the secondary. For a fixed , Eq. (28) gives both and , from which the surface density and central temperature follow from Eqs. (21–22),
Thus, solving the disk structure in these zones amounts to finding the torque at the boundary, .
If then Eq. (11) shows that,
In practice, for a disk without a cavity, and it is the inner edge of the disk if it has a cavity. Depending on which term dominates in Eq. (27), we distinguish the far zone () and the middle zone (). The far zone can be either well inside or far outside the secondary’s orbit, but the middle zone is always outside. Well inside the secondary, the second term can be neglected in Eq. (32), and well outside of it, the second term dominates and the integration domain can be extended to . In both cases, is independent of .
Eqs. (27) and (32) show, that in the region outside the secondary, represents a torque barrier due to the secondary’s tidal effects. This parameter can also be used to obtain the migration rate of the secondary. Indeed, combining Eqs. (9) and (32) gives
4.1.1 Far zone – unperturbed disk
Without the secondary Eq. (12) implies that . Substituting into Eqs. (27–28), gives and . Plugging int Eqs. (8), (16), and (21-22) leads to the standard Shakura & Sunyaev (1973) solution
Here and below, the subscript denotes quantities related to the unperturbed disk, , , is the Eddington accretion rate for radiative efficiency, , , , and we introduced
Without the secondary, in the radiation pressure dominated regime () the scale-height is approximately constant, and increases approximately linearly further out where gas pressure dominates ().
4.1.2 Middle zone
Now let us consider the opposite limit, , where the steady-state perturbation to the torque is significant. In terms of the dimensionless torque barrier,
the formulae describing the unperturbed disk, Eq. (34–38), get modified by replacing the boundary term with
The disk quantities change to
and the migration rate follows from Eq. (33)
where we have assumed . Here and below, the superscript “m” labels the middle zone. Note that the dimensionless angular momentum flux can be interpreted as a brightening factor in the middle zone relative to the unperturbed disk; is representative of the maximum brightening, if is extrapolated to . In practice, the maximum brightening is even larger than in the near zone due to tidal heating (see § 4.3 below).
The disk is modified within a radial range where the dimensionless angular momentum flux satisfies . This sets the outer boundary of the middle zone, where the disk transitions to the far zone. From Eq. (41),
Eqs. (43–47) represent a disk with negligible inflow of angular momentum but an inner boundary condition with a large viscous torque, corresponding to the torque barrier. Such solutions are often (somewhat misleadingly) referred to as a decretion disk (Pringle, 1991; Lodato et al., 2009). To avoid confusion, we emphasize that there is accretion (i.e. inflow) in this region, too, with a fixed . However, the radial accretion velocity is greatly reduced, while the surface density, temperature, and scale-height are all greatly increased, relative to an accretion disk around a single compact object.
So far in this subsection, we have derived a solution for an arbitrary torque barrier or , without specifying its value. In general, is given by Eq. (32), which depends on the tidal torque in the near zone. Thus, to complete the derivation of the disk structure in the middle zone, we are first required to obtain the disk structure in the near zone (which we will do in § 4.2 below). However, in the case of the steady-state cavity, the particular form of the boundary condition allows us to directly infer , independently of the near zone, up to a factor of order unity, which we show next.
4.1.3 Middle zone – steady-state disk with a cavity
When the tidal torque is sufficiently strong to clear a gap so that the secondary and the nearby gas move with a similar velocity, can be substantial over a large range of radii. From Eq. (13–14), this requires
Here and below, the superscript refers to solutions with a gap, and is the outer radius of the gap. For this value of , Eq. (28) gives and , and follows from (21). However, since the right hand side (RHS) of Eq. (50) depends on itself, this gives an algebraic equation for . The solution is
Note that this is independent of the tidal torque model (i.e. the or in Eq. (5)), since here the tidal torque is set by the boundary condition of the gap. This solution breaks down, and becomes tidal torque dependent, if the gap closes, which we discuss in § 4.2 below.
The dimensionless angular momentum flux from Eq. (41) is
In particular, near the secondary is the ratio of secondary mass to the accumulated local gas mass.141414Here using the Syer-Clarke parameter . The only free parameter in this zone is , which we determine explicitly in § 4.3.2 below.
In the range , and Eqs. (43–47) give
where at . Outside , , and the disk approaches the unperturbed solution given by Eqs. (34–38). In the transition zone, between the middle and far zones, , one needs to use Eqs. (43–47) with (Eq. 52).
When a cavity is present, the migration speed of the secondary follows from Eqs. (33) and (51):
This expression is consistent with the secondary dominated Type-II migration rate of Syer & Clarke (1995) who assumed . Note that the migration speed is slower than the gas inflow velocity without the secondary, in Eq. (37). This is referred to as disk-dominated Type-II migration, which is appropriate if the secondary mass is smaller than the unperturbed local disk mass (or equivalently ), but large enough to open a gap.
It is interesting to note that the structure of the middle zone does not depend explicitly on the tidal torque model, (in particular or the parameter in Eq. 5); the dependence is implicit and arises only by fixing the value of . Physically, while the tidal torques are negligible in this region, the effects of the tidal torques are still communicated to the region by setting an effective hydrodynamical boundary condition. We determine in § 4.3.2 below and find that, in fact, it only weakly depends on .
4.1.4 Consistency of steady–state
A basic assumption of our model is that the radial structure of the disk is in a quasi steady–state as the secondary migrates slowly inwards. To check the consistency of these steady-state solutions, we must verify that the implicit time-dependence in the surface density profile through does not violate the continuity equation (1) significantly, so that
Integrating over radius, the relative error in the accretion rate
|
<urn:uuid:ba9dcc3d-1f87-4ea3-90e6-8f7859614953>
|
CC-MAIN-2023-14
|
https://www.arxiv-vanity.com/papers/1205.4714/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00472.warc.gz
|
en
| 0.899291 | 8,298 | 2.578125 | 3 |
Long-term ocean climate effects on wave energy are often analysed from the viewpoint of the well-known increment of wave height over the decades. However, this increment associated with the increase of wave energy flux and absorbed power does not consider the influence of variations in the wave period, whose contribution is more important according to an adimensional performance analysis given by the capture width ratio. This study identifies significant past variations in wave periods during the 20th and 21st centuries using the reanalysis ERA-20C globally and at specific locations, such as Ireland, via calibration with ERA5. A more specific analysis developed in this area shows very significant performance variations (up to 20%) for two types of wave energy converters: oscillating water column devices and a floating body, in which laboratory empirical equations have been used to compute their performance loss due to the deviation from its natural resonance frequency or optimum working wave period. Thus, the performance measured as capture width ratio is highly sensitive to wave period changes, even losing productivity for regions where the wave energy potential is being incremented during the last decades.
|
<urn:uuid:90eb481b-d345-4d9b-8424-793502cf5e92>
|
CC-MAIN-2023-23
|
https://tethys-engineering.pnnl.gov/publications/performance-variations-wave-energy-converters-due-global-long-term-wave-period-change
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00194.warc.gz
|
en
| 0.943576 | 218 | 2.515625 | 3 |
Adhering to our belief that each child comes to us as a capable and competent learner who is rich with potential, the Reggio Emilia approach allows us to truly honor each child’s readiness level and interests. We take a project-based approach to learning as teachers work one-on-one and in groups with students teaching and observing their natural inclinations. As teachers observe and document student inquiry, projects are planned around these themes. Teachers work with students as facilitators to their learning and provide students with the opportunities to expand their knowledge through multi-faceted methods.
Equally important as academics is our research-based caring and nurturing environment. We ascribe to Nel Noddings “Care Theory” and believe that each child should feel both safe and cared for. The ethics of care argues that all people want to be cared for and that caring is reciprocal in nature. Not only do we believe this caring relationship to be central to teacher and child, but we teach children how to care for others and their world through modelling, dialogue, and practice.
In addition to the everyday work inside the classrooms, the students participate in after-school activities lead by the ECC teachers and MJCC faculty while still learning important skills that will help them in elementary school. Please see the MJCC Scene for more information.
|
<urn:uuid:696f6c47-4dfd-4a7b-a6c1-897ea5b7eedd>
|
CC-MAIN-2020-05
|
http://www.jccmemphis.org/early-childhood/early-childhood-center-curriculum/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607407.48/warc/CC-MAIN-20200122191620-20200122220620-00080.warc.gz
|
en
| 0.963039 | 273 | 2.75 | 3 |
Keywords: minority entrepreneurs, entrepreneurship, USA, United States, self-employment, economic well-being, minority business, racial groups, ethnic groups, social-economic class, globalisation
Minority entrepreneurship in the USA
This paper provides statistics to illustrate the minority entrepreneurship in the USA from various perspectives and data sources. While many successful stories have been told, most of minority entrepreneurs are still wrestling in the business-economic obscurity in the USA. Studies have shown a positive relationship between business ownership and economic well-being of US people. Also, statistics have consistently shown that there is a disadvantaged group along racial, ethnic and social-economic class lines. The poor groups usually have lower business ownership. Therefore, continuously fostering minority entrepreneurship and encouraging minority business ownership should be considered as one of most effective economic policies.
|
<urn:uuid:be09be73-e789-4aca-9f0c-95eddaeef94b>
|
CC-MAIN-2017-34
|
https://www.environmental-expert.com/articles/minority-entrepreneurship-in-the-usa-80400
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108264.79/warc/CC-MAIN-20170821095257-20170821115257-00600.warc.gz
|
en
| 0.934389 | 162 | 2.765625 | 3 |
Minnesota Department of Education
Resource Center for the Blind and Visually Impaired (BVI)
1500 Highway 36 W, Roseville, MN, 55113
Distance: 507 Miles
The Minnesota Resource Center for the Blind and Visually Impaired (BVI) is a statewide technical assistance resource addressing special education and services for students who are blind or visually impaired.
Activities of the Resources Center include:
* Engaging in activities which promote the individual talents and capabilities of students who are blind/visually impaired
* Increasing the independence of these students
* Fostering interaction and mutual understanding between these students and other members of their present and future communities
* Identifying and sharing information on innovative educational programs and best practices as they relate to identification, assessment, program planning, curriculum, instruction, transition, blindness and low vision
* Increasing training opportunities for professionals and parents throughout the state on topics related to special education and services for students who are blind/visually impaired
- Blind or visually impaired
- Children and/or youth with disabilities
This provider does not offer this service at other locations.
Other Services or resources
Taxonomy Terms Used: Clicking a taxonomy term from the list below launches a new search.
FT-8000.8000Special Education Advocacy Definition
Programs that work to ensure that children and youth with disabilities receive a free, appropriate, public education often by providing assistance for parents who need support in seeking and obtaining needed early intervention, educational, medical or therapeutic services for their children.
YF-9000Visual Impairments Definition
Eye, optic nerve or brain malfunctions which prevent affected individuals from seeing normally. Eye disorders that can lead to visual impairments include retinal degeneration, albinism, cataracts, glaucoma, muscular problems that result in visual disturbances, corneal disorders, diabetic retinopathy, congenital disorders and infection.
YG-8000.8000Students With Disabilities Definition
Students who have physical, sensory, developmental, cognitive, mental or emotional limitations which may affect their educational performance, their mobility or their ability to communicate.
YZ-8290Special Education Issues Definition
Programs that provide information and/or services that deal with the topic of special education.
|
<urn:uuid:46fe53b6-96ba-4f3b-9e88-f010372c4e16>
|
CC-MAIN-2023-50
|
https://mnhelp.com/Providers/Minnesota_Department_of_Education/Resource_Center_for_the_Blind_and_Visually_Impaired_BVI/1?returnUrl=%2FSpecialTopics%2FPeopleWithDisabilities%2F19817%3F
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00462.warc.gz
|
en
| 0.890062 | 465 | 2.90625 | 3 |
The Christian Science Monitor has the 96 questions potential citizens are asked, and you must answer at least 58 correctly.
In order to become a US citizen, immigrants must pass the Naturalization Test. American citizenship bestows the right to vote, improves the likelihood of family members living in other countries to come and live in the US, gives eligibility for federal jobs, and can be a way to demonstrate loyalty to the US. Applicants must get 6 answers out of 10 in an oral exam to pass the test. According to US Citizenship and Immigration services, 92 percent of applicants pass this test.
|
<urn:uuid:1716d49b-a303-409b-9516-196794b9f8b7>
|
CC-MAIN-2014-15
|
http://www.alan.com/2011/01/05/could-you-pass-the-test-to-become-a-u-s-citizen/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609524259.30/warc/CC-MAIN-20140416005204-00023-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.940519 | 118 | 2.9375 | 3 |
Asteroids from the family of Eureka are fragments of igneous rocks on Mars.
An international team of astronomers has shown that the Martian Trojan asteroids are fragments of the red planet. A study published in the journal Nature Astronomy.
“We have shown that asteroids from the family of Eureka are fragments of magmatic rocks of Mars”, — stated in the publication the authors.
The chemical composition of eight large Trojan asteroids of Mars (first of all, the content rocks, particularly olivine), reminiscent of the crust and mantle of the red planet, which is not typical for asteroids, located in the inner reaches of the Solar system.
Performed by means of telescope VLT (Very Large Telescope) spectral study showed that the eight large Trojan asteroids have a common origin. They are rich in olivine, pyroxene, garnet and other minerals typical for the terrestrial planets.
Trojan asteroids originated, as the authors suggest, as a result of collision of the planet with a large asteroid, and its present position occupied in the course of evolution of the orbital parameters of Mars. Previously, scientists believed that these heavenly bodies originated from the asteroid belt between the orbits of Mars and Jupiter.
Trojan asteroids of the red planet are located in Lagrangian point L4 or L5 system, Mars, the Sun, concerning which they are in a stable position.
© 2017, micetimes.asia. All rights reserved
|
<urn:uuid:32f1900c-71b8-4a01-95d5-11ce5c9fdc64>
|
CC-MAIN-2017-34
|
http://micetimes.asia/near-mars-found-fragments-of-the-planet-crust/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103910.54/warc/CC-MAIN-20170817185948-20170817205948-00401.warc.gz
|
en
| 0.934473 | 297 | 3.765625 | 4 |
Natural Sugars can be found in fruits and vegetables. Eating fruit provides health benefits — people who eat more fruits and vegetables as part of an overall healthy diet are likely to have a reduced risk of some chronic diseases. Fruits provide nutrients vital for health and maintenance of your body.
Fruits and vegetables come in terrific colors and flavors, but their real beauty lies in what's inside. Fruits and vegetables are great sources of many vitamins and minerals.
Remember to keep your plate colorful!
|
<urn:uuid:42ab3719-f578-480e-abec-3bb30634029d>
|
CC-MAIN-2013-48
|
http://www.hss.edu/sneaker-nutrition-sugars.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163996875/warc/CC-MAIN-20131204133316-00061-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.960667 | 99 | 2.8125 | 3 |
Sensory cues affect how much people eat when they sit down to a meal. For example, research shows foods that are creamier or thicker in texture increase feelings of satiety. That’s why a smoothie is more filling than a glass of milk. Even the color and size of the plate you eat on has an impact on appetite and satiety. Red, yellow or orange plates stimulate appetite while eating from blue or green plates subtly reduces your motivation to eat. Size matters too. People feel satisfied with smaller portions when they eat off a small plate. Now a study shows that the way a food smells is another sensory cue that affects satiety.
Strong Aroma = Smaller Bites?
When people eat foods with a strong aroma, they take smaller bites. That’s according to a study published in the journal Flavours. Researchers in the Netherlands discovered that people use bite size to control how much flavor they get when they take a bite and that’s influenced by a food’s smell. They made this discovery by using a special machine to deliver custard to hungry participants. The participants were able to control the size of the bites they ate, and researchers were able to vary the strength of the custard’s aroma. They found when the aroma of the custard was strong – the participants took bites that were 5% smaller.
Why might this be? Foods that have a strong aroma are perceived as being more flavorful, and when people eat them they unconsciously take smaller bites to control the amount of flavor they get with each mouthful. On the other hand, when people bite into foods that have little aroma, they take a bigger bite to compensate – to experience more flavor. Even after the strong aroma has diminished, they continue to take smaller bites. Why is this important? When you take smaller bites or slow down the pace of their meal, you generally eat less. Changing the aroma of food could be a simple way to reduce bite-size, calorie intake and increase satiety.
Add More Flavor to Your Food
Adding more flavor to foods, in general, should reduce bite size since people take smaller bites when food is more flavorful. Adding flavorful spices to food, especially ones with a powerful aroma may cause you to eat fewer overall calories and feel more satisfied with each bite. Researchers believe that this simple strategy could reduce the amount of food people eat at a meal by as much as 10%.
Ways to Use This Strategy
Pump up the flavor and aroma of your food by adding more spices to it. Some of the most pungent spices are cardamom, cinnamon, cumin and cloves, commonly used to prepare Thai and Indian dishes. If you prepare these foods at home, the strong aroma of the food cooking will have an appetite-satiating effect even before you sit down to eat a meal.
Add a small amount of cheese with a strong aroma to foods when appropriate. Have you ever noticed how filling a fragrant piece of cheese is and how much slower you eat it when it has a powerful smell?
Enjoy the taste of hot sauce? Adding a little to a dish not only enhances its flavor, it temporarily fires up your metabolism because of the capsaicin it contains. Black pepper and ginger also have a modest metabolism-boosting effect. Although this may not be enough to have a major impact on weight loss, research shows that people get full more quickly when they eat hot, spicy foods so you may eat less when you sprinkle a little hot sauce on your food.
Add spices to veggies to give them more flavor so you’ll eat more of them. Most veggies are naturally low in calories and rich in vitamins, minerals, and antioxidants and when you’re chowing down on vegetables you have “less room” for higher calorie, less healthy foods.
The Bottom Line?
Pump up the aroma and flavor of your food and you may end up eating less. Plus, certain spices are naturally high in antioxidants – something most people need more of. Skip the bland, boring food and enjoy food with more flavor and aroma. It could help you eat less.
Science Daily. “How the Smell of Food Affects How Much You Eat”
FoodNavigator.com. “Thick and Creamy Sensory Cues Increase Satiety of Low-Calorie Foods”
|
<urn:uuid:65f07f65-18fc-4fa2-829d-b5be317c3f70>
|
CC-MAIN-2023-40
|
https://cathe.com/can-a-foods-aroma-affect-how-much-you-eat/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510888.64/warc/CC-MAIN-20231001105617-20231001135617-00777.warc.gz
|
en
| 0.950078 | 898 | 3.265625 | 3 |
It wasn’t that long ago — 1987, to be precise — that U.S. Surgeon General Everett Koop predicted the HIV/AIDS epidemic would kill 100 million people by the year 2000. That didn’t happen. Instead, about 34 million people are living with HIV, according to AVERT, an international health organization, and a 2006 study published in the British medical journal QJM found that patients who are diagnosed as HIV-positive before developing full-blown AIDS now have an average life expectancy of 21.5 years. Once, the public faces of HIV were dead movie stars, artists and musicians; today, it’s pro basketball great Earvin “Magic” Johnson, who by all accounts is still in excellent health, two decades after his diagnosis.
Who do we have to thank for this startling turnabout? Medical researcher Jerome P. Horwitz, who back in 1964 discovered AZT, a medication that prevents HIV from replicating and lowers the amount of the virus in the bloodstream. Combined with other medications, AZT has helped turn HIV from an automatic death sentence into what in many cases is a manageable condition.
Here are five surprising facts about Horwitz, who died Sept. 6 at age 93 in Bloomfield Township, Mich.
- Horwitz didn’t start out as a drug researcher. After earning his Ph.D. in chemistry from the University of Michigan in 1948, Horwitz initially worked in research on rocket fuels. It wasn’t until the mid-1950s that he joined the Michigan Cancer Foundation and Wayne State Medical School as a cancer researcher.
- When Horwitz developed AZT, the drug initially was viewed as a failure. Back in 1964, the HIV virus hadn’t even been discovered. Horwitz was trying to develop a cancer drug. AZT turned out not to be effective against cancer. But decades later, the tactic he’d dreamed up — tricking cancer cells into adding booby-trapped molecules to their DNA chains that hindered their runaway growth — turned out to work against HIV.
- Horwitz didn’t actually think of using AZT against HIV. Horwitz told colleagues at Wayne State that AZT and other similar compounds he’d developed were “a very interesting set of compounds that were waiting for the right disease.” But the boxes containing his research gathered dust for nearly 25 years before two other researchers, Samuel Broder and Hiroaki Mitsuya, discovered that AZT stopped HIV from multiplying in cultured human cells.
- Horwitz never made any money from his discovery. As this Scientific American blog post details, Horowitz never patented AZT. Thus, he didn’t share in the windfall that pharmaceutical giant Burroughs Wellcome got from AZT, which in 1992 alone amounted to $400 million. In fact, Horwitz didn’t receive a royalty check until he was 86, and it was for another drug treatment that he’d developed to treat tumors.
- Horwitz never envisioned that AZT would turn out to be a primary weapon against HIV. In a 1992 speech to commemorate World AIDS Awareness Week, Horwitz said that AZT was “not a panacea” for HIV. Instead, he envisioned it as a stopgap treatment that would be made obsolete by the development of an anti-HIV vaccine, a development he believed — incorrectly — was just over the horizon.
Here’s a video explaining how AZT works.
|
<urn:uuid:c6097db4-07fa-4c8e-a487-92f14443350d>
|
CC-MAIN-2014-15
|
http://blog.aarp.org/2012/09/21/legacy-5-surprising-facts-about-jerome-horwitz-the-inventor-of-azt/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203235.2/warc/CC-MAIN-20140423032003-00586-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.96643 | 717 | 3.140625 | 3 |
A massive glaciation event that occurred around 720 million years ago is yielding important clues as to how anomalies in Earth’s carbon cycle can occur. A Princeton University-led team of geologists suggest that a geological episode called “snowball Earth” (which many believe covered the continents and oceans in a thick sheet of ice) produced a dramatic change in the carbon cycle. This change in the carbon cycle, in turn, may have triggered future ice ages.
Published in the journal Science, the new work shows how changes to the Earth’s surface wrought by the glaciers of the Neoproterozoic Era could have created the anomaly in carbon cycling. “The Neoproterozoic Era was the time in Earth history when the amount of oxygen rose to levels that allowed for the evolution of animals, so understanding changes to the carbon cycle and the dynamics of the Earth surface at the time is an important pursuit,” said Princeton’s Nicholas Swanson-Hysell, the first author on the paper.
The Neoproterozoic era, which lasted from 1,000 million years ago to 542 million years ago, is divided into three distinct periods, beginning with the Tonian, extending through the Cryogenian and ending with the Ediacaran. The Cryogenian period is notable in Earth history for the extensive and repeated ice ages that took place, beginning with the massive Sturtian glaciation at the start of the period. This marked the first ice age on Earth in roughly 1.5 billion years, which is an unusually long time span between glaciations. Since the Cryogenian, Earth has endured an ice age about once every 100 to 200 million years.
The “snowball Earth” theory suggests that the Sturtian glaciation was global in scope, encasing the planet in ice, which could have wreaked havoc on the normal functioning of the carbon cycle. While the theory is controversial and the extent of the deep freeze is under investigation, research team member Adam Maloof co-wrote a March 2010 Science paper demonstrating that glaciers reached the equator some 716.5 million years ago, providing further evidence to support the existence of a Cryogenian “snowball Earth.”
In the latest research, the researchers collected samples of limestone from Central and South Australia dating back to the Tonian and Cryogenian periods. Using a technique known as isotope analysis to learn how the carbon cycle worked in ancient times, the team pieced together clues that are hidden in the atomic composition of the carbon found in inorganic limestone sediment and ancient organic material.
Their results documented a peculiar and large shift in the carbon cycle. “The disturbance we’re seeing in the Neoproterozoic carbon cycle is larger by several orders of magnitude than anything we could cause today, even if we were to burn all the fossil fuels on the planet at once,” noted Maloof.
Previous data from the Ediacaran period at the end of the Neoproterozoic era have shown a similar perturbation to the carbon cycle, and in 2003 Massachusetts Institute of Technology geophysicist Daniel Rothman suggested that a buildup of a huge pool of organic carbon in the ocean could have led to the observed disturbance.
“The new carbon isotopic data shows a whopping downshift in the isotopic composition of carbonate, possibly the largest single isotopic change in Earth history, while the isotopic composition of organic carbon is invariant,” said Rothman, who was not part of the research team. “The co-occurrence of such signals is enigmatic, suggesting that the carbon cycle during this period behaved fundamentally differently than it does today.”
Building on Rothman’s work, the researchers set out to explain how an ice-covered globe in the early Cryogenian period could have prompted the accumulation of massive amounts of organic carbon in the ocean, leading to the observed disturbance to the carbon cycle later in the period.
According to their new hypothesis, the passage of the Sturtian glaciers across continental surfaces would have removed the weathered material and debris, which had accumulated in the 1.5 billion years since the preceding ice age. When the glaciers receded, this would have exposed vast amounts of bedrock to the carbon dioxide in the atmosphere for weathering, freeing up nutrients in the rock for delivery into the oceans.
This process would have generated a large influx of iron into the oceans, which could have interrupted the biomechanisms used by marine bacteria during the Tonian to process the organic carbon in the water and convert it into carbon dioxide and other dissolved inorganic carbon compounds. If the organic carbon was not eaten by bacteria, it would have accumulated into a massive oceanic reservoir and resulted in the strange carbon cycle of the Cryogenian and early Ediacaran.
The interaction of carbon dioxide with the continental surfaces during the weathering process also would have removed some of the carbon dioxide from the atmosphere, lowering the global temperatures and creating conditions conducive to the series of glacial events that were observed throughout the Cryogenian.
According to Rothman’s hypothesis, over millions of years the levels of oceanic and atmospheric oxygen would have grown as a consequence of the altered carbon cycle, ultimately leading to the oxidation of the large reservoir of organic carbon, removing the extra organic carbon from the oceans and returning the carbon cycle to a steady state more similar to how it functions today. Increased levels of oxygen in the atmosphere also would have provided the conditions that were necessary for the explosive diversification of animal life at the end of the Neoproterozoic and into the Cambrian Period.
The Princeton team plan to continue their investigation into the carbon cycle disturbances of the Cryogenian and Ediacaran periods, and conduct research on the Tonian-Cryogenian-Ediacaran geologic, isotopic and paleogeographic history of northern Ethiopia and southern Australia.
CO2 behind prehistoric global cooling
Carbon impacts get major revision
New study shows intimate relationship between ice caps and CO2 levels
Global Warming May Trigger Ice Sheet Growth
Did human-induced climate change begin thousands of years ago?
|
<urn:uuid:f7287ff0-fefd-420e-a184-bf27e055819e>
|
CC-MAIN-2023-40
|
https://www.scienceagogo.com/news/20100403011942data_trunc_sys.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00560.warc.gz
|
en
| 0.94633 | 1,272 | 4.28125 | 4 |
Since 1800, the world’s population has multiplied seven and a half times.
The world’s population has reached 7.5 billion and is expected to climb to nearly 10 billion by 2050. Why will population growth inevitably continue? Should we try to reduce or stop this growth?
Sand for use in hydraulic fracturing operations at a processing plant in Chippewa Falls, Wisconsin in 2011.
AP Photo/Steve Karnowski)
Overuse of sand for construction and industry is harming the environment and fueling violence around the world. Scientists explain why we need international rules to regulate sand mining and use.
The climate crisis demands not only green technologies, but a completely different approach to economic development.
Environmental destruction is a negative externality to be isolated and managed. Here, Native Americans at Standing Rock defend sacred land from a proposed oil pipeline.
Today's ugly politics are not a backlash against global capitalism, they're an open embrace of the racism and greed that has always underpinned so-called global governance.
No matter how hard we dig, the Earth’s resources are ultimately finite.
Mining image from www.shutterstock.com
Even supposedly "green" technologies such as renewable energy require materials, land and solar exposure and cannot grow indefinitely on this planet.
Victoria’s mountain ash ecosystem is vulnerable to collapse.
From fisheries to forestry, there's a pattern to collapsing ecosystems and industries. If we can predict them, maybe we can avoid the damage.
Mexico has a lot of natural beauty to save – or squander.
The government has decided to protect vast new expanses of land and sea. But bad planning and lax regulations are likely to limit, or even undermine, this conservation effort.
Think of all the resources needed to transform Shenzhen, a fishing town 35 years ago, into a megacity of more than 10 million people.
Our cities need to become much more efficient not just to conserve precious resources but to improve the economy, wellbeing and resilience to environmental change and disasters.
Hundreds of small-scale miners are scraping out tiny quantities of increasingly precious gold in El Corpus, southern Honduras.
Are high levels of violence and displacement in Central America and Mexico caused by natural resource exploitation?
There’s too much focus on the footprint of large businesses on the environment, leaving small businesses out.
The impact of small businesses on the environment has largely been ignored, but getting them to implement environmental management systems won't be easy. This is because of their culture of resisting red tape and the way they operate.
While politicians like Malcolm Turnbull and Barnaby Joyce do the traditional photo-ops, fewer people than ever are taking on farming, which can no longer support vibrant rural and regional communities on its own.
What are the issues facing rural and regional Australia? The challenges are many and varied – and only some have made the national political agenda – but these areas deserve better than neglect.
Many developing countries are highly urbanised but lack large industrial sectors.
Developing countries, specifically in sub-Saharan Africa, are urbanising without industrialising, a trajectory that leaves them with relatively higher poverty rates and share of slums.
The need for a solution to e-waste disposal is more urgent than ever.
Excavators and drillers at work in a copper and cobalt mine near Lubumbashi. Mineral resources are a big part of the DRC’s economy.
The fall in commodity prices has hit the DRC hard. This is a lesson to resources-dependent countries in Africa that they need to diversify their economies.
In 1991 Iraq forces set fire to Kuwait oil fields.
By Jonas Jordan, United States Army Corps of Engineers [Public domain], via Wikimedia Commons
Acts perpetrated during the course of warfare have, through the ages, led to significant environmental destruction.
An oil worker stands on the deck of a tanker at Bonga off-shore oil field outside Lagos. Africa’s extractive industries are committed to local content but universities aren’t producing the right kind of graduates.
Huge investments have been made to develop Africa's extractive industry. The challenge now is to forge collaboration between the industry and institutions of higher education to build a skills base.
What goes around comes around –
New circular thinking, access to abundant solar energy and supporting new technology could provide a competitive advantage for Australian industries.
Flickr/Beyond Zero Emissions
Australia’s relative share of global economic opportunity derived from smarter use of materials, energy and water could be $26 billion each year by 2025. Here are four ways Australia could make the most of the circular economy boom.
The Queensland town of Chinchilla is now home to a coal seam gas processing plant.
AAP Image/Dave Hunt
Residents in Queensland’s Western Downs region have mixed feelings towards coal seam gas (CSG) development taking place in their midst, according to our CSIRO survey. More than two-thirds of locals described…
Putting a price on things you can’t even put words to.
Journalist and environmentalist George Monbiot recently wrote a powerful polemic against the concepts of ecosystem services and natural capital, arguing that they were leading us on a neoliberal “road…
Are Queensland’s cassowaries being let down by Canberra’s officialdom?.
Dave Kimble/Wikimedia Commons
What do school chaplains and cassowaries have in common? Both highlight the degree to which federal governments struggle to devolve quality public decision-making to the right level. Our schools and our…
|
<urn:uuid:1204140f-6420-48c9-aa85-350970e9cab0>
|
CC-MAIN-2017-47
|
http://theconversation.com/id/topics/natural-resources-5927
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806736.55/warc/CC-MAIN-20171123050243-20171123070243-00165.warc.gz
|
en
| 0.921151 | 1,149 | 3.015625 | 3 |
The use of LED screens in LAMP (Linux, Apache, MySQL, PHP) technology has revolutionized the display industry. The combination of LAMP technology with LED screens has brought about a significant shift in the way businesses and organizations display their content. The use of LEDs in screens offers a better visual experience and has become a popular choice for digital signage, advertising, and other display applications.
What is an LED screen?
LED (Light Emitting Diode) screens use a panel of light-emitting diodes as pixels for the display. They are currently the most popular type of display for digital signage, large outdoor screens, and other applications. LED screens have a number of advantages over traditional displays, including high brightness, long lifespan, low power consumption, and better color contrast.
Advantages of LED screens
One key advantage of LED screens is their high brightness. LED screens are designed to display images and videos in bright outdoor environments, where traditional displays often struggle to be seen. LED screens also offer better color contrast than traditional displays, making them a perfect choice for digital signage, advertising, and other types of visual communication.
Another advantage of LED screens is their long lifespan. LED screens can last up to 100,000 hours, which makes them a cost-effective choice for businesses and organizations that need long-lasting displays.
Finally, LED screens have a low power consumption, which makes them energy-efficient and environmentally friendly. They use up to 30% less energy than traditional displays, which means they can save businesses money on their electricity bills.
LAMP technology and LED screens
LAMP technology is a combination of four open-source technologies: Linux, Apache, MySQL, and PHP. It is used to build robust, scalable, and secure web applications. The combination of LAMP technology and LED screens has opened up new possibilities for businesses and organizations to display their content in a more engaging and interactive way.
For example, a business can use LAMP technology to create a website or web application that displays dynamic content on an LED screen. The dynamic content can be updated in real-time, making it more engaging and relevant to the viewer.
Another example is digital signage. Businesses can use LED screens and LAMP technology to create dynamic and interactive signs that display advertisements, promotions, and other content. LAMP technology allows businesses to automate the content of the signs, making it easier to manage and update.
Examples of LED screens in LAMP technology
There are many examples of LED screens used in LAMP technology, including:
1. Times Square
The famous Times Square in New York City is famous for its LED screens. The screens are used for advertising, promotions, and other types of content. The screens are powered by LAMP technology, which allows for real-time updates and interactive content.
LED screens are also used in stadiums for digital signage and scoreboards. The screens can display real-time updates of the game, as well as advertisements and other types of content. LAMP technology allows for real-time updates, making it easier to keep fans engaged and informed.
3. Retail stores
Retail stores are using LED screens for digital signage and promotions. LED screens can be used to display product information, promotions, and other types of content. LAMP technology allows for dynamic and interactive content, making it easier for consumers to make informed purchase decisions.
|
<urn:uuid:0e6bab7e-7a6f-4404-bc32-8e391295a7f0>
|
CC-MAIN-2023-23
|
https://www.lumenrooflight.com/2023/04/02/revolutionizing-displays-the-led-screen-in-lamp-technology/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00440.warc.gz
|
en
| 0.918613 | 696 | 2.671875 | 3 |
Product management refers to the practice of strategically driving the development, market launch, and continual support and improvement of a company’s products. The main purpose of product management is creating and providing customer value, which is discovered through deep, focused, research.
When working as a product manager is very important to define your target market. Being able to identify and to understand what your customers need, will undeniably define the success of your product strategy and it will be of utmost help when creating a path to improve your product or services.
Product management encompasses a wide-ranging area of responsibilities and the role of product management may as well vary between different things in different organizations. But what are the main aspects and responsibilities this role entails? The list can be synthesized as follows:
Product management is a strategic function and as such it requires a high-level understanding of planning and prioritizing. A good product manager should be able to:
In order to be able to provide customer value, an effective product manager should also focus on:
Conducting research. Only through extensive research will you be able to gain expertise and knowledge about the company’s user personas, competitors, and market.
Developing a strategy. Once you have acquired the knowledge, it’s time to shape it into a strategic plan, which should include goals and objectives, and a timeline.
Communicating plans. Being able to communicate the strategy is also a key aspect. So once your plan has been established, you should present it to stakeholders in order for them to understand how it will impact them.
Coordinating development. Once you have received the “go-ahead”, it’s time for strategic planning. This includes creating a plan and coordinating with different teams such as development and product marketing, in order to start executing the plan.
Feedback and analysis. After the new product or feature has been introduced and launched to your users, there comes a key step: learning through feedback and analyzing usage through customer data. It’s also important to incorporate what you have learned through this final step into future developments or improvements.
Product management is the basic structure that supports and manages all the activities related to planning, developing, and marketing a product. It’s a role that requires high-level planning skills, comprehensive analysis, and deep researching and documenting.
In order to navigate this process successfully, building a plan can be extremely beneficial because it will help you establish a path by creating a timeline for your work. And this is where project management software such as Instagantt can make your life a whole lot easier.
Create a roadmap for your strategy in minutes and focus on researching, documenting your vision, communicating your concept, and coordinating development with the rest of your team.
Take a Look at Our Product Management Template
|
<urn:uuid:2b6eccd9-44f1-48e1-aee9-adb5bb0435b4>
|
CC-MAIN-2020-29
|
https://instagantt.com/product-management-template
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890105.39/warc/CC-MAIN-20200706042111-20200706072111-00235.warc.gz
|
en
| 0.949365 | 576 | 2.671875 | 3 |
A gopuram or gopura (Sanskrit: गोपुरम्, gopuram) is a monumental entrance tower, usually ornate, at the entrance of a Hindu temple, in the Dravidian architecture of the Tamil Nadu, Andhra Pradesh, Kerala, Karnataka, and Telangana states of Southern India.
Ancient and early medieval temples feature smaller gopuram, while in later temples they are a prominent feature of Hindu temples of the Dravidian style; or in many cases the temple compound was expanded and new larger gopuram built along the new boundary. They are topped by the kalasam, a bulbous stone finial. They function as gateways through the walls that surround the temple complex. Another towering structure located towards the center of the temple is the Vimanam. Both of them are designed and constructed as per rules given in the texts of Vaastu shastra.
The gopuram's origins can be traced back to early structures of the Pallava kings, and relate to the central shikhara towers of North India. Between the twelfth and sixteenth century, during the Pandya, Nayaka and Vijayanagara era when Hindu temples increasingly became a hub of the urban life, these gateways became a dominant feature of a temple's outer appearance, eventually overshadowing the inner sanctuary which became obscured from view by the gopuram's colossal size and courtyards. It also dominated the inner sanctum in amount of ornamentation. Often a shrine has more than one gopuram. Besides South India, even in North East India, there is an enchanting gopura in the Shree Angala Parameswari Shree Muneswarar Temple in Moreh, the Indo-Myanmar border town in Manipur, which was established in the year 1967, built by the Tamil people of the region. They also appear in architecture outside India, especially Khmer architecture, as at Angkor Wat.
A large Dravidian-style temple, or koil, may have multiple gopurams as the openings into successively smaller walled enclosures around the main shrine, with the largest generally at the outer edges. The temple compound is typically square or rectangular with at least the outermost wall having gopuras, often from the four cardinal directions. The multiple storeys of a gopuram typically repeat the lower level features on a rhythmic diminishing scale. The inner sanctum and its towering roof (the central deity's shrine) is also called the Vimanam, although in the south it is typically smaller than the gopurams in large temples.
The Tamil derivation is from the two words: கோ (kō) and புறம் (puram) meaning 'king' and 'exterior' respectively. It originates from the Sangam age when it was known as ஓங்கு நிலை வாயில் (ōnggu nilai vāyil) meaning 'imperishable gateway'.
An alternative derivation is from the Sanskrit word gopuram, which can be broken down to go (Sanskrit: गो), which means either 'a city' or 'a cow', and puram (Sanskrit: पुरम्), 'a town', or 'a settlement'.
Dr. Sthapati explains the meaning of the words gopuram and vimanam thus. Vimanam means measure, indicating the number of measures made in the construction and design of that structure. Gopuram consist of two words, gawa and puram, meaning the place from which all the energy that exists in all living beings comes inside.
A gopuram is usually a tapering oblong in form with ground-level wooden doors, often richly decorated, providing access. Above is the tapering or "battered" gopuram, divided into many storeys (talas), which diminish in size as the gopuram tower narrows. Usually the tower is topped with a barrel vaulted roof with a finial. The form began rather modestly in the 10th century, as at Shore Temple, Mamallapuram, with the 11th century Brihadeeswarar Temple in Thanjavur marking a crucial step forward with two multi-storey gopurams from that period, much larger than any earlier ones, though much smaller than the main tower (vimanam) of the temple. The four gopurams of the Thillai Nataraja Temple, Chidambaram are important early examples, begun in the mid-13th century but completed over a longer period. Gopurams are exquisitely decorated with sculpture and carvings and painted with a variety of themes derived from the Hindu mythology, particularly those associated with the presiding deity of the temple where the gopuram is located.
The two tallest gopuras are both modern, at least in part. The Ranganathaswamy Temple, Srirangam, Tamil Nadu, has 21 gopurams (tower gateways), including the towering 239.5-foot (73.0 m) Rajagopuram (shrine of the main gateway), which is claimed as the tallest temple tower in Asia. The 73-metre (240 ft)-tall 13-tiered Rajagopuram was completed in 1987 (having previously been incomplete) and dominates the landscape for kilometers around, while the remaining 20 gopurams were built between the 14th and 17th centuries. Competing for the title of "tallest" is the twenty storey 249-foot (76 m) gopura at the modern Murdeshwar Temple, which, unusually, is provided with a lift.
- "gopura". Encyclopædia Britannica. Retrieved 20 January 2008.
- Ching, Francis D.K.; et al. (2007). A Global History of Architecture. New York: John Wiley and Sons. p. 762. ISBN 978-0-471-26892-5.
- Ching, Francis D.K. (1995). A Visual Dictionary of Architecture. New York: John Wiley and Sons. p. 253. ISBN 0-471-28451-3.
- Ananth, Sashikala (1 January 2000). Penguin Guide to Vaastu: The Classical Indian Science of Architecture and Design (2 ed.). Mumbai: Penguin. ISBN 014027863X.
- Michell, George (1988). The Hindu Temple. Chicago: University of Chicago Press. pp. 151–153. ISBN 0-226-53230-5.
- Sellby, Martha A.; Indira Viswanathan Peterson (2008). Tamil geographies: cultural constructions of space and place in South India. SUNY Press.
- S. Sundararajan (1991). Ancient Tamil country: its social and economic structure. Navrang.
- Lienhard S., von Hinèuber O. (2007). Kleine Schriften: Supplement (in French). Harrassowitz Verlag. p. 414. ISBN 9783447056199.
- Sthapati, Dr. V. "Lecture at Brihadeeshwara temple (part 2)". You tube.
- Harle, 320-325
- "Towers" on temple website; Tamilwebworld
- "Murudeshwar Temple Now Tallest Gopuram in Asia", April 2008
|Look up gopuram in Wiktionary, the free dictionary.|
|Wikimedia Commons has media related to Gopurams.|
|
<urn:uuid:9efbd622-3b5c-4a6d-853f-73f3f926efe1>
|
CC-MAIN-2020-34
|
https://en.m.wikipedia.org/wiki/Gopuram
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.94/warc/CC-MAIN-20200804131928-20200804161928-00322.warc.gz
|
en
| 0.9066 | 1,676 | 3.65625 | 4 |
OUR LIFE IN CHRIST story: Through Holy Baptism, in the name of the Father, and of the Son, and of the Holy Spirit, we are brought to faith in Jesus our Lord and Savior, who redeemed us, by His death on the cross, through His Word, and the Sacrament of Holy Communion, and in regular worship we are strengthened until that great day when we shall rise to eternal life with the King of Kings.
The dove reminds us of the Holy Spirit. The Holy Spirit descended upon Jesus at his baptism in the form of a dove. To descend means to come down. This dove a coming down too. That reminds us that the Holy Spirit comes from heaven down , to earth to live among us. The circle the dove is shown with is the nimbus we saw earlier with the hand. It is the symbol of sanctity, or holiness. The three
“rays are a symbol of the Deity of God.
"And when Jesus was baptized, he went up immediately from the water, and behold, the heavens were opened and he saw the Spirit of God descending like a dove, and alighting on him." Matthew 3:16.
|
<urn:uuid:071f7f06-b30d-4123-ab67-a213a39878bd>
|
CC-MAIN-2023-40
|
https://www.mycorneronline.com/tutorial/bible/chrismon14.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00122.warc.gz
|
en
| 0.968416 | 239 | 2.5625 | 3 |
Finding an effective way to combat the epidemic of childhood obesity in North America has stumped doctors, educators and parents for years. But a pilot study at West Sechelt – led by a team of B.C. researchers and published this week in the prestigious journal Pediatrics – has showed unusual success in improving children’s health. See the full article here: He ain’t heavy, he’s my buddy:
The program involved students in Grades 4 to 7 teaching younger “buddies” the importance of good nutrition, exercise and self-esteem. Within one school year, researchers from BC Children’s Hospital found that students had made major strides in their health knowledge – and gained less weight than a control group from another school.
Fuelled by West Sechelt’s success, the Healthy Buddies program has spread to dozens of schools across British Columbia, Alberta and Ontario. Last month, the World Health Organization took notice and is taking steps to implement the program across the Arabic-speaking world.
It’s a success story the original participants couldn’t have dreamed of in 2002, when it began with a frustrated doctor, an elementary school and a question: Can kids teaching kids have a measurable impact on their health?
“I certainly couldn’t have imagined this,” said Valerie Ryden, a physical education teacher who helped design and implement Healthy Buddies. “But at the same time, we realized that something really special was happening.”
The inspiration for the program came from Suzanne Stock, an endocrinologist at BC Children’s Hospital. Frustrated by the high number of obese children referred to her clinic, she wondered if there was a way to combat the problem through education.
Dr. Stock teamed up with Ms. Ryden, who was hired for her expertise in educational programming. To design their program, they decided to try something that has been gaining recognition among educators in recent years for its effectiveness: peer teaching. “We thought maybe if the older kids partner with the younger kids, maybe we’d have an impact,” said Jean-Pierre Chanoine, a pediatric endocrinologist and researcher involved in the study. “But would it work? We didn’t know.”
For their guinea pig, the researchers turned to Sechelt, a town of about 8,500 on the B.C. coast. The town’s school superintendent had shown interest in finding ways to promote healthy living among students. West Sechelt Elementary was selected for its manageable number of classes. Another school, located about 30 minutes away, would act as a control group.
Beginning in September, 2002, West Sechelt students in Grades 4 through 7 were taught lessons in nutrition, and the importance of exercise and positive self-esteem.
Then, for two or three hours a week, the students were paired up with students in kindergarten to Grade 3 and, with Ms. Ryden acting as a facilitator, they passed on those lessons to their younger buddies. Once a week, the pairs would head to the playground to do organized physical activities.
As the year went on, school faculty members began to realize that they were on to something.
“The [older buddies] would talk to me like we were in the staff room,” Ms. Ryden recalls. “They would say, ‘It went really well today, she’s really catching on.’ “
Researchers and teachers also began noticing changes that none of them had expected. The program seemed to be putting a dent in a problem that can be just as detrimental to a child as obesity, and just as difficult to fix: bullying.
Posted by: Tony Carson | 2 October, 2007
Obesity, bullying and the buddy system
Posted in Health
- Developing World
- Human Rights
- International Relations
- Middle Class
- Middle East
- Open Source
- Social Policy
|
<urn:uuid:b274a215-1be9-4feb-884d-6c75804430c6>
|
CC-MAIN-2013-48
|
http://carsonspost.wordpress.com/2007/10/02/obesity-bullying-and-the-buddy-system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163047212/warc/CC-MAIN-20131204131727-00092-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.972416 | 828 | 2.84375 | 3 |
Kosovo Crisis The tension in Kosovo has existed for centuries, dating back as far as 1389 when Serbs lost an epic battle to the Ottoman Turks in Kosovo. Not until 1912, more than 500 years later did the Serbs regain control when Kosovo became part of the Kingdom of Serbs, Croats, and Slovenes following the collapse of the Austro-Hungarian Empire. With the conclusion of World War II, as an absolute monarchy under the name Yugoslavia, the country became a communist republic. Autonomy was granted to Kosovo in 1974 in a revised constitution. Kosovo, although a Serbian province, was largely occupied by ethnic Albanians who established Albanian-language schools and institutions.
In 1987, Slobodan Milosevic rose to power in Yugoslavia, riding the wave of Serbian nationalism with his promises of a “Greater Serbia.” Escalating tensions between the Serbs and the ethnic Albanians and the fear of secession prompted Milosevic to strip Kosovo, though 90 percent Albanian, of its autonomy and army troops and police were deployed in battle strength to maintain order. Kosovos Albanian majority voted in 1992 to secede from Yugoslavia, voicing a desire to merge with Albania. President Bush warned Serbs that the United States would use force if the Serbs attacked Kosovo. In 1997, The Kosovo Liberation Army began killing Serb policemen and others supporters of the Serbs. The conflict turned into a guerilla war after Milosevic sent troops into the areas controlled by the Kosovo Liberation Army and killed 80 Kosovars.
Shortly after, talks were held for the first time advocating a peaceful path to independence for Kosovo, but the Albanian side boycotted further meetings. Later, the United Nations Security Council called for an immediate cease-fire and political negotiations, but with little support from either side. NATO allies then authorized airstrikes against Serb military targets, but were not prompted to take action because Milosevic agreed to withdraw troops and accept unarmed international monitors. Following a number of failed peace talks NATO launched airstrikes on March 24th of this year. The involvement of NATO in this conflict is unprecedented and raises questions about why action was not taken under the auspices of the United Nations rather than NATO. The United Nations has not voted on the use of force against Yugoslavia because both Russia and China would almost certainly veto military action. Russia has a traditional alliance with the Serbs, while China (particularly because of their own political situation and human rights violations) opposes any international intervention in the domestic affairs of sovereign nations like Yugoslavia.
The crisis in Kosovo is of particular interest to Russia because it is ultimately a test of the relative weights of sovereignty and the right to self-determination. As the outlying areas of Russia are home to a myriad of ethnic groups, the settlement of the situation in Kosovo will provide a precedent (albeit perhaps a reluctant one) to which future conflicts might be resolved. Once the governments of the NATO countries decided it was necessary to intervene in Kosovo, they acted without taking the issue to the United Nations Security Council because of the certain resistance of China and Russia. The United States and NATO objectives are to stop the killing and achieve a durable peace that prevents further repression and provides for democratic self-government for the Kosovar people. The United States and NATO have three strong interests at stake in the Kosovo conflict: averting a humanitarian catastrophe; preserving stability in a key part of Europe; and maintaining the credibility of NATO. The Serbians sustained and accelerating repression in Kosovo is creating a humanitarian crisis of a staggering dimension. Serb forces have killed hundreds of ethnic Albanians in an effort Serbs call “ethnic cleansing”, and displaced an estimated 250,000 by burning and looting their homes.
Currently 40,000 Serbian police and military troops are positioned in and around Kosovo poised for a military offensive. The instability in Kosovo directly threatens peace in the Balkans and the stability of Europe, which could have viable consequences to the United States as well as the rest of the world. There is no natural boundary to this violence; World War I began in this same tinderbox. If actions are not taken now to stop the conflict, it will spread and both the cost and the risk will increase substantially. Continued fighting in Kosovo has the potential to re-ignite chaos in Albania and destabilize Macedonia.
In addition the conflict could exacerbate rivalries between Greece and Turkey, two NATO allies. Greece and Turkey have different ethnic, religious, and political allegiances to the peoples living in Kosovo and the nations surrounding Yugoslavia. The conflict could draw those countries in to protect their own national interests. Lastly, so many displaced people creates a breeding ground for international criminals, drug traffickers and terrorists. Perhaps the most decisive motive behind NATOs involvement in Kosovo is the certain risk of losing credibility through inaction.
NATOs credible threat of force was solely responsible in originally obtaining Milosevics agreement to a cease-fire and the establishment of OSCE and NATO verification regimes. This agreement enabled hundreds of thousands of Kosovars to come down from the hills and temporarily return to their homes. As of today, Milosevic has not come into compliance with the October agreements and his repression continues. NATO warned Milosevic that it would respond under such circumstances. Given the situation, action is required on the part of NATO to ensure its continued credibility.
The preference of NATO has been to achieve these objectives through peaceful means. The international community has been actively seeking a peaceful resolution of the conflict through diplomacy. The agreement produced at the Rambouillet and Paris talks keeps Kosovo in Serbia, but gives Kosovars the self-government they deserve, however Milosevic has refused to sign the agreement. Milosevic has rejected all efforts to achieve a peaceful solution. Milosevic has been out of compliance with the solemn commitments to NATO and OSCE since October.
Serb forces have consistently and blatantly violated the cease-fire, moved troops and police out of garrison in violation of his commitments, refused to cooperate with and continued to impede the work of the Kosovo Verification Mission and international relief agencies, and committed atrocities such as the Racak massacre in mid-January. NATO has outlined three clear objectives in the Kosovo conflict. NATO intends to demonstrate its seriousness of purpose in order to make clear to Milosevic the imperative of reversing course. It also must deter Milosevic from launching an all-out offensive against helpless civilians. Finally, to seriously damage Milosevics military capability to take repressive action against Kosovars.
What is to be done to reconcile both the right to Yugoslav territorial integrity and the right to self-determination on the part of the Kosovars? There will need to be two policy prescriptions. Foreign Minister Zivadin Jovanovic has warned the United States and its allies that any initiation of a ground war would result in a conflict that would make Vietnam look like nothing. But the situation would become very different to the one in Southeast Asia. After an extensive air campaign, new conditions provide an end to NATO air strikes from the outset, not completion of Serbian withdrawal from Kosovo. From there on in, armed NATO peacekeepers will administer the safe return of Kosovar refugees.
In this sense, and with the knowledge of human rights violations, the international community will justly revoke Yugoslavias sovereignty. The second policy prescription is the most difficult. Slobodan Milosevic and his supporters must be removed from office and new, democratic institutions put in place to ensure both the maintenance of the Yugoslav state and the wider participation and self-determination of Kosovars. The second policy prescriptions success relies upon the Serbian people. A vocal minority will be hateful of the measure. It will be a matter of harnessing the anti-Milosevic sentiments present during the protests of 1991 and 1997 to remove him from office. He will not retire without a struggle.
His removal by his own constituents proves the key component to the success of new democratic institutions. Democratic institutions, in which the Kosovars, Montenegrins, and Serbians alike may be represented, seem the best (though not the perfect) solution to opposing sovereignty and self-determination rights. Much as in Bosnia, a peacekeeping force will be required for years to attempt to fortify the new constitutional government against what amounts to over 600 years of distrust between the Serbian and Kosovar parties. This solution is ideal in the respect that it is a compromise attractive to the international community. The sovereignty and territorial integrity of Yugoslavia will be maintained.
A medium for some safe exercise of self-determination rights will be provided. No clear preference will be shown between the two, and international law can continue to operate case-by-case.
|
<urn:uuid:9d4ded37-e857-49a1-ab48-401f3a1afcfb>
|
CC-MAIN-2020-16
|
https://deliciousghost.com/kosovo-crisis-article/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371829677.89/warc/CC-MAIN-20200409024535-20200409055035-00293.warc.gz
|
en
| 0.95796 | 1,764 | 3.796875 | 4 |
American Flags near Minden.
Made in America!
The American flag is a strong sign of American identity and nationwide pride. Likewise called Old Glory, the United States flag has a colorful history and also has gone through several adjustments since the very first main flag of 1777.
Today the U.S. flag consists of thirteen straight stripes, seven red alternating with six white stripes. The stripes stand for the initial 13 colonies; the stars stand for the 50 states of the nation. The colors of the flag are symbolic as well: red symbolizes strength as well as valor, white symbolizes pureness as well as innocence as well as blue stands for vigilance, determination and also justice. Nevertheless, the reason the Continental Congress initially selected the red, white, and blue shades was not explained in the resolution embracing the flag. Chroniclers think it was most likely a color choice based on the British Union Jack, which had previously flown over the colonies.
Over time, some have actually connected a little various significances to the three shades, for example, the shade red signifying the bloodshed spilled to preserve our freedoms, however the significance of the initial definition has been fairly consistent from 1782.
Just how did the American flag become what it is today?
It is so much greater than the 3 colors or a “decoration”. Consider the places around the world that the American flag has flown, think about the transformation it has undertaken throughout the years on American land. It is genuinely humbling to think of all that was provided and sacrificed to make sure that the American flag can fly easily throughout this country.
The flag that began with only 13 stars grew to 50 with the addition of new states to the Union. The number of stars on the flag slowly increased to its existing number today wherein a brand-new star would certainly be included in the blue field on the 4th of July after the day of each new state’s admission.
The variety of alternating horizontal red as well as white stripes has actually continued to be at thirteen except from 1795 to 1818 when fifteen stripes showed up on the flag to show the admission of Kentucky and Vermont to the Union. In 1818, it was determined that adding a stripe to the flag for every brand-new state would certainly no longer happen as it will make the flag look crowded and also it would certainly make the flag unwieldy. It was agreed then that the flag would go back to consisting of only thirteen stripes to stand for the original colonies.
The American flag is an icon not only of strength, valiance, purity, virtue, vigilance, perseverance as well as justice; it is an icon of liberty. Freedom that has been dealt with so hard for over the decades. Freedom that has actually cost this country and the households within so much, and yet it is still a beacon to those wanting they had the liberty that the country has.
Folding up the American flag.
Traditional flag rules prescribes that prior to an American flag is kept or presented, its handlers need to two times fold it in half lengthwise; after that (from the end opposite the blue field) make a triangular fold, remaining to fold it in triangles til the other end is reached. This makes a triangular “pillow” of the flag with only heaven starred field revealing outside, and it takes thirteen folds to generate: 2 lengthwise folds and eleven triangular ones.
The flag isn’t folded up in this manner due to the fact that each of the folds has a special symbolic significance; the flag is folded this way since it provides a dignified ceremonial touch that identifies folding a flag from folding a normal item such as a bedsheet, and since it results a visually pleasing, easy-to-handle form. This thirteen-fold procedure was a common technique long before the creation of a ceremonial assignation of “indicating” per of the actions.
A sophisticated flag folding event including these significances has from then on been developed for special events such as Memorial Day and Veterans Day. These connections are “real” in the sense that they indicate something to the people that take part in the ceremony, but they are not the reason that a flag is folded up in the traditional thirteen-step fashion.
This is America as well as its icon is the American Flag. This respectable symbol has been targetted at, set fire to, spew on as well as stomped on, but she rises repeatedly. Despite the fact that lots of Americans near Iowa state happily fly the flag outside their homes and businesses every day, it is fitting that we, as a country, have reserved one particular day every year to honor our flag and to bear in mind that it stands for the beliefs as well as values that we ought to strive to promote. May God bless America and those who defend her.
Minden ZIP codes we serve: 51553
|
<urn:uuid:53624b79-1ac4-44c2-a8f2-69faa9e6a732>
|
CC-MAIN-2017-34
|
http://americanflaginfo.net/us-flags-sale-minden-ia-51553.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886118195.43/warc/CC-MAIN-20170823094122-20170823114122-00091.warc.gz
|
en
| 0.969542 | 998 | 2.796875 | 3 |
Rain has been over-abundant in the last couple of weeks. So, of course, it is no surprise that anthracnose is already showing up. Anthracnose is primarily a foliar disease affecting many deciduous trees including ash, elm, oak, and maple. So far, all the reports we have received have been on maples, but it is likely other species are showing symptoms and we just have not heard about it. Leaves are already heavily spotted. Often, we don’t see a lot of defoliation with anthracnose (except for sycamore anthracnose), but infections on maple seem to be severe enough this year to be causing some defoliation. This will not be fatal, but it will put some additional stress on trees as their “food factories”, the leaves, drop off prematurely. The food that trees make for themselves is different from what fertilizers provide, so extra fertilization is not warranted.
The fungi are able to infect the young, tender leaves, especially during cool and wet springs, like we’ve been having this year. The disease is caused by several different fungi. The fungi are host specific, so the maple fungus doesn’t infect oak trees, and so on. Symptoms vary with the plant host, weather, and time of year when infection occurs, but this disease often produces brown or black blotches (fig. 10) and curled or twisted leaves. Infection is more severe when prolonged spring rains occur after new growth is produced. Although the symptoms appear in late spring into the summer, the initial infection took place in the early spring at bud break and before the leaves hardened off. Once the symptoms show up, it is too late for any chemical applications to be effective.
Management: Cultural methods are usually sufficient to reduce the severity of anthracnose in our region. These include:
- Pruning trees to open up the canopy for better air circulation.
- Maintaining tree vigor with proper watering during times when rain is inadequate.
- In the fall, cleaning up and destroying fallen leaves to reduce the source of inoculum.
With Arborjet products, you’ll differentiate yourself from the competition.
Our Trunk Injection products provide a solution that is fast and effective, and it eliminates the need to put harmful pesticides into the air and soil. Trunk injections can be done during inclement weather and in active areas where other applications can’t be used, and it does not require special scheduling.
Our water management, soil enhancement, and organic products also offer a range of unique and impressive results for total landscape care.
Strobe Pro G is a granular fungicide with a combination of two broad spectrum, curative and preventative fungicides for the control of turfgrass plant diseases. It provides the same control as Strobe Pro Fungicide, only now in granular form. It is formulated with two combination spectrum Azoxystrobin and Propiconazole. Azoxystrobin interferes with the normal respiration of the fungus and Propiconazole is a known DMI’s to help prevent cell membrane from forming. Use for treatment against leaf spots, patch diseases, stem, foliar and root diseases, fairy rings, anthracnose, molds, mildews and rusts of turfgrass.
Control the Uncontrollable.
Sure Power is a new standard in herbicide power, providing swift early-season and late-season control to strike down challenging broadleaf weeds. In fact, broad-spectrum Sure Power is proven to produce excellent control of ground ivy and wild violet. Its four-way formulation manages more than 250 broadleaf weeds, making Sure Power a valued tool in the pursuit of clean cool-season turf.
Fast and Effective Selective Herbicide
- Outperforms the competition in ground ivy and wild violet control
- Proven efficacy on more than 250 broadleaf weeds
- Ideal for early- and late-season application
- Rainfast after one hour
- Rapid knockdown with visible results starting in 2-3 days
- First flumioxazin formulation for cool-season turf
- Group 4 and 14 herbicides support resistance management
- Easy-to-use, reduced-odor formulation
Proven efficacy on challenging weed issues
- Ground ivy
- Wild violet
- Black medic
Some Good News!
After a parent at Sanford Middle School in Minneapolis reached out to principal Amy Nelson suggesting ways of getting food to local kids in the district, the educator never imagined the overwhelming response she would receive from the community, as well as towns and cities beyond.
Over the weekend, many local grocery stores were closed due to protests fueled by the death George Floyd. The sudden closure of these essential businesses quickly limited many families' access to food.
Nelson initially posted a callout on social media, asking for 85 food kits to be donated to help students and their families. Soon after the message went up, it quickly became clear to Nelson that the turnout was going to be much bigger than they had anticipated.
"Aldi, Target, Cub (Foods) — they were all burned out and looted," Nelson said. "The same with Walgreens and CVS. There's nowhere to go (to) buy groceries, diapers or shampoo."
On Sunday morning, people from as far away as Wisconsin descended on the school, which is currently closed due to COVID-19, bringing bags filled with groceries and toiletries. The middle school is within a three-block radius of the 3rd police precinct that was burned during the protests.
"I think people were looking for something to do," Nelson told TODAY Food. "We had countless people drive up. They were at a grocery story 25 miles away and people there were buying from our same grocery list."
Initially, Nelson had expected to receive donations from 10 a.m. to noon on Sunday. But when she arrived at the school at 8 a.m., there was already more food than she knew what to do with. Nelson, who has been a teacher and administrator in Minnesota for 20 years, said she has never seen anything like it.
As the piles of groceries mounted, Nelson realized she'd be able to help those beyond her school district. Thankfully, she explained, The Sheridan Story, a local organization that works to fight childhood hunger, was able to step in.
"I told them, 'We’re going to have a lot of people,'" she recalled.
To help get the word out, The Sheridan Story shared some photos from the incredible day on Instagram.
"As we get close to wrapping up the day, but certainly not our work, our words are few and full of love - the outpouring of community support we experienced today was… simply beautiful.
‘Feisty’ 103-Year-old Grandma Celebrates COVID Recovery By Drinking an Ice Cold Bud Light
This 103-year-old woman was given a slim chance of survival after she was hospitalized with a case of the novel Coronavirus earlier this month.
Jennie Stejna, a “feisty Polish grandmother” from Easton, Massachusetts, was the first resident of her nursing home to be diagnosed with the virus after she contracted a low-grade fever. Despite being moved to a quarantined ward, her condition worsened.
Nursing home staffers eventually called Stejna’s granddaughter, Shelley Gunn, and advised her to say her final goodbyes before it was too late. According to the Easton Wicked Local, Gunn’s husband asked Stejna if she was ready to go to heaven—and Stejna reportedly responded with a resounding “hell yes”.
To everyone’s shock, however, Stejna made a full recovery from the virus.
As a means of celebrating her recovery, nursing home staffers gave her a bottle of Bud Light—a drink which Stejna loves, but has not gotten to enjoy in a long time.
Since Stejna’s story has been shared across international news outlets, social media users have hailed the grandma for her strength—and for her good taste.
Contact your sales rep for more information
Tom Breier: email or (630) 417-9054
Tim Breier: email or
Dan Breier: email or
Mark Breier: email or
Kevin Spiller: email or
Zully Arroyo: email or
(708) 506-9933 (Hablo Español )
|
<urn:uuid:018c16de-4023-4d54-b82b-e85e30955160>
|
CC-MAIN-2020-29
|
https://natseed.com/email/2020-06/natseed.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00172.warc.gz
|
en
| 0.960386 | 1,779 | 2.875 | 3 |
A lottery is a form of gambling where people buy tickets for a chance to win money. The winner is chosen by chance, and the prize is usually a large amount of money.
Historically, lotteries have been used by governments to raise funds for public projects, including schools and colleges, towns and wars, and public works such as roads and bridges. Several governments have outlawed or deregulated the sale of lottery tickets, but they still exist in many countries.
The United States is a major market for the sale of lottery tickets. As of August 2004, forty states and the District of Columbia operated lottery programs.
Some state lotteries operate for profit, while others are purely recreational. As of fiscal year 2006, Americans wagered more than $57.4 billion in lottery games, a 9% increase over the previous year.
Players typically pay between $1 and $2 per ticket, depending on the game. The ticket usually contains a set of numbers, and the drawing is held once or twice a week.
In addition to the jackpot, there are other prizes, ranging from smaller amounts to millions of dollars. Some players may choose to participate in a subscription program, where they purchase multiple tickets over time to boost their chances of winning.
There are also multistate lottery games like Mega Millions and Powerball that offer huge jackpots to players from all over the country. Some of these games even allow players to choose annuity options for the jackpot.
The main reason people play the lottery is that it offers them a chance to win against the odds, which is a positive experience. It also provides hope and optimism to those who are struggling financially.
Buying a lottery ticket is not cheap, and it can be an addictive habit that can cost you a lot of money. Moreover, the odds of winning the lottery are very low, so it can be difficult to win even if you have good luck.
To improve your chances of winning the lottery, make sure you always read the rules and terms of the game carefully. The rules of the game can vary widely, so make sure you understand them before you start playing.
Some of the rules that apply to lotteries include: a fixed number and amount of prizes for each game, a fixed prize structure for the lottery, and a payment schedule that depends on how much is paid out by the lottery. The payout schedule can also depend on how many tickets are sold for a specific game.
A draw is held in a lottery and all the eligible players are notified of their results via an email. The email contains all the details of the lottery and any further steps that must be followed if you have won a prize.
The winning tickets are then drawn from a pool of all the players who have purchased tickets for the drawing. The winning tickets are then awarded to the winner by lottery officials.
|
<urn:uuid:754ee189-32d6-4d7b-805f-4d650b786099>
|
CC-MAIN-2023-40
|
https://dralinsyed.com/what-is-a-lottery-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00104.warc.gz
|
en
| 0.978025 | 582 | 2.703125 | 3 |
The rondeau cinquain originally had a refrain of five verses and a total length of 21 which became the norm in the 15th century. The rhyme scheme is AABBA–aab–AAB–aabba–AABBA.
The modern version has the refrains shortened and the restatements are reduced to just the first two or three words of the first line, which stand as short, pithy, non-rhyming lines in the middle and at the end of the poem. These half-lines are called rentrement. If derived from the erstwhile 21-line rondeau cinquain, the result is a 15-line form with the rentrements in lines 9 and 15 (rhyme scheme aabba–aabR–aabbaR). This 15-line form became the norm in the literary rondeau of the later Renaissance, and is known as the “rondeau” proper today
I discovered first this form on 2 January 2016 thanks to a talented fellow blogger and poet Dajena aka moonskittles. You can discover her poetry here
|
<urn:uuid:4c22a416-9e3e-4d5a-88e6-b0f4fc1c027a>
|
CC-MAIN-2020-16
|
https://geethaprodhom.wordpress.com/poems-by-poetry-forms/rondeau/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370495413.19/warc/CC-MAIN-20200329171027-20200329201027-00388.warc.gz
|
en
| 0.946873 | 235 | 2.640625 | 3 |
Human-like robot tricks people into thinking it has a mind of its own
It was actually being controlled by researchers.
An uncannily human-like robot that had been programmed to socially interact with human companions tricked people into thinking that the mindless machine was self-aware, according to a new study.
The digital deceiver, which the researchers dubbed "iCub," is a child-size humanoid robot created by the Italian Institute of Technology (IIT) in Genoa to study social interactions between humans and robots. This advanced android, which stands at 3.6 feet (1.1 meters) tall, has a humanlike face, camera eyes that can maintain eye contact with people and 53 degrees of freedom that allow it to complete complex tasks and mimic human behaviors. Researchers can program iCub to act remarkably humanlike, as demonstrated in its 2016 appearance on Italy's Got Talent when the robot performed Tai Chi moves and wowed the judges with its clever conversational skills.
In the new study, researchers programmed iCub to interact with human participants as they watched a series of short videos. During some of the experiments, iCub was programmed to behave in a human-like manner: greeting participants as they entered the room, and reacting to videos with vocalizations of joy, surprise and awe. But in other trials, the robot's programming directed it to behave more like a machine, ignoring nearby humans and making stereotypically robotic beeping sounds.
The researchers found that people who were exposed to the more human-like version of iCub were more inclined to view it with a perspective known as "the intentional stance," meaning they believed that the robot had its own thoughts and desires, while those who were exposed to the less human version of the robot did not. The researchers had expected that this would happen, but were "very surprised" by how well it worked, lead study author Serena Marchesi, a researcher with the Social Cognition in Human-Robot Interaction unit at IIT, and study senior author Agnieszka Wykowska, the head of the Social Cognition in Human-Robot Interaction unit, told Live Science in a joint email.
Related: Human-like robot creates creepy self-portraits
The iCub robot does have a limited capacity to "learn" like a neural network (a type of artificial intelligence, or AI, that mimics the processes of a human brain), but is far from being self-aware, the researchers said.
In each of the experiments, a single human participant sat in a room with iCub and watched three short two-minute video clips of animals. The research team decided to use video-watching as the shared task because it is a common activity among friends and family, and they used footage that featured animals and "did not include a human or a robot character" in order to avoid any biases, the researchers said.
In the first set of experiments, iCub had been programmed to greet the human participants, introducing itself and asking for their names as they entered. During these interactions, iCub also moved its camera "eyes" to maintain eye contact with the human subjects. Throughout the video-watching activity, it continued to act in a human-like way, vocalizing responsively as people do. "It laughed when there was a funny scene in the movie or behaved as if it was in awe with a beautiful visual scene," the researchers said.
In the second set of experiments, iCub did not interact with participants, and while watching the videos its only reaction to the scenes was to make machine-like noises, including "beeping sounds like a car sensor would do when approaching an obstacle," the researchers said. During these experiments, the cameras in iCub's eyes were also disabled, so the robot could not maintain eye contact.
Intentional vs mechanistic
Before and after the experiments, the researchers made participants complete the InStance Test (IST). Designed by the research team in 2019, this survey is used to gauge people's opinions of the robot's mental state.
Using the IST, the study authors assessed participant's reactions to 34 different scenarios. "Each scenario consists of a series of three pictures depicting the robot in daily activities," the researchers said. "Participants then choose between two sentences describing the scenario." One sentence used intentional language that hinted at an emotional state (for example: "iCub wants") and the other sentence used mechanistic language that focused on actions ("iCub does"). In one scenario when participants were shown a series of pictures where iCub selects one of several tools from a table, they chose between statements that said the robot "grasped the closest object" (mechanical) or "was fascinated by tool use" (intentional).
The team found that if participants were exposed to iCub's human-like behaviors in the experiments, they were more likely to switch from a mechanistic stance to an intentional stance in their survey responses, hinting that iCub's human-like behavior had changed the way they perceived the robot. By comparison, participants that interacted with the more robotic version of iCub firmly maintained a mechanistic stance in the second survey. This suggests that people need to see evidence of relatable behavior from a robot in order to perceive it as human-like, the researchers said.
These findings show that humans can form social connections with robots, according to the study. This could have implications for the use of robots in healthcare, especially for elderly patients, the researchers said. However, there is still much to learn about human-robot interactions and social bonding, the scientists cautioned.
One of the big questions the team wants to answer is if people can bond with robots that do not look human, but still display human-like behaviors. "It is difficult to foresee how a robot with a less human-like appearance would elicit the same level of like-me experience," the researchers said. In the future, they hope to repeat the study's experiments with robots of different shapes and sizes, they added.
The researchers also argue that in order for humans to form lasting social bonds with robots, people must let go of preconceived notions about sentient machines that are popular fear-mongering fodder in science fiction.
"Humans have a tendency to be afraid of the unknown," the researchers said. "But robots are just machines and they are far less capable than their fictional depictions in popular culture." To help people overcome this bias, scientists can better educate the public on what robots can do — and what they can't. After that, "the machines will become immediately less scary," they said.
The study was published online July 7 in the journal Technology, Mind and Behavior.
Originally published on Live Science.
Live Science newsletter
Stay up to date on the latest science news by signing up for our Essentials newsletter.
Harry is a U.K.-based staff writer at Live Science. He studied Marine Biology at the University of Exeter (Penryn campus) and after graduating started his own blog site "Marine Madness," which he continues to run with other ocean enthusiasts. He is also interested in evolution, climate change, robots, space exploration, environmental conservation and anything that's been fossilized. When not at work he can be found watching sci-fi films, playing old Pokemon games or running (probably slower than he'd like).
By Sascha Pare
By Ben Turner
By Sascha Pare
By Harry Baker
By Ben Turner
By Harry Baker
|
<urn:uuid:5632291e-8d37-45dd-a895-29e89e9e259d>
|
CC-MAIN-2023-23
|
https://www.livescience.com/people-think-robot-has-mind-of-its-own
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00034.warc.gz
|
en
| 0.969239 | 1,544 | 3.078125 | 3 |
This insect, notorious for its “smelly” reputation, earned its name from its tendency to release an odor when disturbed or when crushed. Many other insects have these same characteristics, including some species of ants, beetles and other bugs. Most stink bugs are herbivorous and use their piercing and sucking mouthparts to feed on plant juices. A few common species of stink bugs are predatory and use their mouthparts to drain fluids from caterpillars and other pest insects.
Most species of stink bugs are innocuous, only feeding on their host plants, and are seldom encountered by humans. Stink bugs feed on a variety of plants, including crop species. When stink bugs feed on tree fruits such as apples, it results in a characteristic distortion, referred to as “cat facing,” that renders the fruit unmarketable. Some species can cause damage in cotton and other crops.
Predatory stink bugs use their mouthparts to drain fluids from other pest insects. Some predatory stink bugs are important, beneficial insects in crops and gardens. They prevent caterpillars and other insect pests from destroying plants, trees, crops and gardens. Scientists are interested in using them as natural control agents of crop pests.
When handled or disturbed, stink bugs are able to secrete a bad-smelling, bad-tasting fluid from pores on the sides of their bodies. This secretion protects stink bugs from predators. They are often fed upon by birds, spiders, assassin bugs and other arthropod predators (including other stink bugs). Many species are attracted to lights at night. Adult stink bugs of various species are active from spring through late fall.
During warm months, female stink bugs attach large masses of eggs to the underside of leaves and stems. After hatching, the wingless nymphs go through five immature stages before becoming full-sized, winged adults. Stink bugs are not known to bite humans but caution should be used when handling them to avoid a release of their odor.
To prevent stink bugs from entering homes and buildings, seal cracks around windows, doors, siding, utility pipes, behind chimneys, and underneath the wood fascia and other openings. Use a good quality silicone or silicone-latex caulk. Damaged screens on doors and windows should be repaired or replaced. A licensed pest professional can treat for stink bugs in the late summer or fall just prior to bug congregation.
If stink bugs have already entered a home or building, a vacuum cleaner can aid in the removal of live or dead stink bugs. The bag must be removed to prevent odor from permeating the area. If an infestation has developed inside the home or building, a licensed pest control operator should be called to evaluate and assess the problem.
|
<urn:uuid:1d12e3d7-793c-46ce-9a6f-bff577626d8f>
|
CC-MAIN-2023-14
|
https://rkenvironmental.com/pests/stink-bugs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00015.warc.gz
|
en
| 0.938713 | 556 | 3.453125 | 3 |
If you read my last blog post you heard discussion of putting together a practical and useful professional development opportunity for chemistry teachers. It is a conference for teachers, by teachers. My goal is for every presenter to bring in one idea that they find useful in their classroom; One good demo, one good lab, one good original idea about how to do something that we are all doing to begin with.
Figure 1 - Magnesium metal inside a copper wire cage.
While working on the schedule I came across a presentation from three years ago that was absolutely fabulous and truly had an impact on my classroom. It reminded me of why we really need to have professional development presented by classroom teachers who are practicing what they preach every day. Many of us are familiar with the Molar Volume of Hydrogen Gas lab. It was on the required lab list for AP Chemistry for many years and I can find versions of it that date all the way back to Chem Study in 1962. Every version seems to take a strip of magnesium and put it into a small cage of copper wire and insert it into a gas collection tube (Figure 1). Six molar HCl is then reacted with the magnesium. A little twist to this procedure was suggested by an amazing teacher, Werner Willoughby, formerly of San Pedro High School in Los Angeles. He presented the idea of using 12 M HCl (only handled by the instructor) and instead of wrapping the magnesium into the cage of copper wire to simply fold it over and place it in the gas collection tube and let friction keep it in place (Figure 2). Since the acid is so concentrated it reacts almost instantly and provides two great benefits. One is that it does not require a cage of copper that may or may not keep the magnesium in place. Second is that it reacts so quickly it allows for multiple trials in one class period. This saves me a great deal of time! I run after school labs so that I can have a two-hour block of time. I have to do this twice a week to accommodate all the students enrolled in my class. Now I have one less week that I have to stay after school and force the students to stay after school.
Figure 2 - Magnesium metal held in place by friction.
Now I don’t want you to think that the purpose of this blog post is only to describe this technique because it is not. The main purpose is to point out how important continuing education is for teachers and the importance of it being provided by other teachers. I am very confident that all of you reading this have at least one trick you have come up with that I have not thought about. Why not get out there and attend an AACT, BCCE, Biennial, ChemEd or NSTA style meeting and help share your passion and your expertise with others. Every year I organize this meeting I come home with at least one great idea. I have never failed to learn something at every major conference I attend.
Planning and carrying out investigations in 9-12 builds on K-8 experiences and progresses to include investigations that provide evidence for and test conceptual, mathematical, physical, and empirical models.
Planning and carrying out investigations in 9-12 builds on K-8 experiences and progresses to include investigations that provide evidence for and test conceptual, mathematical, physical, and empirical models. Plan and conduct an investigation individually and collaboratively to produce data to serve as the basis for evidence, and in the design: decide on types, how much, and accuracy of data needed to produce reliable measurements and consider limitations on the precision of the data (e.g., number of trials, cost, risk, time), and refine the design accordingly.
|
<urn:uuid:573748ec-db40-4a8c-b099-25727273dc04>
|
CC-MAIN-2023-50
|
https://www.chemedx.org/blog/molar-volume-gas-lab-tip
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103464.86/warc/CC-MAIN-20231211013452-20231211043452-00543.warc.gz
|
en
| 0.96428 | 746 | 2.765625 | 3 |
The Web pages you visit, the e-mail you read, the music you download and the radio stations you listen to on the Internet are all delivered to you by applications using TCP/IP. TCP/IP makes it possible for different types of computers and devices to talk to each other across multiple networks. TCP/IP is what makes the Internet work, and does so invisibly to the user.
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP actually consists of several protocols: TCP, IP and other support protocols. The specifications are in the public domain, so there are no license fees for their use, and any company is free to use TCP/IP in their products. Because it is an open standard, just about every computer system, and an increasing number of devices, can speak TCP/IP and can therefore talk to each other.
TCP/IP works with the Open Systems Interconnect (OSI) layered model. Its operation is broken down into layers with specific responsibilities. The concept of a layered model is fundamental to the ease-of-use and widespread adoption of technologies like e-mail and the World Wide Web. Each layer hides the details of the layers below it and provides additional services to the layer above it.
Using this type of approach may seem arbitrary at first, but the advantages are significant. For instance, it is possible to change or improve how things are done at any layer without having to change anything in the other layers. For example, when you visit a Web page, you don't need to know anything about how you are connected to the Internet. You just type in the Web address of the site you want to visit, and your browser works in the same way whether you are using a laptop with a wireless modem or a computer with an Ethernet connection.
In the layered model, programs such as the Web browser are at the application layer, the uppermost layer. The bottom layers manage raw data transmission over the physical link, which can be anything from a direct Ethernet connection to a modem over a telephone line or wireless link. In the middle are the TCP and IP protocols, and other support protocols that are part of the TCP/IP protocol suite. The TCP/IP protocol layers are what hide the details of your network connection from the browser. Figure 1 shows the different layers and the services they provide.
The Internet Protocol, or IP, is a network layer protocol, which has the responsibility of routing data from one computer to another across the Internet. Network layer routing is accomplished with IP addresses, which uniquely identify every device on the network. To send data from one device to another, you only need to specify the IP address of the destination device. An IP address is a 32-bit value, often expressed in dotted decimal form, for example 188.8.131.52. If the two machines are on the same physical network, the IP layer sends data to the destination directly. If the destination computer is on a distant network, the IP layer uses routers to find a path from the source to the destination.
The Internet consists of thousands of computer networks connected through routers and can be thought of as a network of networks. Routers transfer data from one network to another using complex algorithms and protocols to determine routes and optimal paths across networks. The IP layer handles routing invisibly, so that routers and the details of their operation are hidden to the upper layers. IP also hides the details of the underlying network architecture, so that sending data across dial-up connections, high-speed leased lines, or microwave links all looks the same at the higher level protocols.
TCP/IP is a packet-switched protocol, which means that when you send a continuous stream or large file across the network, it is broken down into smaller pieces called packets before it is sent. The network layer may choose to route the packets that make up a single transmission along different paths to avoid network congestion or take advantage of optimal routes along the way. While the network layer provides services for routing data from one place to another invisibly, it doesn't offer any guarantees that the data won't get lost along the way, or that the packets will arrive in the same order in which they were sent. These are the responsibilities of the next layer up, called the transport layer.
In the TCP/IP protocol suite, the Transport Control Protocol provides reliable data transmission on top of IP. The TCP layer takes care of retransmission of any lost packets, and puts packets back together in order so that the receiver gets an exact copy of what was sent. Applications that can't tolerate lost data typically make use of TCP. UDP, or User Datagram Protocol, is another transport layer protocol that is part of TCP/IP. While UDP is referred to as a transport layer protocol, it is just an interface for sending data over IP directly. UDP doesn't offer any additional services beyond the best effort delivery attempts provided by IP, so it doesn't guarantee that the data will arrive in the order it was transmitted, or that it will arrive at all. Applications such as Web browsers or e-mail clients use the reliable delivery service of TCP so that the Web pages you visit and the e-mail you receive are exact copies of what was sent.
As a user, you don't need to know anything about TCP, UDP or IP addresses to use the Internet. IP addresses are invisible to the user in most cases because of a support protocol called Domain Name Service or DNS. DNS can translate a human readable hostname into IP address. When you access a website by typing a Web address like www.beradio.com into your browser, you're telling your browser to contact a specific computer with the hostname “www.beradio.com.” The Web browser gives DNS that hostname and DNS returns the IP address, which allows the browser to connect to the Web server running on that machine.
Ken Nosé is chief software architect of NeoSonic Industries, Cleveland.
Acceptable Use Policy blog comments powered by Disqus
[an error occurred while processing this directive]
Today in Radio History
The history of radio broadcasting extends beyond the work of a few famous inventors.
EAS Information More on EAS
The feed provides feeds for all US states and territories.
Need a calendar for your computer desktop? Use one of ours.
Information from manufacturers and associations about industry news, products, technology and business announcements.
A cutting-edge radio and TV broadcast media center brings hope and entertainment to a sixth pediatric hospital.
Browse Back Issues[an error occurred while processing this directive]
Also in the December Issue
- IP Audio Begins Interoperability Journey
- New Tower Construction Update Mainly for the Birds
- The FCC has been busy since the government shutdown in October 2013.
- Applied Technology: HD Voice
- Field Report: iZotope RX3 Advanced
- Side by Side: Portable Recorders
- New Life for Legacy Equipment
- Do You Remember? Gifts of Holidays Past
|
<urn:uuid:a69212fc-df7f-41aa-b000-66968c1f4f77>
|
CC-MAIN-2013-48
|
http://radiomagonline.com/features/radio_tcpip_primer/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164992771/warc/CC-MAIN-20131204134952-00091-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.926504 | 1,435 | 4.15625 | 4 |
Understanding Over-the-Counter Drug Addiction and Treatment
Heroin and methamphetamine come to mind immediately when most people think about the dangers of drug addiction. However, over-the-counter (OTC) drugs can also pose significant health risks to Americans. In fact, the National Institute on Drug Abuse (NIDA) noted that OTC drugs (along with prescription drugs) are the most commonly abused substances in the U.S. after alcohol and marijuana.
Over-the-counter drug abuse is so widespread, in part, because the substances are very accessible. Additionally, many users don’t realize that OTC drugs can be addictive, and this error in judgment can encourage individuals to misuse a substance they buy from off the shelf in their local pharmacy.
The reality is that nearly any drug has the potential for harm if used incorrectly. More information about the major risks associated with OTC drugs can help consumers make smarter, healthier decisions about medication.
The Most Commonly Abused OTC Drugs
One reason that OTC drugs are abused so easily is because most friends and family do not think to monitor how a loved one uses medication from a pharmacy. Paying a closer attention to what and how a person uses OTC drugs, however, makes it easier to get loved ones the help they need as quickly as possible.
The following OTC medications historically have a high risk for abuse and addiction:
- Pseudoephedrine – This drug is commonly found in nasal decongestants such as Sudafed, and some people use the substance to illegally produce methamphetamine.
- Caffeine – While caffeine is perfectly safe in small doses, an overdose of caffeine can easily result in life-threatening symptoms, such as irregular heartbeat, hallucinations, convulsions and breathing difficulties.
- Acetaminophen – A mild analgesic drug used to treat pain and fever, acetaminophen can be combined with a long list of other medications. Abuse risks include acute liver failure, stomach pains, convulsions and coma.
Other Commonly Abused OTC Drugs
Not all over-the-counter medications are abused as often as others. However, almost any medication has some potential for addiction. Awareness is key when it comes to preventing yourself or a loved one from developing a dependency.
The following OTC drugs are extremely accessible and seemingly harmless, yet ripe for abuse:
This nonsteroidal, anti-inflammatory drug is commonly found in the over-the-counter section of the pharmacy. Ibuprofen works by limiting the body’s ability to produce the chemicals that induce pain and inflammation. Though ibuprofen is not naturally addictive, it is possible for individuals to become dependent on the drug as a form of pain management.
Colorful diet pills were once sold everywhere from pharmacies to grocery store aisles. However, greater scrutiny of unregulated medications revealed that these mysterious dietary supplements are not as harmless as they may appear.
According to the Food and Drug Administration, many of these diet pills contain unknown quantities of prescription drugs, controlled substance and potentially dangerous chemicals. As a result, diet pills represent an unpredictable risk for abuse and addiction.
Popular OTC cough syrups such as NyQuil and Robitussin contain dextromethorphan (DXM), a drug that produces psychoactive side effects when taken in excess. In excessive doses, DXM mimics the dissociative properties of street drugs such as ketamine and PCP. Young people typically abuse cough syrups containing DXM because of its euphoric effects and because the substance is easily accessible at most drug and grocery stores.
Antihistamine, a chemical developed to manage the activity of the body’s histamine’s receptors, is a major ingredient in several OTC allergy medications. Some individuals abuse allergy medication to take advantage of antihistamine’s moderate hallucinatory effects.
Antihistamines also come with a long list of negative side effects, including nausea, disorientation and fever. Long-term abuse of antihistamines also makes the individual more vulnerable to dependence and liver failure.
The Dangers of Mixing OTC Drugs and Alcohol
OTC drug abuse is inherently risky, but the practice becomes even more dangerous when individuals abuse these substances with alcohol. Acetaminophen is commonly used as part of a hangover cure, but doing so during or soon after drinking alcohol is extremely unsafe. That’s because alcohol greatly magnifies the liver damage that can be caused by acetaminophen. In some cases, this liver damage is irreversible.
Alcohol is also regularly mixed with cough syrups, especially those containing DXM. Long-term mixing of DXM and alcohol can result in life-threatening respiratory problems. The more often alcohol and OTC drugs are consumed together, the higher the risk is for the individual.
Using OTC Drugs Safely
If you or a loved one is currently using an OTC drug, then you should take care to administer the medication correctly. Failure to do so carries with it heavy health and addiction risks. Thankfully, taking OTC drugs appropriately is easy.
Follow these steps to protect yourself and your family from OTC drug abuse and addiction.
- Review Instructions – Take the time to carefully read the Drug Facts label found on OTC medication. Pay close attention to the chemicals contained in the OTC medication, including the appropriate dosage.
- Follow Directions – Once you’ve reviewed the Drug Facts label, follow the printed instructions to the letter. OTC drug abuse often starts after individuals begin to self-prescribe doses of medication.
- Ask Questions – If you are unsure about how much or how often to take an OTC medication, do not experiment until you find a suitable dosage. Instead, talk to a physician or a pharmacist about how to correctly administer your medication.
When It’s Time for OTC Drug Addiction Treatment
You and your loved ones don’t need to deal with OTC drug addiction alone. Overdose deaths and health complications related to OTC drug abuse can be prevented if individuals can get access to the help they need.
Get in touch with The Treatment Center of the Palm Beaches if you fear that OTC drug abuse is threatening the safety of your family. You can reach our admissions counselors 24/7 at (866) 295-6003 if you have questions about over-the-counter drug addiction and treatment.
|
<urn:uuid:85a23aa5-3916-4df6-95e6-f33e2e342bc2>
|
CC-MAIN-2017-39
|
https://www.thetreatmentcenter.com/resources/wiki/otc-drugs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00519.warc.gz
|
en
| 0.929071 | 1,322 | 2.84375 | 3 |
Modern Masters e-Book with video!
Modern Masters for K-2nd grade contains three lesson plans that will check off all your art room standards. Easy and dynamic, the lesson now include the option to purchase the e-book with or without the video supplements.
Modern Masters for Kinder-2nd grade introduces young children to the modern masters with easy to prep and easy to do art lessons. Children learn about Henri Matisse and his fauve painting “The Goldfish”, Paul Klee’s “Cat and Bird” and Claude Monet’s “Waterlilies”. Each lesson is designed so that every child of any ability can master the art techniques demonstrated.
This 22-page booklet features three complete lessons and is perfect for ages 5-8. The booklet includes:
- 22 pages of photo-tutorials and teacher tips
- An introduction to the artist and his paintings
- 3 handouts: How to draw a lily pad, how to draw Matisse’s “Goldfish” and how to draw Klee’s “Cat and Bird”.
- Literature tie-in suggestions
- Student galleries
- Art Supply lists
About the Video Option:
I am pleased to offer you a view into how I teach my painting and drawing techniques. These videos are designed to offer visual tips and new ideas on teaching children art.
The video links are embedded into the PDF document. Simply click on the URL and you will be directed to a private video page that will require a password. Enter the password as indicated on the PDF and you can watch three video tutorials of the lessons. It’s that easy! The 10-minute videos are recorded in high definition and will require a few minutes to load. Please be patient. Also, if you use Internet Explorer, it is best to switch to either Google Chrome or Safari to view the videos.
Interested? Watch this!
Should you have any questions, refer to the Customer Support Page.
Click to see The Modern Masters K-2 PDF with Video in the Shop
Click to see The Modern Masters K-2 PDF in the Shop
|
<urn:uuid:19acf685-1610-46ce-b371-6974d18bdd57>
|
CC-MAIN-2014-23
|
http://www.deepspacesparkle.com/2012/07/25/modern-masters-e-book-with-video/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883468.51/warc/CC-MAIN-20140722025803-00165-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.904753 | 450 | 3.0625 | 3 |
Binġemma is a small Maltese village, located on the outer limits of Mgarr and boasting beautiful country scenery. But some of its most fascinating features can’t be seen by scanning the horizon. Just across the view of the land below, there’s a series of prehistoric tombs and cave dwellings.
These troglodytic sites stretch across different levels. Some are fairly shallow, whereas others contain corridors that wind their way into even further caves and chambers.
The origins of the site are shrouded in mystery. Archaeologists can’t reach a consensus on what time period they’re from. Some say the troglodytic site dates from the Bronze Age; others claim the caves are a Punico-Roman necropolis; and yet still others insist the caverns are actually the remains of catacombs from a first-century Greek cemetery.
One thing that is certain, however, is that this enigmatic place was briefly used during the 20th century. Like many other underground settlements scattered throughout the country, the caves served as a hiding spot for the locals during the bombings of World War II.
On the edge of the rock outcrop on the other side of the valley, there’s also the chapel of Our Lady of Itria (Lady of the Way) that was built in the 1670s.
Know Before You Go
Access to these tombs is through a little pathway next to the chapel.
|
<urn:uuid:c362e9b6-5655-40f7-abed-5163360a49d7>
|
CC-MAIN-2020-29
|
https://assets.atlasobscura.com/places/bingemma-troglodyte-settlement
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886516.43/warc/CC-MAIN-20200704170556-20200704200556-00006.warc.gz
|
en
| 0.957965 | 301 | 2.84375 | 3 |
The oldest trees east of the Rocky Mountains can be found on this meandering blackwater stream in the southeastern part of the state: a stand of thousand-year-old bald cypress trees. The oldest is a staggering 2,624 years old. These ancient trees are easily recognized by their huge buttresses and flat tops that have been blown out by countless storms.
The river flows 66 miles through portions of Sampson, Pender, and Bladen counties before emptying into the Cape Fear River 14 miles above Wilmington. Water ash and cat-briar form a subcanopy of dense thickets along the banks of the river. Elsewhere along the river, slight variations in elevation allow for changes in the forest from black gum and tupelo gum in lower areas, to water hickory, American elm, and some oak species on the ridges. In a few places, dry upland bluffs along the river support longleaf pines and turkey oaks.
In recognition of the fact that the Black River is one of the cleanest, high-quality waterways in North Carolina, the state designated the river an Outstanding Resource Water in 1994. The river is home to rare fish species such as the Santee chub and broadtail madtom and numerous rare mussels like the Cape Fear spike. Many wildlife species inhabit the river’s floodplain, including bobcat, river otter, black bear, and neotropical songbirds like the prothonotary warbler and yellow-throated vireo.
The Black River is a treat to canoe throughout the seasons. You will relish drifting down the slow-moving tea-colored stream flanked by stately bald cypress draped with Spanish moss. Swamp roses bloom in the spring and spider lilies grace the water in the summer. Spring is a great time to see migratory songbirds nesting, while the foliage is outstanding in the fall.
The Bald Cypress
The ancient trees were discovered by accident in the 1980s. University of Arkansas professor David Stahle was exploring the relationship between tree growth rings and climate. His work led him to the Black River in southeast North Carolina.
Using an increment borer, essentially a hollow tube that takes a small cross section of a tree without harming it, he counted growth rings of Black River bald cypress. Many of the trees are more than 1,000 years old, with the oldest dating back to 605 BC.
The Nature Conservancy protected and manages the Three Sisters swamp where these ancient giants grow.
History of the Preserve
The Nature Conservancy is the sole conservation group actively working to protect the ancient bald cypress and their surrounding lands and waters. Since the 1990s, we’ve protected over 16,000 acres of land in the Black River basin.
|
<urn:uuid:e6a5e0a0-b91b-4883-9342-94f1f64a3bd9>
|
CC-MAIN-2020-10
|
https://www.nature.org/en-us/get-involved/how-to-help/places-we-protect/black-river-preserve/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146004.9/warc/CC-MAIN-20200225014941-20200225044941-00084.warc.gz
|
en
| 0.935305 | 575 | 3.515625 | 4 |
Random Facts about Yellowstone Park
DESCRIPTION OF THE YELLOWSTONE PARK
The Yellowstone National Park extends sixty-five miles north and south, and fifty-five miles east and west, comprising 3,575 square miles, and is all 6,000 feet or more above sea-level. Yellowstone Lake, twenty miles by fifteen, has an altitude of 7,788 feet. The mountain ranges which hem in the valleys on every side rise to the height of 10,000 to 12,000 feet, and are always covered with snow. This great park contains the most striking of all the mountains, gorges, falls, rivers and lakes in the whole Yellowstone region. The springs on Gardiner's River cover an area of about one square mile, and three or four square miles thereabout are occupied by the remains of springs which have ceased to flow. The natural basins into which these springs flow are from four to six feet in diameter and from one to four feet in depth. The principal ones are located upon terraces midway up the sides of the mountain. The banks of the Yellowstone River abound with ravines and canons, which are carved out of the heart of the mountains through the hardest of rocks. The most remarkable of these is the canon of Tower Creek and Column Mountain. The latter, which extends along the eastern bank of the river for upward of two miles, is said to resemble the Giant's Causeway. The canon of Tower Creek is about ten miles in length and is so deep and gloomy that it is called "The Devil's Den." Where Tower Creek ends the Grand Canon begins. It is twenty miles in length, impassable throughout, and inaccessible at the water's edge, except at a few points. Its rugged edges are from 200 to 500 yards apart, and its depth is so profound that no sound ever reaches the ear from the bottom. The Grand Canon contains a great multitude of hot springs of sulphur, sulphate of copper, alum, etc. In the number and magnitude of its hot springs and geysers, the Yellowstone Park surpasses all the rest of the world. There are probably fifty geysers that throw a column of water to the height of from 50 to 200 feet, and it is stated that there are not fewer than 5,000 springs; there are two kinds, those depositing lime and those depositing silica. The temperature of the calcareous springs is from 160 to 170 degrees, while that of the others rises to 200 or more. The principal collections are the upper and lower geyser basins of the Madison River, and the calcareous springs on Gardiner's River. The great falls are marvels to which adventurous travelers have gone only to return and report that they are parts of the wonders of this new American wonderland.
|
<urn:uuid:92b3eb81-abfa-4ad9-8d98-a5dbf0374e16>
|
CC-MAIN-2023-14
|
http://www.findfast.org/random-facts-about-yellowstone-park.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00269.warc.gz
|
en
| 0.952704 | 569 | 3.5625 | 4 |
Final Test - Hard
|Name: _________________________||Period: ___________________|
This test consists of 5 short answer questions and 1 (of 3) essay topics.
Short Answer Questions
1. What happened to Zlata's parents?
2. Which composer was J.S. named for?
3. What illness does J.S. think she has?
4. What actually happened to Doona?
5. What does Melissa begin doing again when she comes into the room in Scene 15?
Essay Topic 1
Discuss the ways in which these women are healed by one another.
Essay Topic 2
Who is Doona and what is her role in both the action and the theme of the play?
Essay Topic 3
Please explain how Melissa is a foil to J.S. Be specific.
This section contains 132 words
(approx. 1 page at 300 words per page)
|
<urn:uuid:b1975db5-834b-4e7b-895a-9b7230032202>
|
CC-MAIN-2014-23
|
http://www.bookrags.com/lessonplan/necessary-targets/test6.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997901076.42/warc/CC-MAIN-20140722025821-00182-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.91742 | 196 | 2.625 | 3 |
By Mihnea Tanasescu
Does good environmentalism mean humans have to become guardians of nature? Triggered by her research in New Zealand, Mihnea Tanasescu reflects on this idea, which is so widespread as to go unnoticed.
If you happen to visit the Wanganui river or Te Urewera, the ancestral Tūhoe homeland in Aotearoa New Zealand’s North Island, you should know that these constitute legal persons. These beings were recognised as persons in law, a move that has generated widespread international media coverage and fawning commentary. I want to reflect on an idea implied in the coverage of these events that is so widespread as to go unnoticed: that good environmentalism means humans have to become guardians of nature.
The legal personality that was granted to the Whanganui river and Te Urewera, is but a node in a process of world-collision that began with Captain Cook and the British colonization, in 1769. Since then, the various Maori descent lines have lost the use of much of their ancestral land at the hands of European settlers. The Whanganui iwi, the tribes inhabiting the Whanganui lands, and the Tūhoe, the inhabitants of Te Urewera, sought to obtain ownership of their respective lands by challenging the Crown in court for having breached the founding treaty of New Zealand, the Treaty of Waitangi (signed, by many but not all chiefs, and notably not by the Tūhoe, in 1840). The iwi (tribes) claimed that they had never given the Crown exclusive rights to their lands. Predictably, the NZ government resisted granting the iwi ownership and, instead, ownership was granted to the land itself: hence, the Whanganui river and Te Urewera are legal persons.
The question of course arises – and this is where the rubber hits the road – of who is to represent the legal person in the future. The NZ legal system does not allow for natural entities to speak on their own behalf, so evidently there needs to be some form of representation put in place. The legal persons therefore each come with a detailed plan of governance, but that is not what I want to discuss here. What I want to pause and think about now is the idea, often repeated in news coverage of these cases, that the iwi are the guardians of the legal persons. This idea is present in most commentary on indigenous relationships to the land, whether in Aotearoa or elsewhere.
Inasmuch as the lands that are now recognized by NZ law to be legal persons in their own right are to be represented by anyone, it seems right that these should be iwi members. But does this also make them guardians of these lands? In law, guardians usually act on behalf of subjects that for one reason or another (age, health, and so on) are not capable of taking care of their own business. And this is where the idea starts to fray, at its very base: isn’t nature the archetype of self-care? Particularly from the point of view of relational thinking, it is an odd thing to claim that nature is helpless.
Maori philosophies are relational ones, meaning that the identity of individuals is simply a knot in a series of relationships extending in space and time, forward and backwards. This is reflected in Maori art as much as cosmological stories and philosophies. Relationships with ancestors are powerfully important and, like in so many other philosophies worldwide, animals and plants, the land and the sea, can themselves be ancestors. This means that these natural entities can be entered into relations with, and human life is simply the travelling node where all sorts of life-forms interact.
The idea of guardianship is very seductive, being somewhat flattering, painting a picture of responsible humans taking care of the rest of the world. It is also, on this account, deeply steeped into the Great Chain of Being thinking: the idea that the universe was ordered on a string of increasing (or decreasing, depending which way you looked) importance, with God on top and the rest of creation strung on hierarchically. The collision of these worlds, the Great Chain and the relational one of the Maori, is still productively shooting sparks today, and is visible in the very personality of nature.
Anne Salmond in her book Tears of Rangi notes that, in the past, kaitiakitanga (the Maori term usually translated as guardianship) used to be exercised by non-human taniwha (supernatural spirits), such as sharks or sting-rays, whereas now it is usually understood to be exercised by people. Human guardianship is in this sense an emptying out of a world that used to be populated by beings more powerful, and more knowledgeable, than ourselves.
This kind of thinking is further propagated by the idea that we live in the Anthropocene – the human age. But guardianship in human terms and the human age are, in a sense, inimical to indigenous, relational philosophies. Ancestral traditions taught that it was nature that was the guardian of people, not the other way around. The point of Maori philosophies, as well as other indigenous ones, is precisely that we are not above the natural order, so in that sense guardianship or stewardship becomes a logical impossibility.
The language of the acts instituting the legal persons combines both indigenous and western conceptions, but ultimately sneaks hierarchy in through the idea of guardianship. However, this does not mean that natural entities are forever subjected to the benevolent human guardian. Tāmati Kruger, an important Tūhoe leader and chairman of the board tasked with governing Te Urewera, makes the following point:
“We don’t need land management plans, we need people management plans”.
Nature is the definition of the self-made, the very principle of self-generation, and Maori philosophies are rooted in this universal truth. The regeneration of nature for example is a feat that nature accomplishes itself, and we are not in a position to consider ourselves guardians of a process that is still fundamentally mysterious. Instead, we can be guardians of our own behavior.
The term for land in te reo, the Maori language, is whenua. The same word is used to designate the placenta, and in Maori tradition this was buried after birth, precisely to underline the connection between the new life and the land. As the etymology of whenua suggests, the land is that which nourishes and connects people to the greater body that makes them possible. To think of ourselves as guardians of the land is, in this sense, akin to thinking of the child as guardian of her mother.
Parallels between indigenous philosophies and the idea of guardianship are well-meaning, but ultimately wrong-headed. Maori philosophies challenge this easy identification, showing it to be a continuation of hierarchical thinking. The relational mode that is present in alternative ways of being and thinking is beautifully exemplified in whakapapa, or genealogy, the practice of telling who you are by way of who you are related to, including where you’re from (who the home river, or mountain, is).
The natural entity here is not under the guardianship of the person, but exactly the other way around; the natural entity is what nestles the person and gives them meaning and identity. This relationship, much closer to ecological science as well as indigenous knowledge – much closer to relational ways of thinking that shun human hubris – is what we must find ways to express. Guardians of the Anthropocene not only doesn’t come close to it, it points us in the wrong direction.
*A longer version of this post was originally published at the civilanimal.com.
Mihnea Tanasescu is a research fellow of the Research Foundation Flanders (FWO) at the Free University of Brussels (VUB), Belgium. He researches and teaches in political ecology, focusing particularly on rewilding theory and practice, legal personality for nature, and the political representation of nature. He blogs about his work at www.thecivilanimal.com
Reblogged this on POLLEN.
|
<urn:uuid:15a4add8-8620-4b18-b0bb-aa01143288e4>
|
CC-MAIN-2023-23
|
https://undisciplinedenvironments.org/2018/12/20/who-is-guarding-whom/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00261.warc.gz
|
en
| 0.964369 | 1,693 | 2.8125 | 3 |
Privately held company
||This article needs additional citations for verification. (May 2008)|
|European Union / EEA|
|UK / Ireland / Commonwealth|
A privately held company or close corporation is a business company owned either by non-governmental organizations or by a relatively small number of shareholders or company members which does not offer or trade its company stock (shares) to the general public on the stock market exchanges, but rather the company's stock is offered, owned and traded or exchanged privately. More ambiguous terms for a privately held company are unquoted company and unlisted company.
Though less visible than their publicly traded counterparts, private companies have major importance in the world's economy. In 2008, the 441 largest private companies in the United States accounted for $1.8 trillion in revenues and employed 6.2 million people, according to Forbes. In 2005, using a substantially smaller pool size (22.7%) for comparison, the 339 companies on Forbes' survey of closely held U.S. businesses sold a trillion dollars' worth of goods and services (44%) and employed 4 million people. In 2004, the Forbes' count of privately held U.S. businesses with at least $1 billion in revenue was 305.
Koch Industries, Bechtel, Cargill, Publix, Pilot Corp., Deloitte Touche Tohmatsu (one of the members of the Big Four accounting firms), Hearst Corporation, S. C. Johnson, and Mars are among the largest privately held companies in the United States. KPMG, the UK accounting firms Ernst & Young and PricewaterhouseCoopers, IKEA, Trafigura, J C Bamford Excavators (JCB), Lidl, Aldi, LEGO, Bosch, Rolex and Victorinox are some examples of Europe's largest privately held companies.
State ownership vs. private ownership
In the broadest sense, the term private corporation refers to any business not owned by the state. This usage is often found in former communist countries to differentiate from former state-owned enterprises, but it may be used anywhere when contrasting to a state-owned company.
In the United States, the term privately held company is more often used to describe for-profit enterprises whose shares are not traded on the stock market.
Ownership of stock
In countries with public trading markets, a privately held business is generally taken to mean one whose ownership shares or interests are not publicly traded. Often, privately held companies are owned by the company founders and/or their families and heirs or by a small group of investors. Sometimes employees also hold shares of private companies. Most small businesses are privately held.
Subsidiaries and joint ventures of publicly traded companies (for example, General Motors' Saturn Corporation), unless shares in the subsidiary itself are traded directly, have characteristics of both privately held companies and publicly traded companies. Such companies are usually subject to the same reporting requirements as privately held companies, but their assets, liabilities and activities are also included in the reports of their parent companies, as required by the accountancy and securities industry rules relating to groups of companies.
== Form of organization ==
Private companies may be called corporations, limited companies, limited liability companies, unlimited companies, or other names, depending on where and how they are organized and structured. In the United States, but not generally in the United Kingdom, the term is also extended to partnerships, sole proprietorships or business trusts. Each of these categories may have additional requirements and restrictions that may impact reporting requirements, income tax liabilities, governmental obligations, employee relations, marketing opportunities, and other business obligations and decisions.
In many countries, there are forms of organization which are restricted to and are commonly used by private companies, for example the private company limited by shares in the United Kingdom (abbreviated Ltd) or private unlimited company and the proprietary limited company (abbreviated Pty Ltd) or unlimited proprietary company (abbreviated Pty) in Australia.
Reporting obligations and restrictions
Privately held companies generally have fewer or less comprehensive reporting requirements and obligations for transparency, via annual reports, etc. than publicly traded companies do. For example, in the United States, unlike in Europe[where?], privately held companies are not generally required to publish their financial statements. By not being required to disclose details about their operations and financial outlook, private companies are not forced to disclose information that may potentially be valuable to competitors and can avoid the immediate erosion of customer and stakeholder confidence in the event of financial duress. Further, with limited reporting requirements and shareholder expectations, private firms are afforded a greater operational flexibility by being able to focus on long term growth rather than quarterly earnings. In addition, private company executives may steer their ships without shareholder approval, allowing them to take significant action without delays. In Australia, Part 2E of the Corporations Act 2001 requires that publicly traded companies file certain documents relating to their annual general meeting with the Australian Securities and Investments Commission, while there is no similar requirement for privately held companies.
Privately held companies also sometimes have restrictions on how many shareholders they may have. For example, the U.S. Securities Exchange Act of 1934, section 12(g), limits a privately held company, generally, to fewer than 2000 shareholders, and the U.S. Investment Company Act of 1940, requires registration of investment companies that have more than 100 holders. In Australia, section 113 of the Corporations Act 2001 limits a privately held company to fifty non-employee shareholders.
Privately owned enterprise
A privately owned enterprise refers to a commercial enterprise that is owned by private investors, shareholders or owners (usually collectively, but they can be owned by a single individual), and is in contrast to state institutions, such as publicly owned enterprises and government agencies. Private enterprises comprise the private sector of an economy. An economic system that contains a large private sector where privately run businesses are the backbone of the economy is referred to as capitalism. This contrasts with socialism, where industry is owned by the state or by all of the community in common. The act of taking assets into the private sector is referred to as privatization. The goal of private enterprise differs from other institutions, the major difference being private businesses exist solely to generate profit for the owners or shareholders.
A privately owned enterprise is one form that private property may take.
Types of privately owned business
- Sole proprietorship: A sole proprietorship is a business owned by one person. The owner may operate on his or her own or may employ others. The owner of the business has total and unlimited personal liability of the debts incurred by the business. This form is usually relegated to small businesses.
- Partnership: A partnership is a form of business in which two or more people operate for the common goal of making profit. Each partner has total and unlimited personal liability of the debts incurred by the partnership. There are three typical different types of classifications for partnerships: general partnerships, limited partnerships, and limited liability partnerships.
- Corporation: A business corporation is a for-profit, limited liability or unlimited liability entity that has a separate legal personality from its members. A corporation is owned by multiple shareholders and is overseen by a board of directors, which hires the business's managerial staff. Corporate models have also been applied to the state sector in the form of Government-owned corporations. A corporation may be privately held (that is, close - that is, held by a few people) or publicly traded.
In India, Pakistan and Sri Lanka, the term private limited (abbreviated: Pvt. Ltd. or (Pvt.) Ltd.) is used after a name of a company which is privately held unlike public companies which use the word limited or PLC only. This system was invented by Nirasha Abeysekera and Kiran Kumar Raju.
- Private company limited by shares (private limited company)
- Private equity
- Public company
- Unlimited company
- "Forbes.com". Forbes.com. Retrieved 2012-03-06.
- Loewen, Jacoline (2008). Money Magnet: Attract Investors to Your Business: John Wiley & Sons. ISBN 978-0-470-15575-2.
- PrivCo.com, Private Company Knowledge Bank.
- Library of Congress, Private company research.
- Ownership Society. Cato.org. Retrieved on 2010-11-16.
|
<urn:uuid:9e0c7810-6d52-4450-a3a1-6986ebbfe95d>
|
CC-MAIN-2013-20
|
http://en.wikipedia.org/wiki/Private_enterprise
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708808740/warc/CC-MAIN-20130516125328-00074-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.961191 | 1,722 | 2.8125 | 3 |
Transgenic maize (corn) has been deliberately genetically modified to have agronomically desirable traits. Traits that have been engineered into corn include resistance to herbicides and resistance to insect pests, the latter being achieved by incorporation of a gene that codes for the Bacillus thuringiensis (Bt) toxin. Hybrids with both herbicide and pest resistance have also been produced. Transgenic maize is currently grown commercially in a number of countries, including the United States (where over 80% of the maize crop is genetically-modified), South Africa, and, to a limited degree, in Spain, the Czech Republic, Portugal and Germany.
Corn varieties resistant to glyphosate isopropylamine (salt) (Liberty) herbicides and Roundup have been produced. There are also corn hybrids with tolerance to imidazoline herbicides marketed by Pioneer Hi-Bred under the trade mark Clearfield, but in these the herbicide tolerance trait was bred without the use of genetic engineering. Consequently the regulatory framework governing the approval, use, trade and consumption of transgenic crops does not apply for imidazoline tolerant corn.
Herbicide resistant GM corn is grown in the United States. A variation of herbicide resistant GM corn was approved for import into the European Union in 2004. Such imports remain highly controversial (The Independent, 2005).
Expressing the toxin was achieved by inserting a gene from the lepidoptera pathogen microorganism Bacillus thuringiensis into the corn genome. This gene codes for a toxin that causes the formation of pores in the larval digestive tract. These pores allow naturally occurring enteric bacteria such as E. coli and Enterobacter to enter the hemocoel where they multiply and cause sepsis. (Broderick et al., PNAS 2006) This is contrary to the common misconception that Bt toxin kills the larvae by starvation.
In 2001, Bt176 varieties were voluntarily withdrawn from the list of approved varieties by the United States Environmental Protection Agency (EPA) when it was found to have little or no Bt expression in the ears and was not found to be effective against second generation corn borers. (Current status of Bt Corn Hybrids, 2005)
In May 1999, a laboratory at Cornell University published the results from a laboratory trial that appeared to indicate that the pollen of genetically modified Bt corn presented a threat to monarch caterpillars. Critics claimed that the popular media was wrong to report that monarch butterflies were threatened because this experiment did not duplicate natural conditions under which monarch caterpillars may come in contact with corn pollen. (Cornell News, 1999)
In 2001 the scientific journal the Proceedings of the National Academy of Sciences published six comprehensive studies that showed that Bt corn pollen does not pose a risk to monarch populations for the following reasons:
(Sears, et al., 2001)
Monarch populations in the USA during 1999 increased by 30%, despite Bt corn accounting for 30% of all corn grown in the USA that year. The beneficial effects of Bt corn on Monarch populations can be attributed to reduced pesticide use. (Trewavas and Leaver, 2001).
Numerous scientific studies continue to investigate the potential effects of Bt corn on a variety of nontarget invertebrates. A synthesis of data from many such field studies (Marvier et al. 2007) found that the measured effect depends on the standard of comparison. The overall abundance of nontarget invertebrates in Cry1Ab variety Bt corn fields is significantly higher compared to non-GM corn fields treated with insecticides, but significantly lower compared to insecticide-free non-GM corn fields. Abundance in fields of another variety, Cry3Bb corn, is not significantly different compared to non-GM corn fields either with or without insecticides.
By law, farmers in the United States who plant Bt corn must plant non-Bt corn nearby. These non-modified fields are to provide a location to harbor pests. The theory behind these refuges is to slow the evolution of the pests to the Bt pesticide. Doing so enables an area of the landscape where wild type pests will not be immediately killed.
It is anticipated that resistance to Bt will evolve in the form of a recessive allele in the pest. Because of this, a pest that gains resistance will have an incredibly higher fitness than the wild type pest in the Bt corn fields. If the resistant pest is feeding in the non-Bt corn nearby, the resistance is neutral and offers no advantage to the pest over any non resistant pest. Ensuring that there are at least some breeding pests nearby that are not resistant, increases the chance that resistant pests will choose to mate with a nonresistant one. Since the gene is recessive, all offspring will be heterozygous, and the offspring from that mating will not be resistant to Bt and therefore no longer a threat. Using this method scientists and farmers hope to keep the number of resistant genes very low, and utilize genetic drift to ensure that any resistance that does emerge does not spread.
However, although mandated by law, compliance data from the EPA for 2008 showed that 25% of Bt corn growers were not in compliance. Data showed that noncompliance climbed to 13.23 million acres or almost 15% of all Bt corn grown, suggesting that in some areas ample acreage does not exist to support pests without resistance to mate with any resistant pests that survived the Bt corn.
The non-Bt pesticide status of the refuges is being compromised by wind-born pollen drifting into the non-Bt corn fields. Corn harvested from the supposed Bt-free zones has shown traces of Bt toxin. The levels found in the non-Bt corn decreases with distance from the Bt-corn fields indicating that the pollen is wind-borne rather than another method of transfer. The concentrations in the refuge fields were found to be low-to-moderate.
Possible solutions to the cross-pollination problem are to plant a wider refuge field or plant varieties of corn that bloom at different times than the Bt fields do. (Chilcutt & Tabashnik, 2004)
"Attribute" is the brand name for a line of Bt sweet corn. Seed is available only to large professional farmers who sign a stewardship agreement. The farmer must agree to not repackage or resell Attribute seed. Growers also must grow the corn exactly as directed. Herbicide resistant sweet corn has not yet been released for sale.
A 2009 study compared an analysis of blood and organ system data from trials with rats fed three main commercialized genetically modified types of maize which are present in food and feed in the world. Approximately 60 different biochemical parameters were classified per organ and measured in serum and urine after 5 and 14 weeks of feeding. GM maize-fed rats were compared first to their respective isogenic or parental non-GM equivalent control groups, followed by comparison to six reference groups, which had consumed various other non-GM maize varieties. According to the authors, "Our analysis clearly reveals for the 3 GMOs new side effects linked with GM maize consumption, which were sex- and often dose-dependent. Effects were mostly associated with the kidney and liver, the dietary detoxifying organs, although different between the 3 GMOs. Other effects were also noticed in the heart, adrenal glands, spleen and haematopoietic system. We conclude that these data highlight signs of hepatorenal toxicity, possibly due to the new pesticides specific to each GM corn. In addition, unintended direct or indirect metabolic consequences of the genetic modification cannot be excluded."
U.S. regulatory authorities permitted the commercial sale of StarLink seed with the stipulation that crops produced must not be used for human consumption. This restriction was based on the possibility that a small number of people might develop an allergic reaction to the Bt protein used in StarLink that is less rapidly digested than the version used in other Bt varieties.
StarLink corn was subsequently found in food destined for consumption by humans. An episode involving Taco Bell taco shells was particularly well publicized . This led to a public relations disaster for Aventis and the biotechnology industry as a whole. Sales of StarLink seed were discontinued. The registration for Starlink varieties was voluntarily withdrawn by Aventis in October 2000.
28 people reported apparent allergic reactions related to eating corn products that may have contained the Starlink protein. However, the US Centers for Disease Control studied the blood of these individuals and concluded there was no evidence that the reactions people experienced were associated with hypersensitivity to the Starlink Bt protein . A subsequent review of these tests by the Federal Insecticide,Fungicide, and Rodenticide Act Scientific Advisory Panel points out that while "the negative results decrease the probability that the Cry9C protein is the cause of allergic symptoms in the individuals examined ... in the absence of a positive control and questions regarding the sensitivity and specificity of the assay, it is not possible to assign a negative predictive value to this"
Aid sent by the UN and the US to Central African nations also contained some StarLink corn. The nations involved refused to accept the aid.
The southern portion of the U.S. corn belt planted the greatest amount of StarLink corn. It is this portion of the U.S. where corn borer damage creates the greatest economic loss to farmers.
The US corn supply has been monitored for the presence of the Starlink Bt proteins since 2001. No positive samples have been found since 2004, showing that it was possible to withdraw this GM crop without leaving traces in the environment once it has been used in the field
In 2007 researchers from South Africa announced the production of transgenic maize resistant to Maize streak disease (MSD), caused by maize streak virus (MSV). This maize is still in the research and development phase.
|
<urn:uuid:e0d206e3-1ed0-454f-b278-55ddff66ca79>
|
CC-MAIN-2014-35
|
http://www.thefullwiki.org/Transgenic_maize
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500811913.46/warc/CC-MAIN-20140820021331-00046-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.952983 | 2,023 | 3.53125 | 4 |
other detrimental nurture effects or how widespread these effects are on the population.* It may very well be that, despite the dramatic nature of some of the clinical cases, the percent of the population affected in this way may be small. In what follows it will be assumed that the three effects already considered have, in fact, a small impact; for the most part the implications of the replacement effect will be traced. THE REPLACEMENT EFFECT The rate at which a population transmits acquired characteristics to subsequent generations will depend in part on the growth rate of the population and its age structure. This is readily seen if we assume that all quality improvements take place among the lower age groups and not the higher ones. For example, nurture and schooling improvements are, for the most part, likely to enter the system during early ages. To the extent that entrants into the work force are of higher quality (i.e., higher education and acquired skills, etc.) than those that leave through retirement or death, the average quality of the labor force improves more rapidly if the rate of population growth is higher (other things equal) rather than lower. "There is some evidence on the effects of starvation that can lead to interesting calculations. For example, Keys (24) determines experimentally the reduction in physical capacities as a consequence of "semistarvation," e.g., a shift from 3,000-plus calories to about 1,600 calories leads in 12 weeks to a decrease in strenuous physical work capacity to 52 percent of the nonstarved group, and, at the end of 24 weeks, to a decrease equal to only 28 percent of the nonstarved group. Of course the initial level based on the diet of well-off American students is unusually high. Perhaps the work capacity is not much lower for a standard below the U.N. Food and Agriculture Organization (FAO) norm but above Colin Clark's (25) calculated norm for west Asia. If so, then we might readily visualize an agricultural family producing grain that would yield 9,600 calories per family per day. Calculating children as two thirds of adults, this would lead a three-child family to have approximately 2,400 calorics per adult-equivalent whereas something close to a six-child family would reduce the intake to the semistarvation level of about 1,600 calories. At this level we might apply Keys' results with qualifications. In the Carnegie experiment mentioned by Keys, men's physical capacities were reduced trivially when on a 2,000 calorie low-weight-maintenance diet. See Brown (26) for actual nutritional reference diets, pp. 36, 142-143. See also Clark (25, pp. 123-129). If we raise Clark's figures by some 25 percent for the greater weight and height of Americans to tally with Keys' data, we obtain a norm of about 2,300 calories. It seems probable that the greatest effects of "semistarvation" are the psychological ones. In Keys' experiments, apathy was a major consequence of semistarvation. It was highly correlated with such psychological elements as lack of ambition, decrease in sell-discipline, decrease in mental alertness, and a decrease in concentration. On a self-rating scale the increase in apathy and the related psychological characteristics was roughly calibrated at about 1.75 on a range between no apathy (0) and extremely more apathy (5). This was approximately half of the amount of the sense of tiredness reported. Of course, it is very difficult to determine the economic significance of these results, but they are suggestive of the possible relationship between poor diet and the type of resultant characteristics that inhibit economic change.
|
<urn:uuid:6b03dc20-5a9c-4465-8b93-eee802f28bda>
|
CC-MAIN-2017-43
|
http://archive.org/stream/RapidPopulationGrowthConsequencesAndPolicyImplications/TXT/00000203.txt
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820700.4/warc/CC-MAIN-20171017033641-20171017053641-00333.warc.gz
|
en
| 0.950281 | 746 | 2.65625 | 3 |
Take out a one dollar bill and look at it. The one dollar bill you’re looking at first came off the presses in 1957 in its present design. This so-called “paper” money is in fact a cotton and linen blend, with red and blue minute silk fibers running through it.
Our first President George Washington is on the front of the bill along with the United States Treasury Seal. On the top of the seal, we see the balanced scales representing justice and equality among all our citizens; in the center is a chevron with 13 stars representing the 13 original colonies; underneath is a key used as a symbol of authority.
As we turn the bill over, we see two circles. Both circles, together, comprise the Great Seal of the United States.
If we look at the left-hand circle, we see a pyramid. Notice the face is lighted and the western side is dark. This symbolizes that our country was “just beginning”: we had just begun to explore the West and we did not yet know what we could do for western civilization.
The pyramid is uncapped, signifying that the work of our nation is not finished. Above, in a capstone not yet in place, we have the all-seeing eye, an ancient symbol for divinity. It was Benjamin Franklin’s belief that one man couldn’t do it alone, but a group of men, with the help of God, could do anything.
The Latin above the pyramid, ANNUIT COEPTIS, means, “It (The Eye of Providence) has favored our undertakings”. The Latin below the pyramid, NOVUS ORDO SECLORUM, means, “A New Order for the Ages”.
At the base of the pyramid is the Roman numeral MDCCLXXVI, 1776, the year our independence was declared.
“IN GOD WE TRUST” is centered above the ONE dollar denomination of this bill, ever reminding us of the “ONENESS”, the UNITY of all mankind under GOD.
If we look at the right-hand circle, we see the Great Seal of the United States, which adorns every Federal Office Building and National Cemetery in the United States.
Prior to 1945, modified with the Eagle looking to its left toward the arrows, it was the seal of the President of the United States, as commander-in-chief of the Armed Forces. Since President Harry Truman ordered this change in 1945, the Eagle always looks to the right toward the olive branch. The presidential seal is always visible whenever he speaks, yet very few people know what the symbols mean.
The Founding Fathers made an appropriate choice when they selected the American Bald Eagle as the emblem of the nation. The fierce beauty and proud independence of this great bird aptly symbolizes the strength and freedom of America. Secondly, he wears no material crown – we had just broken from the King of England and all ties to any form of “nobility”. Also, notice the shield is unsupported – this country now stands on its own.
At the top of the shield (in the full-color version of the Seal), we have a blue field which represents Congress, a unifying factor. The colors are taken from the American flag and officially:
- the red represents hardiness and valor
- the white represents purity and innocence
- the blue represents vigilance, perseverance and justice
On the ribbon in the Eagle’s beak we read, “E PLURIBUS UNUM,” meaning, “Out of Many, One”. We see that the eagle holds an olive branch in its right talon and a cluster of arrows in its left. The official meaning is that the olive branch and the arrows “denote the power of peace and of war.”
Above the Eagle, we see thirteen stars, representing the thirteen original colonies. Notice what the Eagle holds in his talons. He holds an olive branch, symbolizing peace, and arrows. This country wants peace, but we will never be afraid to fight to preserve peace. The Eagle always wants to face the olive branch, but in time of war, his gaze turns toward the arrows.
Some say that the number 13 is an unlucky number, but think about this:
- 13 original colonies joined in signing the Declaration of Independence
- 13 stripes on our flag
- 13 tiers on the pyramid
- 13 letters in the Latin ANNUIT COEPTIS
- 13 letters in E PLURIBUS UNUM
- 13 stars above the Eagle
- 13 bars on the shield
- 13 leaves on the olive branch
- 13 olive fruits
- 13 arrows.
All in one dollar bill.
|
<urn:uuid:2f4cf833-fc5d-4af8-bf72-b3e4097276b0>
|
CC-MAIN-2017-43
|
https://slatelickupc.wordpress.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824357.3/warc/CC-MAIN-20171020211313-20171020231313-00307.warc.gz
|
en
| 0.937351 | 992 | 3.75 | 4 |
Learning Goal: Assess conceptual and procedural fluency for triangle congruence proofs, and reassess compositions of transformations.
- Common Core
- HSG.CO.A.5 – Given a geometric figure and a rotation, reflection, or translation, draw the transformed figure using, e.g., graph paper, tracing paper, or geometry software. Specify a sequence of transformations that will carry a given figure onto another.
- HSG.SRT.B.5 – Use congruence and similarity criteria for triangles to solve problems and to prove relationships in geometric figures.
- G.3(A) – describe and perform transformations of figures in a plane using coordinate notation
- G.3(B) – determine the image or pre-image of a given two-dimensional figure under a composition of rigid transformations, a composition of non-rigid transformations, and a composition of both, including dilations where the center can be any point in the plane
- G.3(C) – identify the sequence of transformations that will carry a given pre-image onto an image on and off the coordinate plane
- G.6(B) – prove two triangles are congruent by applying the Side-Angle-Side, Angle-Side-Angle, Side-Side-Side, Angle-Angle-Side, and Hypotenuse-Leg congruence conditions
|
<urn:uuid:c7c7af83-65d0-477c-b158-ec99763ee617>
|
CC-MAIN-2020-24
|
https://whenmathhappens.com/tag/g-3c/page/3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410352.47/warc/CC-MAIN-20200530200643-20200530230643-00309.warc.gz
|
en
| 0.819459 | 286 | 3.390625 | 3 |
Definition of Keratotomy, radial
Keratotomy, radial: A surgical procedure designed to flatten the cornea and thereby correct nearsightedness (myopia). It is called a radial keratotomy because the radial incisions in the cornea resemble the spokes in a bicycle wheel.
Last Editorial Review: 3/19/2012
Back to MedTerms online medical dictionary A-Z List
Need help identifying pills and medications?
|
<urn:uuid:c1887924-9e51-4f3b-aa7a-fcd67bf0aa86>
|
CC-MAIN-2014-35
|
http://www.medterms.com/script/main/art.asp?articlekey=18081
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00073-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.787201 | 91 | 2.765625 | 3 |
Concrete – the extensive dangers to the planet and human health
Apart from water, concrete due to its benefits of endurance and low cost of production is the most widely used building material on the planet. It provides foundations for modern cities, homes, offices, streets, and pavements.
Cement is a basic component of concrete. The cement industry pumps out more than eight billion tonnes every year.
The sheer scale at which we produce cement means that cement alone before it’s even been made into concrete accounts for four to eight per cent of man-made carbon emissions including dust and gases.
Creating concrete requires huge amounts of non-renewable resources from raw materials, large amounts of energy mostly powered by fossil fuels to heat, mix and cool the ingredients.
Sand is an important part of cement and is being harvested from the environment-destroying beaches and riverbanks which need their sand to prevent flooding and keep ecosystems running.
Concrete uses almost a tenth of the world’s industrial water use – straining supplies for drinking and irrigation, 75 per cent of this consumption is in drought and water-stressed regions.
Concrete replaces natural structures like floodplains or forests without adequately mimicking their essential functions.
Animals, plants, fungi, and their ecosystems have been smothered under tonnes of concrete. It is estimated that about 60 per cent of the soil in the City of Melbourne is covered. This increases flooding, as water cannot sink into the ground thereby increasing run off. The floods in New Orleans after Hurricane Katrina were made more severe because urban and suburban streets could not soak up the rain like a floodplain.
Cement production emits large amounts of toxic substances and pollutants into the air such as cadmium, thallium, and mercury creating considerable environmental pollution.
These toxic elements are bad for anyone exposed to them, but they can also damage the ecosystems nearby wherever the cement is being produced.
Concrete, new or aged is subject to vapour emissions “outgassing” forever unless you make the extra effort to seal the capillary or gel pore system found in all concretes.
Concrete is well known for magnifying heat on hot days – being the significant material that contributes to the heat island effect. It also traps gases from our car exhausts and air conditioner units.
Every part of the process of making concrete has the potential to cause serious damage to the environment however it seems that humanity is far from phasing it out.
The cement industry has undergone some changes to clean up its carbon emissions with concrete being recycled and alternative energy sources being sought.
However, the politics of concrete seen in the form of stimulus spending projects by governments around the world plus cementing our riverbeds and hillsides in the name of flood and mudslide prevention – coupled with the technological advances of the cement industry – makes it difficult for another voice to be heard.
In Japan construction companies have been ordered to “hold back the sea”.
Environmentalists say that mangrove forests could provide a cheaper buffer.
What are the alternatives? While construction companies are fuelled by developers seeking to maximise profits for their shareholders and themselves versus what’s best for the planet or human health and not checked by themselves or government policies we have lots more to lose in air quality, natural resources, water, sand, soil, ecosystems and their natural functions. •
|
<urn:uuid:6204ec7d-446f-4440-9406-306d446a7597>
|
CC-MAIN-2023-50
|
https://www.northwestcitynews.com.au/concrete-the-extensive-dangers-to-the-planet-and-human-health/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00450.warc.gz
|
en
| 0.950855 | 699 | 3.25 | 3 |
Have you ever wondered if light is a wave or a particle? This question has been debated by scientists for centuries, and to this day there is still no clear answer. The question of whether light is a wave or a particle has puzzled scientists since the time of Isaac Newton. Some of the earliest experiments conducted by the British physicist Thomas Young in 1801 suggested that light was made up of particles, while later experiments in the 19th century suggested that light was a wave-like phenomenon.
Today, the answer to this question is still up for debate. Some scientists believe that light is a particle, while others argue that it is a wave. The debate between whether light is a wave or a particle is known as the wave-particle duality. So, is light a wave yes or no? To answer this question, let’s take a look at the evidence that both sides of the argument have.
We’ll explore the history of the debate, who said light is a wave, how is light like a wave, what kind of wave is light, and why do scientists think light is a wave? We’ll also look at the evidence that suggests that light is a particle. By the end of this article, you’ll be able to answer the question: is light a wave yes or no?
Is light a wave yes or no?
Light is a form of energy that travels in waves. It is both a particle and a wave, which means it has both particle-like and wave-like properties. The answer to the question ‘Is light a wave yes or no?’ is a resounding yes!
Light is a Wave
Light is made up of discrete packets of energy called photons. Photons carry momentum, have no mass, and travel at the speed of light. The wave-like nature of light is the result of the electromagnetic radiation of photons. Photons, and the waves they create, are the same thing.
When light interacts with matter, it can be absorbed, reflected, refracted, or scattered. The wave-like nature of light is what allows it to interact with matter in these ways.
Light is Also a Particle
Light can also be thought of as a particle. This is because light is made up of particles called photons. Photons are the smallest particles of light and have both particle-like and wave-like properties.
When photons interact with matter, they can be absorbed, reflected, refracted, or scattered. The particle-like nature of light is what gives it these properties.
Light Has Both Wave-Like and Particle-Like Properties
Light has both wave-like and particle-like properties. The wave-like properties of light are what allow it to interact with matter in ways such as absorption, reflection, refraction, and scattering. The particle-like properties of light are what give it its ability to carry momentum, have no mass, and travel at the speed of light.
Conclusion: Is Light a Wave Yes or No?
The answer to the question ‘Is light a wave yes or no?’ is a resounding yes! Light is both a wave and a particle, which means it has both wave-like and particle-like properties. These properties allow it to interact with matter and travel at the speed of light.
Understanding the wave-like and particle-like properties of light is important for many applications, such as optics, telecommunications, and astronomy. It is also important for understanding how light interacts with matter and how it can be used to our advantage.
Who said light is a wave?
Light has long been a source of fascination and mystery to humans. For centuries, scientists have speculated on its nature, debating whether it is composed of particles or waves. In the early 17th century, Christian Huygens suggested that light travels in waves, while Isaac Newton argued that it was composed of particles too small to detect individually.
Christian Huygens and Wave Theory
Christian Huygens was a Dutch physicist, mathematician, and astronomer who made important contributions to the field of optics in the late 1600s. He was a contemporary of Isaac Newton, but unlike his rival, Huygens believed that light travelled in waves.
Huygens proposed that light was composed of small pulses or waves of energy that moved outward from a source in all directions. He also theorized that light waves could be reflected off of solid surfaces and refracted when passing through a medium such as glass or water.
Isaac Newton and Particle Theory
Isaac Newton was an English scientist and mathematician who is widely considered to be one of the most influential figures in the history of science. He proposed the corpuscular theory of light, which held that light was composed of small particles that moved in straight lines.
Although Newton’s theory was widely accepted at the time, it did not explain certain phenomena, such as how light could bend when passing through a prism. This led some scientists, including Huygens, to question Newton’s theory and propose the wave theory of light instead.
Thomas Young and the Double Slit Experiment
In 1801, an English physicist named Thomas Young proposed an experiment to test whether light was composed of waves or particles. This experiment, which became known as the double slit experiment, involved passing a beam of light through two narrow slits and measuring the pattern of light that emerged on the other side.
Young’s experiment showed that light behaved as if it were a wave, creating an interference pattern on the other side of the slits. This was evidence that light was indeed composed of waves, and not particles as Newton had suggested.
The debate between wave and particle theories of light continued for centuries, but it was Thomas Young’s double slit experiment that ultimately provided evidence that light is composed of waves. This experiment is still considered one of the most important experiments in the history of science and has been used to formulate the modern theory of light.
How is light like a wave?
Light is a form of energy that can travel in a wave-like pattern. This behavior is similar to sound waves, which also travel in a wave-like pattern. When light moves from one medium, such as air, to another medium, such as water, it will change directions. This phenomenon is called refraction and is a wave-like behavior of light.
Refraction occurs when light passes from one medium to another. As it moves, the light wave changes direction. When the light wave enters a medium with a different density, its speed changes. This change in speed causes the light wave to bend.
Examples of Refraction
One example of refraction is when light passes through a glass prism and is split into its component spectral colors. This is due to the fact that light of different wavelengths travel at different speeds when passing through glass. This causes the light wave to bend and split into its component colors.
Another example of refraction is when light passes through a lens. A lens is made of glass and has different densities. When light passes through the lens, the light wave bends and focuses the light. This is how lenses are able to magnify objects.
Interference and Diffraction
Light can also exhibit wave-like behavior when it is subjected to interference and diffraction. Interference occurs when two light waves interact with each other. This can cause the light waves to cancel each other out or amplify each other. Diffraction occurs when light waves pass through a small opening or around an object. This causes the light wave to spread out and bend around the object.
The Speed of Light
The speed of light is also an important factor in understanding how light behaves like a wave. Light travels at a constant speed of about 186,000 miles per second in a vacuum. When light passes through a medium, its speed is reduced. The amount of reduction depends on the density of the medium.
Light behaves like a wave in many ways. It exhibits wave-like behavior when it passes from one medium to another and when it is subjected to interference and diffraction. It also travels at a constant speed and its speed can be reduced when it passes through a medium. All of these behaviors are similar to sound waves and other forms of energy. Understanding how light behaves like a wave is important for understanding its many uses in everyday life.
What kind of wave is light?
Light is a fascinating phenomenon that has been studied for centuries. From its ability to bend around corners to its ability to travel through space, light has many remarkable properties. One of the most interesting aspects of light is that it is an example of a transverse wave.
What is a Transverse Wave?
A transverse wave is a wave that travels in a direction perpendicular to the direction of the energy that it carries. This type of wave is characterized by the fact that the particles in the medium that the wave travels through are displaced parallel to the direction of the wave’s motion. Transverse waves can be found in many different areas of science, including water waves, sound waves, and electromagnetic waves.
What is an Electromagnetic Wave?
An electromagnetic wave is a type of transverse wave that is composed of an electric field and a magnetic field that are perpendicular to each other. These types of waves travel through space at the speed of light, which is approximately 300,000 kilometers per second. Electromagnetic waves are the basis for many different forms of communication, including radio, television, and cell phone signals.
What is Light?
Light is an example of an electromagnetic wave. It is composed of an electric field and a magnetic field that are perpendicular to each other and travel through space at the speed of light. Light can be seen in the form of visible light, which is the light that our eyes can detect. Light also consists of other forms of electromagnetic radiation, such as X-rays and gamma rays.
What are the Properties of Light?
Light is an example of a transverse wave and has many unique properties. It has the ability to bend around corners, known as refraction. It also has the ability to travel through space and is not affected by gravity. Light also has the property of being able to be reflected off of surfaces, known as reflection. Finally, light has the property of being able to be absorbed and re-emitted by objects, known as absorption and emission.
Light is an example of a transverse wave that is composed of an electric field and a magnetic field that are perpendicular to each other. Light has many unique properties, such as its ability to bend around corners and travel through space, that make it an important part of our lives. By understanding the properties of light, we can better understand how the universe works.
Why do scientists think light is a wave?
Light is one of the most fascinating and mysterious phenomena in the universe, and its understanding has been a source of debate and exploration for centuries. Although it was once thought to be a particle, it has since been proved through the interference of light that it is actually a wave. This article will explore why scientists believe light to be a wave, and what evidence supports this theory.
Isaac Newton’s Theory of Particles
In the late 17th century, Isaac Newton proposed that light consisted of small particles, or corpuscles. This was based on his theory of “corpuscular emission”, which stated that all objects emitted tiny particles in all directions, and these particles were responsible for the transmission of light.
The particle theory was widely accepted at the time, and it wasn’t until the 19th century that further experimentation began to challenge this idea.
Thomas Young’s Double Slit Experiment
In 1801, Thomas Young conducted the famous double slit experiment, which showed that light was a wave and not a particle. In this experiment, Young shone a beam of light through two narrow slits in a screen. On the other side of the screen, the light formed an interference pattern of alternating bright and dark bands.
The combination of dark and bright bands is known as an interference pattern and can be seen on the sensor screen opposite the slits. This interference pattern was the evidence Young needed to determine that light was a wave and not a particle as Newton had suggested.
Maxwell’s Wave Theory of Light
In the mid-19th century, James Clerk Maxwell proposed a wave theory of light, which proposed that light was composed of electromagnetic waves. This theory was based on the idea that light was a form of energy that could travel through space in waves.
Maxwell’s theory of light was supported by further experimentation and observation, and it eventually became the accepted scientific theory of light.
The Nature of Light
The nature of light is still a mystery, and the debate continues to this day. However, the evidence from experiments such as the double slit experiment clearly suggests that light is a wave, and not a particle.
The wave-like properties of light have enabled us to understand many of its phenomena, such as diffraction and interference. And although light may be composed of particles, these particles behave as if they were waves.
Therefore, scientists are certain that light is a wave, and this understanding has enabled us to explore and uncover the mysteries of the universe.
In conclusion, the answer to the question “Is light a wave yes or no?” is a resounding yes. Light is made of discrete packets of energy called photons, which carry momentum and travel at the speed of light. This energy is what gives light its wave-like properties, allowing it to bend and travel great distances. Photons, however, have no mass. This allows light to travel faster than any other form of energy.
Light is an amazing phenomenon that has captivated scientists for centuries. Understanding its properties and behavior can help us better understand the universe we live in. With further study, we may be able to discover new ways to use light to our advantage. So, the next time you look up at the stars, remember that the light you see is a wave of energy that has travelled vast distances to reach us.
|
<urn:uuid:b1a1434e-d4f2-4742-914d-832a45b59566>
|
CC-MAIN-2023-40
|
https://whatfuture.net/is-light-a-wave-yes-or-no-10157/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00770.warc.gz
|
en
| 0.969884 | 2,909 | 3.296875 | 3 |
Let’s return to the issue of peak oil. In the first post, I explained that fairly soon the world will reach a peak in the amount of oil it can pump out of the ground on a daily basis. Regardless of how much total oil remains in the earth, natural limits exist to how fast we can get the oil out of the ground.
Why? Common sense would seem to dictate that, if the oil is down there, pumping it out at a faster rate is simply a matter of sinking more wells, or building fatter pipelines, or otherwise turning the dial to 11. And common sense would be wrong.
If you’re like me, you might have naively assumed that tapping an oil field was a bit like tapping a beer keg. Once you get the tap in place, you simply pump away until the keg runs dry. All of the glory lies in finding the keg (oil field) in the first place. Afterward, mining the resource is a standard bit of engineering.
In reality, tapping an oil field is a bit like prospecting for beer the morning after a frat party has taken place (warning: strained analogy ahead). You might find a half-empty keg still in its ice bucket, an easy source of fresh beer. Next, you might collect the leftovers in stray cups and cans littering the common areas. This beer would be stale, contaminated, and available in smaller quantities, but still fairly easy to find. Finally you might resort to wringing out the sofa cushions, a time-consuming, thankless process that would yield only dregs.
An oil field works a bit the same way. First you mine the clean, high-pressure pockets, the source of all those gushing oil wells you see in 1950s movies about wildcatters. From there, you go to increasingly desperate lengths to extract lower-quality crude from the intermixed sandstone, shale, clay, and limestone that comprise a typical oil field.
This is the geological constraint that underlies peak oil, and no technology available now or under development will change the incontrovertible fact that an oil field’s daily production rate goes into decline long before its supply of oil is tapped out.
Not only is this process uncontroversial, it’s fairly predictable. Shell geologist M. King Hubbert figured in 1956 that oil production in the continental U.S. would peak in 1970. He was right — daily oil production in the lower 48 has been in decline since December 1970, despite the fact that we have plenty of oil left.
That was 35 years ago. What’s happened since? In a nutshell, the rest of the world’s oil production has peaked too — with the possible exception of the OPEC countries, and Saudi Arabia in particular. The OPEC countries are a bigger mystery. And a subject for a future post.
|
<urn:uuid:e563d1ec-3971-4695-b7c9-d3d3814d759d>
|
CC-MAIN-2014-15
|
http://www.terrapass.com/science-technology/peak-oil-the-sc/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206672.15/warc/CC-MAIN-20140423032006-00553-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.950109 | 597 | 2.828125 | 3 |
The swing sign looks two legs on a swing going back and forth. On your non-dominant hand, extend your middle and index fingers. Then hook your dominant middle and index fingers over the fingers on your non-dominant hand, and move your hands back and forth.
When you go to the playground, make the swing sign before you put your baby into the swing.
The sign for swing is associated with fun, and babies will learn it quickly. Use it when getting ready to go to the park, or if you are fortunate enough to have an indoor swing, ask your baby if he wishes to spend time swinging.
Get all four volumes of Baby Signing Time...
I am LOVING teaching my daughter sign language. THANK YOU!!
|
<urn:uuid:b9ed19f4-eaf2-4313-aabe-b9ad4b54f699>
|
CC-MAIN-2023-23
|
https://babysignlanguage.com/dictionary/swing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00297.warc.gz
|
en
| 0.89892 | 159 | 2.59375 | 3 |
Zika Exposure While Pregnant Associated with Microcephaly
Zika Virus Infection During Pregnancy Causes Neurodevelopmental Damage to Infected Infants
A new study focused on the Zika virus outbreak in Brazil during 2015-2016 reported there was long-term neurodevelopmental damage to infected infants.
This study of 216 children published in the journal Nature Medicine shows that a very small number of children born without symptoms of Microcephaly went on to develop the condition as an infant.
And, the infants who were exposed to the Zika virus while their mothers’ were pregnant, found that they suffered developmental delays and other problems, even if they were born without the abnormally small heads and underdeveloped brains often associated with Microcephaly.
Below-average neurodevelopment and/or abnormal eye or hearing assessments were noted in 31.5 percent of children, between 7 and 32 months of age.
Of this group of children, language function was most affected, with 35 percent of children testing below average.
Furthermore, these researchers noted a higher rate of autism among children exposed to the Zika virus.
Recent Zika virus news:
- US Government Makes 2nd Zika Investment
- Test Returning Floridians For Both Dengue and Zika Viruses
- Don’t Bring Zika Home This Summer
“You can’t just look at them when they’re born and say they don’t have microcephaly and they look normal and they’re fine, because there are repercussions for the developing brain,” said lead author Karin Nielsen, MD, a pediatric infectious disease specialist at the University of California at Los Angeles, reported the Washington Post.
Dr. Neilsen noted these children living in Rio de Janeiro, Brazil, should be watched for developmental problems because “if you see that these children are at risk for bad neurodevelopmental outcomes, you can implement measures” to help them.
This study is important since the US Centers for Disease Control and Prevention (CDC) continue to report travel-related Zika virus cases in California, Florida, and Utah during 2019.
But, the good news is that during 2018 and 2019, there was no local mosquito-borne Zika virus transmission reported in the continental United States, reports the CDC.
The CDC hosts a web directory of countries reporting Zika virus cases.
This study was supported by the Departamento de Ciência e Tecnologia do Ministério da Saúde do Brasil.
No conflicts of interest were disclosed with these researchers.
|
<urn:uuid:a59764b8-86bf-4ac4-9019-4f47636879e1>
|
CC-MAIN-2020-05
|
https://www.zikanews.com/zika-virus-infection-during-pregnancy-causes-neurodevelopmental-damage-infected-infants
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00268.warc.gz
|
en
| 0.957065 | 527 | 2.765625 | 3 |
"A single conversation across the table with a wise man is better than ten years mere study of books." — Henry Wadsworth Longfellow
Participation refers to the ways students are engaged in the learning process and includes almost everything you do for a class. It could be said that all learning requires the active engagement or involvement of the student, as "optimum class management and effectiveness depends on students being actively engaged, supportive of each other, and civil in their exchanges." Furthermore, some online faculty members use the word ‘contribution’ instead, and this helps to clarify the term further, as ‘contribution’ more directly sets guidelines on what is expected, such as whether your involvement in the class show you have truly completed the assigned readings, shared what you learned from them, and demonstrated understanding and application of the concepts in a project or paper.
The National Survey of Student Engagement (NSSE Studies) shows that "student success is directly linked to student involvement." Participation is also one of the key ways a professor can assess learning. "Requiring students’ participation in the online discussion through regular contributions is a way to determine if students are keeping pace with the ongoing learning activities," the report stated, and "their commitment with the learning community, and their necessary involvement with course content." Therefore, it is in your best interest to take participation seriously in your online courses specifically and in your education generally.
Ways to Participate in an Online Class
One of the greatest benefits of online learning is the multitude of ways to participate. Online courses are known as a great leveler, meaning that no matter who you are — extroverted/introverted, male/female, younger/older, traditional/non-traditional student, etc. — there are ways to participate based on your preferences and without the fears that can arise in face-to-face (F2F) classrooms. Here’s a list of typical ways you may be expected in an online class:
- Assignments. Be sure to complete readings and other assigned activities. These will give you a firm basis for the course content and allow you to be a fully informed participant.
- Discussion Boards. Just like F2F classes, online courses feature frequent class discussions within what is typically referred to as a "discussion board" (Db) (See the sample here). The professor will post an original question based on an aspect of the course content and/or its application; each student will be expected to post a response to that original prompt. Then, students will read and reply to the posts of classmates; replying to at least two classmates is a typical requirement, but you are often welcomed and encouraged to reply to more. The discussions are usually asynchronous, meaning they are not held in real time, instead being open for a set period for completion, so look for this information carefully.
- Seminars. Some online classes have regular synchronous (real time) seminars. These may involve audio, video, and/or chat features (audio, webinars, adobe, etc.). You will log into an online learning site (e.g., Blackboard, eCollege, or Adobe Connect), and you may be able to see the other participants, hear them speak, and type in an "instant message" chat window. Check this link to see and experiment with an Adobe Connect room: Many online learning systems operate in a similar way.
- Chats. Some faculty may also set up "chat" areas where students can participate in synchronous or asynchronous conversations. Often these are considered "lower stakes" activities that are either ungraded or receive a minimal amount of points if you just participate. Even though these may not be worth the points of a large paper or project, don’t overlook them. Chats can be a great place to network with other students and your professors, to brainstorm ideas for those larger projects, or to get help as needed.
- Blogs. Blogs are a discussion led by an individual who focuses on writing and sharing information about a specific topic. Then, others are welcome to post responses to what is shared. The writing style is more informal than on discussion boards, and the posts are more concise as well. Faculty use blogs in online classes for a variety of purposes — there may be a blog set up for your specific course or section that is led by the professor who may share tips for the class or information about the subject. Other students and interested individuals may also take part in the discussion. Some courses may require you to create your own blog; composition and communication courses, for example, sometimes use blogs as a way to provide students with practice writing about a specified topic.
- Office hours. Check your syllabus to see when and how your professors hold office hours. If your online courses are associated with a ground campus, your professor probably will post F2F office hours. As an online university student, you should still take advantage of the opportunity to meet with your professor in person as needed. In fact, it doesn’t hurt to stop by and introduce yourself at the beginning of the class. Many professors also hold "virtual office hours" that may be hosted within the online learning system (e.g., Blackboard has an "office hours" feature), in AIM (or another instant messaging service), and/or by video chat (in Skype or Adobe Connect). Whatever the means your professor uses for office hours, it would be helpful to participate in them.
- Q & As. Many online courses will have a "Question & Answer" area where you and other students may post questions about the course. It should be kept in mind that this is not the place to post private concerns like a question about your grade; rather, this is a place to post a public question about the course, assignments, or class topics. Class instructors usually check the Q&As every 24 hours during the week and at least once over the weekend. Other students may also provide responses, making it an excellent area to participate in to get a quick answer to a question or to just show your professor you are truly interested in the course and its content.
- Labs. Some online courses may have online "labs" where students either receive a prepackaged set of materials (e.g., some rock samples for a Geology course) that they work with on their own and without synchronous support from the instructor or a link to view or work with the materials online (e.g., an instructor’s Jing video). Whichever method the course uses, be sure to take part fully in the activity, taking time to record and share your observations and interpretations with classmates and the instructor.
- Study groups. Your school may offer the opportunity to set up a study group, and it’s also not uncommon for online students to set up their own Facebook page for the course. Other students may join, and studying may be done by means of the status update, messaging, and other available features. As Facebook and Skype are joining forces, this would be a great way to include video conferencing in your virtual study sessions.
Participation Will Help You Get the Most Out of Your Online Experience
Participating in an online class will not only help you to get better grades, but it can benefit your overall online experience as well. For example, it allows you to network. Whether you do this in person or virtually, don’t be shy about networking with professors and other students. Chances are good that some of these individuals will make an excellent part of your support team as you climb the educational/career ladder and that you will be a valuable resource for some of them. Participation should not be seen as just an assigned activity within the confines of a course. Instead, view it with a larger focus of advancing your opportunities and helping others to reach their goals, too.
In addition, participating regularly will help you take advantage of your university’s excellent F2F and online resources. Check out your university’s writing, math, and science centers; participate in any tutoring, workshops, or other resources they may offer. Check out the library for similar programs they make available to students. Most will have an orientation available F2F and online, one-on-one research help with a librarian, or even tutorials on various software and learning systems needed for a class. You can also consider joining clubs and organizations. There are organizations for online students, and many of these serve as professional networking groups. Others are also for fun; Theta Omega Gamma, for instance, is a fraternity just for online university students. If, by chance, your school doesn’t have any organizations listed, consider starting one. Often, all it takes is a few interested students to start an organization for online learners.
Try to participate before the posted deadline and be sure to save a screen shot or copy as back up. Do review the syllabus, directions, and rubrics carefully for how participation is evaluated; then, make sure to meet the instructor’s expectations. Engagement is key for student success inside and outside of the classroom, so take advantage of the opportunities presented to you to be fully engaged in your own education.
|
<urn:uuid:c08781ed-cedc-4908-9fe0-b339bae7ea3d>
|
CC-MAIN-2013-48
|
http://www.onlineuniversities.com/articles/students/the-practice-of-participation-in-an-online-course/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164611566/warc/CC-MAIN-20131204134331-00080-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.947802 | 1,891 | 3.40625 | 3 |
Erica Mede, CVT
Garter snakes are shy snakes reaching lengths of 2-3 feet. With a life span of 10-12 years, these snakes are common in captivity and are exceptional escape artists. There are various species of Garter snake available in the reptile industry and a plethora of morphs (color variations) as well! Hatchlings are about 4-5 inches long. These snakes are generally patterned with full length stripes starting behind the head and progressing down the body with large round eyes and slender bodies. Garter snakes are diurnal and terrestrial, sporting the classic round pupils that most people associate with “safe” snakes. When startled, these snakes will often mimic rattling by vibrating their tail quickly and when all else fails, musk their captors with a fluid that leaves the captor smelling unpleasant. These snakes are great swimmers as well and agile low level branch climbers.
These diurnal, terrestrial semi-aquatic snakes are found throughout the United States and portions of Canada in fields, forests, wetlands, marshes, and residential areas. This species of snake does brumate during the winter months in large masses. Generally, before exiting the brumation den, these snakes will breed.
Up to three adults can easily be kept in a 20-30 gallon glass aquarium with a screen lid. It is recommended to house they animals alone for the best monitoring capabilities but if a group housing situation is desired, two females and a male or all females is acceptable. The larger the cage and the wider the cage the better! Wider enclosures allow for more exercise and fulfill this species urge to explore. Custom designed enclosures can be created but are not commonly utilized in the pet industry. However, custom enclosures created with a little ingenuity and imagination can offer supreme naturalistic set-ups. Hatchlings can be kept in 10 gallon aquariums.
Substrate should be easy to clean and dry. Newspaper, reptile carpet, and paper towel are favorites for hatchlings and new individuals to help monitor fecal output. Most established individuals can be maintained happily on the above or aspen shavings as long as it is agitated frequently and changed every 7-14 days. Never use pine or cedar shavings which have aromatic oils that can cause irritation and respiratory issues in snakes. Enrichment can be provided by placing hay, straw, or even dried leaves in the cage for the snake to explore and navigate through.
Temperature and Humidity
Garter snakes require an ambient temperature of 75-85F° which is easily provided with under tank heaters, heat tape, heat cable (on the outside of the cage not the inside). The temperatures can be controlled easily with a thermostat and monitored with the use of three thermometers. One thermometer placed on the warm end an inch above the substrate, one placed at the level of the basking site, and another placed an inch above the substrate on the cooler end. A basking site should be 85-88F°. At night, the temperature can drop as low as 72F°.
Humidity should be moderate, 35-60%, with the higher end utilized during shedding. Humidity can be monitored with a hygrometer and increased with the use of a large water bowl, fogger, mister, or daily spraying.
Low branches for climbing should be offered to Garter snakes for exercise and increased basking sites. Garter snakes will climb low branches but are not excellent climbers so it is important not to have the branches at severe angles. Natural and artificial foliage can be placed in the cage to increase hiding locations. Hide boxes in the form of half logs, PVC pipes, and half flower pots can be utilized. Rocks can be added especially for basking areas if they are placed over a heat source and under the basking light to warm the rock. A large water bowl is highly recommended to allow the snake to soak at will and swim. Small plastic storage containers make excellent “swimming pools” for this species and does not require a heater. If a custom enclosure is created with a custom pond situation then a filter system and heating element may be needed.
In the wild, these snakes feed primarily on small rodents, fish, earthworms, and slugs. In captivity, these snakes are fed primarily earth worms, fish, and/or mice. It should be noted that snakes fed primarily earthworms must be fed more at least two times a week while fish eaters and mice eaters should be fed every 7 days. It is recommended that only pre-killed prey be offered as live prey has the potential of severely injuring or killing captive snakes in the case of mice and can transmit parasites in the case of fish. Chicago Exotics recommends feeding properly thawed frozen rodents. Hatchlings can be fed every 3-5 days depending on diet offered. Juveniles and adults every 4-7 days depending on diet offered. A word of caution against feeding night crawlers from bait shops, these large powerful worms are very difficult for these snakes to eat. If night crawlers are to be offered, it is strongly recommended to cut these worms into pieces first.
Owners wishing to feed mice to their Garter snakes may find it frustrating when some individuals simply refuse to eat them. Not all will. Scenting mice by rubbing them on fish or earthworms seems to help but is not always successful. Very small snakes should be fed pinky mouse parts as they cannot eat a whole mouse. Adult snakes typically can eat hopper mice or fuzzies.
Sources and Recommended Reading
Garter and Ribbon Snakes, R. D. Bartlett and Patricia Bartlett
The General Care and Maintenance of Gater Snakes and Water Snakes, David Perlowin
The Garter Snakes: Evolution and Ecology, D. Rossman, N.B. Ford, R.A. Siegel
An educational handout concerning reptiles and Salmonella is available through the Association of Reptilian and Amphibian Veterinarians. Please ask your veterinarian for a copy.
If you have any questions, please feel free to call us at (502) 241-4117.
|
<urn:uuid:3555185c-0bfc-4124-b062-88572a804564>
|
CC-MAIN-2023-40
|
https://crestwoodvethospital.com/garter-snake-care-thamnophis-sp/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00564.warc.gz
|
en
| 0.932438 | 1,281 | 3.03125 | 3 |
Exposing skin to sunlight may help to reduce blood pressure and thus cut the risk of heart attack and stroke. From the January 17, 2014 Science Daily:
Exposing skin to sunlight may help to reduce blood pressure and thus cut the risk of heart attack and stroke, a study published in the Journal of Investigative Dermatology suggests.
Research carried out at the Universities of Southampton and Edinburgh shows that sunlight alters levels of the small messenger molecule, nitric oxide (NO) in the skin and blood, reducing blood pressure... "NO along with its breakdown products, known to be abundant in skin, is involved in the regulation of blood pressure. When exposed to sunlight, small amounts of NO are transferred from the skin to the circulation, lowering blood vessel tone; as blood pressure drops, so does the risk of heart attack and stroke."
While limiting sunlight exposure is important to prevent skin cancer, the authors of the study, including Dr Richard Weller of the University of Edinburgh, suggest that minimising exposure may be disadvantageous by increasing the risk of prevalent conditions related to cardiovascular disease.
Cardiovascular disease, often associated with high blood pressure, accounts for 30 per cent of deaths globally each year. Blood pressure and cardiovascular disease are known to vary according to season and latitude, with higher levels observed in winter and in countries further from the equator, where ultraviolet radiation from the sun is lower.
|
<urn:uuid:48e2a961-93d9-41f6-ae90-2917313d12a2>
|
CC-MAIN-2020-05
|
https://lactobacto.com/tag/nitric-oxide/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251669967.70/warc/CC-MAIN-20200125041318-20200125070318-00333.warc.gz
|
en
| 0.935157 | 279 | 3.375 | 3 |
Tech visionary Elon Musk, who currently helms both Tesla and SpaceX, has launched a startup, Neuralink, dedicated to developing technology that will connect human brains directly to a computer.
This venture is in its very early stages, according to a report in The Wall Street Journal that Musk confirmed via Twitter.
Long Neuralink piece coming out on @waitbutwhy in about a week. Difficult to dedicate the time, but existential risk is too high not to.
— Elon Musk (@elonmusk) March 28, 2017
Neuralink, which Musk is funding privately, is a medical research firm that aims to develop “neural lace” — a technology that could allow the implanting of small electrodes into the brain.
Musk reportedly has recruited leading academics in the field to work with the company.
Not So Plug and Play
Exactly what a direct connection between a computer and brain could do has been the fodder of science fiction debates, but whether it is possible is the great unanswered question.
“The technique of trepanning — drilling holes in our skulls to try to fix problems with people’s brains — appears to be as ancient as humanity itself, and the idea of implanting electrodes is decades old,” said Paul Teich, principal analyst at Tirias Research.
“However, the medical imaging sensors and processing power required to figure out how a human brain works to a level of detail that can be used to implant sensor and exciter networks that have specific, precise and deterministic functions is still in its infancy,” he told TechNewsWorld.
“We still have a long way to go toward developing a complex bi-directional link directly to the brain,” added Kevin Krewell, also a principal analyst at Tirias Research.
Medical Advances vs. Ethical Dilemmas
Treatment of brain damage perhaps tops the list of reasons to pursue such a connection between brain and computer.
“Neuralink will develop advanced electrodes that can be attached or implanted within the brain, and this direct connection between the brain and electronics could allow direct stimulation of specific brain areas, which can be used for therapy for some neural disorders,” Krewell told TechNewsWorld.
What Musk is attempting, in essence, is basic medical research backed by new computational science methods. However, it likely will be a long time before anyone’s brain can be “plugged” directly into a computer — at least in the way it’s suggested in the works of science fiction writers William Gibson and Bruce Sterling.
“While I’m sure there will be a lot of animal and human experimentation and field trials over the next decades, it’s going to be a long time before countries with liberal medical device approval processes will see widespread use of these technologies — never mind our FDA approval process in the U.S.,” observed Teich.
“Technology turns into a very different beast when you begin to work on the human body,” said futurist Michael Rogers.
“During R&D, there are ethical concerns about human experimentation,” he told TechNewsWorld, “and when you go to market, there are major hurdles with agencies like the FDA.”
One facet of such a connection that hasn’t been discussed much is privacy. If a brain-to-computer interface can allow for the uploading of thoughts, then what happens as thoughts become data?
“It isn’t so much your brain being hacked — but there will be other challenges that come with a neural and electronic interface,” said technology and privacy consultant Frederick Lane.
“The real worry is that thoughts are truly the definition of private information,” Lane told TechNewsWorld.
“It is the literal definition, and it doesn’t get more private than that, so when you put your memories in the cloud you have to worry about how they will be protected,” he added.
Companies are increasingly good at collecting data, but they aren’t very good at protecting it. Further, it’s conceivable that personal thoughts could get individuals in serious trouble.
“We have a legal system that already wants to punish fantasy,” noted Lane. “This opens the way for thought police — where you think about a potential crime and could be prosecuted for just having that thought.”
Real World Cyborgs
Beyond the unhappy prospect of thought policing, there is the potential debate on whether electronics could change the very nature of a human being — whether this technology, or something like it, could be the first step toward another staple of science-fiction, the cyborg.
“A sensor on the brain could be used to send signals to the electronics and then be used to control electronics,” suggested Tirias Research’s Krewell.
“Eventually, we can have direct interfaces between the brain and electronics, enabling augmented humans — but the problem is that it can create a future of haves and have nots — of augmentations,” he added.
It’s ironic that Musk announced his new venture the same week that the movie Ghost in the Shell is being released, “which is a science fiction movie involving the future of augmented humans and human cyborgs,” remarked Krewell.
“The most likely positive outcome would be enhanced access to data and knowledge and mind-to-mind communication,” said futurist Glen Hiemstra.
However, “the negative possibilities include radically unequal access to the tech, leading to even more radical inequality in human opportunity,” he told TechNewsWorld.
It may be a long time before anyone has to deal with such worrisome issues, however.
“There is already a lot of exciting work being done in the therapeutic use of brain-computer or nervous system-computer interfaces, and with further work there is a valuable investment,” Rogers added.
Creating a consumer product would be something else, though.
“My guess,” offered Rogers, “is that Elon will have his Mars colony well before the average person can order cosmetic brain surgery.”
|
<urn:uuid:ffbacb85-48c1-40ca-a91f-6c0be9f2c401>
|
CC-MAIN-2023-40
|
https://www.technewsworld.com/story/elon-musk-plans-to-build-a-human-ai-interface-84415.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00614.warc.gz
|
en
| 0.949619 | 1,296 | 3.265625 | 3 |
4:1 “Now the man had known his wife Eve,..” – The translation in the past-perfect follows Rashi, that the conception and birth of Cain had occurred before the sin and expulsion of Adam and Eve from Eden.
“I have acquired a man with Hashem.” – As partners with Hashem. “My husband and I were created by God alone, but through the birth of Cain we are partners with Him” (Rashi).
Note: From the beginning of Genesis until 2:4, God is referred to exclusively as ‘God’, indicating His attribute of strict justice with which He initially created the world. From 2:4 until this verse, He is designated as ‘Hashem’ God (except for verses 3:1-5 where the conversation is with and by the serpent) indicating that He tempered His justice with mercy as implied in His name ‘Hashem’ so that the world could exist. From the birth of Cain, when the Evil Inclination increased, He is referred to only as ‘Hashem’ indicating that God discarded His attribute of strict justice and rules the world with mercy alone, for the world could not endure otherwise.
4:2 “Abel became a shepherd, and Cain became a tiller of the ground” – Because Abel feared the curse which God had pronounced against the ground, he turned to caring for sheep and herds (Midrash; Rashi).
Meat was prohibited to them (being permitted only in the days of Noah (see 9:3). Nevertheless, milk, butter, wool, and the skins of dead animals were permitted to them. Abel’s work consisted of shearing the sheep for their wool, and milking the cows (Mizrachi).
Like the Patriarchs, Moses and David, Abel chose a profession that permitted him to spend his time in solitude and contemplation of spiritual matters (HaK’sav V’HaKabbalah). Cain, however, chose an occupation that, though essential, can lead its practitioners to worship nature and enslave others to do the hard work of the fields in an effort to attain and develop property. Although Abel was younger, his occupation is mentioned first because he chose a more spiritual pursuit.
Pirkei d’Rabbi Eliezer notes that they would exchange with each other the products of their respective pursuits. Thus the system of bartering goods and services was instituted by God from the very beginning of creation.
4:3 “And after a period of time..” – Various interpretations of ‘days’ are offered by the Midrash and commentators ranging from ‘an indefinite period’ to ‘forty years’. Ibn Ezra and Radak cite various verses (Leviticus 25:29; Exodus 13:10) where ‘days’ means a full year.
Midrash Aggadah interestingly comments that it was the season of Passover and Adam said to his sons: “At some time in the future all the people of Israel will bring their Paschal sacrifices during this season, and they will be favorably received by God. This is therefore a beneficial time for you, too, to bring a sacrifice to God, and He will be pleased with you.”
…of the fruit of the ground;” – From the subtle contrast between the simple description of Cain’s offering and the more specific description of Abel’s offering in the next verse, the Sages derive that Cain’s offering was from the inferior portions of the crop, while Abel chose only the finest of his flock. Some say Cain’s was from the leavings, while there is Midrash which says it was flax-seed. His sacrifice was therefore not accepted (Ibn Ezra; Radak).
Note: Midrash Tanchuma relates that, according to the Sages, Cain’s offering consisted of (lowly) flax seed, while Abel’s consisted of wool. For this reason, the blending of flax and wool was later forbidden (Deuteronomy 22:11) because God said: It is not proper to mingle the offering of a sinner with the offering of the righteous.
Hirsch writes that Cain brought to God some of the produce of the earth, but without troubling to choose the finest. He is content with a minimum. Such a person devotes only spare time to God; donates only ‘the lame and the sick’, and whatever is expendable.
4:4 “..as for Abel, he also brought…” – Abel was not content to bring from his material substance. He was totally devoted to God; he was ready to offer all of himself in addition to his animals. Therefore, his sacrifice was so much more acceptable.
Hirsch writes – For Abel took of the very best firstlings of his flock. He who brings the first and the best, places his relationship to God in the foreground; for him this relationship is the first and most important. Everything else in life is secondary.
“Hashem turned to Abel and his offerings..” – A fire descended and licked up his offering (Rashi), which was the way that God showed His regard for pleasing sacrifices, as He did in the Tabernacle (Leviticus 9:24) and with Elijah ( I Kings 18:38).
The verse does not read ‘to Abel’s offering’, but rather ‘to Abel and to his offering’: Abel himself was pleasing and so was his offering; it was not merely the better quality of Abel’s offering that made his sacrifice more acceptable, and Cain’s less; it was their conduct that was decisive. Abel was accepted because of his lofty deeds, while his brother was rejected because of his despicable ways… Abel’s offering was in a spirit of humility while Cain’s was in a spirit of arrogance (Zohar).
4:5 “He did not turn. This annoyed Cain exceedingly..” – God detested both Cain and his offering, because Cain did not offer his sacrifice until he filled his own belly, and then gave of the leavings; whereas Abel gave of the firstlings, before enjoying any personal benefit (B’chor Shor; Tur). Cain was annoyed because he did not understand how he had sinned.
4:6 “And Hashem said to Cain..” – God addressed him in order to teach him and generations after him the way of repentance. A sinner can atone for his sins if he will but repent sincerely (Radak).
“Why are you annoyed and why has your countenance fallen?” – “Why are you annoyed” as though My acceptance of your brother’s sacrifice was arbitrary or unjust! “And why has your countenance fallen?” When a fault can be remedied, one should not grieve over what has passed, but rather concentrate on improving matters for the future (Sforno).
In this verse God tells Cain (in a theme later echoed by the Prophets) that He does not desire sacrifice but obedience..(Malbim).
4:7 “…sin rests at the door.” – If you succumb to your Evil Inclination, punishment and evil will be as ever-present as if they lived in the very doorway of your house (Sforno).
The Evil Inclination is like a guest…. At first he is shy and undemanding, then he will begin making requests and – unless he is controlled by his host – will continue to take liberties and impose until he becomes virtual master of the house. So, too, the Evil Inclination. He will never seek to drive man to major sins at first, for people will not obey. He begins with small sins and, unless held in check, develops in man a pattern of sin until he is powerless to stop (Me’am Loez).
“Its desire is toward you..” HaRechasim LeBik’ah, as well as several other commentators explain the subject of this phrase as being Abel, it reverts back to the beginning of the verse, which when rearranged would translate as such: Why are you downcast that I accepted the offering of Abel, your younger brother, while yours I did not accept? If you will better your ways, you will have pre-eminence above him as the eldest and you will be the object of his love and desire, and you will rule over him as a master over a servant. However, if you do not better yourself, your punishment awaits you at the door of your tent and you will not be absolved.
“..you can conquer it.” – You can prevail over it if you wish (Rashi), for you can mend your ways and cast off your sin. Thus God taught Cain about repentance, and that it lies within man’s power to repent whenever he wishes and God will forgive him (Ramban).
4:8 “Cain rose up against his brother and killed him.” – The Midrash relates that Abel was the stronger of the two, and the expression ‘rose up’ can only imply that Cain had already been thrown down and lay beneath Abel. But Cain begged for mercy, saying: ‘We are the only two in the world. What will you tell our father if you kill me?’ Abel was filled with compassion, and released his hold. Cain then ‘rose up and killed him.’
As the Talmud (Sanhedrin 37b) relates: not knowing which blow would be fatal, Cain pelted all parts of Abel’s body, inflicting many blows and wounds, until he killed him by striking him on the neck.
4:9 “Where is Abel your brother” – The question is rhetorical, for God knew full well where he was. He engaged Cain in a gentle conversation to give him the opportunity to confess and repent (Rashi; Radak; Sforno), but Cain misunderstood. He took God’s question to indicate ignorance about Abel’s whereabouts, so he denied knowledge. The reference to Abel as his brother was to allude to Cain, that he had a responsibility for Abel’s welfare but he denied that brotherhood imposed responsibility upon him.
Kli Yakar notes that since Cain had offered a sacrifice to God, he must have recognized that God is aware of human deeds and could not therefore have thought that God was oblivious to his act. This response to God is therefore not to be understood as an incredulous question. He attaches it instead to the previous statement and renders: ‘I was not aware that I was to guard my brother and protect him from murder. I had no idea that murder is sinful’.
Me’am Loez suggests that in those early days in the history of the world, people were as yet unaware of which blow could be painful and which could be lethal. Cain, in his jealous rage, attacked Abel and sought to hurt him, but he did not know that death would result from his blows (although he probably was aware that murder was sinful).
4:10 “..the blood..” – The Hebrew word is literally ‘bloods’. The word is in the plural, implying that Cain’s crime was not limited to one person; he had shed Abel’s blood and the blood of his potential descendants. Alternatively, this teaches that he bled from many wounds.
Seeing that Cain was being insolent, God challenged him forthright by revealing that He was aware of Cain’s crime (Midrash Aggadah).
4:11 For Cain was a farmer and his punishment was that the land would not yield its full produce and he would be forced to wander far away seeking more fertile farmland. Thus his curse came ‘through the ground’ (Ibn Ezra; Ramban; Sforno).
The Mechilta relates that when the Egyptians drowned, the Sea refused them and cast them upon the dry land, but the land, too, refused to harbor them and cast them back into the Sea saying: ‘For receiving the blood of Abel, who was but an individual, I was cursed. How then shall I receive the blood of this vast multitude?’ The land persisted in her refusal until God reassured her that He would not bring her to judgement.
You have killed your brother and covered his blood with the earth, and I will decree that it uncover the blood, ‘and she shall no more cover her slain’ (Isaiah 26:21) for the earth, together with all that is covered up in it, such as seed and plant will be punished. Bloodletting which ‘pollutes the land’ (Numbers 35:33) brings a curse upon its produce (Ramban).
4:12 There is a double curse here: That the earth would no longer yield its natural fertility for his benefit by making fruit trees productive; and that it would not even respond to his plowing and sowing as before (Ramban). For when man tears apart the bond between himself and God, then God tears apart the bond between man and the earth (Hirsch).
‘..you..” – Rav Eleazar said: ‘To you it shall not yield its strength, but to another shall yield it (Midrash). Therefore the curse was specifically directed to him, while in the case of Adam’s curse (3:17), which was meant to apply eternally to all mankind, the curse was directed to the earth (Radak).
This is the third curse: that he will be a vagrant and a wanderer in the world. In other words, he will always wander, without the tranquility to remain in one place, for the punishment of murders is banishment (Ramban).
4:13 Is my iniquity too great to be forgiven? My punishment is too great to bear!
4:14 ‘Can I be hidden from Your Presence? I will not be able, out of shame, to stand before You in prayer or bring a sacrifice,,” (Ramban)
‘Yet You in Your boundless mercy have not decreed death upon me … Behold, my sin is great and You have punished me exceedingly. Protect me that I should not be punished with more than You have decreed, for if I must be a fugitive and wanderer, unable to build myself a house and fence at any one place, and without Your protection, the beasts will kill me.’ Thus Cain confessed that man is powerless to save himself by his own strength, but only by the watchfulness of the Supreme One (Ramban).
If your protection were still upon me I would not worry. He Who commanded the earth to give its fruit will command the Heavens to sustain me. My fear is that bereft of Your presence and watchfulness I will be easy prey for anyone who wishes to molest me. Having no secure place, any creature could kill me and no one will avenge me. Thus, my punishment is truly more than I can endure…
4:15 “..whoever slays Cain before seven generations..” Rashi interprets this as ‘an abbreviated verse with an implied cause: Whoever slays Cain will be punished; as for Cain, only after seven generations will I execute My vengeance upon him, when Lamech, one of his descendants will arise and slay him.’
Harav David Feinstein explains that the postponement of the ultimate punishment of Cain is a manifestation of God as long suffering and patient. Nevertheless, Cain was punished to wander the earth. It is similar to a man who lends someone a large sum of money and accepts payment at the rate of a penny a day. He is patient and merciful, but he does not forget the right to payment. So, too, God is patient and merciful in deciding upon the mode of punishment, but he exacts it nonetheless. As a result of his minuscule daily suffering as a wanderer Cain’s punishment was deferred for hundreds of years.
“..Hashem placed a mark upon Cain..” – As far as how or what the mark was, the Torah nor the Talmud reveals what the mark was.
For more background on Cain and Abel, reference the blog “Ancient Book of Jasher 1 – Creation to Abel”
4:16 – “Cain left the presence of Hashem..” – He departed in (pretended) humility as though he could deceive the Most High (Rashi). It is obvious that Cain did not actually deceive God. God ‘sees the heart’ and was fully aware that once Cain received clemency, he would resume his evil ways. Nevertheless, Cain claimed sincerity and God allowed him a degree of clemency assured that in the course of time Cain’s wickedness would become apparent to all. At that time, God would exact full punishment (Harav David Feinstein).
“..settled in the land of Nod” – Nod means ‘wandering’ – the land where exiles wander about. However, he did not find any rest there for his fate was to be a ceaseless wanderer. He is identified with this region, however because it was there that he spent most of his time; his family resided there; and it was there that he would return periodically during his wanderings (Abarbanel).
“..east of Eden.” – To the east of Eden, where his father had been exiled when he was driven out of the garden (3:24). Notably, the eastern region always forms a place of refuge for murderers, for the cities of refuge that Moses later set aside were also to the east, ‘the place of sun-rise’ (Deuteronomy 4:41)
4:17 – “..a city-builder,” – It does not say, he built the city. The term ‘builder of a city’ implies that his personality is being described. Cut off from the earth, Cain was left only with his own intelligence and talent which he utilized to build cities. Urban life, unlike rural life, ‘cultivates’ its inhabitants. Hence, the following verses list the sophisticated skills that were developed in his inhabitants (Hirsch).
“…named the city after his son..” – Thus proclaiming that he did not build it for himself because he was cursed and a wanderer. Rather it would be as if Enoch had built it for himself (Ramban).
4:19 – This verse could simply have said ‘and Lamech begot Jabal … etc’ listing the births of generations as it does in succeeding chapters but the Torah goes into the narrative (verses 23-24) to inform us that God kept the promise that ‘vengeance shall be taken on Cain after seven generations.’ For after Lamech had children – the seventh generation – he arose and slew Cain (Rashi).
4:22 – “..the sister of Tuval-Cain was Naamah” – Her name, meaning lovely, is mentioned because she was the wife of Noah, and her deeds were lovely and pleasant (Rashi). She was famous and, being a righteous woman, she gave birth to righteous children. Thus, a token remembrance of Cain was left in the world (Ramban).
4:23-24 – Lamech’s Plea. Lamech was blind and his son Tubal-cain used to lead him. One day, Tubal-cain saw Cain and mistaking him for an animal, he bade his father to shoot an arrow, which killed Cain. When Lamech realized he had killed Cain, he beat his hands together in grief and accidentally struck his son, killing him, too. This angered his wives who refused to live with him, and he tried to appease them. He demanded that they obey him and come back, for, he asked, since he had not killed intentionally, could he be considered a murderer? As to their fears that God would punish him, he contended, “If the punishment of Cain, an intentional murderer, was delayed until the seventh generation, surely my punishment will be deferred many times seven because I killed accidentally!” He used the number seventy-seven to denote many times seven – a long period, not meaning exactly seventy-seven (Rashi).
4:25 – “And Adam knew his wife again..” – This occurrence happened previously but first the Torah completed the entire narrative of Cain and Abel and now returned to detail the generation of Seth and his descendants. This is an example of ‘the Torah does not concern itself with chronological sequence’, the Torah arranges each general topic (such as the story of Cain and Abel) separately (Aderes Eliyahu).
Adam saw that Abel was dead, Cain was cursed, and Cain’s descendants had gone in evil ways. He ‘knew’ his wife again – after a separation of 130 (Midrash) – to ensure that worthwhile forebears of mankind would be produced (Malbim).
4:26 – “Then to call in the Name of Hashem became profaned.” – The generation of Enosh introduced idolatry, which was to become the blight of humanity for thousands of years. By ascribing God-like qualities to man and lifeless objects, they created the abominable situation in which to call in the Name of Hashem became profamed (Rashi).
Note: Rambam thought this so very fundamental that he wrote at length:
In the days of Enosh, the people fell into gross error, and the wise men of the generation began to give foolish counsel. Enoch himself was among those who erred. Their error was as follows” ‘Since God created these starts and spheres to guide the world, set them on high and allotted them honor, and since they are ministers who service before Him, they deserve to be praised and glorified, and honor should be rendered them. It is the will of God, blessed be He, that men should aggrandize and honor those whom He aggrandized and honored – just as a king wants respect to be shown to the officers who stand before Him, thereby honoring the king. When they conceived this idea, they began to erect temples to the stars, offered up sacrifices to them, praised and glorified them in speech, and prostrated themselves before them – to obtain the Creator’s Favor, according to their corrupt notions. This was the root of idolatry, and this was what the idolaters, who knew its fundamentals, said. They did not however maintain that, except for the particular star which was the object of their worship, there was no God. All knew that He alone is God; their error and folly consisted in imagining that this vain worship was His desire.
In course of time, false prophets arose who asserted that God had commanded and explicitly told them, ‘Worship that particular star,…offer such and such sacrifices to it. Erect a temple to it. Make a statue of it, to which all the people – the women, children, and the rest of the community – shall bow down’ …. They began to make figures in temples, where they would assemble, bow down to the figures, and tell all the people that this particular figure conferred benefits and inflicted injuries, and that it was proper to worship and fear it.
So gradually the custom spread throughout the world to worship figures with various types of worship, such as offering them sacrifices and bowing to them. As time went on, the honored and revered Name of God was forgotten by mankind, vanished from their lips and hearts, and was no longer known to them. All the common people and the women and children knew only the figure of wood and stone, and the temple edifice in which they had been trained from their childhood to prostrate themselves to the figure, worship it, and swear by its name. Even their wise men, such as priests and the like, also fancied that there is no God save for the stars and heavenly spheres for which the figures were made.
But the Creator of the Universe was known to none, and recognized by none, save a few solitary individuals, such as Enosh, Methuselah, Noah, Shem, and Eber. The world moved on in this fashion, until the Pillar of the World, the Patriarch Abraham, was born (Hilchos Avodas Kochavim 1:1,2)
|
<urn:uuid:6a637be1-9953-4c64-9479-8efd784fd64e>
|
CC-MAIN-2023-40
|
https://janlemke.com/genesis-chapter-4
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00002.warc.gz
|
en
| 0.984035 | 5,183 | 2.890625 | 3 |
Albizzia procera (किनई )
FAMILY OF THE WEEK : MIMOSEAE
Bentham and Hooker divided the Leguminosae into three subfamilies : Papilionaceae,Caesalpinieae and mimoseae.Most of the recent taxonomist treat them as three distinct families.
MIMOSEAE : There are about 56 genera and2800 species widely distributed in the tropical and subtropical regions but they are abundant in southern hemisphere. In India this family is represented by 15 genera and 72 species mostly in tropical and subtropical Himalayas and western Peninsular India.
Vegetative characters :
They are mostly trees and shrubs and rarely herbs(Neptunia) or woody climbers, climbing with the help of leaf tendrils (Entada)
The stems of climbing species show anomalous growth in thickness and they become winged. Tannin sacs and gum passages are common in pith and medullary rays.
The leaves are usually alternat and bipinnate or rarely simply pinnate as in Inga. The stipules are present and in some species of Acacia they are modified into thorns. In many species of Australian acacia the leaves are represented by simple green phyllodes. The leaves of Mimosa and Neptunia are sensitive to touch and assume a sleep position.
Inflorescence and flowers:
The minute flowers are generally in dense globose headsbut sometimes they are spikate or racemose(Prosopis and some Acacias). In dicrostachys the spikes are dimorphic.
The flowers are actinomorphic, bisexual or rarely unisexual or polygamous, mostly pentamerous and hypogynous.
The calyx is composed of usually five sepals which are united into a short tube. the corolla is also usually of five petals.
The number and cohesion of stamens show much variation.Generally they are numerous. The Gynoecium is of single carpel. The ovary is superior and unilocular with usually several ovules along the ventral suture. The style and stigma are one.
Fruits and seeds :
The fruit is legume or indehiscent.In several species of Acacia the fruit is lomentum. It is constricted between the seeds and breaks into one seeded segments. The seeds are with scanty endosperm.
Pollination and seed dispersal :
The flowers are pollinated by insects which are attracted by long exerted and beautifully coloured stamens. The seeds are dispersed by wind, birds or animals.
Mimosa pudica (Sensitive plant)Lajalu
Acacia nilotica,(Babhul) Acacia melanoxylon, Acacia auriculaeformis, Acacia concinna, Acaciacatechu, Acacia ferruginea, Acacia leucophloea
Albizzia lebbek, Albizzia procera, Albizziaodoratissima,Albizzia amara, Albizzia chinensis,
|
<urn:uuid:046d5aa0-3c6b-4d70-a009-2fd3745636b8>
|
CC-MAIN-2017-39
|
http://satishphadke.blogspot.com/2008/10/family-of-week-mimoseae.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691830.33/warc/CC-MAIN-20170925130433-20170925150433-00104.warc.gz
|
en
| 0.861743 | 662 | 3.0625 | 3 |
In teaching science I hope to help children see the beauty and wonder of our natural environment and to instill within them an understanding of the complex interactions of science and life. By layering the science with other disciplines I believe the science will become more alive and make more sense for the student. I believe that when we connect our hands with our ideas we move our thinking. Thus, I believe that physical manipulation of materials in science is critical to gaining depth of understanding. It is not enough to watch and hear; as learners we need to touch. To further the eye-hand-brain connection, my students are required to make detailed drawings of observations and are expected to write at length about what they notice.
My metaphor for teaching is gardening and this ecosphere is a miniature model of a garden, as no garden is without plants and animals, air and water. I think of the students as diverse and unique as the plants living on our planet. Each has a special niche to fill and a role to play in the association with life. Each has different needs and preferences for growing strong and contributing all they can. And each has different gifts or fruits to offer. Some plants may be lovely to look at and others may be thorny, but they all have their place on this planet. It is our job as teacher to uncover the requirements of each individual so as to enable the student to succeed to the greatest degree possible. As teachers we need to understand the elements we can modify for the students. Some students thrive in one environment while others may have a different learning style. To meet all their distinctive and wide-ranging needs we need to make their learning visible and give the students several entry points for discovery. I hope that I accomplish this by recognizing each student as the individual that they are and by designing lessons that have multiple points of entry and alternative assessments.
|
<urn:uuid:eaded453-60da-4013-955c-4e3b3d6dd236>
|
CC-MAIN-2017-39
|
http://sanmccarron.blogspot.com/2008/01/metaphor.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688940.72/warc/CC-MAIN-20170922112142-20170922132142-00040.warc.gz
|
en
| 0.968993 | 372 | 2.734375 | 3 |
Nowadays, planes are the obvious solution to air travel but, 100 years ago, people may have looked to a different craft entirely. If you wanted to travel by air, you needed a ticket for a zeppelin. But now, these giants of the sky have all but vanished. Here’s a look at four tumultuous decades for lighter-than-air travel, and how the zeppelin collapsed as a result of two World Wars and a high-profile disaster.
The zeppelin was named after its creator, Count Ferdinand Adolf Heinrich August Graf von Zeppelin. He served as an official observer with the Union Army during the American Civil War, and he became fascinated with balloons and their use in air traffic. He saw how hot-air balloons were used to send mail, and resigned from the German army in 1891 at age 52 to devote his full attention to airships. He began construction of the first zeppelin in 1899, financed by the king of Wurttemberg, who believed in him and saw the potential of his work.
The first zeppelin flight took place on 2 July 1900 – it lasted around 20 minutes, and ended with a crash landing. These early zeppelins had a different shape, looking like a pencil, and they were built to flex like an accordion. Shareholders were unconvinced by the early work, but the craft evolved after much experimentation. Count von Zeppelin used hydrogen gas in his craft – contained within a large metal ring, the gas was lighter than air, enabling the craft to fly. The zeppelins began civilian use in 1909, and a total of 21 were made before the outbreak of World War I. The German Army and Navy purchased 14 of these crafts for the war, using them for reconnaissance missions and bombing runs, (although they had little success in the latter).
As World War I ended, there was no need for military zeppelins. Cue Dr Hugo Eckener, a man who saw the crafts as vessels of peace rather than war – he took command of the zeppelin business and began using them for civilian transport from 1924. This form of travel was akin to travelling by train and, by the 1930s, luxury airships were whisking well-to-do passengers across the Atlantic Ocean in style. They had an influence on the urban landscape, and there are rumours that the spire of the Empire State Building was to be converted into an airship dock. Although the Germans were the pioneers, Britain and the USA also built their own airships, preferring helium fuel.
At that point, it was clear that zeppelins were a thing of the past
The end of the zeppelin era came with a single tragedy – Hindenburg. It was the biggest commercial airship ever built (at 245 meters long), a craft intended for the creme de la crème. It had the finest wine and china, and people paid a lot of money for the chance to send a postmarked postcard from the Hindenburg. On 6 May 1937, the ship attempted to dock with its mooring mast at New Jersey and caught fire. It caught fire and was entirely destroyed in just 34 seconds, killing 35 of the 97 people on board and one crewman on the ground.
There was a leak in the fuel cells, causing hydrogen to escape and mix with oxygen, creating a highly flammable mixture. It is likely that this was ignited by the high electric charge on the day, caused by lightning storms. That iconic image of the craft going up in flames, captured by photographers waiting for the celebrity passengers, was broadcast the next day and killed public confidence overnight.
Any potential respite for the German zeppelin industry vanished as the Nazis took power. The regime initially used the craft as a propaganda tool during the Berlin Olympics in 1936, but Luftwaffe commander Hermann Goering was not a fan. Supposedly, he wasn’t best pleased that Count von Zeppelin was ambivalent to the ambitions of the Nazis. In 1940, as war fully broke out, he ordered that the Graf Zeppelin (a forefather of the Hindenburg) be dismantled so its aluminium could be used for the manufacture of planes. At that point, it was clear that zeppelins were a thing of the past.
In many ways, it was likely that the zeppelin would have become obsolete anyway. Air technology was improving rapidly, and the aeroplane would soon take over. But the massive public relations crisis caused by the Hindenburg disaster really accelerated this decline. Now, we’re at a time with fewer than 25 zeppelins operating around the world, remnants of a time when these giants of the sky represented the future.
|
<urn:uuid:bf163aaa-0ee7-433a-a39f-3121a88be3c4>
|
CC-MAIN-2020-29
|
https://theboar.org/2020/06/zeppelin-industry/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887046.62/warc/CC-MAIN-20200705055259-20200705085259-00187.warc.gz
|
en
| 0.984065 | 963 | 3.453125 | 3 |
Night’s Dream Essay, Research Paper
Realism and Romanticism in A Midsummer Night s Dream
In A Midummer Night s Dream, Theseus states, “The lunatic, the lover, and the poet are of an imagination all compact” (Act5, Scene 1). Love, in this play, is viewed in different ways. While the four main characters believe in romanticism, Theseus is a strong supporter of realism.
In A Midsummer Night s Dream, Bottom states, “O what fools these mortals be.” Bottom proves to be quite accurate when pertaining to the four main lovers. Demetrius and Lysander both speak in figurative language and both are very handsome. Their love for Helena and Hermia deal mainly with physical attraction and flirtatious acts than love that captures body, mind, and soul. If any of the four characters posses anything of realistic love, it would be Hermia. She was willing to risk death in order to be with Lysander. This act of love goes beyond any other in this play, and demonstrates Hermia s devotion to Lysander. “My good Lysander, I swear to thee by Cupid s strongest bow- Tomorrow truly will I meet with thee” (Act 1, Scene 1).
Helena is one of the silliest character s in the play, and at times can be quite irritating. Demetrius shows no love for her, yet she persists in chasing him. “And even for that do I love you the more. I am your spaniel; and, Demetrius, the more you beat me, I will fawn on you” (Act 2, Scene 1). These characters are a true definition of “love sick.” All of them appear to be in love with love, more so than in love with each other. They all frantically run about, each changing partners so often that one is never really sure of who loves whom. Each consume themselves with what they consider to be real love to the point of losing touch completely with the real world. To them, love is a fairy tale which involves no reason. They all believe that falling in love involves nothing more than romantic speech and desire for each other.
Unlike the four main lovers, Theseus, Duke of Athens, believes that men should never be out of touch with the real world. In short, he views the four lovers story as nothing but an illusion concocted in their imaginations. The entire idea of being infatuated with one s lover to the point of losing touch with the real world is ludicrous to him. At first, Theseus love for Hippolyta may be viewed as cold, but once one realizes Theseus realistic and noble character, it is obvious that he strongly desires his bride. Theseus may not use poetic language or “shout his love from the rooftops,” but the feelings he shares with Hippolyta are from his heart, mind, and soul.
More strange than true. I never may believe
These antique fables, nor these fairy toys.
Lovers and madmen have such seething brains,
Such shaping fantasies, that apprehend
More than cool reason ever comprehends.
The lunatic, the lover, and the poet,
Are of imagination all compact. (Act 5, Scene 1)
Theseus sees the story of the four lovers as nothing more than a magical adventure that took place in their imaginations. He distrusts how they believe so absolutely in their love story. Theseus and Hippolyta s love is far deeper than the four lovers, but this real love may be seen as something that matures with age. Young love has proven to be far more romanticized and less thought out than older, more realistic love.
Theseus compares the four characters feelings for each other to poets and lunatics. Each, he says, see their fantasies more clearly than they see what s actually there. This has proven to be so in the minds of the four lovers. Their devotion to each other is far more romanticized and figurative than the more realistic, mature love that Theseus shares with Hippolyta.
|
<urn:uuid:98d5138b-eb48-4bd3-8d17-30810e5cfd36>
|
CC-MAIN-2017-30
|
http://mirznanii.com/a/74324/realism-verses-romanticism-in-a-mid-summer
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424586.47/warc/CC-MAIN-20170723182550-20170723202550-00145.warc.gz
|
en
| 0.950157 | 861 | 2.953125 | 3 |
Turkey - Turkish Language, Culture, Customs and EtiquetteWelcome to our guide to Turkey. This is useful for anyone researching Turkish culture, customs, manners, etiquette, values and wanting to understand the people better. You may be going to Turkey on business, for a visit or even hosting Turkish colleagues or clients in your own country. Remember this is only a very basic level introduction and is not meant to stereotype all Turks you may meet!
Facts and Statistics
Location: southeastern Europe and southwestern Asia (that portion of Turkey west of the Bosporus is geographically part of Europe), bordering the Black Sea, between Bulgaria and Georgia, and bordering the Aegean Sea and the Mediterranean Sea, between Greece and Syria
Climate: temperate; hot, dry summers with mild, wet winters; harsher in interior
Population: 68,893,918 (July 2004 est.)
Ethnic Make-up: Turkish 80%, Kurdish 20% (estimated)
Religions: Muslim 99.8% (mostly Sunni), other 0.2% (mostly Christians and Jews)
Government: republican parliamentary democracy
The Turkish Language
The official language, Turkish, is the first language spoken by 90% of the 63m population. Minority languages include Kurdish, spoken by 6% of the population. Arabic is spoken by 1.2% of the Turkish population; most of those speakers are bilingual Arabic and Turkish speakers. Other minority languages include Circassian, spoken by more than 0.09% throughout the country, Greek, Armenian and Judezmo, a Romance language spoken by Jews.
Why not learn some useful Turkish phrases?
Turkish Society and Culture
Islam is the religion of the majority of Turks although the state is fiercely secular. Islam emanated from what is today Saudi Arabia. The Prophet Muhammad is seen as the last of God's emissaries (following in the footsteps of Jesus, Moses, Abraham, etc) to bring revelation to mankind. He was distinguished with bringing a message for the whole of mankind, rather than just to a certain peoples. As Moses brought the Torah and Jesus the Bible, Muhammad brought the last book, the Quran. The Quran and the actions of the Prophet (the Sunnah) are used as the basis for all guidance in the religion.
Among certain obligations for Muslims are to pray five times a day - at dawn, noon, afternoon, sunset, and evening. The exact time is listed in the local newspaper each day. Friday is the Muslim holy day although this is not practised in Turkey. However, most males will attend the congregational afternoon prayer. During the holy month of Ramazan all Muslims must fast from dawn to dusk. Fasting includes no eating, drinking, cigarette smoking, or gum chewing
Etiquette & Customs in Turkey
Meeting and Greeting Etiquette
- When meeting shake hands firmly. When departing it is not always customary to shake hands although it is practised occasionally.
- Friends and relations would greet each other with either one or two kisses on the cheek. Elders are always respected by kissing their right hand then placing the forehead onto the hand.
- When entering a room, if you are not automatically met by someone greet the most elderly or most senior first. At social occasions greet the person closest to you then work your way around the room or table anti-clockwise.
- Greet people with either the Islamic greeting of 'Asalamu alaykum' (peace be upon you) or 'Nasilsiniz' (How are you? pronounced na-sul-su-nuz). Other useful phrases are 'Gunaydin' (Good Morning, pronounced goon-ay-dun), 'iyi gunler' (Good Day, pronounced ee-yee gun-ler) or 'Memnun Oldum' (pleased to meet you).
Gift Giving Etiquette
- Gift giving has no real place in business relationships or etiquette. Relationship building and the like will usually take the form of dining or sight seeing trips rather than lavish gifts.
- However, if a gift is given it will be accepted well. It is always a good idea to bring gifts from your own country such as food stuffs or craft items.
- Be aware that Turkey is a Muslim country. Before giving alcohol to anyone be 100% sure that they drink.
- The only time you would need to give any great thought to gifts would be if you were invited to a Turk's home for dinner. The most usual gifts to take are pastries, (especially 'baklava') and decorative items for the home such as ornaments or vases. Flowers are not usually taken to a host but can be if felt appropriate. It is best to ask a florist for advice on what is best to take. If the host has children take some expensive sweets or candy.
- Most business entertaining will take place in restaurants. Turks enjoy food and the meal is a time for relaxing and engaging in some good conversation.
- The protocol of Turkish hospitality dictates that the host always pays for the meal. The concept of sharing a bill is completely alien. You may try and offer to pay, which may be seen as polite, but you would never be allowed to do so. The best policy is to graciously thank the host then a few days later invite them to do dinner at a restaurant of your choice. It may be a good idea to inform the restaurant manager that under no circumstances are they to accept payment from your guests.
- Evening meals may be accompanied by some alcohol, usually the local tipple called Raký (pronounced rak-uh). It will comprise of a few courses with the main course always meat or fish based, accompanied by bread and a salad.
- Turks smoke during meals and will often take breaks between courses to have a cigarette and a few drinks before moving onto the next.
- Tea or Turkish coffee is served at the end of a meal sometimes with pastries. Turkish coffee is a national drink and should at least be sampled. It comes either without sugar, a little sugar or sweet. Turkish coffee is sipped and allowed to melt into the taste buds so do not gulp it down as you would instant coffee. Never drink to the bottom of the cup as it will be full of ground coffee and taste awful.
Business Etiquette and Protocol
Relationships & Communication
- Turks prefer to do business with those they know and respect, therefore spend time establishing a personal relationship.
- Relationships are fostered in the office, over extended lunches, dinners, and social outings.
- Courtesy is crucial in all business dealings.
- Turks do not require as much personal space as many other cultures and will stand close to you while conversing.
- Do not back away, as this can be construed as unfriendly.
- Discussions may start slowly, with many questions that may seem irrelevant to the purpose of your visit. It is extremely rude to insist that your colleagues get to the point.
- Ask about his/her family without prying. Questions about children will be welcomed.
- The Turks are proud of their country and will enjoy answering questions on their culture and history although be sure to avoid political history.
- Most Turkish men love football (soccer) and usually support one of three teams: Galatasaray, Beþiktaþ or Fenerbahçe. Asking after their team's recent fortunes will always produce lively and animate responses.
- Once a relationship has been established, communication is direct.
- It is vital that you maintain eye contact while speaking since Turks take this as a sign of sincerity.
Business Meeting Etiquette
- Appointments are necessary and should be made 1 to 2 weeks in advance, preferably by telephone.
- Many Turks take vacation during July or August, so it is best not to try to schedule appointments at that time.
- It is also not a good idea to schedule meetings during Ramazan (Ramadan).
- Punctuality is expected although you should be prepared to be kept waiting.
- First appointments are more social- than business-oriented since Turks prefer to do business with people they know.
- Small talk helps establish a rapport. Do not immediately begin discussing business.
- Have all printed material available in both English and Turkish.
- Presentations should be well thought-out, thorough, and backed up with visual aids such as maps, chart and graphs.
Business Negotiation Etiquette
- Always come to Turkey knowing two things. Your success is defined by your ability to build effective personal relationships combined with a clearly outlined and well presented proposal.
- Business is personal. Although this is changing with the influx of big multi-nationals and a more corporate culture in some of the larger companies, many businesses are still family owned and run.
- Turks will want to do business with those they like, trust, feel comfortable with and with those that can provide a long term relationship. If they feel you are hiding something or there is an element of suspicion about your motives you may not get very far.
- Building a relationship with your Turkish counterpart(s) is therefore critical. The first meeting at least should be solely focused on getting to know each other. Once a relationship has been established you can safely move on to business matters.
- As well as looking to the person, Turks are also astute business people. Ensure your proposal clearly demonstrates the mutual benefit and profitability of any agreement or partnership.
- Turks are primarily oral and visual communicators so in addition to written statistics, projections and the like try to present information vocally or with maps, graphs and charts.
- Decision making can be slow. It is most likely that you will meet and negotiate with less senior members of a family first. Once you are seen as trustworthy and your proposal financially viable you will then move on to meet more senior members. A decision is ultimately made by the head of the family/company.
- When negotiating, the Turks will start at extremes in order to gage your response. Prior to negotiations know your target figure and work slowly towards it through meaningful concessions. When conceding ensure you present this as a favour and a decision made out of respect and liking for your counterpart(s). Try and concede only once you have gained agreement on a reciprocal concession on a separate or related issue.
- Do not use deadlines or pressure tactics as the Turks will use this to their advantage and reverse the tactic by threatening to cancel agreements or end negotiations. Be patient.
- It may not always be necessary to focus on financial benefits when negotiating. It is just as useful to point to areas such as power, influence, honour, respect and other non-monetary incentives.
Business Dress Etiquette
- Business dress is conservative. You will be expected to wear a suit and tie. Similarly women should wear smart professional outfits.
- In the summer, and especially in the cities of Istanbul, Izmir and Anakara the weather is very hot and humid. It is acceptable to just wear a shirt with trousers and in most cases to not wear a tie.
- Outside the big cities and especially in the East of Turkey both women and men should wear more conservative clothing. Women are advised to refrain from exposing their legs and arms and to ensure clothes are not tight-fitting. Men should not wear shorts.
- When addressing a Turk the most common method is to call a man by his first name followed by 'bey' (pronounced bay). So, Ertan Gonca, would be Ertan Bey. Similarly a woman's first name would be followed by 'hanim' (pronounced ha-num).
- Where professional titles exist such as Doctor or Professor, always use them either on their own of before the first name. Curiously this is also the case with many other professions such as lawyers 'Avukat' or engineers 'Muhendis'. Within Turkish companies and organisations senior ranking staff will be addressed accordingly. A common example is Mr. Manager, 'Mudur Bey'.
- A common phrase you will hear Turks using is 'efendim' (literally 'my master'). You may hear this from a waiter, a secretary, taxi driver, doorman, shop staff and many others. It is simply a polite way of addressing people you are not familiar with.
Business Card Etiquette
- Business cards are exchanged without formal ritual.
- Use both hands to exchange cards.
- Present your business card to the receptionist when you arrive.
- Have one side of your business card translated into Turkish. Although not a business necessity, it will impress your business colleagues.
- Quite often Turks do not give their business card unless they are certain that they wish to establish a business relationship.
Doing business in Turkey?
Did you know we provide Turkish translation services as well as English/Turkish interpreters worldwide.
|
<urn:uuid:70158a9b-34ca-4734-9ffb-a67db88953d3>
|
CC-MAIN-2013-20
|
http://www.kwintessential.co.uk/resources/global-etiquette/turkey-country-profile.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709337609/warc/CC-MAIN-20130516130217-00047-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.95433 | 2,657 | 3.03125 | 3 |
dialog.messageShows a message box
|Shows a message dialog box with the specified <caption>, <message_text>, <icon> and
<caption> is a text string that will appear in the caption of the dialog box.
<message_text> is a text string that will appear in the dialog box and can contain HTML formatting.
<icon> is an image identifier that defines an icon to be placed in the dialog box. <icon> can be a relative or absolute path to an image file, a signed number (in that case it defines an internal KVIrc image) or one of the special strings "critical", "information" and "warning".
<button0> is the text of the first button (on the left).
<button1> is the text of the second button (if empty or specified, only one button will appear in the dialog).
<button2> is the text of the third button (if empty or specified, only two buttons will appear in the dialog).
The first button is the default button - it is activated when the user presses the enter key. The third (or the second if only two buttons are present) is treated as the escape button and is activated when the user presses the Esc key or closes the dialog with the window manager close button.
If one of the button text strings starts with a "default=" prefix then that button is assumed to be the default button of the dialog.
If one of the button text strings starts with a "escape=" prefix then that button is assumed to be the escape button of the dialog.
<magic1>,<magic2>... are the magic parameters - evaluated at dialog.message call time and passed to the <callback_command> as positional parameters.
If the -b or -modal switch is specified the dialog will have blocking modal behaviour - it will appear above its parent widget and block its input until the dialog is closed.
Once the dialog is displayed, the user will click one of the buttons. At this point the dialog is hidden and the <callback_command> is executed, passing the number of the button clicked as $0 and the magic parameters as positional parameters $1, $2, $3....
|
<urn:uuid:162e1f07-d4c3-42f7-9faa-52f9c8e6c01b>
|
CC-MAIN-2013-20
|
http://www.kvirc.net/doc/cmd_dialog.message.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704666482/warc/CC-MAIN-20130516114426-00035-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.791444 | 464 | 2.765625 | 3 |
Imagine a new generation of solar cells so lightweight and portable that you can roll one up, carry it in your pocket, then stick it on a window to power a light bulb.
That's the vision of Gregory Welch, an assistant professor of organic chemistry at the University of Calgary. He's leading a team of researchers on a quest for the holy grail of solar energy.
"We're trying to make a new type of solar cell," said the 35-year-old lead chemist.
"It's an organic solar cell and the real catch there is that these organic materials are soluble. They can be dissolved in a solution and printed on substrates just like newspaper. The printing aspect allows us to print on plastics and foils and thus we can make a very flexible solar cell."
If successful, said Welch, the solar cells would also be coloured and transparent.
"So we can start making decorative solar cells, or even solar cells for windows where you can still see through it. But now your window is converting photons to electrons," he said.
"What's really neat, too, is that these flexible solar cells are really form-fitting. So you can start to mend them to various surfaces and and various structures so it really adds an architectural flare to solar cell technology, which opens up new avenues and markets for power production."
- MORE CALGARY NEWS | Calgary's official song called Neighbours of the World turns 30
- MORE CALGARY NEWS | Calgary's David Bowie reflects on sharing name with music legend
Solar panels have come a long way since the first modules were used in space nearly 60 years ago. But even with all the improvements, setting up a modern solar system in a home could cost $10,000 to $40,000.
Printable solar cells would cost a fraction of that, said Welch.
"What we look at is the energy payback time," he said.
"Currently the first and second generations of solar cells could take anywhere from five to 20 years until you've recouped the cost of producing this so-called 'free energy' from the sun. We hope for an energy payback time that could be one year — as little as six months."
Oil and gas byproducts used as raw material
To reach their goal, researchers are drawing resources from both Alberta's oil and gas sector and its budding technology sector.
Welch said the organic compounds being used to develop this new generation of solar cells are pieced together from oil and gas byproducts.
"What we do is we take these petrochemicals and we do some creative chemistry to them," he said.
"We fuse them together, we take molecules, then macromolecules and we make them in such a way that they can absorb and emit light — they're like dyes," said Welch.
And like the dye in our jeans, the core structure is organic. But as a "conjugated organic," it can delocalize electrons, giving it semiconductive properties — science speak for essentially the ability to convert sun's energy into electricity.
In order to find the perfect material for printable solar cells, Welch and his team have to make, identify and test hundreds of compounds. To speed up the process, they're using a state-of-the-art machine that was also developed in Calgary.
Portable device as innovative as laptop
Test tubes, papers and a dozen or so machines sit on top of counters in a lab on the fifth floor of the university's EEEL (Energy. Environment. Experiential Learning) building. A core piece of this project is a newly acquired apparatus called the Nuclear Magnetic Resonance Spectrometer (NMR).
It's about the size of a toaster.
Graduate student Jonathan Cann, 22, took a drop of solution from a beaker and placed it into the machine. Ninety seconds later, a graph showed up on the screen, identifying exactly what's in the molecules of the liquid sample.
To the untrained eye, this process may seem routine, but Welch remembers a time when it took hours to get results.
Not only was the old spectrometer slow, the system was also very big and heavy, with each instrument weighing and measuring about the size of a Smart car.
The portable NMR, by contrast, is similar to what a laptop is to the old mainframe computers. It's an innovation of Nanalysis, the third tech company founded by self-described Calgary boy Sean Krakiwsky.
"An NMR spectrometer is like an MRI machine for chemists," said Krakiwsky, a U of C alumnus. "It takes a picture of molecules of the liquid being analyzed."
The machine can within minutes identify any liquid being dropped into it — a useful tool for Welch's project, which requires testing dozens of samples a day.
The race for an affordable solar solution
Researchers in Calgary hope all the time saved will help expedite the process of finding that holy grail of solar energy. They're in a race against other scientists around the world.
"That's the end game. The whole area of organic solar cells has been going on for a number of years — probably since the late '80s this concept has been introduced," said Welch.
"A Nobel Prize was awarded to Alan Heegar and a few colleagues in 2000 for the discovery of conducting organic materials. Since then it's just snowballed into these new applications."
Welch said he hopes to reach some tangible results very soon.
"Bring the University of Calgary some recognition, file some patents in one to two years," he said.
And he would like to develop a working prototype within five to 10 years — that can later be marketed to the public, with the help of industry players.
|
<urn:uuid:54d2ce4b-666f-4341-b412-289a326a55a9>
|
CC-MAIN-2017-26
|
http://www.cbc.ca/news/canada/calgary/printable-solar-power-calgary-1.3399958?cmp=rss
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00527.warc.gz
|
en
| 0.963833 | 1,199 | 3.484375 | 3 |
If you closely review all the foods you eat throughout the day, you’ll probably notice that quite a few of them contain salt. All of that salt can quickly add up, and salt-heavy diets can eventually lead to chronic health problems. While it can be a bit of a challenge to avoid this ingredient, making some smart choices at the supermarket can help you get a better grip on your salt intake.
Salt, Sodium and Your Health
When discussing the impact of salt on the body, it’s important to also mention sodium. Sodium is often synonymous with salt, and for good reason; the chemical makeup of table salt is 40 percent sodium, with chloride accounting for the remaining 60 percent. Given that sodium is closely associated with salt, and that sodium is frequently used as an additive in foods, the Centers for Disease Control and Prevention (CDC) uses sodium intake as a barometer for salt consumption.
According to the CDC, adults are best served by limiting their sodium consumption to 2300 milligrams (mg) per day. For certain groups, this limit is even lower; those with high blood pressure, diabetes and chronic kidney disease are urged to limit their daily intake to 1500 mg. Likewise, African-Americans and adults aged 51 and older are encouraged to stick to a 1500 mg per day limit.
A diet high in sodium poses numerous risks to the body, including high blood pressure, stroke and heart failure. Other possible problems include kidney disease, osteoporosis, kidney stones, headaches, enlarged heart muscle and stomach cancer.
Uncovering Hidden Sodium
Many people struggle with keeping track of all the salt they put into their bodies. By keeping an eye out for the items listed below, you stand a better chance of preventing salty foods from derailing your health.
Breakfast Cereals – While it’s well understood that cereals are often brimming with sugar, shoppers are often unaware that their favorite cereal might also contain large amounts of sodium. Specifically, it’s not unheard of for some cereals to have 180 to 300 mg of sodium in just one serving. To put this in perspective, this figure represents 12 to 20 percent of the 1500 mg per day guideline.
Veggie Burgers – At first glance, veggie burgers would seem to offer a healthier alternative to regular hamburger patties, particularly for those who prefer not to eat meat. Unfortunately, veggie burgers are usually chocked full of processed additives, among them being sodium. In addition to any sodium found in the bun, ketchup and cheese, a single patty might hold up 400 to 500 mg of this ingredient.
Pancakes – Aside from cereals, you might also want to reconsider opting for pancakes at breakfast time, as sodium is found in abundance in pancake mixes. Ready-made mixes can contain up to 400 mg of sodium in a single serving. Pancakes made from pourable mixes aren’t that much better; just three pancakes made from this type of mix may hold up 700 milligrams worth of sodium.
Chicken Breast – Chicken breast is a good source of protein. Unfortunately, sodium is frequently used to boost the taste of chicken breasts sold at grocery stores. Fortunately, health-conscious shoppers do have the option of buying organic chicken breasts, which tend to have much less in the way of sodium. Likewise, chicken-breasts labeled with the words “non-enhanced” also represent a better bet.
Canned Soups – Canned soups are fairly popular with shoppers, as they require little effort to prepare and have a relatively decent taste. The problem is that canned soups, like many other processed foods, can largely attribute their flavor to copious amounts of sodium; a single serving can have up to 600 mg of this additive.
Processed Cheese – Liked canned soups, cereals and pancake mixes, packaged cheese slices are convenient, tasty – and packed full of sodium. Believe it or not, processed American cheese can have anywhere from 330 to 460 mg of sodium in a one-ounce slice.
Spaghetti Sauce – Spaghetti is one of the world’s most popular foods, and most people prefer to eat it with a good amount of spaghetti sauce. Not surprisingly, spaghetti sauce relies heavily on sodium to improve the flavor of pasta dishes, to the tune of more than 400 mg per serving.
Bread – In comparison to other items on this list, bread may not seem so bad when it comes to sodium content. The problem is that bread and rolls take up a large chunk of the average American’s diet. While the amount obviously varies based on brand and type, 120 mg of sodium can lurk within a single slice of bread. Eating just two sandwiches made with this kind of bread would mean ingesting 480 mg of sodium – and that’s not including the ingredients between the slices.
|
<urn:uuid:59006f6c-99a1-4735-b644-318b45a839e1>
|
CC-MAIN-2023-50
|
https://naturalknowledge247.com/foods-with-hidden-salt/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00113.warc.gz
|
en
| 0.948529 | 997 | 3.328125 | 3 |
How would i calculate the change of flow rate when i have the intial rate, the length, and diameter of tubing ? Say I get an initial flow of 100gph and the tubing the water travels through is .5inch diameter and 16 inches long. What is the flow at the end of the tubing? Could I also calculate how far water goes into the air with a kinematic equation? I am only in general physics but I was wondering this for applicational purposes. Im building a waterfall and want to find the right pump for the output desired.
|
<urn:uuid:968c3860-70be-4df5-be35-46dfd008c833>
|
CC-MAIN-2017-43
|
https://www.physicsforums.com/threads/calculating-the-change-in-flow-rate-with-varied-height.377253/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00859.warc.gz
|
en
| 0.96022 | 113 | 2.703125 | 3 |
During World War II, hundreds of death sentences were carried out on this abandoned military shooting range. Among them was also submarine captain, after whom the street leading to the shooting range was named.
The convicts awaited their execution in the local Navy detention center.
The German Reich bought the area in the year 1906 from various owners to create a shooting range of 35 hectares. The construction of a new, larger shooting range became necessary due to the development of the K 98 rifle, which demanded shooting ranges with a length of at least 600 meters.
The shooting range was expanded again in the 1930s.
In the final years of World War II, the shooting range apparently served as the central place of executions in the Reich's Navy, but since the beginning of the war was already used as the central place of execution for the state.
The entire process of the executions became more and more bueaurocratic over time. So much so, that a form was conceived in which only the corresponding data had to be entered.
In a handout that was distibuted to the soldiers, the preparations and process of execution were explained in detail.
This handout stated that the coffin had to be covered with straw for the blood, and that "shoes belonging to the Reich" had to be taken from the prisoners before the execution to be used again.
In 1955, the German Bundeswehr took over the area and used it yet again as a shooting range.
|
<urn:uuid:27e04971-77ee-492c-bd20-d1eeaeb82f39>
|
CC-MAIN-2020-10
|
https://www.arcanumurbex.de/photos/military-objects/military-shooting-range-a/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00077.warc.gz
|
en
| 0.985616 | 299 | 3.0625 | 3 |
The stage is set at Shakespeare's Curtain Theatre
As the detailed 3 month excavation of Shakespeare’s Curtain Theatre comes to a close and development of The Stage gets underway, our recent discoveries are poised to completely transform our understanding of the evolution of Elizabethan theatres.
After further careful excavation, we can now confirm that the rectangular theatre was purpose built for performance and entertainment, and housed a long, rectangular stage with evidence of an unusual passageway running beneath it.
The early stages of the dig confirmed that the theatre was not the polygonal structure we had anticipated, but this latest set of discoveries give us more detail about this early Elizabethan theatre. The discovery of an oblong stage which is far longer than expected and the mysterious passageway offers a tantalising glimpse into the secrets that are still to be uncovered. We’re now embarking on post-excavation work to further explore the relationship between the unusual shape of the stage, the production and staging and the mysterious backstage areas.
Discovering that the theatre was purpose built tells us this was not a repurposed space with a stage added, it was a place where people came to be immersed in entertainment. It had timber galleries with mid and upper areas for those who could afford to spend a little more, and a courtyard made from compacted gravel for those with less to spend.
Throughout findings, we’ve also been able to tell that The Curtain Theatre is one of earliest Elizabethan playhouses where people actually paid money to see performances and be entertained. We know this because fragments of ceramic money boxes have been found. These fragments are a really exciting find because the pots would have been used to collect the entry fees from theatregoers and then been taken to an office to be smashed and the money counted. This office was known as the ‘box office’, which is actually the origin of the term we still use today!
We’ve also found glass beads and pins, these are small but fascinating finds that can offer us a glimpse backstage, as they may have come from actors’ costumes. We’ve also unearthed drinking vessels and clay pipes, which relate to the making merry of revelling theatregoers and actors.
We now know so much more about the theatre than ever before and these discoveries offer a rare and exciting opportunity to explore the new questions they pose.
For now, the excavated remains of the Curtain Theatre, which takes its name from Curtain Road, have been carefully covered over with a protective membrane and a special type of pH neutral sand, while construction of The Stage, a new £750m mixed-use development backed by a consortium led by Cain Hoy and designed by architects Perkins+Will, continues.
A display of the finds will sit alongside the theatre remains as part of a cultural and visitor centre at the heart of the completed development, which will also feature 33,000 sq ft of retail, over 200,000 sq ft of office space, more than 400 homes, and over an acre of vibrant public space including a performance area and a park.
Historical documents reveal Shakespeare's Curtain Theatre from the perspective of the people that knew it best in this blog for #...
Cloak and Dagger Studios (CnD) and Museum of London Archaeology (MOLA) have teamed up to create the first ever digital animation of...
|
<urn:uuid:5474409c-4685-4219-9983-52246cb86f5c>
|
CC-MAIN-2017-43
|
http://www.mola.org.uk/node/28536
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825473.61/warc/CC-MAIN-20171022222745-20171023002745-00073.warc.gz
|
en
| 0.962007 | 691 | 2.96875 | 3 |
Preventing and Treating Gum Disease
Mentions of gum disease are everywhere in dental products and for good reason. Left untreated, gum disease can have long lasting and potentially serious effects. Luckily, many cases of gum disease are easy to treat, and with proper care in our Jacksonville office and at home, you can reverse and prevent further damage as well.
The earliest stage of gum disease is called gingivitis. Caused by a buildup of bacteria-filled plaque along the gum line, the result is infected tissue that becomes swollen, red, and bleeds easily. The reason that gingivitis begins is often poor dental hygiene habits. If you aren’t properly brushing and flossing, then you aren’t removing all of the plaque in your mouth.
Gingivitis is easy to treat and can generally be reversed with a good dental cleaning. Our team of skilled dental hygienists will be able to thoroughly remove plaque and help teach you how to properly care for your teeth at home.
When gingivitis is left untreated, it develops into full-blown periodontal disease (also called gum disease). At this stage, treatment becomes much more difficult. Long term effects of gum disease can include the recession of gums, tooth loss, and destruction of bone. While this sounds severe, gum disease is still treatable! Using a technique called root planing and scaling, we can do a deep clean in the areas between your gums and teeth. These periodontal pockets are where most of the disease-causing bacteria lives. By removing it and thoroughly cleaning the area, we are able to stop gum disease in its tracks!
The best solution to preventing gum disease and gingivitis is to make sure your mouth stays clean. While brushing and flossing will help maintain your mouth’s health, the only way to assure that you are keeping your teeth in peak shape is by scheduling regular six-month cleanings.
The symptoms of gingivitis and periodontal disease can often be invisible. Don’t wait until it’s too late! Schedule a thorough exam for Gum Disease by calling our office at 501-982-4447, or schedule an appointment using our online form.
|
<urn:uuid:ddc98915-21d4-49a3-9479-ae4301bc7346>
|
CC-MAIN-2023-40
|
https://www.tedpinneydds.com/our-services/gum-disease/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00583.warc.gz
|
en
| 0.945512 | 480 | 2.625 | 3 |
Breast cancer is the leading cancer diagnosed among women. In 2008, an estimated of 182,460 new cases of breast cancer will be diagnosed, and more than 40,480 women will die of the disease and is second to lung cancer as the most common cause of cancer death in the U.S. Women in the United States have a 1 in 8 chance of developing breast cancer by the time they reach their 90’s. The single most important factor for surviving breast cancer is the stage at which the disease is detected. The survival rate for early stage disease is 97%. It is 77% for disease, which has spread to the nearby lymph nodes, and 21% for distant metastatic disease.
In adolescence, the breast tissue is very dense; however, as women age, the dense breast tissue is infiltrated with fat cells, which allows for greater penetration of the x-rays used in mammograms. Women who have a first-degree relative with breast cancer should have their initial breast mammogram performed at 30 years of age, and then every two years until she is 40. Women without an immediate family history should begin mammogram screening at 35 and then every two years until 40. After 40, the accuracy of the mammogram greatly increases as the amount of fat replacement becomes more significant and mammograms should be performed annually
Self-breast examinations should be performed on the last day of each menstrual period during the reproductive years. When a woman ceases menstruating, she is recommended to perform the self-exam on the first day of each calendar month. Remember, when performing self-breast exams, you are looking only for a change that you didn’t notice on previous self-exams (such as an area of thickening, or a small lump, or tenderness). When you do not find anything new or different, you can trust there is generally nothing to find.
Contact Dr. Gordon Gunn today at (714) 912-2211 to schedule an appointment.
Dr. Gordon Gunn also proudly serves Anaheim, Buena Park, La Mirada, Yorba Linda, Diamond Bar, Walnut, and surrounding areas.
|
<urn:uuid:efa15409-7a6a-42f7-a79c-dcaa9899075c>
|
CC-MAIN-2020-34
|
http://gordongunnmd.com/womens_wellness/breast-cancer-screening-fullerton-ca/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737168.97/warc/CC-MAIN-20200810175614-20200810205614-00178.warc.gz
|
en
| 0.959663 | 435 | 2.671875 | 3 |
Pop singer, evangelical Christian, and Florida orange juice spokesperson Anita Bryant symbolized the contentious battle over American civil rights and national mores in 1977. Grounded in her religious convictions, she launched the “Save Our Children” campaign, which led to the repeal of a Dade County ordinance that would protect the rights of homosexual residents. That October, Bryant flew to Indianapolis to perform and spread her anti-gay rights message at the “Rally for Decency,” alongside controversial southern pastor Jerry Falwell Sr. and Indiana lawmaker Don Boys, who planned to introduce a bill at the 1978 legislative session that would criminalize sodomy.
From the moment Bryant’s plane touched down to the second she departed the Indiana State Fairgrounds Coliseum, Hoosier journalists and activists pressed Bryant on her opposition to the employment of gay teachers and her advocacy of gay conversion therapy. Like in Indianapolis, her visits to Fort Wayne and South Bend later that month were met with protest, albeit characteristically polite in nature. One of the nation’s leading gay rights activists at the time, Bob Kunst, credited Anita Bryant’s 1977 crusade with forwarding the gay rights movement by normalizing discussions about homosexuality.
Indeed, her efforts to keep gay individuals from obtaining their rights inspired organized resistance in Indiana. The Michiana Human Rights Coalition formed in direct response to her appearance in South Bend. Her visits to the Hoosier state also catalyzed support for gay rights from those outside of the queer community, many of whom may not have given much thought to the plight of this minority group previously. Catholic and cisgender University of Notre Dame Library employee Charles Early explained why he protested her performance on campus in The South Bend Tribune, noting “I joined in a demonstration opposing Anita Bryant on an issue which did not affect me personally because I believe that the spirit which she represents is ultimately a threat to everyone’s rights.”
Here, we examine Hoosier protest to Bryant’s 1977 visits and how similar resistance across the country effectively ended her entertainment career, resulted in the loss of lucrative endorsement deals, and reflected changing national mores.
It could be said that the conflicting movements of 1977 constituted a fight for the nation’s soul. Journalist Gloria Steinem, bearing her trademark aviator eyeglasses, mobilized feminists in support of women’s reproductive rights and long-awaited ratification of the Equal Rights Amendment (ERA), which would guarantee equal legal rights for women. Leading counter-protests, conservative activist Phyllis Schlafly, “STOP ERA” button dutifully pinned to her lapel, rallied “pro-family” troops at the White House. Occupying the same battlefield as Schlafly was Anita Bryant, who shared her desire to quell the winds of cultural change and safeguard “traditional” American family values. Of this resistance, Early theorized “Many people today are frightened and disturbed by the unrest and rapid change in American society, and they want to go back to a time when things were simpler and more understandable.”
While Steinem and Schlafly sparred over the role and rights of women, Bryant focused on safeguarding the American family by suppressing the rights of gay Americans. Fearing her children would be exposed to the “perversion” of gay teachers, she successfully led a movement to repeal a Dade County, Florida ordinance that would prohibit teachers from being fired due to their sexual orientation.
Anita and her husband Bob Green insisted that they loved gay individuals, so much so that they dedicated themselves to converting them to heterosexuality in order to save them from hell and the “sad” lifestyle they lived. Green recalled:
‘When we were kids, we used to say if a guy was a homosexual, all we had to do was fix him up with a girl and the next day he’d be heterosexual. . . . Well it’s not like that. Anita and I have led many, many homosexuals to the light. But it’s a slow process. It’s an area of sin Christians need to work on.’
Feeling no love from the devout Christian couple was Ernest Rumbarger, an Indianapolis resident and gay contributor to The Works. He recalled that in the 1970s gay men “were finally learning how to communicate with each other in a social setting other than bars” and that “Gay businesses as such were beginning to flourish and, all in all, things seemed to be going rather well.” That is, until Anita Bryant undertook her “Save Our Children” campaign. Indianapolis police officers arrested Rumbarger and two other men in 1977 for homosexual prostitution in Indianapolis. Rumbarger wrote that he and his partner were two of Bryant’s “better known local victims. We were taken from our home in the middle of the night and held for eight days in jail, incommunicado.” Despite receiving no assistance from the Indiana Civil Liberties Union or Gay People’s Union, a grand jury found Rumbarger not guilty and reportedly offered him an “unsolicited public apology.” The Hoosier wrote “On either coast we would have been carried through the streets and hailed as national heroes” for his triumph over persecution.
As Bryant’s campaign emboldened harassment of queer individuals, Hoosier allies mounted resistance to her October 7 visit to Indianapolis. The day before the “Rally for Decency,” the Indiana Coalition for Human Rights hosted a news conference, attended by representatives of the Metropolitan Community Church of Indianapolis, Gay People’s Union, and the Sex Information and Education Council of Indiana. Coalition spokesperson Mary Byrne told the press that allies would picket Bryant’s performance “because she represents a force for evil and persecution. She has inflamed irrational prejudices and fostered fear and hatred.” Attending the protest would be Baptist minister Rev. Jeanine C. Rae, who believed that fundamentalists’ attempts to legislate sexuality threatened the separation of church and state. She argued that withholding human rights from certain communities “‘limits the freedom of all persons-including white heterosexual Baptists.'”
Immediately after arriving at the Indianapolis International Airport on the day of her performance, Anita participated in a press conference, looking, in the words of journalist Robert Reed, “very much like an aging but attractive president of the local PTA.” She and her husband fielded questions about her work to repeal the Dade County ordinance, which she felt afforded gay individuals “special privileges” and would allow them to flaunt homosexuality in the classroom. She believed “God put homosexuals in the same category as murderers, thieves and drunks. Homosexuality is a sin and I’m against all sin. I’m also against laws that give respectability and sanction to these types of individuals.” Her crusade against these laws, she alleged, incited a “national conspiracy” against her. She reported receiving bomb threats and the loss of product endorsements. Reed wrote that her statements were ill-received by journalists, who left the press conference while she was still talking.
That night, the Indiana State Fairgrounds Coliseum thrummed with cheers and “Amens” as approximately 7,000 attendees absorbed the words of speakers who outlined their plans to “restore decency” in America. The Martinsville Reporter-Times noted that the event “took on the aura of a political rally and a Baptist revival.” Local pastors emphasized the need to elect officials who supported causes like “Save Our Children,” some of whom sat in that very coliseum. Greenwood Rep. Donald Boys advocated for his anti-sodomy law, to be introduced the following year, and for lawmakers to expunge the Equal Rights Amendment. After his bill failed to pass in 1976, the persistent lawmaker wrote, “‘This is the day of equal rights unless you happen to be a Christian, conservative, white male, creationist.’”
Outside of the coliseum, 500 protesters bore the rain, carrying dampened signs that read “Straights for gay rights” and “A day without human rights is a day without sunshine”— a play on the Florida Citrus Commission’s “Breakfast without orange juice is like a day without sunshine” slogan. Protesters included Fritz Lieber, co-chairman of the Indiana Coalition for Human Rights, who lost his teaching position for being gay. Mary Hoffman, her husband, and three kids also attended the demonstration, believing that Bryant’s message “‘parallels McCarthyism, the Ku Klux Klan and Hitler.'” As protesters stoically made their presence known, Rev. Jerry Falwell quipped on the stage, “It’s a shame it’s raining. It might wash off their make up.”
When at last Bryant took the stage, the audience was rapt, hanging onto every word she sang. She occasionally punctuated her religious and patriotic songs with oration—like warning the audience that “if parents don’t rise up and set standards for our children, the humanists, the ultra-liberals and the militant homosexuals will”—which inspired several standing ovations. After her performance, the polarizing figure departed for Nashville, but the momentum generated at the rally carried over to the next day, when a parade of 500, led by U.S. Marine Cleve McClary, marched to Monument Circle. There, 2,000 Hoosiers joined them for an “encore” rally to “restore decency.” Local pastor Earl Lawson, who worked to reform homosexual individuals and sex workers, declared that he would organize similar rallies across the state.
Opponents responded to the continued rallies through the press. Indianapolis newspapers printed an advertisement compiled by sixty-three clergy protesting “the crusade against persons with homosexual orientation.” A few days after the rally, Jerry Briscoe wrote to the Indianapolis News editor that Bryant’s judgment of others “has become devastating to their existence” and contradicted Christian theology. He stated, “God is our ultimate judge—that is, of course, before Anita Bryant came along.”
Hoosiers, joined by Cleveland and Chicago activists, again mounted resistance to Bryant when she returned to Indiana at the end of the month. The Michiana Human Rights Coalition formed ahead of her October 26th concert at the University of Notre Dame, with the motto that “All God’s Chillun Gotta Sing.” Protesters planned to march with signs bearing Bible verses and Shakespearean quotes reaffirming human rights. That evening, only 500 of the arena’s 10,000 seats were occupied. The South Bend Tribune reported that Bryant, who led the audience in prayer for gay individuals, unwed couples living together, and divorced couples, “seemed lost in the vastness of the Athletic and Convocation Center.” The number of protesters, both in support of and opposition to Bryant, nearly matched that of concert-goers.
About two weeks before her Notre Dame performance, a protester threw a pie at Bryant during a press conference in Des Moines, Iowa. Her face eclipsed by whipped cream, Bryant tried to pray for the man before breaking down into tears. South Bend demonstrators determined to make their opinions known peacefully and by demonstrating love. They went so far as to invite Bryant to a “gay” reception in her honor, to which she declined. In lieu of pie, they gave her a bouquet of roses and dropped petals at the feet of counter-protesters.
According to Catholic Notre Dame employee Charles Early, the same kindness was not exhibited by counter-protesters, one of whom spat on the seven-year-old daughter of a Michiana Coalition leader. However, Early alleged the “fiasco” that was the concert showed a growing acceptance of the marginalized community. Just three days later, demonstrators picketed Bryant’s performance at Fort Wayne’s Embassy Theater for the 60th anniversary celebration of the Brotherhood Mutual Insurance Co. Some carried signs saying “Gay is Okay” and “Anita Bryant is Proof Orange Juice Causes Brain Damage.”
Bryant was met with similar protests across the country and nationwide boycotts of orange juice, endorsed by entertainment titans like Barbara Streisand, John Waters, and Mary Tyler Moore. Gay bars swapped orange juice for apple in screwdriver cocktails. The backlash effectively ended her entertainment career and endorsement deals. She reportedly lost $500,000 in television contracts, was no longer booked for performances, and lost her years-long endorsement deal with the Florida Citrus Commission. Bryant’s crusade ultimately backfired and activists credit her with bringing the issue of gay rights to the forefront. One South Bend Tribune editorial noted that she “stirred a reaction among those whose awareness of and sympathy with the problem previously was minimal but who automatically throw up mental defenses against extremism.” The author wrote that her campaign also prompted examination of the “psychological and physical complexity of homosexuality.”
In Louisville, Bryant’s crusade inspired some gay and lesbian residents to cautiously come out of the closet. The thought that “‘We’re all monsters'” inspired one man to be open about his sexuality. Another man interviewed noted that “Anita has made gays aware of themselves.” Reflecting increasingly-tolerant attitudes, that November Harvey Milk became the first openly-gay elected official in California, when he won a seat on the San Francisco Board of Supervisors. He introduced a gay rights ordinance similar to that which officials repealed in Dade County.
By 1980, Anita Bryant was divorced and financially depleted. Five years earlier, she described the agony of choosing whether to prioritize her family and Christian faith over a career in entertainment. Although she experienced “depressions and doubts, caused by the many sides of me coming into conflict,” prayer revealed to her that she must relinquish ambition and submit to a life of service to her family and Christ. Now shunned by Christian fundamentalists for leaving her marriage, perhaps she related to the lyrics of a song she performed in 1964:
The world is full of lonely people
I know because I’m one of them
Celebrations resounded in courthouses across the country in 2015, when the U.S. Supreme Court struck down same-sex marriage bans in all states. But the 2015 enactment of Indiana’s Religious Freedom Restoration Act, as well as the 2018 firing of a Roncalli High School guidance counselor upon discovery of her same-sex marriage, again set off passionate debate about religious and civil rights. The events of October 1977 demonstrate that Hoosiers have historically participated in the debate and protested for what they believe is right.
* All newspaper articles accessed via Newspapers.com.
Mike Ellis, “‘Standards Must Be Set by Parents,'” Indianapolis News, October 8, 1977, 2.
Interview, “Anita Bryant Confronted in 1977,” Who’s Who, accessed YouTube.
Charles Early, “Counter-protesters at Bryant Concert Warped by Hatred,” South Bend Tribune, November 7, 1977, 15, accessed Newspapers.com.
Karen Karbo, “How Gloria Steinem Became the ‘World’s Most Famous Feminist,'” March 25, 2019, accessed National Geographic.; Douglas Martin, “Phyllis Schlafly, ‘First Lady’ of a Political March to the Right, Dies at 92,” September 5, 2016, accessed New York Times.
Early, “Counter-protesters at Bryant Concert Warped by Hatred.”
Barney Seibert, “Perverts’ Hatred Makes Life Tough for Anita Bryant,” The Reporter-Times (Martinsville, IN), April 10, 1980, 5.
Holly Miller, “‘Deliverance:’ Anita and Mate Tell Their Story,” Anderson Herald, October 8, 1977, 1.
“3 Arrested in ’77 Freed of Charges,” Indianapolis Star, March 9, 1979, 20.; Editorial, E. Rumbarger, “What Do Hoosiers Have to Be Proud of?,” New Works News (June 1989), 4, accessed Chris Gonzalez GLBT Archives.
“Anita to Face Pickets Here,” Indianapolis News, October 6, 1977, 3.; Jan Carroll, “Groups Call Miss Bryant Evil Force,” Courier-Journal (Louisville, KY), October 7, 1977, 6.; “Protesters to Be on Hand to Picket Anti-Gay Rally,” Daily Journal (Franklin, IN), October 7, 1977, 5.
Robert Reed, “Anita Bryant: She Draws Line for Hoosier Journalists,” Daily Journal (Franklin, IN), October 8, 1977, 2.
Miller, “‘Deliverance:’ Anita and Mate Tell Their Story.”
Reed, “Anita Bryant: She Draws Line for Hoosier Journalists.”
“Protesters Picket Anita Bryant Decency Rally in Indianapolis,” Reporter-Times (Martinsville, IN), October 8, 1977, 1.
Letter to the Editor, Donald Boys, State Representative, Reporter-Times (Martinsville, IN), June 9, 1977, 2.
Ellis, “‘Standards Must Be Set by Parents.'”
“Anita Stirs Emotions,” Journal and Courier (Lafayette, IN), October 9, 1977, 9.; Ellis, “‘Standards Must Be Set by Parents.'”
Ellis, “‘Standards Must Be Set by Parents.'”
“‘Save Our Society’ Circle Rally Held,” Indianapolis Star, October 9, 1977, 59.
“Anita Stirs Emotions,” Journal and Courier.; Letter to the Editor, Jerry Briscoe, “On Peaceful Coexistence,” Indianapolis News, October 10, 1977, 9.
“Support Grows for Gay Rights, Promoter Says,” South Bend Tribune, October 26, 1977, 14.
Edmund Lawler, “Anita Bryant Revival Draws 500 into ACC,” South Bend Tribune, October 28, 1977, 1.
William Simbro, “Pie Shoved in Anita Bryant’s Face by Homosexual—She Cries,” Des Moines Register, October 16, 1977, 3.
“Support Grows for Gay Rights, Promoter Says,” South Bend Tribune.; Jeanne Derbeck, “‘Gay’ Tactic: Show of Kindness,'” South Bend Tribune, October 17, 1977, 1.; Lawler, “Anita Bryant Revival Draws 500 into ACC.”
Early, “Counter-protesters at Bryant Concert Warped by Hatred.”
“Anita Picketed in Fort Wayne,” Indianapolis News, October 29, 1977, 15.
Fred Fejes, “Gay Rights and Moral Panic: The origins of America’s Debate of Homosexuality (New York: Palgrave Macmillan, 2008), accessed Springer Link.
Seibert, “Perverts’ Hatred Makes Life Tough for Anita Bryant.”; N.R. Kleinfield,” Tarnished Images: Publicity’s Great—Up to a Point,” Press Democrat (Santa Rosa, CA), May 26, 1981, 36.
Editorial, “Anita’s Woes,” South Bend Tribune, October 31, 1977, 14.
“Anita Bryant has Opened Doors for Gays,” The Courier-Journal (Louisville), October 6, 1977, 1, 4.
“Milestones in the American Gay Rights Movement,” American Experience, accessed PBS.org.
Seibert, “Perverts’ Hatred Makes Life Tough for Anita Bryant.”; Barry Bearak, “Turmoil Within Ministry: Bryant Hears ‘Anita . . . Please Repent,” Miami Herald, June 8, 1980, 1A, 33A.; Steve Rothaus, “Bob Green: Anita’s Ex Paid Dearly in the Fight,” Steve Rothaus’ Gay South Florida, June 9, 2007, accessed Miami Herald.
Alan Ebert, “For Easter: Anita Bryant’s Painful Progress Toward God,” Anderson Daily Bulletin, March 29, 1975, 30.
Lyrics, “The World of Lonely People,” 1964, accessed Genius.com.
Ed Payne, “Indiana Religious Freedom Restoration Act: What You Need to Know,” CNN, March 31, 2015, accessed CNN.com.; Bill Chappell, “Supreme Court Declares Same-Sex Marriage Legal in All 50 States,” The Two-Way, June 26, 2015, accessed NPR.org.
Arika Herron, “Shelly Fitzgerald, First Gay Guidance Counselor Suspended by Roncalli, Files Federal Suit,” IndyStar, October 22, 2019, accessed IndyStar.com.
|
<urn:uuid:94808ea8-70db-4e75-a050-820142893984>
|
CC-MAIN-2023-23
|
https://blog.history.in.gov/tag/mary-byrne/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00486.warc.gz
|
en
| 0.942242 | 4,679 | 2.765625 | 3 |
With natural furies increasingly taking their toll on the planet, the need to better predict the most dangerous earthquake-prone faults and their consequential damages are gaining importance.
Cuing with these concerns, scientists are taking up studies on the ‘nature’ of the killer-earthquakes. Amidst this, a new study has found that earthquakes along the long and straight faults can rupture faster than previously thought! – Thanks to the more powerful computers, higher quality seismograms and new imaging techniques.
It can also trigger powerful shock waves that trigger the destructiveness of the quick-moving quakes. This finding has its significance in predicting the potential risks of a forthcoming earthquake.
Leading the study, Shamita Das, a seismologist at Oxford University wrote:
Given the potential for increased destruction, we must take such information into account when planning earthquake-resistant construction worldwide.
According to the study, earthquakes, like roads, slow down during bends or a bump. Taking the California’s San Andreas fault into consideration, it is found that many parts of it run in long, straight lines making it more vulnerable to such quick quakes.
This new finding opens up new scopes to identify faults across the world that could fuel these more powerful quakes in the future. Thus, planning earthquake-resistant constructions would be easier across the world.
|
<urn:uuid:fc8ce181-b295-45a8-bfe7-f9d01c81d445>
|
CC-MAIN-2020-24
|
https://drprem.com/guide/powerful-shock-wave-creating-earthquakes-can-move-faster-than-predicted/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00510.warc.gz
|
en
| 0.939391 | 274 | 3.9375 | 4 |
By Raymond Goldsworthy, PhD
Associate Professor, Research Division
USC Caruso Department of Otolaryngology – Head and Neck Surgery
While cochlear implants restore substantial hearing, they can’t compete with the body’s natural hearing ability. Rehabilitation is required once the device is implanted in order to train the brain to recognize speech through the implant’s signals. Music recognition can be next to impossible for many because current implants negatively impact pitch perception and can make it difficult to identify individual instruments or vocalists.
Restoring music to people reliant on the implant
One of the key focuses of the USC Caruso Department of Otolaryngology – Head and Neck Surgery at Keck Medicine of USC is to help patients with all levels of hearing loss regain as complete a spectrum of sound and experiences as possible.
In support of this mission, I’ve spearheaded a special research project funded by a grant from the National Institutes of Health in support of the Sound Health Initiative. My goal is to restore music to cochlear implant users.
A key factor of the study is tackling how solve the impact the implant has on users’ pitch perception. As a key part of this effort, I’ve developed special rehabilitation software to help the brain recognize pitch from signals the implant sends to the brain.
I’ve also developed new ways of encoding improved pitch signals into the electrical stimulation patterns of the cochlear implant itself. Throughout this process, brain imaging has helped me to map changes in the brain that occur with pitch training.
Bringing implant users together for a common purpose
Finally, I’ve spent the past two and a half years working with a group of musicians reliant on cochlear implants who have volunteered their time to help me and my doctoral assistants test these technical developments. They are also testing practical rehabilitation methods to help train the brain to recognize the enhanced signals from the implant. Not only have they been a crucial part of this research, but they’ve been an enormous source of support and help to each other, sharing tips and tricks to help make their rehabilitation efforts as effective as possible.
Just before pandemic restrictions went into place in Los Angeles, the group met to play instruments and read music together. Since then, we’ve continued virtual music appreciation meetings once a week. My team seeks out professional musicians to play for the group. In turn, the group participants share what these instruments sound like through their implants. This helps us to make adjustments to the technology where needed.
Hopes for future practical application
I’m gratified to be part of the research team at USC Otolaryngology – Head and Neck Surgery, where I and other scientists can work on the research that truly matters to us with full confidence that when our efforts show proven benefits, they will soon be shared with patients to help them regain their quality of life. As a music lover and cochlear implant user, I’ve believed in the benefits of restoring music to other users for most of my adult life. Being able to put this belief into action, and to share the results with others, has been an extraordinary research experience.
For patients who may be interested in participating in this study, contact me at [email protected].
|
<urn:uuid:4b9c1dd6-8b7f-4b3a-84c0-1fb6686cd790>
|
CC-MAIN-2023-14
|
https://medresources.keckmedicine.org/news/cochlear-implant-advancements-to-include-music-recognition-capabilities
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00357.warc.gz
|
en
| 0.935557 | 681 | 2.671875 | 3 |
This Assessment Bundle focuses on Geometry and includes 8 formative assessments (each is a one-sided worksheet), a practice test booklet, and summative assessment (unit test). ALL of these include answer keys. Here they are as they align to the common core standards.
1. Area of Parallelogram - CCSS.6.G.A.1
2. Area of Triangles - CCSS.6.G.A.1
3. Area of Trapezoids - CCSS.6.G.A.1
4. Complex Figures - CCSS.6.G.A.1
5. Surface Area with Nets - CCSS.6.G.A.2, G.A.4
6. Surface Area without Nets - CCSS.6.G.A.2
7. Volume - CCSS.6.G.A.2
8. Volume with Fractions - CCSS.6.G.A.2
9. Geometry Practice Test
10. Geometry Assessment
You will download a ZIP file including the ten files above.
These assessments were designed to work in INTERACTIVE NOTEBOOKS. In my class, I use the left hand side of the notebook for guided notes with foldables, while the right-hand side is reserved for individual practice. The worksheets are all one-sided to be glued into interactive notebooks. I usually trim just a bit around the edge with a paper cutter so that they fit perfectly, but this is not necessary. Of course, they can be used as stand alone worksheets. My students also glue their practice test booklets into their interactive notebooks.
I have created assessments for six units of sixth grade math, trying to hit on all the common core standards for this grade level. Here are the units that I used:
2. Fractions and Decimals
3. Numbers and Coordinates
These activities can be found in my 6th Grade Math COMPLETE YEAR Assessment Bundle at 35% off!!! I will also be bundling them together with my other interactive notebook resources! Check out my Stick-n-Solve FOLDABLES!
**Leave Feedback after your purchase to earn TpT credits!!**
Find the area of right triangles, other triangles, special quadrilaterals, and polygons by composing into rectangles or decomposing into triangles and other shapes; apply these techniques in the context of solving real-world and mathematical problems.
Find the volume of a right rectangular prism with fractional edge lengths by packing it with unit cubes of the appropriate unit fraction edge lengths, and show that the volume is the same as would be found by multiplying the edge lengths of the prism. Apply the formulas V = l w h and V = b h to find volumes of right rectangular prisms with fractional edge lengths in the context of solving real-world and mathematical problems.
Represent three-dimensional figures using nets made up of rectangles and triangles, and use the nets to find the surface area of these figures. Apply these techniques in the context of solving real-world and mathematical problems.
Geometry Worksheets & Test - 6th Grade
by Kimberly Wasylyk
is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
|
<urn:uuid:8067368e-e228-4e0b-88fc-3f70d2032a1d>
|
CC-MAIN-2017-34
|
https://www.teacherspayteachers.com/Product/Geometry-Worksheets-Test-6th-Grade-2680254
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107490.42/warc/CC-MAIN-20170821041654-20170821061654-00377.warc.gz
|
en
| 0.88176 | 683 | 4.0625 | 4 |
On 2/4/2013 2:15 AM, WM wrote: > On 3 Feb., 23:04, fom <[email protected]> wrote: > >>> There is no sensible way of saying that 0.111... is more than every >>> FIS. And every FIS is in a line. >> >> Do you mean "is in some line"? > > What is s? In decimal it is 1/9. In binary it is 1. In paths or > strings of bits or decimals it does not exist! >> >> As in "there exists a line containing a given FIS"- > > There is not more than every FIS of 0.111... Not even all FIS. Here > you may see why: > 1) The set of all real numbers of the unit interval is (said to be) > uncountable.
So, one takes "uncountable" as negatively defined in distinction with the usual definition concerning correspondence with the smallest completed infinity containing every natural number.
...compared with, say, "a set of vectors is linearly independent if it is not linearly dependent"
> 2) An uncountable set has (infinitely many) more elements than a > countable set.
By "more," you mean that the construction of a new name may be accomplished and by "infinitely many" you mean that consecutive constructions can always be performed sequentially without end from any initial finite configuration of names.
> 3) Every real number has at least one unique representation as an > infinite binary string (some rationals have even two representations > but that's peanuts).
By "uniqueness", you mean there is a strategy for constructing names that always allows you to differentiate a single object from a plurality on the basis of "naming"
> 4) In many cases the string cannot be defined by a finite word.
What would be the limitation here? Is it the negative logic of "since there are more numbers than names..."?
> 5) Without loss of information the first bits of two strings, if > equal, need not be written twice.
This starts to become a little problematic. Now, your numbers are turning into classes of numbers. And, your names are turning into the names for canonical representatives of those classes if the partition is viewed as an equivalence partition.
> 6) Application of this rule leads to the Binary Tree. > 7) The binary strings of the unit interval are isomorphic to the paths > of the Binary Tree. > 8) It is not possible to distinguish more than countably many paths by > their nodes. > 9) This is proven by constructing the Binary Tree node by node. > 10) Further this is proven by colouring all edges and nodes and paths > of the complete Binary Tree by countably many paths.
This last part is not problematic. I do not consider the debate you have been having as reflecting the actual sense of the Cantor space (by which I mean "topological"). You are describing the well-founded k-equivalent parts of a tree structure in a discrete sense.
In trying to understand your position, I hope my paraphrasing has been reasonably accurate.
|
<urn:uuid:2b9115d1-bb5f-4590-a6fa-7f13ce88c728>
|
CC-MAIN-2017-26
|
http://mathforum.org/kb/message.jspa?messageID=8248387
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00402.warc.gz
|
en
| 0.940432 | 664 | 2.921875 | 3 |
In this essay from the Center on Children and Families’ Essay Series on Character and Opportunity, Martin Seligman says that neither good character nor opportunity on their own will amount to much for an individual—they must be accompanied by optimism and hope, the bulwarks of a robust future-mindedness.
The standard view of today’s social reformers is that building character plus building opportunity will break the transmission of poverty from one generation to the next. I think this view, while laudable and a big improvement over the failed strategy of merely building opportunity, is still seriously incomplete. The missing link is that good character can take advantage of opportunity only by free will, and free will only works through future-mindedness. This view sounds quaint to twenty-first century ears and so is in need of a history and a justification.
Why did science give up the notion of free will? Pierre-Simon Laplace (1749-1827), a French mathematician of the Enlightenment, postulated that if we knew the position and momentum of every particle in the universe at one instant only, we could then predict the entire future of the universe as well as postdict the entire past. When the deterministic claims of Darwin for biology, Marx for sociology and politics, and Freud for psychology are hammered on to Laplace’s superstructure, this makes for a pretty imposing edifice – an edifice that is a secular version of the Calvinist doctrine of predestination and just as pointedly renders any belief in human choice nonsensical. Is it any wonder that so many educated people of the twentieth and twenty-first centuries began to believe that they were prisoners of their past, doomed to be frog-marched into their predestined futures by the accidents of their environment and their personal histories?
Actually it is. First, because the argument is much looser than it appears, and second because Laplace faced venerable intellectual forces arrayed on the opposing side. The nineteenth century American mind did not think much of historical determinism. Quite the contrary.
The educated nineteenth century American mind believed deeply, and for reasons not at all frivolous, in two intimately related psychological doctrines: free will and character. It was the first doctrine, free will, and all its buttresses that were arrayed against Laplace and his allies. The modern history of free will begins with the liberal Dutch Protestant Jacob Arminius (1560- 1609). In opposition to Luther and Calvin, Arminius claims that humans have free will and can participate in their own election to grace. This was dubbed the “Arminian Heresy” since grace was supposed to come freely only from God. The heresy then became widespread through the charismatic, evangelical preaching of John Wesley (1703-1791).
The English founder of Methodism, Wesley preached that humans have free will and using free will, each of us can actively participate in attaining their own salvation by doing good works. Wesley’s stunning sermons, heard through the cities, towns, and villages of England, Wales, Northern Ireland, and in the American Colonies, made Methodism a strong and popular religion by the early part of the nineteenth century. Free will entered popular American consciousness, and almost all forms of American Christianity – even Lutheran and Calvinist – came to embrace it. Ordinary people no longer saw themselves as passive vessels waiting to be filled with grace. Ordinary human life could be improved. Ordinary people could better themselves. The first half of the nineteenth century became the great age of social reform – the second great awakening. The Evangelical religion of the American frontier was intensely individualistic. Prayer meetings climaxed with the drama of the choice of Christ.
There was no better soil than nineteenth century America for this doctrine to root and grow and flower. Rugged individualism, the idea that all men were created equal, the endless frontier along which the waves of immigrants could find freedom and riches, the institution of universal schooling, the idea that criminals could be rehabilitated, the freeing of the slaves, the drive to women’s suffrage, and the idealization of the entrepreneur, are all manifestations of how seriously the nineteenth century mind took free will – before Darwin, Marx, and Freud threw cold water on it – and how little it cared for the idea that we are prisoners of the past.
This led to an uncomfortable standoff. On the one hand, the religious and political traditions of America embraced free will and everyday experience seemed to display it in hundreds of small ways. On the other hand the bulky edifice of science seems to demand that you give up the notion. So by the end of the 20th century, educated Americans were talking out of both sides of their mouths about freedom and choice. On the one hand, free will is integral to political discourse (e.g., “the will of the people,” “responsibility” “I will return character to the White House”) and to ordinary discourse (e.g., “Would you mind putting your cigarette out?” “Would you rather go to the movies or watch television?”). On the other hand, tough-minded scientific argument excludes it. This exclusion has crept into legal decisions (“mitigating circumstances,” “not guilty by reason of insanity”), and most importantly into the way most educated people think about their own past.
Can hard determinism be overthrown? After all, Laplacian determinism failed utterly for Freudians, was too general to be at all predictive for Darwinians, and as for Marx, the only remaining home for historical inevitability after the fall of Eastern Europe is in the English departments of a few elite American universities. The philosophical arguments for Laplace’s dictum are, however, less easily disposed of than the empirical claims of Freud and Marx. This is not the place to review the long, picky arguments about hard determinism, soft determinism, compatibilism and free will. For now, I will simply direct attention to recent work by Chandra Sripada (2014), work that is a breath of fresh air as it discusses an aspect of free will that has been so far almost entirely neglected.
Paraphrasing liberally from Sripada’s discussion, consider the question of what makes a Ferrari fast, what is special or distinctive that makes a Ferrari speedier than other cars. A proper answer must surely say something about the Ferrari’s engine, and in particular its size or power or its unique engineering. The philosophical question of free will is similar: What is the distinctive mark that makes humans, presumably alone in the animal world, free?
Sripada contends that the distinctive mark of free will is not, as is usually claimed, any properties of our decisions or our actions; it is remarkable how much decisional machinery we share with simpler creatures. Rather, it is to be found in our imagination – it consists in our potent abilities to imaginatively construct and evaluate options. These abilities are in turn intimately linked to time horizons; a sufficiently long horizon enables the building of complex plans of action that unfold over months, years, decades, even generations. If a person can only think about the actions that can be done in the present moment, his set of options is highly constrained. Once the future is fully brought in, the space of options expands spectacularly; there are countless plans he might construct, projects he might pursue, lives he might lead, persons he might elect to be. It is human imagination, our ability to mentally create sets of options of massive size and diversity, that is the engine of freedom.
If Sripada is correct, this makes sense of Banfield’s dictum (1976) that poverty is not a state of the pocket book, but a state of mind – present mindedness. This in turn has important implications for interventions that will break the intergenerational cycle of poverty.
Good character alone will not amount to much. More opportunity alone will not amount to much. They must be accompanied by optimism and hope, the bulwarks of a robust future-mindedness – and there are well-validated interventions that build optimism and hope. We need to develop interventions that expand the latitude of the futures young people imagine, that lengthen the time horizon that young people imagine, and that teach our young people how to dream.
|
<urn:uuid:201e1c44-ebaf-4588-8b1c-7cd2934ecb0d>
|
CC-MAIN-2020-34
|
https://www.brookings.edu/research/free-will-the-missing-link-between-character-and-opportunity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735812.88/warc/CC-MAIN-20200803140840-20200803170840-00111.warc.gz
|
en
| 0.953708 | 1,721 | 3.109375 | 3 |
Posted August 16, 2013 in Reviving the World's Oceans
Have you ever wondered what the seas off our shores looked like 100 years ago? Join underwater photographer Marc Shargel and find out in Yesterday’s Ocean: A History of Marine Life on California’s Central Coast. Marc's latest book of photography takes the viewer on a historical tour of the golden state's central coast -- including the "boom and bust" relationship with ocean fisheries over the past three centuries.
As fishermen in Monterey eventually found out, the ocean was not without its limits: after short, intense periods of exploitation, stocks of otters, abalone and sardines became much harder to find. As one species was depleted, another was targeted. This boom and bust pattern came to characterize many of the central coast’s fisheries – eventually leading to the stunning crash of the sardine fishery in the late 1940s.
Watch the video podcast below (from Thank You Ocean) and journey back to see just how amazingly abundant our coasts once were. An important reminder that smart ocean policies (such as the Marine Life Protection Act) are needed to conserve the many special spots along California's coastline -- and the wonderful marinelife that inhabit them. I invite you to check out the slideshow too.
|
<urn:uuid:f9cb67a5-bde1-4c22-9463-db9685536676>
|
CC-MAIN-2014-35
|
http://switchboard.nrdc.org/blogs/fkoe/yesterdays_ocean.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834258.45/warc/CC-MAIN-20140820021354-00274-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.938723 | 264 | 3.140625 | 3 |
Highlighting our history: the world's first solar radiospectrograph--Penrith 1948-1949
Stewart, Ronald, Wendt, Harry, Orchiston, Wayne, and Slee, Bruce (2010) Highlighting our history: the world's first solar radiospectrograph--Penrith 1948-1949. ATNF News, 68 . pp. 8-11.
|PDF (Published Version) - Repository staff only - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader|
View at Publisher Website: http://www.atnf.csiro.au/news/newsletter...
[Extract] The first radio observations of the Sun made by Lindsay McCready, Ruby Payne-Scott and Joe Pawsey from the CSIR’s Division of Radiophysics were conducted at 200 MHz from October 1945 using wartime radar installations at Collaroy, North Head and Dover Heights (Orchiston et al., 2006). The earliest chart recordings showed two distinct types of sporadic activity referred to as isolated bursts and outbursts which differed in their intensity and duration. A third type of persistent activity, called noise storm bursts, was reported by Cla Allen (1947a), who was observing at the Commonwealth Solar Observatory on Mt Stromlo.
|Item Type:||Article (Non-Refereed Research)|
|FoR Codes:||02 PHYSICAL SCIENCES > 0201 Astronomical and Space Sciences > 020199 Astronomical and Space Sciences not elsewhere classified @ 100%|
|SEO Codes:||97 EXPANDING KNOWLEDGE > 970102 Expanding Knowledge in the Physical Sciences @ 100%|
|Deposited On:||12 Sep 2011 14:26|
|Last Modified:||12 Sep 2011 18:02|
Last 12 Months: 0
Repository Staff Only: item control page
|
<urn:uuid:f6bc5421-3b9f-45bf-a9af-f2d229490f69>
|
CC-MAIN-2013-48
|
http://eprints.jcu.edu.au/18655/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164346985/warc/CC-MAIN-20131204133906-00021-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.795707 | 397 | 2.578125 | 3 |
Cyber Diplomacy – Addressing the Gap in Strategic Cyber Policy
Although it is a new topic, cyber-diplomacy has already advanced in leaps and bounds worldwide in an attempt to define and to summarize the efforts constantly made to solve a new type of conflict, namely those taking place in cyberspace. The primary role of diplomacy is to generate common advantage through dialogue, thus the primary role of cyber diplomacy would be to generate advantage through dialogue on cyber security issues. More concrete, a simple assumption would be that cyber diplomacy uses diplomatic tools to solve the problems that emerge in cyberspace. Topics like internet governance, enforcement of law against cyber crime, response to malicious attacks arising in cyberspace, the protection of critical infrastructure, just to mention a few, are of utmost importance and require a dedicated agenda and concrete action. The last decade has seen emerging technologies impact national economic systems in virtual space. This has changed the diplomatic agenda, with cyber threats moving to the top and with many governments already acknowledging that ignoring cyber diplomacy is no longer an option for global dynamics. Both a confusion in terminology and a lack of common legislation when addressing the cyber diplomacy topic is observed, since beyond internet governance and cyber security, a range of topics, from military use of internet to economic growth, are also enclosed by cyber diplomacy.
Cyber diplomacy or digital diplomacy?
The concept of cyber diplomacy is often associated with digital diplomacy, electronic diplomacy or computer diplomacy. Overlapping use of these concepts raises confusion over the relationship between diplomacy and the digital world.
Topics like internet governance, enforcement of law against cyber crime, response to malicious attacks arising in cyberspace, the protection of critical infrastructure, just to mention a few, are of utmost importance and require a dedicated agenda and concrete action.
Digital (electronic or computer) diplomacy refers to the use of digital tools and techniques to advance diplomatic goals. If there is a need to avoid confusion, then we must properly define digital diplomacy: it is more of a tool than an end in itself. This tool can be used by state and non-state actors. The development of a diplomatic strategy includes a range of tools and techniques that also includes digital ones enhancing analysis, influencing key policies or policymaking, as well as supporting consular diplomacy. There is always a challenge, namely to develop dedicated digital tools to implement diplomatic strategies since there is a different approach to this issue than the one used to promote commerce and trade.
Cyber diplomacy is the use of diplomatic tools and diplomatic thinking to solve the problems from the cyberspace. The use of digital tools to promote broader diplomatic agendas and the use of diplomatic techniques and mentalities (or mental modes) to analyze and manage cyberspace problems are separate but linked activities. Cyberspace provides digital tools towards a more effective implementation of diplomatic strategies, generating at the same time a whole range of government-level measures and other issues that can benefit from the diplomat's techniques and mentality.
Cyber diplomacy is the use of diplomatic tools and diplomatic thinking to solve the problems from the cyberspace.
In order to sustain computer security coalitions, it is not enough to exclusively address technical teams. It is what top cyber diplomat Chris Painter stressed in June 2018 during the 30th CERT international meeting in Kuala Lumpur. The skills and mentalities necessary to build and sustain such coalitions are essentially diplomatic. The development of wider and forward-looking diplomatic strategies can enhance cyber security by promoting collaboration between governments, companies, and other key players.
Since cyber security represents a top priority for many governments' foreign policy, there are examples that could clearly illustrate the importance of diplomacy in the actual geopolitical context:
- In June 2009, China and Russia signed the Agreement among the Governments of the Shanghai Cooperation Organization (SCO) Member States on Cooperation in the Field of Ensuring International Information Security (Yekaterinburg Agreement). Established in 2001, the SCO is an international organization composed of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, Uzbekistan, India and Pakistan for the purpose of cooperation in the political, military and economic sectors, with a particular focus on extremism, separatism and terrorism;
- In September 2011, four members of the SCO (including China and Russia) addressed a Draft of International Code of Conduct for Information Security to the United Nations General Assembly, followed by a new draft submitted in 2015, addressing the controversial global concept of “cyber sovereignty”. The SCO strongly supported the regulation of this concept due to its potential threat to security, while Western democracies feared that such a regulation would be a threat to fundamental human rights, namely to the freedom of expression;
- The 2015 USA-China agreement on cyber security represented an important step ahead since cyber security has been a critical issue in the relationship between the two countries: China has expressed grave concern over the Edward Snowden's revelations of the cyber espionage activities of America and its Five Eyes partners, while the US accused China of hacking and espionage activities. In May 2014, five Chinese military officers were accused of computer espionage and President Obama urged the imposition of sanctions against Chinese companies blamed for intellectual theft, just ahead of a meeting in Washington with President Xi Jinping. In this context, the result of the bilateral agreement was the output of the cyber diplomatic activity, including preparatory meetings and a four-day meeting between foreign affairs senior staffers of China and the US.
The US response to the need for harmonization in cyberspace
In November 2017, The Cyber Diplomacy Act (CDA) was included in a legislative push by the Foreign Affairs Committee of the House of Representatives, that was first introduced in September 2017. The act covers topics providing the foundation for the US to “work internationally to promote an open, interoperable, secure, and reliable information and communications infrastructure” in support of US national security and economic interests.
The Cyber Diplomacy Act requires a “strategy relating to United States international policy with regard to cyberspace”, a strategy expected to address norms, deterrence and related policy tools, and the applicability of current international law to cyberspace.
The Cyber Diplomacy Act requires a “strategy relating to United States international policy with regard to cyberspace”, a strategy expected to address norms, deterrence and related policy tools, and the applicability of current international law to cyberspace. The act builds upon growing demand for a strategy to curtail cyber-attacks against the US. It has been noted the there is a lack of policy and strategy for deterrence and defending against and responding to cyberattacks and, accordingly, there is a need for a strategy and a doctrine regarding cyber-attacks.
The Ambassador for Cybersecurity would “lead all US engagement on issues pertaining to cybersecurity strategies, standards, and practices”. The role of a high-ranking cyber diplomat would be to prioritize the efforts towards cyber-defense and response and to work with foreign governments.
The proposal aims to create an Office of Cyber Issues and to establish an Ambassador for Cybersecurity. The Ambassador for Cybersecurity would “lead all US engagement on issues pertaining to cybersecurity strategies, standards, and practices”. The role of a high-ranking cyber diplomat would be to prioritize the efforts towards cyber-defense and response and to work with foreign governments.
Another topic addressed by CDA is global international cooperation with the aim to establish US policy to evaluate and implement global norms in cyberspace. It is worth mentioning also that the act considers the applicability of the Law of Armed Conflict to cyberspace and prohibits attacks such as those aimed at critical infrastructure or commercial espionage for corporate gains, without explicitly mentioning “cyber war”.
What about the EU?
The EU’s first acts of cyber diplomacy go back to the early 1990s, when the European Commission took part in the international debates on internet governance, followed by the establishment of the Internet Corporation for Assigned Names and Numbers (ICANN). Nevertheless, the 2013 EU cyber-security strategy represented a milestone in the development of the EU’s cyber diplomacy, setting the promotion of an EU “coherent international cyberspace policy” as one of its five key priorities (European Commission and High Representative, 2013), stating that “the EU will seek to promote openness and freedom of the Internet, encourage efforts to develop norms of behavior and apply existing international laws in cyberspace. The EU will also work towards closing the digital divide and will actively participate in international efforts to build cybersecurity capacity”. The vision for the EU’s cyber diplomacy was based on the identification of five key priorities: the promotion and protection of human rights in cyberspace, norms of behavior and application of existing international law in the field of international security, internet governance, enhancing competitiveness and prosperity, as well as capacity-building and development. A sixth priority refers to cyber diplomacy, less to its objectives but more to its channels. It refers to “strategic engagement with key partners and international organizations” due to the “global cross-cutting nature, scope and reach” of cyber issues (Council of the EU, 2015).
This approach can be expressed in layman’s terms as an intention to deepen the relationships with a number of key cyber actors, in line with both its growing interest for cyber issues and its broader efforts to engage strategically at the bilateral level with a number of partners. When referring to cyber diplomacy, the EU’s approach has developed mirroring both a global trend and the development of the EU as a diplomatic actor. Still, cyber issues are not yet the most visible part of the EU’s global diplomatic efforts, while most EU efforts are focusing on the need to increase European capabilities and coordinate more actions.
The EU’s attempt to defend against Cyber-Attacks with the help of a Cyber Diplomacy Toolbox
Adopted in June 2017, the draft Council Conclusions on a Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities (Cyber Diplomatic Toolbox) aims to provide a way of coordinating a collective response of EU Member States to malicious cyber activities at the EU level.
The vision for the EU’s cyber diplomacy was based on the identification of five key priorities. A sixth priority refers to cyber diplomacy, less to its objectives but more to its channels. It refers to “strategic engagement with key partners and international organizations” due to the “global cross-cutting nature, scope and reach” of cyber issues.
The toolbox should include diplomatic measures within the EU Common Foreign and Security Policy (CFSP) which could be used against malicious operations directed against Member States in cyberspace. However, it is still not clear of what kind of measures this toolkit will include in practice, but it does say that the measures can be, if necessary, “restrictive” and that the response would be proportionate to the scope, scale, duration, intensity, complexity, sophistication and impact of the cyber activity.
Along with other efforts, the toolbox stresses the importance of EU Member States unifying their diplomatic response against malicious cyber activities, the common diplomatic efforts being seen as a way to strengthen the security of European countries. However, despite being a clear step ahead, the toolbox leaves a lot of open questions, being more of a manifesto than a provider of actionable norms.
A way ahead
Efforts have been made both by the US and the EU towards a common and comprehensive approach for cyber diplomacy to contribute to conflict prevention, the mitigation of cybersecurity threats and to greater stability in international relations. Cyber diplomacy is expected to encourage cooperation also through diplomatic negotiation, to improve the mitigation of threats, or to moderate the behavior of potential aggressors, but until it is put into action it will be difficult to estimate the degree of influence of this approach in terms of reaching the proposed goals.
|
<urn:uuid:53c8fb98-8c92-4f1b-91df-1872567252ad>
|
CC-MAIN-2023-23
|
https://www.themarketforideas.com/cyber-diplomacy-addressing-the-gap-in-strategic-cyber-policy-a388/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00101.warc.gz
|
en
| 0.943597 | 2,427 | 2.984375 | 3 |
Nikola Tesla Images and Photographs
Images and photographs of, or related to, Nikola Tesla
Tesla diagram relating to the moon's rotation
It Is Well Known That the Moon, M., Always Turns the Same Face Toward the Earth, E, as the Black Arrows Indicate. The Parallel Rays From the Sun Illuminate the Moon In Its Successive Orbital Positions as the Unshaded Semi-circles Indicate. Bearing This in Mind, Do You Believe That the Moon Rotates on Its Own Axis?
|
<urn:uuid:2f9e7e32-38cc-466f-8a1e-8fce590eb677>
|
CC-MAIN-2020-24
|
http://teslauniverse.com/nikola-tesla/images/tesla-diagram-relating-moons-rotation
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00225.warc.gz
|
en
| 0.707319 | 106 | 2.765625 | 3 |
Children love to imitate adults, especially in the kitchen. They seem magically drawn to the all of the whirring sounds, flashing lights and shiny utensils. And while it’s true that the kitchen can be dangerous territory for inquiring minds (and hands), don’t put up the “No Trespassing” sign just yet.
With the proper supervision, children can safely accomplish simple cooking tasks. They can retrieve ingredients from the cupboards and refrigerator, grease and flour pans, and measure and mix ingredients. While it may slow down the dinner-making process a bit, take comfort knowing that cooking is an educational experience for children (just don’t tell them). It helps them learn about measurements, encounter new vocabulary, and practice fine motor skills. More importantly, cooking provides a priceless bonding experience–a chance to be creative, ask questions and solve problems together.
Getting children to play a role in preparing family meals may teach them about nutrition while expanding their palates. Kids know they like jellybeans, but they might not understand why they can’t have their favorite “food” at every meal. Don’t expect finicky eaters to suddenly beg for shrimp scampi, but children are more likely to eat a food that they helped make.
You can build a little one’s cooking confidence by introducing a few easy recipes. Something as simple as spreading peanut butter and jelly on bread can provide a child with a sense of accomplishment, and you can up the creativity quotient by using cookie cutters to cut out fun shapes, like daisies and dinosaurs. For pre-readers, boxed instant cake mix has illustrated, easy-to-follow instructions. You can also turn to the hundreds of kid-friendly cookbooks for inspiration. Many of the books on the market today offer delicious and nutritious recipes that kids will enjoy making and eating.
Kid-sized play kitchens, utensils and pots and pans can help children refine their cooking skills in the playroom. A supply of Play-Doh or grocery-bought dried lentils in a variety of shapes and colors are cheap and easy ways to create a more hands on experience.
Finally, help children feel welcome in the kitchen by relinquishing a little control. It doesn’t matter if an eggshell slips into the batter or if things get a little messy (they will). Give them their own apron and set of cooking utensils to use and store in the kitchen and one day you may be rewarded with breakfast in bed. In the meantime, hope for some help with the dishes.
I love Orchids but fine it hard to kept alive for very long. I love the way you display
Syndie Reynolds in Paula’s Love of Orchids on May 13, 2013 at 10:59 pm
Use baking soda and peroxide made into a paste to get all the grunge off o f your casserole dishes and pots and pans.
in 10 Quick Household Tips on May 11, 2013 at 6:21 pm
To Ronald Bryant: Try Paula's apple cake recipe "Grandgirl's Fresh Apple Cake From Georgia." It is sooooo good. I think you'll like it!
Mary in Paula’s Love of Orchids on May 11, 2013 at 4:11 pm
|
<urn:uuid:0ab056aa-6fff-4f52-b252-91a7cd0ba524>
|
CC-MAIN-2013-20
|
http://www.pauladeen.com/blogs/blog_view/kids_in_the_kitchen_-_the_littlest_sous_chef/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382396/warc/CC-MAIN-20130516092622-00095-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.933466 | 687 | 2.9375 | 3 |
Who Was King Tut?
ISBN 9780448443607 | 112 pages | 02 Mar 2006 | Grosset & Dunlap | 8.26 x 5.23in | 8 - 12 years
Summary of Who Was King Tut? Summary of Who Was King Tut? Reviews for Who Was King Tut? An Excerpt from Who Was King Tut?
Ever since Howard Carter uncovered King Tutankhamunís tomb in 1922, the young pharaoh has become a symbol of the wealth and mystery of ancient Egypt. Now, a two-and-a-half-year-long museum exhibit of Tutís treasures is touring major cities in the U.S., drawing record crowds. This Who Was . . . ? is complete with 100 black-andwhite illustrations and explains the life and times of this ancient Egyptian ruler, covering the story of the tombís discovery, as well as myths and so-called mummy curses.
To keep up-to-date, input your email address, and we will contact you on publication
Please alert me via email when:
|
<urn:uuid:57712c7b-112e-45c2-a0d0-449907ec8b64>
|
CC-MAIN-2014-15
|
http://www.us.penguingroup.com/nf/Book/BookDisplay/0,,9780448443607,00.html?Who_Was_King_Tut%3f_Roberta_Edwards
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539665.16/warc/CC-MAIN-20140416005219-00047-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.841269 | 216 | 2.625 | 3 |
The definition of “lure” as Emily Dickinson would have understood it, using her 1844 ed. Webster’s American Dictionary of the English Language:
Falconry device; feathered apparatus with bait used to recall hawks; [fig.] attraction; allurement; enticement; calling; pull of desire; invitation to serve.
lure [-s] v
see lure, n.
Persuade; call; invite; tempt; attract with promise of reward.
from http://www.edickinson.org/ Dickinson archive
- The Online Emily Dickinson Archive Makes Thousands of the Poet’s Manuscripts Freely Available (openculture.com)
- Complete Emily Dickinson online archive goes live (telegraph.co.uk)
|
<urn:uuid:e68b491e-ab90-4c3e-95a5-62c330082bee>
|
CC-MAIN-2017-47
|
https://ohnosundials.wordpress.com/2013/10/23/lure-n-and-lure-v-for-emily-dickinson/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00241.warc.gz
|
en
| 0.732817 | 163 | 2.640625 | 3 |
How S•O•S Works
As components wear, elements are suspended in the lubricant. S•O•S Fluid Analysis can measure the levels of these wear elements and provide insight into the condition of the component.
Trend analysis (the comparison of historical oil sample results as the basis for normal test results) and proprietary wear tables are used to determine if wear rates are normal or abnormal.
Trends are established by repeated oil sample results from the same compartment. Three to five samples are needed to establish a trend, making regular sampling a critical part of your maintenance program.
|
<urn:uuid:4a835501-ac81-4bf2-9c22-f223e1dc01e0>
|
CC-MAIN-2017-39
|
http://www.yanceybros.com/technology/emsolutions/s%E2%80%A2o%E2%80%A2s-fluid-analysis/how-s%E2%80%A2o%E2%80%A2s-works
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689471.25/warc/CC-MAIN-20170923033313-20170923053313-00422.warc.gz
|
en
| 0.942892 | 118 | 2.5625 | 3 |
The Sustainable Development Goals, used by the UN Member States including Canada, is a “shared blueprint for comfort and success for individuals as well as the earth, now and in to the future. ” Every SDG is mirrored into the Green Party platform. These symbols look close to policies which may advance the objectives.
Advancing the Simply Community
Although we are making great strides towards this objective, previous gains can’t be overlooked, and far remains to be performed. Personal justice is certainly one of this six fundamental pillars regarding the Green motion. For this reason the Green Party believes it is important to put equity during the centre of policy-making.
Advancing Gender Equality
Gender-based physical violence (GBV) is physical violence threatened or committed against some body predicated on their sex identity, sex phrase or observed sex.
In Canada, GBV disproportionately impacts ladies, girls and people that are gender-diverse.
Data published by the Victim Justice system as well as the Canadian Women’s Foundation show that the calculated 362,000 kiddies witness or experience family physical violence every year. Every day over 3,000 females (due to their young ones) utilize a crisis shelter to flee violence that is domestic while about 200 females (and kids) are turned away due to the fact shelters are complete. Every six times an average of a female in Canada is killed by her intimate partner.
Domestic physical physical violence makes up about about 12 per cent of most violent criminal activity and, since less than 25 % of most incidents are reported to police, the true number is significantly greater. The Department of Justice says that expenses associated with the aftermath of spousal violence – emergency room visits, funerals, future expenses such as for example loss in earnings, and intangible expenses such as for example pain and putting up with – total $7.4 billion yearly. This might be unsatisfactory.
A Green government might:
- In collaboration with women’s and native companies, develop an extensive plan that is canada-wide of – having a timetable and devoted financing – to eradicate violence against females, girls and gender-diverse individuals.
- Implement most of the guidelines regarding the Inquiry on Missing and Murdered Indigenous Women and Girls.
- Increase usage of shelters by spending $40 million over four years into the Shelter Enhancement system, providing a lot more than 2,100 brand new and spaces that are renovated first-stage shelters and a huge selection of areas in change homes.
- Increase funding to bolster investigations and beliefs in individual trafficking situations.
- Develop an action want to end physical violence against females and peoples that are gender-diverse
- Implement all suggestions for the Missing and Murdered Indigenous Women and Girls report
- Result in the intercourse work industry legal
- Ban and condemn the training of transformation treatment
- Ensure usage of gender-affirming medical care
- Need available and gender-neutral facilities in most federal structures
- Ensure funding for the protection of native languages at an increased risk
Protecting Sex Workers
The Green Party supports labour liberties for intercourse employees to ensure they can get a handle on their working conditions, conduct company in a safe and healthier environment, and also have recourse to appropriate treatments whenever these conditions aren’t supplied. For people who move to sex act as their only financial choice, our policy of developing a Guaranteed Livable Income could offer an alternative that is economic.
A Green government shall:
- Reform sex work laws and regulations in Canada having a focus that is clear damage decrease, provided the risks that intercourse trade employees face. Making the industry legal and general general public will allow sex employees to get into law enforcement and social solutions whenever required.
- Increase funding of community companies services that are providing those driven https://www.camsloveaholics.com/xlovecam-review to intercourse work by financial starvation.
Advancing LGBTQI2+ Rights
“Politics is merely one little bit of the puzzle of just exactly exactly how modification takes place, however it is an essential piece. ” – Andrew Reynolds. 35
There’s been progress that is considerable the ongoing campaign for LGBTQI2+ (lesbian, homosexual, bisexual, trans*, queer, intersex, Two Spirit, plus) equality in Canada with significant and fast modifications to legislation on same-sex advantages and retirement benefits and prohibitions against harrassment and discrimination. But there is however nevertheless a complete great deal to complete.
The Green Party called when it comes to legalization of same-sex wedding when you look at the 1980s, the very first governmental celebration to do this. Greens genuinely believe that consensual freedom that is sexual a fundamental individual right and that acceptance and celebration of LGBTQI2+ people and identities are crucial for genuine social justice and equity. We affirm that sex identity is each person’s specific experience of sex, that everybody else gets the straight to define and easily express their sex, and that intersex individuals have the proper to reside with complete autonomy that is bodily. We affirm that every teenagers deserve use of safe and comprehensive sex training according to a comprehensive knowledge of diverse sexualities, diverse genders, intersex biology and consent that is informed.
A Green government shall:
- Repeal all federal guidelines and policies which are discriminatory on the basis of sex, including area 159 regarding the Criminal Code, and that relate to intersex reality as being a problem, aberration, or by any kind of derogatory terms.
- Establish a capital system within wellness Canada to guide community-based businesses offering targeted LGBTQI2+ youth’s mental health insurance and wellbeing programs, including suicide avoidance, peer help, being released, and counselling.
- Fund education that is community-driven understanding programs that result in a higher understanding of intersex realities and also the variety of sexualities and sex identities, and referral programs to direct for trans*, non-binary and Two Spirit individuals appropriate solutions.
- End the discriminatory blood ban.
- Ban and condemn the training of clinically surgeries that are unnecessary intersex young ones.
- Ban and condemn the training of transformation therapy, in every its forms.
- Ensure access to comprehensive health that is sexual and sex affirming wellness care, including hormones remedies and blockers, and gender confirmation surgeries.
- Make sure that trans*, non-binary, and Two people that are spirit without undertaking surgeries, have the ability to change their intercourse designation on all federally-issued formal documents, in line with their sex identification.
- Make use of social services, community supports, crisis shelters as well as other frontline businesses to ensure all LGBTQI2+ people that are young looked after and safeguarded.
- Make sure the census that is national built to mirror the variety of sex and sex and inquire appropriate concerns to make certain sufficient, effective and safe data collection.
- Need facilities that are accessible all federal structures, including gender-neutral washrooms, changing facilities, etc. While also re-affirming trans, non-binary and Two Spirit people’s right to utilize whichever facilities with that they identify.
Protecting Minority Language Rights
This present year is the anniversary that is 50th of certified Languages Act.
The maxims laid call at this landmark legislation were the foundation for Section 16 regarding the Canadian Charter of Rights and Freedoms, which acknowledges the equality of status, liberties and privileges for Canada’s French and English linguistic communities. Respect for and security regarding the Charter and all sorts of its values are non-negotiable. An eco-friendly Party federal government will agree to protecting Canada’s two languages that are official our communities and across our nation.
- In the 1st 12 months associated with parliament that is next improve and implement a modernized Official Languages Act to safeguard both national languages.
- Ensure funding for the security of native languages vulnerable to vanishing, across Canada.
|
<urn:uuid:820f4be9-7810-4b05-902a-ef7fb6569bcb>
|
CC-MAIN-2020-34
|
http://tajistuff.com/2020/08/01/advancing-the-simply-society-in-a-just-culture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.94/warc/CC-MAIN-20200804131928-20200804161928-00075.warc.gz
|
en
| 0.936815 | 1,610 | 2.71875 | 3 |
HistoryThe term "magic" is etymologically derived from the Latin word magi, a term that was used to refer to Zoroastrians. Performances we would now recognize as conjuring have probably been practiced throughout history. The same level of ingenuity that was used to produce famous ancient deceptions such as the Trojan Horse would also have been used for entertainment, or at least for cheating in money games, since time immemorial. They were also used by the practitioners of various religions and cults from ancient times onwards to frighten uneducated people into obedience or turn them into adherents. However, the profession of the illusionist gained strength only in the eighteenth century, and has enjoyed several popular vogues since.
In 1584, Reginald Scot published The Discoverie of Witchcraft. It was written in an attempt to show that witches did not exist, by exposing how (apparently miraculous) feats of magic were done. The book is often deemed the first textbook about conjuring. All obtainable copies were burned on the accession of James I in 1603 and those remaining are now rare. It began to reappear in print in 1651.
Jean Eugène Robert-Houdin, the first modern magicianFrom 1756 to 1781, Jacob Philadelphia performed feats of magic, sometimes under the guise of scientific exhibitions, throughout Europe and in Russia. Modern entertainment magic owes much to Jean Eugène Robert-Houdin (1805–1871), originally a clockmaker, who opened a magic theatre in Paris in the 1840s. His speciality was the construction of mechanical automata which appeared to move and act as if they were alive. The British performer J N Maskelyne and his partner Cooke established their own theatre, the Egyptian Hall in London's Piccadilly, in 1873. They presented stage magic, exploiting the potential of the stage for hidden mechanisms and assistants, and the control it offers over the audience's point of view.
The model for the look of a 'typical' magician—a man with wavy hair,a top hat,a goatee, and a tailcoat—was Alexander Herrmann (February 10, 1844 – December 17, 1896), also known as Herrmann the Great. Herrmann was a French magician and was part of the Herrmann family name that is the "first-family of magic". Those who witnessed Herrmann the Great perform considered him the greatest magician they ever saw.
The Conjurer, 1475-1480, by Hieronymus Bosch. Note that the man in the back row is stealing another man's purse. He is also applying misdirection by looking up at the sky to misdirect the audience from his actions. The artist has even misdirected us from the thief, because we are drawn to the magician.The escapologist and magician Harry Houdini took his stage name from Robert-Houdin and developed a range of stage magic tricks, many of them based on what became known after his death as escapology. The son of a Hungarian rabbi, Houdini was genuinely skilled in techniques such as lockpicking and escaping straitjackets, but also made full use of the range of conjuring techniques, including fake equipment and collusion with individuals in the audience. Houdini's show business savvy was great as well as his performance skill. There is a Houdini Museum dedicated to him in Scranton, Pennsylvania.
As a form of entertainment, magic easily moved from theatrical venues to television specials, which opened up new opportunities for deceptions, and brought stage magic to huge audiences. Famous magicians of the 20th century included Okito, Alexander, Harry Blackstone Sr., Harry Blackstone Jr., Howard Thurston, Theodore Annemann, Cardini, Joseph Dunninger, Dai Vernon, John Scarne, Tommy Wonder, Siegfried & Roy, and Doug Henning. Popular 20th and 21st century magicians include David Copperfield, Lance Burton, James Randi, Penn and Teller, David Blaine, and Criss Angel. Most TV magicians perform before a live audience, who provide the remote viewer with a reassurance that the illusions are not obtained with post-production visual effects.
Many of the principles of stage magic are old. There is an expression, "it's all done with smoke and mirrors", used to explain something baffling, but effects seldom use mirrors today, due to the amount of installation work and transport difficulties. For example, the famous Pepper's Ghost, a stage illusion first used in 19th-century London, required a specially built theatre. Modern performers have vanished objects as large as the Taj Mahal, the Statue of Liberty, and a space shuttle, using other kinds of optical deceptions
hi...do you believe in magic... magics is not a trick but is actually an entertainment for us... as you know, there are several people who believe this magic.......... sometimes, other people say that magic is mostly like spells, voodoo, or witch......... but the truth is magic is a game and only a mind playing to the audience.............. WHAT IS MAGIC?..... david blaine has answer to this question.... when poeple see the magic, they will be confused..... and they will say HOW... WHY..... and the answer is only magic......... From cyril view, magic is a natural... it cannot be change by magician but it can change the magician.... there is no word "TRICK" in magic in this world..... there is only the magician and the audience..... only he need is how the audience interect with his art....... And from JOKER view, magic is only the fantasy to audience.... they just like being on the fantasy land with some illusion will make all their dream become reality... there is also not a trick but it is mind's fantasy from audience.... they created the fantasy in their mind when they believe the magic.... the mind concept is important to audience to make they believe the fantasy eventhough they in the reality........
|
<urn:uuid:61719799-e286-4ff0-b0f3-b70619c9d84f>
|
CC-MAIN-2017-34
|
http://zul-magicjoker.blogspot.com/p/definition.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105961.34/warc/CC-MAIN-20170820015021-20170820035021-00138.warc.gz
|
en
| 0.97038 | 1,241 | 3.015625 | 3 |
The Human Genome Project has enabled sequencing of human DNA and led to advancements in technologies that detect genomic, transcriptional, proteomic, and epigenetic changes. These technologies, combined with novel drug development, have accelerated the implementation of personalized medicine. Personalized medicine uses concepts of the genetic and environmental bases of disease to individualize prevention, diagnosis, and treatment (1,2). Optimization of treatment using targeted therapy—molecules targeting specific enzymes, growth factor receptors, and signal transducers, thereby interfering with a variety of oncogenic cellular processes—and other strategies made possible by advances in translational medicine holds the promise of improving patient care (3).
This chapter focuses on targeted therapy in cancer therapeutics. The material is organized according to the key drivers of carcinogenesis in humans and summarizes the current state-of-the-art applications of personalized medicine.
Upregulation of the mitogen-activated protein kinase (MAPK) cascades RAF (rapidly accelerated fibrosarcoma) and MEK (MAPK/extracellular signal-regulated kinase [ERK]) contributes to carcinogenesis. Several cell surface molecules activate RAS (KRAS, NRAS, and HRAS), a family of guanine triphosphatases (GTPases) that activate downstream RAF protein kinases (BRAF, CRAF, and ARAF). The most important substrates of RAF kinases are MEK1 and MEK2 (MAPK/ERK kinases). The MEK kinases have one main substrate, ERK (4). Activation of ERK leads to modifications in gene expression mediated by transcription factors that control cell cycle progression, differentiation, metabolism, survival, migration, and invasion. This pathway regulates apoptosis by the posttranslational phosphorylation of apoptotic regulatory molecules (Bad, Bim, Mcl-1, and caspase 9). RAS is a downstream effector of the epidermal growth factor receptor (EGFR). Activation of ERK promotes upregulated expression of EGFR ligands and an autocrine loop critical for tumor growth (5). The frequency of molecular alterations in major pathway components is shown in the COSMIC (Catalogue of Somatic Mutations in Cancer) database (http://www.sanger.ac.uk/genetics/CGP/cosmic/).
Mutations in BRAF are found in 62% to 72% of patients with metastatic melanoma (6) and are less frequent in the radial growth phase (10%) and in situ (5.6%) melanomas (7). Mutations of NRAS occur in 5.2% of melanomas (7). In conjunctival melanoma, BRAF and NRAS mutations were identified in 29% and 18% of patients, respectively (8). Alterations of KIT were found in 36% and 39% of patients with acral and mucosal melanoma, respectively (9). Alterations of GNAQ and GNA11 were found in 45% and 32% of patients with uveal melanoma, respectively (10).
Inhibitors of BRAF and MEK have been approved by the US Food and Drug Administration (FDA) based on their significant antitumor activity and tolerability in patients with melanoma. The FDA-approved drugs and selected investigational agents by molecular target/pathway are listed in Table 49-1.
Table 49-1FDA-Approved and Selected Investigational Targeted Agents by Molecular ...
|
<urn:uuid:603a3f23-1fde-40b6-8556-aa33bcc95d27>
|
CC-MAIN-2017-47
|
http://hemonc.mhmedical.com/content.aspx?bookid=1772§ionid=121902560
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806338.36/warc/CC-MAIN-20171121094039-20171121114039-00602.warc.gz
|
en
| 0.897437 | 726 | 2.75 | 3 |
`The Leadership Brain is an incredible resource. David Sousa has taken brain research and made it meaningful to principals by showing them how a basic understanding of this field can make a difference at school' - Principal Magazin
David A Sousa is an international educational consultant. He has conducted workshops in hundreds of school districts on brain research, brain based learning, instructional skills, supervision, and science education at the primary, secondary, and university levels. He has made presentations at national conventions of educational organizations and has served as a consultant to regional and local school districts across the United States, Canada, and Europe.
This book is written to provide educational leaders insights into how research in cognitive neuroscience and other related areas can inform their practice. This book will explore the attributes of a successful leader, the basic facts that educational leaders should know about parts of the brain and their functions, how a leader encourage and develop creativity in a school, and many more such facets pertaining brain-compatible leadership. The book further explains the meaning of leadership, and the reasoning that if leadership is the key to true educational reform, then thoughtful leadership is the key to thoughtful reform. Science can provide leaders with a deeper understanding of their own thinking processes so that their decisions are mindful and ethical, and that is what this book will aim to illustrate.
|
<urn:uuid:8baec7fc-c883-41a6-bacd-2bf8b7b332d5>
|
CC-MAIN-2020-29
|
https://uk.sagepub.com/en-gb/eur/the-leadership-brain/book225959
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00030.warc.gz
|
en
| 0.966587 | 265 | 3.265625 | 3 |
Not unexpectedly, 1857 marked a watershed in early British photography on India. The most important photographic record of the traumatic events of that year and the following was provided by a Corfiot Italian, Felice Beato — even though he arrived in India when British influence had been unquestionably established. He was born in around 1833 or 1834 on the island of Corfu, which was at that time a part of the British protectorate of the Ionian Islands. Beato’s family was originally Italian, perhaps of noble origins. Some Beato aficionados have claimed for him the status of a pioneering photojournalist, and though he clearly was not one in the contemporary understanding of the term, his imagery had an unquestionable urgency and immediacy. In fact, several were carefully composed so as to recreate massacres, sacrifices and victories. He was, very evidently, in favour with the military and political establishment as many of his photographs would have required permission. While commercial interests may have been foremost in his mind, Beato obviously had little qualms in playing along with the growing hegemonic proclivities of the land of his naturalization. Or, perhaps, he had no option, as is evident in his photographs of the Opium War, where permission to photograph was granted only after he had agreed to the careful reconstruction of sites of battle, bodies and all.
In 1855, Felice Beato and his brother-in-law, James Robertson, travelled to Balaklava, Crimea, where they took over reportage of the Crimean War from noted British photographer, Roger Fenton. This war that lasted between 1853–1856 was fought between Imperial Russia on one side and an alliance of France, the United Kingdom, the Kingdom of Sardinia and the Ottoman Empire on the other — one of a number of military campaigns in the area with a clear idea of aggrandizing territory. The fall of Sebastopol that resulted in about 60 images only confirmed the camera’s increasing role in recording imperial aspirations.
It is hardly surprising then that on hearing of the events of 1857, Felice Beato left Crimea in haste for India — but arrived in time to record only the last embers. He apparently landed in Calcutta via the Suez Canal in 1858, addressed the Photographic Society of Bengal the next month and, within a short period, headed up country, to Lucknow. According to photo-historian Sophie Gordon, who has worked on Lucknow, Beato was the first European professional photographer to be attracted to the still smouldering city. Earlier, Ahmed Ali Khan (Chota Miyan) had produced an impressive portfolio of the area that was soon to be a major focus of untold violence and massacre. Beato’s images of Lucknow are famous for their spine-chilling detail — a mutineer swinging from a gibbet, skeletons in front of a badly-damaged Secundra Bagh (or Sikandar Bagh) and the Nawab of Oudh’s (Awadh’s) abandoned boat and so on.
During this time, he produced possibly the first-ever photographic images of human remains. It is believed that for at least one of his photographs taken at the palace of Nawab Wajid Ali Shah’s Secundra Bagh (see image), he had skeletal remains of Indian rebels disinterred or rearranged to heighten the photograph’s dramatic impact. Though this is again controversial: some records say that while the bodies of the British were buried in a trench, those of the Indians were allowed to rot in the open. However, in his memoirs, British officer, Sir George Campbell, expressed surprise at Beato’s photograph of the remains, “When I saw them every one was being regularly buried, so I presume the dogs dug them up.” On the other hand, William Howard Russell of The Times recorded seeing many skeletons still lying around in April 1858. Anyway, the final upshot was a dramatic image of a ruined Palladian façade, stately Ionic pillars and deep archways overlain with the ‘native’ presence, both skeletal and living.
On an early winter’s day, November 16, 1857, British troops from the 93rd Highlanders and 4th Punjab Regiment killed a reported 2,000 sepoys in and around this building. The reconstructed ruins of this once-beautiful property, named after the last Nawab of Awadh’s favourite wife, Sikandar Mahal Begum, now houses the National Botanical Research Institute of India. Memorabilia such as canon balls, their scars on the old garden wall, swords and shields, pieces of muskets and rifle dug out of the garden over the years have been preserved, chilling reminders of the chequered and bloody past of the present-day bureaucratic precincts. The small pavilion in the middle was obviously the venue of many mehfils, quickly forgotten as Indians swarmed in for safety, only to be felled by the canon fire of the better-equipped fighting force. The viewer could not be oblivious to the underlying message of Beato’s image that glorified as it sacralized. The battleground, breached walls, abandoned building scarred by canon and artillery fire, all became important symbols for a growing and almost jingoistic patriotism.
Beato, like Samuel Bourne and other photographers, used human figures in his compositions to convey a sense of scale, ambience and ‘aliveness’. In this image of a desecrated Secundra Bagh, four male figures have been strategically placed together with a horse. The horse stands with its back to the camera, while the men reflect on the desolateness of the space. The two who are seated appear to be engaged in identifying body parts, the one on the ground being supervised in his gory task by the man on the stool, while the person leaning against the wall looks into the middle distance. The syce (groom) concentrates on his charge. What would the photograph have been without the men? While it would still have sent shivers down many spines back home, would it have allowed for alternate scenarios being thought up by fervid imaginations? Scenarios that not only speculated on the presence of the men, but also made it imperative to factor in the helplessness of human beings and perhaps even a latent regret at what destruction had been wreaked; a salutary lesson perhaps.
Beato continued his ‘recreative’ mode in China, during the Second Opium War. In Of Battle and Beauty: Felice Beato’s Photographs of China, David Harris points out that Beato was allowed to photograph the Taku Forts only after he had first taken images of the dead Chinese soldiers in and around them.
At the same time, photographers were aware of the requirements of a market that valorized the picturesque, and their work reflected the dilemma of combining what the Australian historian, who has worked on two albums of Beato’s Delhi photographs, feels is “realism as record, and picturesqueness as pleasing composition”. Beato had to take cognizance of the notions surrounding the new art form: photographs had to be realistic — they were to be the middle-class option to the much more expensive genre of painting — and picturesque in order to be competitive. Thus, Beato placed pickets within pleasant environs, a tree was included rather than cut out of a frame as nature was an important element in many of his compositions. That he could not do so for the iconic image of Secundra Bagh indicates the utter bleakness of the environment. An emptiness that was hardly surprising as the site of what was one of the bloodiest encounters of those years was abandoned for quite a while.
Photographs were read as part of the story of military conquest; this photograph and several others added a vital dimension to many textual accounts to an eager — if not voyeuristic — public back home, as well as added texture to the many ‘died heroically in active service’ citations that the siege of Lucknow had resulted in. Visual representation of bodies in China — as also the skeletal remains at Secundra Bagh in Lucknow — assumed a macabre significance in the growing British involvement in the theatre of war. And the camera a most useful tool in its representation.
|
<urn:uuid:1a1a5677-da46-45ae-a5c1-79536099253f>
|
CC-MAIN-2013-20
|
http://www.telegraphindia.com/1080304/jsp/opinion/story_8974805.jsp
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705559639/warc/CC-MAIN-20130516115919-00061-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.977164 | 1,746 | 2.796875 | 3 |
With what eyes will ALMA observe?
The colors of light that our eyes can detect are justa small portion of the full electromagnetic spectrum.The universe emits light in many colors which are invisible to our eyes, from radio waves to gamma rays, and studies done in each band of the spectrum contribute uniquely to our knowledge.
Only recently has technology allowed us to fullfil the dream of opening a new vein of high-resolution exploration observing millimetric and submillimetric waves.
This wave portion is an excellent area of research for future astronomy because:
It is where half of all light is found. In addition to the cosmic microwave background (an almost uniform glow throughout the sky resulting from the Big Bang), the Universe emits almost all of its light in two color "arrays". We've been studying the rst one, visible light, for centuries with optical telescopes. The second, consists of far infrared colors blocked by the earth's atmosphere and which can be observed in high resolution using observatories in space. Thanks to the incredible transparency and stability of the site where it is located and the careful selection of frequency bands, ALMA will be able to observe some of this light from Earth.
This is where the "fun stu" is happening. Among the most profound mysteries in astronomy are the origins of phenomena such as galaxies, stars, planets and the molecules that nurture life. ALMA will observe the light emitted by cold objects in space, whether the invisible glow of clouds starting to warm up while stars form within them, or the "digital footprints" of complex molecules about which we know very little or which haven't even been discovered yet!
This Flyer is not available for sale.Credit:
|
<urn:uuid:e2357bf6-05d2-4dfd-b1ce-8a4b1104d2b1>
|
CC-MAIN-2017-26
|
http://eso.org/public/products/flyers/flyer_0006/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00476.warc.gz
|
en
| 0.935396 | 346 | 3.828125 | 4 |
Our 5 Core Themes:
Ecology: Leave half for other life.
Wild space must accompany built space for our own survival. Locally, this begins with securing a rich biodiversity, creating space for other live to thrive, and opportunities for us to engage. Globally, his means we set aside half of the planet for other life.
The biosphere theme of Leap Lab is about Biophila, a term describing the human affinity for other living things, from a walk in the woods, companionship with domestic animals, to the ecosystem services nature provides for our sustenance. Understanding biophilic relationships between nature and human existence, science and society, will help define the complexity of human needs and conservation goals.
Here we tackle preserving and rebuilding natural space, ending human-caused extinctions, and create opportunities for the public to understand and explore natural history and conservation.
Waste: Globalize ideas, not stuff.
Zero Waste, composting, circular economy. How we value community is redefining our material culture, promotes minimalism, and reduces social and ecological impacts along the life cycle of the objects that flow though our lives. Bringing the world to zero waste will reduce the impacts of consumption on terrestrial and marine environments.
The mission of The 5 Gyres Institute is to empower action against the global health crisis of plastic pollution through science, education, and adventure. Their vision is a world free of plastic pollution! Click their logo to learn more.
|
<urn:uuid:33d4e5e1-1638-4d52-b1e7-a901efd492a3>
|
CC-MAIN-2020-29
|
https://www.leaplab.org/5-themes
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657139167.74/warc/CC-MAIN-20200712175843-20200712205843-00005.warc.gz
|
en
| 0.897221 | 298 | 3.0625 | 3 |
To understand why bamboo flooring is a “green” choice, one must first understand a bit about the bamboo from which it is made. Smith&Fong Co. makes its bamboo flooring, plywood, and veneers from Moso bamboo (Pyllostachys hedrocycla pubescens).
There are well over a thousand species of bamboo. Each of varying heights, thicknesses, and applicable uses. Out of all of the types of bamboo, bamboo flooring, veneers, and plywood are all made out of Moso. It’s thickness in diameter, overall hardness, widespread availability and extreme height make it one of the most commercially viable species for construction. Moso bamboo, didn’t get the nickname “timber bamboo” without reason!
Interesting fact – bamboo isn’t actually a wood, it’s a grass.
Moso is an excellent candidate for building materials. It grows quickly (as in 70 feet in 3 months!), and is fully mature and ready to harvest in 5 years. Compare that to 20 to 120 years for various hardwoods.* Moso bamboo, when at maturity is incredibly strong. Because it is such a hefty species – very tall, hard, and quite thick, it is, hands down, a great choice for flooring.
Because Moso grows so quickly, 20% of the bamboo forest canopy can be harvested annually leaving behind 80%. Over a five year period, 100% of the forest can be sustainably harvested. An added assurance that the canopy will be left intact — only mature bamboo culms (poles) are heavy enough to get a good price at market. It isn’t advantageous to cut too often or too young, which benefits the farmer and the environment. An extra advantage to this system is that bamboo does not need to be replanted once harvested. It regenerates annually.
So we know that Moso bamboo is rapidly renewable and super strong, let’s consider other factors that make this a superb choice as your current or future floor.
In its native environment, Moso bamboo doesn’t need irrigation or fertilizers. Since this particular species (and so many others) is naturally resistant to pests, it doesn’t need pesticides. That means no pesticide run off or other chemicals are involved in the growth process.
Interesting fact – According to the World Wildlife Fund, Bamboo can sequester up to 70% more carbon per year than a hardwood forest.
Rapidly renewable bamboo is one of many reasons Smith&Fong Co.’s Plyboo brand bamboo flooring is a great choice for your home. Check back next time to learn about FSC® Certified flooring and why Formaldehyde Free matters as we continue the exploration about “How green is bamboo flooring?”
|
<urn:uuid:20b3c788-f04c-402f-adf9-238f7bce5d81>
|
CC-MAIN-2013-20
|
http://blog.plyboo.com/tag/moso-bamboo/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707436332/warc/CC-MAIN-20130516123036-00005-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.932797 | 589 | 2.625 | 3 |
A solid green bubble on a programming level in CS Discoveries or CS Principles simply means that the student has indicated they are done with the given level. In these courses, we strive to give students an opportunity to express their creativity and think outside the box, so we are less prescriptive for how students complete a level. For example, we may ask the student to draw a square on the screen, but might not care if it’s a specific size or color. This means that different students can have completely different and valid solutions for the same programming level, and makes it very difficult for us to automatically validate students’ work.
We recommend looking at student work on levels marked as recommended assessment opportunities to determine if a student is grasping key concepts. This approach will hopefully alleviate the need to go through and check each student’s work on every level. If you see a specific student is missing key concepts on an assessment opportunity, then you can go back and look at other skill building levels to see where they might be struggling.
Want to learn more about assessing student work?
Check out these resources:
|
<urn:uuid:dd28dd00-7f25-4828-816d-69d50c9a7adf>
|
CC-MAIN-2020-16
|
https://support.code.org/hc/en-us/articles/360027945211-Why-do-my-students-levels-turn-green-in-CS-Discoveries-and-CS-Principles-even-if-they-don-t-have-the-right-answer-
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371609067.62/warc/CC-MAIN-20200405181743-20200405212243-00375.warc.gz
|
en
| 0.943531 | 226 | 3.375 | 3 |
German-Russian WWII museum changes name
A German museum dedicated to World War II, and to the ending of that conflict in Europe, has decided to drop the reference to Russia in its name, in response to Moscow’s military campaign in Ukraine.
The German-Russian Museum Berlin-Karlshorst is housed in the building where Hitler’s forces signed Germany’s unconditional surrender on the night of May 8-9, 1945, ending the war in Europe. The document was signed in the presence of representatives of the Soviet Union, the US, Britain and France.
The museum dedicated to German-Soviet relations, was first opened to the public in 1995 and is sponsored by Germany, Russia, Ukraine and Belarus.
Jorg Morre, the museum’s director, told German media earlier this week that the institution has decided to drop the reference to Russia from its name, in protest at Russia’s actions in Ukraine. The new name is just Museum Berlin-Karlshorst.
“Already on the first day of the invasion we said this is such a profound turning point that we had to do this,” Morre told the broadcaster rbb24. In addition to the name change, the German, Russian and Belarusian flags have been removed from the poles in front of the building, and only the Ukrainian flag was left.
The sign on the building would be changed to “The Site of the Capitulation, May 1945,” the director explained. Morre said earlier that due to the Russian-Ukrainian conflict the commemoration of Victory in Europe Day on May 8 will be limited to just regular museum tours.
The museum announced its intention to change the name in April. “This name, although historically grown, does not adequately reflect our actual work,” the institution said in a statement at the time.
The German-Russian Museum Berlin-Karlshorst contains exhibits dedicated to the end of the fighting in Europe, including the hall where the historic Act of Capitulation was signed. Between 1945 and 1949, the same building served as the HQ of the Soviet military administration.
The move is the latest example in a wave of removing references to Russia from the names of businesses, establishments and monuments that has swept across the world, after Moscow launched its campaign against Ukraine in late February. Other cases include the renaming of the Russian House restaurant in Texas and the covering of President Vladimir Putin's name on a 9/11 memorial in New Jersey.
|
<urn:uuid:04f3b520-d63f-41f8-88a5-4a7a4936b8b6>
|
CC-MAIN-2023-40
|
https://www.rt.com/news/555113-berlin-museum-name-change/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510130.53/warc/CC-MAIN-20230926011608-20230926041608-00299.warc.gz
|
en
| 0.963108 | 512 | 3.25 | 3 |
The activated sludge process is characterized by the formation of an activated mass of microorganisms capable of reducing and stabilizing the organic content of influent wastewater by metabolizing the nutrients and organic compounds found within it.
This activated mass of microorganisms forms aggregates known as sludge flocs. The AS sludge floc is typically composed of biotic components (bacteria, fungi, protozoa and some metazoa) and non-biological components (inorganic and organic particulates) that are embedded in a polymeric matrix or gel known collectively as the extracellular polymeric substances. Successful operation of any BNR-WWTW relies on the formation of a suitable microbial floc that affords solids separation to occur in the sedimentation tank or secondary clarifier. This floc formation is thus critical for rapid biomass separation from the treated wastewater as well as entrapment of colloidal solids and other constituents, thereby producing a clear final effluent.
Disturbance of floc formation affects the sludge settling properties in the final clarifier, resulting in an undesired high suspended solids (SS) concentration in the final effluent, as well as increased operational costs and a severe malfunction of the WWTW.
Floc formation is facilitated by the ‘sticking’ together of microbial cells (both floc forming and filamentous bacteria) through a complex process involving physical, chemical and biological phenomena. The floc structure can also be used as an indicator of process performance e.g. pin point flocs (occurring at long sludge ages and very low food to microbes ratios leading to a low sludge volume index and turbid effluent), diffuse flocs (seen in filamentous bulking conditions resulting in a high sludge volume index), and ideal flocs (filamentous bacteria conserved within flocs, are in balance with floc-forming organisms resulting in good settling in the final clarifier). In theory good settling depends primarily on the flocs’ structural properties and on the activated sludge microbial population.
|
<urn:uuid:8ba99682-6fcb-4096-a0cf-c4b139394f46>
|
CC-MAIN-2020-10
|
http://wastewaterconnect.co.za/wastewater-info-hub-entry?id=13
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141653.66/warc/CC-MAIN-20200217030027-20200217060027-00552.warc.gz
|
en
| 0.891274 | 426 | 2.90625 | 3 |
I thought about Churchill's observation as I was reading Nancy Schiff's essay about witchcraft in Puritan Massachusetts that appeared recently in the New Yorker. I am sure it was a very learned scholarly exercise. After all, Schiff won the Pulitzer Prize for her book on Cleopatra. And I'm sure everything she wrote in the witchcraft article is accurate. Nevertheless, Schiff stumbled over some important truths and picked herself up as if nothing had happened.
Early in her article, Schiff writes about the apparent bewitchment of the Martha Goodwin, the daughter of a Boston stonelayer. Cotton Mather got involved and discovered a witch. As Schiff wrote:
The cause of Martha's affliction was identified soon enough. The witch was the mother of a neighborhood laundress. On the stand, the defendant was unable adequately to recite the Lord's Prayer, understood to be proof of guilt. She was hanged in November, 1688 on Boston Common. (p.48)Schiff failed to mention the name of the woman who was hanged: Ann "Goody" Glover," a Gaelic-speaking Irish woman who was probably a former slave who had been captured during Oliver Cromwell's Irish holocaust (1649-1653). According to writer Brian O'Neel, Ann Glover was Catholic and her family were probably the only Catholics in Boston at the time. O'Neel quotes a scholar who concluded that Catholicism was equated with witchcraft among some of the Puritan preachers.
At her trial, Goody Glover was able to recite the Lord's Prayer in the Irish tongue but not in English; therefor she was judged a witch. As Schiff records, Glover was hanged in Boston Common in November 1688, after being taunted on her walk to the scaffold by Puritan bigots.
In short, Ann Glover was a Catholic martyr, and the circumstances of her death should have been stated more fully by Schiff. Surely the good Ms. Glover deserved to be identified by name and recognized for what she was, a faithful Irish Catholic. And Cotton Mather deserved to be described as what he was--a Harvard-trained anti-Catholic bigot (among the first of many).
Schiff also wrote that when the Puritans established a legal code in 1641, the first two capital offenses were idolatry and witchcraft.The Puritans considered Catholicism to be the chief form of idolatry, so the Puritans basically made Catholicism a criminal offense. Certainly the Puritans made their anti-Catholic animus clear the following year, when they passed a law making it a capital offense for a Catholic priest to be inside the boundaries of the colony.
Our higher education elites are in a frenzy to purge any positive reference to historical figures who do not meet today's standards of political correctness. Thomas Jefferson and Andrew Jackson have been purged from their former glory as founding lights of the Democratic Party. The University of Texas has exiled its statue of Jefferson Davis to an obscure space; Robert E. Lee may be removed from New Orelans' Lee Circle.
And perhaps that is a good thing. But let's not take half measures. Let the Puritans be vilified for what they were--anti-Catholic bigots, along with President John Adams, Lyman Beecher, Horace Mann and dozens of other famous 19th century Protestant American who despised Catholicism. Horace Mann still has an insurance company named after him, along with numerous public schools.
Surely, religious bigotry is as hateful as racism. And if the intellectual elites have not unmasked the anti-Catholic bigots in our history books, perhaps it is because they are anti-Catholic bigots themselves.
|Cotton Mather on a good-hair day|
Brian O'Neel, 150 North American Martyrs You Should Know (Cincinnati, OH: Servant Books, 2014).
Nancy Schiff, "The Witches of Salem," New Yorker ( September 7, 2015), 46.
|
<urn:uuid:c407881c-d78e-483e-9340-a33bf5c8c1d6>
|
CC-MAIN-2017-26
|
http://fosseyfaithbook.blogspot.com/2015/09/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00528.warc.gz
|
en
| 0.9737 | 806 | 2.703125 | 3 |
Malaria control: the power of integrated action
New strategies for malaria prevention and control are emphasizing ‘integrated vector management’ (IVM). This approach reinforces linkages between health and environment, optimizing benefits to both.
Integrated vector management is a dynamic and still-evolving field. IVM strategies are designed to achieve the greatest disease-control benefit in the most cost-effective manner, while minimizing negative impacts on ecosystems (e.g. depletion of biodiversity) and adverse side-effects on public health. Possible health risks range from acute exposures to pesticides and their residues to bio-accumulation of toxic chemicals, as well as the development of vector resistance to some widely-used pesticides and drugs.
A new WHO Global Strategic Framework for Integrated Vector Management defines IVM as a strategy to
. . . improve the efficacy, cost-effectiveness, ecological soundness and sustainability of disease vector control. IVM encourages a multi-disease control approach, integration with other disease control measures and the considered and systematic application of a range of interventions, often in combination and synergistically. (1)
Rather than relying on a single method of vector control (e.g. chemical spraying), IVM stresses the importance of first understanding the local vector ecology and local patterns of disease transmission, and then choosing the appropriate vector control tools from the range of options available.
These include environmental management strategies that can reduce or eliminate vector breeding grounds altogether, through improved design or operation of water resources development projects; and the use of biological controls (e.g. bacterial larvicides and larvivorous fish) that target and kill vector larvae without generating the ecological impacts of chemical use.
At the same time – when other measures are ineffective or not cost effective – IVM makes judicious use of chemical methods of vector control, such as indoor residual sprays, space spraying, and chemical larvicides and adulticides. These approaches reduce disease transmission by shortening or interrupting the lifespan of vectors (2,3).
IVM also provides a framework for improved personal protection/prevention strategies that combine the use of environmental management tools/physical barriers with chemical tools for new synergies, e.g. insecticide-treated nets (ITNs). Trials using insecticide-treated bednets in some malaria-endemic African countries have shown very substantial reductions in child and infant mortality (12). Finally, IVM supports more accessible and affordable disease diagnosis and treatment with effective anti-malarial drugs, within the framework of a multi-disease control approach.
IVM supports a process of ‘adaptive management’ through:
- periodic evaluation and reassessment of the ecological setting;
- monitoring of disease incidence and transmission; and
- health impact assessments of new developments to be undertaken by other sectors.
IVM therefore requires a fundamental restructuring of existing vector control programmes into a flexible, multi-pronged, multisectoral approach to vector-borne disease control that engages a range of government actors, communities, and agencies.
IVM is not a panacea for malaria – which is responsible for approximately 11% of the total disease burden in Africa (4) – or for vector-borne disease in general.
However, the large annual death toll from malaria, and the heavy burden of disease from other vector-borne diseases, the development of vector resistance to some widely-used insecticides and drugs, and the costs of developing new insecticides or insecticide-based control campaigns – all are indicators that a more multi-faceted approach to vector-borne disease is indeed warranted.
In many settings, the use of biological and environmental modification/management strategies – alongside or even in the place of insecticides – has yielded sustainable reductions in disease and transmission rates. The judicious use of insecticides, via careful and targeted application, also can preserve their long-term efficacy, slowing development of vector resistance.
In addition, a number of IVM field experiences have been documented as particularly cost effective in control of disease transmission. IVM strategies also have generated significant co-benefits to local economies in terms of development and growth – although more work is yet to be done, linking health and economic outcomes (5).
This brief provides examples of key experiences, which can provide guidance to policy-makers, together with an evaluation of their success in terms of health as well as economic costs and benefits (see Section 5, Cost-effectiveness of IVM).
|
<urn:uuid:6260208f-ea16-4c60-a9f3-045a262ef16c>
|
CC-MAIN-2013-20
|
http://www.who.int/heli/risks/vectors/malariacontrol/en/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698090094/warc/CC-MAIN-20130516095450-00001-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.919305 | 911 | 3.234375 | 3 |
You may have noticed protein bars and shakes popping up at grocery stores or gyms. It’s become a buzzword seen in magazines and heard on talk shows around the country. So it might be surprising that a recent study found almost half of older adults are not getting enough protein, thus negatively impacting their health.
So, what role should protein play in our diet?
Protein can be thought of as one of the building blocks to our muscles, bones and blood. Not only does protein help keep our body strong, it helps promote good balance and mobility– all important factors to being able to live independently as we age.
Additionally, protein helps combat common signs of aging, like declines in muscle mass, strength and function, which can put you at greater risk of falling and fracturing bones.
But before you grab the nearest protein bar, let’s discuss exactly how much protein you should consume per day.
How much protein do I need?
The National Academy of Medicine’s recommended dietary allowance for protein is 0.8 grams per kilogram of body weight per day. For adults who weigh 195 pounds that’s 71 grams per day; and for those who weigh 170 pounds that’s 62 grams per day. To determine how much protein is right for you, use this online calculator.
While it is helpful to know how many grams of protein you should aim to consume each day, knowing the amount of protein in the foods we eat can be a bit of a mystery. Below are some sources of high-quality protein and the corresponding amount of protein in each, according to the U.S. Department of Agriculture FoodData Central database:
- 1 chicken breast: 54 grams/protein
- ½ fillet of salmon: 40 grams/protein
- 1 cup cooked lentils:18 grams/protein
- 1 cup cooked black beans:15 grams/protein
- 1 container Greek yogurt (plain, nonfat):10 grams/protein
- 1 egg: 6 grams/protein
If you feel you might benefit from adding some additional sources of protein into your diet, be sure to talk with your doctor before making any drastic changes.
Increasing your protein consumption will not be a silver bullet to keeping your body healthy as you age; staying physically active is also important to help maintain your health and live your best life.
|
<urn:uuid:aa9c1a3d-69a8-407e-81ef-eb81e7366d6c>
|
CC-MAIN-2023-14
|
https://newsroom.uhc.com/health/protein.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00333.warc.gz
|
en
| 0.950954 | 483 | 3.140625 | 3 |
These unique engravings, which feature rarely seen ORIGINAL HAND-COLORING, are from Giovanni Baptista Ferrari’s work Hesperides sive de Malorum Aureorum Cultura et Usu Libri Quatuor, published in 1646 in Rome.
Ferrari was a prominent horticultural adviser in 17th century Rome. His close relationship with Cassiano dal Pozzo, a well-known scholar very interested in cirtus fruits, led to the creation of this work. It is a four-part work, the first of which features the lore of the citrus fruit. The next three parts contain 80 plates of citrons, lemons, and oranges. Ferrari was very carful about the taxonomy given the fruits which is shown written in the fanciful ribbon surrounding each fruit. The engravings were created by Johann Friedrich Greuter and Cornelis Blowmaert based on the works by several important artists of Rome.
The objective of the work was to illustrate the science, lore, and poetic illustration of the citrus family. It has been called by some a “citrus encyclopedia”.
|Dimensions||9.25 × 13.5 in|
|
<urn:uuid:310c1eb9-f205-4148-a433-b129b7fd58f8>
|
CC-MAIN-2023-40
|
https://rareprintsgallery.com/product/ferrari-giovanni-027/?add-to-cart=1771
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00206.warc.gz
|
en
| 0.956821 | 249 | 3.296875 | 3 |
The spectacle of two ancient armies advancing toward each other in battle is no doubt striking. And these compelling images of warriors atop elephants and steering extravagant chariots into battle are evoked at Canada Park, once the site of a Hellenistic town traditionally considered to be the New Testament settlement of Emmaus. Remnants of the town are displayed alongside plaques detailing the modest Maccabee rebel militia’s most successful victory against its vast Greco-Syrian rival in 166 BCE, which was won at Emmaus.Canada Park, a lush, sprawling 30,000 dunams (7,500 acres) established, as its name indicates, thanks to the generosity of donors from the Canadian JNF, is close to Latrun and is therefore an ideal spot to begin a Hanukka trail in the footsteps of the Maccabees if Jerusalem is your point of departure. Visitors can lunch alfresco at one of the many picnic tables scattered throughout the park while enjoying spectacular views.
Relics from the Hellenistic period as well as those of a variety of other historical eras provide insight into Emmaus’s rich past, not least its significance in Christian tradition as the place where Jesus is said to have appeared to his disciples following the resurrection.
The Hasmonean victory at Emmaus was won in the second year of a three-year Jewish revolt against Greek rule over the Holy Land. Upon learning of the Greeks’ plan for a surprise nighttime attack, the Hasmoneans
, led by Judah the Maccabee
, turned the tables on their unsuspecting opponents. Returning to their base at Emmaus following a failed attack on the Maccabee camp, the Greeks were accosted by the Hasmoneans. Despite their numerical advantage, the Greeks sustained heavy casualties in the ensuing battle, bringing about a Maccabean victory that is considered fundamental to the Hasmoneans’ eventual topple of Greek rule in Judea in 164 BCE.
A few miles farther along the Latrun road toward Modi’in
, road signs specifying the proximity of nearby towns and settlements bearing names such as Hashmonaim
, Maccabim-Re’ut and Modi’in signify arrival in the Hasmonean heartland that is the Ayalon Valley
At Umm el-Umdan, an Arab
village close to the southern entrance of Modi’in, excavations have unearthed the remains of a Hasmonean village including a row of houses, a marketplace, a ritual bath and a synagogue. The discovery of the synagogue, the only remnant still exposed and accessible for public viewing, has led some archeologists to propose that Umm el-Umdan is the site of ancient Modi’in, the hometown of revolt leaders and priestly Hasmonean family.
They claim the synagogue is evidence of the settlement at Umm el-Umdan’s importance. Yet others argue that the remains of ancient Modi’in can be found at Titura Hill, the site of a spectacular Crusader-era fortress at the edge of modern-day Modi’in. Excavations at the fortress have revealed remnants from various periods including those depicting a Hasmonean-era settlement. Proponents of the Titura Hill theory claim that the settlement’s vast dimensions are a point in the site’s favor as the Hasmoneans often constructed large structures to demonstrate their importance.
According to Amit Re’em, Israel Antiquities Authority archaeologist for the Modi’in district, the above assertions should be viewed with caution. ’As signs declaring the names of the unearthed settlements were not discovered, any evidence that either location is more likely to be that of ancient Modi’in than any another Hasmonean village is purely circumstantial... and thus such claims are no more than speculation.’
Another relevant site in close proximity to Modi’in is that of The Maccabees’ Graves, which can be reached via Route 443 (after Shilat Junction and before Moshav Mevo Modi’im, when coming from Jerusalem). The graves, which are carved into rocks and covered by large boulders, were initially discovered by a group of Jewish schoolchildren and their teacher on the eve of Hanukka 1907. The students encountered a local Arab shepherd while attempting to locate the graves. They inquired as to their whereabouts upon which the shepherd escorted them to a site he claimed housed the ’The Jews’ Graves.’ On arrival the students lit the first Hanukka candle and danced at the graves, thereby initiating a thus-far unbroken Hanukka tradition.
According to Re’em, however, archeological findings have disproved the authenticity of the children’s site. ’Excavations close to the nearby Arab village of Midya during the 19th century uncovered findings suggesting that site houses the Maccabees’ graves,’ he explained. ’The discoveries [which have since been concealed] included seven triangular tombs corresponding with first-century Jewish historian Josephus Flavius’s description of the Hasmonean family’s pyramid-shaped graves — all seven of which, he claimed, were erected in the same place, as is the case here.’
An additional factor in Midya’s favor, Re’em says, is that it overlooks the sea, which is another of Josephus’s specifications for the Hasmonean grave site. ’Even if the graves aren’t located at Midya,’ he concludes, in light of Josephus’s writings along with other evidence it is unlikely that the traditional site is the authentic one.’
Archeological conclusions, however, have not deterred the continuation of the graveside tradition, a factor, which according to a guide with the Genesis 2000 tour-operating company that specializes in the Ayalon
Valley, may be due to the collective need to identify with a tangible point of reference. ’Symbolic association often becomes more important than the concept being commemorated? the Western Wall is just one of many examples of this phenomenon,’ he explains. ’People need a place to direct their energies and in this case the children who discovered the graves were pioneers of a new Zionist ideology looking for strong Jewish heroes to whom they could relate from a tradition which stressed the might of God over that of man? and their sentiment is one modern-day Israelis can still relate to.’
Having contended with historical and archeological disparities, light relief is available to Maccabee trail followers in the form of reconstruction of Hasmonean life at Neot Kedumim. Visitors to the biblical nature reserve, located between Modi’in and Ben-Gurion Airport
on Route 443, can gain insight into the daily lives of Hasmonean-era inhabitants of the Holy Land through a variety of activities including picking and crushing olives into oil, modeling ancient-style lamps out of clay, drawing water from a restored cistern and working a water-powered flour mill.
Similar options are available at the family-oriented Hasmonean village close to Moshav Shilat. Here, guests are transported to the Hasmonean era through interactive workshops and animated performances.
The picturesque Beit Horon
settlement just past Givat Ze’ev
on the Jerusalem-Modi’in highway makes for an idyllic location to picnic at the conclusion of an action-packed day. Here visitors can take in their surroundings — the site of yet another Hasmonean battle — at ground level or marvel at the attractions from an observation deck.
For those hoping to encounter Maccabee life closer to home, the excavations in Jerusalem’s Old City offer insight into the lives of Hasmonean-era residents of the Holy City. Parts
of a Hasmonean-era citadel can be admired from the Cardo while the remnants of Maccabee houses and ritual baths at the atmospheric Davidson Center excavation site make for a worthwhile visit.
of the Ayalon Valley require access to a vehicle. The Genesis 2000 tour operating company offers full-day car tours complete with a guide for up to four people at $400. Half-day tours cost $280. Full-day guided tours for up to seven people are $450 and $500 for up to 11 passengers.
|
<urn:uuid:63c05674-6591-4e2e-8f26-bfa1a91901da>
|
CC-MAIN-2020-29
|
https://www.jpost.com/israel-guide/jerusalem-area-tours/ayalon-valley-on-the-maccabee-trail
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655933254.67/warc/CC-MAIN-20200711130351-20200711160351-00445.warc.gz
|
en
| 0.94495 | 1,732 | 3.25 | 3 |
Stopping Runaway Climate Change
Life as we know it will end by 2025.
Find that improbable?
Consider this then. The Arctic is heating up four times faster than the rest of the planet and this thawing has already begun. The consequences are ominous. The thawing of the Arctic will release enormous quantities of methane.
The Siberian bog has already started giving off small amounts of carbon dioxide (CO2) and methane. Many natural occurrences are self-regulating, but there is no self-regulation in global warming and more specifically, the Arctic warming. This is a run-away event; a kind of global domino effect.
Significant methane release in the Arctic will start impacting the climate within the next 10 years and the complete flip to a methane atmosphere will take an additional 5 years. Since, methane has 20 times the global warming effect as CO2, the release of methane from the Arctic will then trigger a release of methane from the ocean floor as the oceans warm. This second wave of methane release double-insures no plant or animal will survive. Plant and animal species are inter-dependent on each other. Lower level, plant and animal species die off first and this will result in the death of the higher level species.
2025 is neither a pessimistic nor an optimistic prediction but it is the mid-point of my range of years from 2020 to 2030. Predicting the future is difficult because we do not know the exact release rates of methane from the Arctic bogs and tundra.
My estimate of the Arctic temperature rise and release of methane takes into account:
-the burning of trees
-the increase in wind
-heat transfer by the wind
-less snow cover
-increasing CO2 and methane release from the Arctic
The burning of trees
Trees are the kindling which will add to Arctic warming. Today, forest fires have noticeably increased. Another ½ deg. Centigrade of temperature rise of the planet would be disastrous for forests with more pests and fires. The burning of trees is a vicious circle. Trees burn and winds increase which causes more lightning, which starts more forest fires, which are fanned by the increased winds.
When a tree burns five things happen.
The tree, mainly carbon, burns and its’ carbon is released into the atmosphere as CO2.
The planet warms from this burning.
The tree is now gone and also gone is its ability to convert CO2 to O2, which is the tree’s photosynthesis, which converts the solar energy to carbon storage.
The tree was a resistance to the flow of the winds and now it is gone. Winds will increase because the surface of the earth has become smoother, like a billiard ball.
The buffeting of the Arctic cold air mass by the southern winds creates a heat transfer of cold air out of the Arctic and warm air into the Arctic. This heat transfer was slowed by the heat capacity (sink) of that tree. Now the tree is gone and the heat of the southern winds will stay warmer as they blow north and the cold northern winds will stay colder as they blow south. This is an increase of heat transfer.
The accelerated Arctic warming
In a previous article, I said wind was the cause of the Arctic’s 4 times warming. I dismissed the two other possible causes. These other possible causes are increased warm ocean currents or increased solar gain. The one part of solar gain that I could not dismiss is the ozone hole because I do not know whether it is an addition or subtraction to Arctic warming. I leave it to others to comment on the ozone hole. Also, as the Arctic warms, bare areas develop and these areas will absorb solar energy instead of reflecting it. An example is the Siberian bog. These bare areas will add to Arctic warming but it is an effect of Arctic warming, not the cause. I was surprised when, recently, MIT researchers had measured wind and said that winds have doubled when wind intensity and frequency are added together. This new information reinforces and corroborates my research that wind is the cause for Arctic warming.
Winds are created by updrafts due to the earth’s surface temperature and the earths spin. These winds work against the resistance of the terrain which is mostly trees and hills. The hills and the earth’s spin have not changed. The reason the winds have doubled is because of an increase of surface temperature which is due to global warming and a reduction in resistance which is due to deforestation. As one would suspect, most winds are greatest near the equator where the earth’s velocity is greatest.
Parts of this article have been built on others work. For example, I am accepting, as reported, that there is a huge amount of frozen methane in the Arctic and under the oceans. There are several articles on the internet which discuss this methane and I have not seen any denials to this information.
The Solution is to stop the Arctic thaw by reducing the winds and the resultant heat transfer by the winds.
Trees will block the wind but we do not have time to plant more trees and wait for them to grow. The only, feasible, solution to reduce wind speed is to build and install a massive number of wind turbines to get wind speeds down to pre-industrial levels.
The laws of thermodynamics do apply. A wind turbine takes energy from the wind therefore wind speed must be reduced by that amount of energy.
Obviously, wind turbines were not designed to slow the wind. They were designed to extract energy from the wind, but in this scenario, their primary mission is to slow the wind and stop the Arctic thaw. Their secondary mission is to provide us with energy so we can stop burning fossil fuels and start reducing CO2 levels in the atmosphere. Co-incidentally, wind turbines are also today’s best financial solution to generate electricity and eliminate the burning of fossil fuels.
5 to 20 million large wind turbines are needed to stop the Arctic thaw.
My estimate is that 5 to 20 million large wind turbines would lower the wind speeds to pre-industrial levels and get the Arctic freezing again. That is a lot of wind turbines. To put it in perspective. Today, 10 million large wind turbines would supply mans’ energy needs. 5 to 20 million large wind turbines is a fairly wide prediction. That is because I lack the data and knowledge to zero in on a more exact number.
If we installed a wall of wind turbines, four deep, across Canada (7,000 km) with a 40 meter spacing, it would require 180,000 wind turbines. This is a good visualization but these 180,000 wind turbines could probably be more strategically placed. There is a lack of trees on the plains of North America and on the rocky coast of Newfoundland and Labrador where the trees are few, stunted and windswept. These are windy places and that is where the wind turbines would best be situated.
Comparing natural rough ground resistance to an equivalent wind farm resistance
Hurricanes and tornados build over flat surfaces, where there is a lack of wind resistance. This point is missed in the weather news. Commentators like to say that Hurricanes develop over warm water. I think this is misleading. Humid air will make rain but it has a net zero effect on wind. A warm surface, whether it is water or plains, is the engine that makes wind and it is the flat surfaces that allow these high wind speeds to develop.
I believe it was hurricane Dennis that grew in the Caribbean, swept across the Yucatan Peninsula, lost speed, then gained speed over the Gulf of Mexico and then lost speed as it hit the mainland. Dennis’ strength grew because it was over a warm, flat surface and lost speed once it hit a rugged surface of hills and trees. If we analyze these rugged surfaces and compare them to a rugged surface of wind generators, we may be able to quantify the numbers of wind generators needed to lower the wind speeds. So, imagine bulldozing the trees and hills from the Yucatan and replacing these hills and trees with 50,000 wind turbines. Would that be enough wind turbines to replace the resistance of the missing hills and trees? Obviously, we will not be bulldozing the trees and hills from the Yucatan and installing wind turbines. It is just an example but placing 100,000 wind turbines in tornado alley (US plains) would be a good idea to reduce or eliminate tornados.
Wind turbines in the Caribbean and Florida would slow hurricanes. Wind turbines up the eastern US coast would further slow the winds and wind turbines in Newfoundland and Labrador would further slow the wind. There would be an accumulating slowing effect caused by many wind turbine installations as they slow these Atlantic winds as they travel north to the Arctic.
Doing the Math
Ever try to suck a thick milkshake through a skinny straw? It is painfully slow because the straw is just too restrictive for good flow. Switch to one of those fat, McDonald’s type straws and it is easy to suck and the flow is good. Welcome to the world of flow. In the ventilation business, we design duct systems (pipe) by starting with knowing the desired air flow. Then, we just match the resistance of the duct to the horse-power of the blower. Mostly, we just pick the resistance values of duct and the horse-power ratings of the blowers from available tables. To make things easy, we also use a technique called "equivalent resistance".
For example 1 duct elbow has the "equivalent resistance" to 5 feet of straight duct. I used this technique to substitute wind turbine resistance for tree resistance. On the Danish wind turbine association website, there was a brief mention of trees blocking the wind if they are in front of the wind turbines. It also states that trees with leaves restrict the air more than bare trees (as you would think). To me, a wind turbine looks more like a bare tree than one with leaves. As there are no tables for the resistance value of wind turbines or trees, I had to estimate an "equivalent resistance". A big wind turbine is 550 ft tall. One wind turbine should equal 50 trees. Multiply this by a factor of 10 due to strategic placement. A hill with trees might be worth 5 wind turbines and so on.
I estimated an equivalent number of wind turbines needed to replace the resistance lost through deforestation plus an additional number of wind turbines needed to counteract the effect of surface warming.
The basic flow formula
flow = square root of pressure / resistance
-Today an increase of surface temperature has increased the pressure of the wind
-Deforestation has decreased resistance
-According to research at MIT, winds speeds (flow) have doubled since 1970
I have estimated that increases in wind are due to surface temperature and deforestation by a ratio of 50/50.
(This is a very "ball park" estimate on my part based only on my experience in air flow. There are no resistance tables for trees or wind turbines and there is no data on increased pressure due to increased surface temperature. A 50/50 estimate is OK for this article. Later when we do some measuring and some computer modeling, we can do an adjustment.)
Wind turbines will replace the missing trees as resistance but also more wind turbines will be added to counteract the rise in surface temperature. This means that, to counteract the doubling of the winds since 1970, we only have to increase resistance by 50% for trees plus 18% for surface temperature. This is very good news since, as per the formula, increasing resistance has an exponential effect on counteracting the increased pressure due to increased surface temperature.
Reducing the wind = reducing the heat transfer
The winds that transfer heat into the Arctic are mostly, "back and forth", buffeting type winds. Warm winds blow north into the Arctic and cold winds blow south from the Arctic. There may even be some balance. A Siberian northern wind may be balanced by a Canadian southern wind? It is helpful to visualize the Arctic as a big bowl of cold air that is being sloshed out because of this increased buffeting.
The obstacles on the ground (hills, trees, rocks, etc.) create turbulence and a mixing effect. They also have heat storage capacity. The ground is warmed by the sun and results in updrafts. Low clouds and fog are a sign of cooling due to mixing. Precipitation adds to turbulence and mixing. Precipitation also transfers heat (or coldness) to the ground. The theory is that the winds transport the heat. At first glance, heat transfer is quite simple.
Most of the solar energy heats the surface of earth. If the solar radiation hits snow, most of it will be reflected back into space. If this solar radiation hits dirt, it will be absorbed by the dirt as heat. The dirt will heat the air, this air will updraft and the winds will transport this heat. If the winds are strong this heat will be transported further. This heat transfer system becomes more complicated with the mixing of warm and cold air flows as well as the heat transfer of air to surface whether it is trees, ground or water. Further, there is precipitation and evaporation that transfers heat (or coldness) to ground.
Analyzing the Wind
There is a lot happening within the first 1,000 ft. of elevation.
A 550ft. wind turbine will have a speed reducing effect on the wind speed of the first 1,000 ft. of elevation, but what happens above? The second 1,000 ft of elevation has higher wind speeds but it is slowed a little as it drags across the top of the lower 1,000 ft. The density of air decreases with elevation. At 5,000 ft. of elevation the air is 14% less dense than at sea-level. The temperature of air also decreases with elevation, because it’s only source of heat is provided by the updraft from the lower level.
This second 1,000 ft of elevation should provide a lot less Arctic heating. Wind speed increases but it is probably less turbulent because there are no obstructions, to make it turbulent. Only updrafts can cause turbulence in the second 1,000 ft of elevation.
At 3,000 ft of elevation, there is more wind speed, less turbulence and a further reduction in temperature.
Predicting the effectiveness of wind turbines in reducing wind speed and the resultant heat transfer into the Arctic by computer modeling and measuring.
Wind turbines will reduce wind speed. So, how effective are large wind turbines in slowing the wind and reducing the heat transfer into the Arctic? There’s certainly lots of room for improvement in my estimate.
In the future, we must establish accuracy in predicting our wind turbine needs. Accurately measuring any decrease of wind speed with the 20,000 or so wind turbines currently installed may be difficult. We may need 200,000 or 2,000,000 wind turbines to get an accurate measurement to determine how many wind turbines are needed to get the wind speed down. In addition to wind speed, we need to measure future global and Arctic warming to see the trends and how we are doing.
Researchers do their global warming predicting with computer models but these models are only as good as the model formulas being entered. To predict future Arctic warming researchers must put into their models: the burning of trees, the increase in wind, heat transfer, less snow cover and increasing CO2 and methane release from the Arctic which add to global warming. A special computer model for the Arctic may be required.
By computer modeling and comparing our model prediction to actual future measurements, we can check the accuracy of our computer model. As more accurate wind speed measurements are taken, this data gets fed back into the model to recheck.
We need to know wind speed reductions due to wind turbines and we need to know heat transfer reductions due to wind speed reductions. Heat transfer reductions will be shown by the Arctic temperature reduction.
At this late date we need to go to war against wind speed and also win the war on global warming. It would be wonderful if "big oil" companies and "big oil" countries realized that the age of burning oil is over and their future is in using oil for non-combustion uses. Now that wind turbines are firmly established as the future direction, "big oil" should be massively investing in wind turbine companies. By investing in wind turbines, they can have their cake and eat it too. If they do not, it may be necessary for Governments to commandeer wind generator companies and finance the quadrupling (X4) of yearly production. With large investments, it is possible to finance the manufacture and installation of 10 million large wind turbines within 5 years.
My theory is that wind turbines will reduce wind speed and result in a decrease of heat transfer into the Arctic. This would keep the methane frozen and not allow it to get into the atmosphere. This article is built mostly on others work. What I have added is my expertise on air flow and heat transfer. I have this, what I call, 2+2=4 ability which is the combining of research into a picture. Also, it should be noted that I have no reason to promote wind turbines. In fact, all my money is tied to the manufacture of energy conservation products which have moved from earth’s #1 in priority to earth’s #2 priority, now that wind turbines have become earth’s #1 priority.
We may have to install more wind turbines for resistance to the wind than what is required for global energy needs. What would we do with the extra energy if 20 million large wind turbines are needed? If we combine a dehumidifier (heat pump) with an air to air heat exchanger, we get a very efficient piece of equipment which is capable of condensing water from desert air.
Then we plant the desert.
Michael Lucking is President of Heat Exchangers NF Inc., who developed and market the Shower Smart Faucet.
They also have an item on superconductors in the "news and chat" section of their site.
What do you think? Leave a comment below.
Sign up for regular Resilience bulletins direct to your email.
|
<urn:uuid:e9c891aa-ae19-4592-8e0d-869b13a444d2>
|
CC-MAIN-2014-10
|
http://www.resilience.org/stories/2005-11-01/stopping-runaway-climate-change
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010779425/warc/CC-MAIN-20140305091259-00042-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.949132 | 3,745 | 3.84375 | 4 |
NCERT Solutions for Class 12 Maths Chapter 4: Get 100% accurate NCERT Solutions for Class 12 Maths Chapter 4 (Determinants) solved by Maths subject experts. We jot down step by step solutions for questions provided in NCERT Class 12 maths textbook as per CBSE guidelines. You can access these comprehensive & helpful solved questions of Ch 4 Determinants from the provided NCERT Class 12 Maths Solutions Chapter 4 PDF.
Download NCERT Solved Questions of Class 12 Maths Ch 4 Determinants Exercises 4.1, 4.2, 4.3, 4.4, 4.5, 4.6 from our page at any time freely & kick start your exam preparation. Prepare from these NCERT Solutions for class 12 maths & get strong command on the basics of the determinants chapter. All these Class 12 Maths NCERT Determinants Exercise Questions with Solutions helps you to revise the entire syllabus quickly and score maximum marks in the final exams.
Class 12 Maths NCERT Solutions Chapter 4 Determinants – Free PDF
From the Class 12 Maths Chapter 4, Students will study about Determinants concept in detail. A determinant is a number that can be determined for only square matrices. While determining a system of linear equations, it plays a crucial role to find whether the system of equations has a unique solution or not. NCERT Solutions of Class 12 Ch 4 cover all the problems like solving the determinants of a 2x² matrix, 3x³ matrix, evaluating the area of the triangle, finding the equation of the line using determinant, minors, and co-factors, etc.
To make it easy for you, we have jotted down the Class 12 Maths NCERT Solutions for Chapter 4 Determinants in a systematic way here in this article. Also, you can find these NCERT Solved questions of Ch 4 in both Hindi & English Mediums for better practice & good scores.
NCERT Solutions for Class 12 Maths Chapter 4 Determinants – Solved Exercises 4.1 to 4.6
Practicing Class 12 Maths Ch 4 Determinants NCERT Solved Ex 4.1, Ex 4.2, Ex 4.3, Ex 4.4, Ex 4.5, Ex 4.6 is the smartest way to obtain the max. marks in the particular chapter questions asked in board exams. NCERTBooks.Guru offers Free PDF Download links to access the expert teachers prepared NCERT Solutions for class 12 maths chapter 4 determinants according to CBSE board guidelines.
- Determinants Class 12 Ex 4.1
- Determinants Class 12 Ex 4.2
- Determinants Class 12 Ex 4.3
- Determinants Class 12 Ex 4.4
- Determinants Class 12 Ex 4.5
- Determinants Class 12 Ex 4.6
All solutions provided here in a simple language to let students understand the concepts fully & fetch excellent marks in the annual exams. Download NCERT CBSE Solutions for Class 12 Maths Chapter 4 – Determinants and reach the top position in your board examinations. These NCERT Ch 4 Exercise solutions act as a major role in providing the latest & standard important questions for the exam preparation & improve your subject knowledge & other skills.
We hope the given information regarding NCERT Solutions Class 12 Maths Chapter 4 will benefit you to the fullest. So, view & download class 12 maths ch 4 determinants solved questions from this page for free & practice well. If you find any difficulties while using our provided NCER Solutions, please let us know via comments. Our expert team will get back to you asap. Stay connected with us & avail the latest updates on 12th Maths NCERT Ch 4 Determinants Solutions.
|
<urn:uuid:5dca3f7f-fa39-4ee0-90c1-e30261990137>
|
CC-MAIN-2023-23
|
https://www.ncertbooks.guru/ncert-solutions-for-class-12-maths-chapter-4/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00339.warc.gz
|
en
| 0.807424 | 821 | 3.46875 | 3 |
Indy has done incredibly well with her development, both physically and cognitively. I attribute this to many things but her diet is at the top of the list. I feel that having her on a plant based, whole food diet from the start is making all the difference in her development.
Everything we put in our body either makes us healthier or makes us sicker. This holds true for all of us, but how important is this concept when it comes to taking care of our children? We want our children to be healthy, strong, and intelligent. We want them to feel good, have strong immune systems that fight off sickness, and have the opportunity to develop to the best of their ability.
When it comes to a child with limited cognitive abilities, a pure, whole foods diet can be the difference between an IQ of 60 or an IQ of 75. A diet high in anti-oxidant foods, omega-3 fatty acids, and healthy fats can really optimize brain function.
“We now know that particular nutrients influence cognition by acting on molecular systems or cellular processes that are vital for maintaining cognitive function. This raises the exciting possibility that dietary manipulations are a viable strategy for enhancing cognitive abilities and protecting the brain from damage, promoting repair and counteracting the effects of aging.” Study done by NIH.
People with Down syndrome have accelerated aging and a high risk of early onset Alzheimer’s. Their brains are more susceptible to damage from free-radical toxins, and the quality of cellular repair is much lower. The exciting thing is that a diet rich in whole foods & void of processed foods can help combat these effects of having an extra 21st chromosome.
So what foods am I talking about specifically?
Anti-oxidant foods help counteract the effects of free radicals (toxins). All fruits and vegetables have anti-oxidant properties, so you can feel good about any fruits and veggies your child eats. Some in particular have very strong healing abilities and high levels of anti-oxidants, like frozen wild blueberries, spinach & dark leafy greens, pomegranate, potatoes, papaya, asparagus, and raw honey to name a few. We eat most of these things every day at our house. Every morning we blend up wild blueberry fruit smoothies and have raw honey in our herbal teas. Don’t be afraid to eat a lot of fruit. The sugar in fruit is the sugar our brains need to function- especially children!
Omega-3 fatty acids make up a large volume of our brain and aid in the development of cognitive function. They help improve motor skills, memory, and speaking abilities. Adequate levels of Omega 3 are important for all of us, but especially children and pregnant or nursing mothers as they help develop a healthy brain. Sources of omega-3 fatty acids include chia/flax/hemp seeds, walnuts, spinach, and fatty fish such as salmon and halibut. Since high quality, safe fish is hard to come by, getting omegas from plant sources is the easiest daily option and shows just as much benefit. I blend 1-2 TBS of chia seeds in our smoothies every day, and use hemp and flax seeds often in my cooking to add omega’s in our diet.
Healthy fats such as those found in avocado, coconut, olive, and nuts & seeds really improve the functions of the brain. Our brains are composed of almost 60% fats. These fats, in addition to fruit sugars, give our brain cells energy. Incorporate these in your diet daily to support brain function. Keep in mind however, fats are fats, and you can over-do it. Reasonable amounts of healthy fats are great as part of your daily diet.
Vitamin and mineral deficiencies such as Vitamin C and Folate are very common in DS. A diet rich in whole foods can help combat these deficiencies and give your child the best possible outcome.
So how do I apply this to Indy? When I say “Indy’s diet”, what I mean is the diet she gets through me (by breastfeeding), and the baby food I make for her (using the twister jar on my blendtec). Her baby foods consist of high anti-oxidant fruits and vegetables pureed with breastmilk. I have not given her any grains yet in an effort to avoid allergy development. We eat a diet free of gluten, dairy, soy, and processed fats & sugars because it is important for the health of Indy’s brain.
A whole food diet increases strength by fortifying the muscles and bone structure, improves cognition and brain function, balances hormone glands like the thyroid, improves cellular energy and detoxification, and creates beautiful hair-skin-and nails. When it comes to Indy, a diet rich in whole foods is going to make all the difference. It already has!
I am so blessed to be this little girls mama.
17 Replies to “Treating the effects of Down syndrome with whole foods”
It’s always exciting to read the things you do for Indy 👶🏼to insure optimum health for her and your family. Good information for us all.😍
Thanks Sharon! Thank you for taking the time to read 🙂 Much love!
I completely agree with this. We’ve noticed great cognitive development with Kara and I believe it’s because of what I put into my body and give to her through my milk. Please keep sharing, this is the key to a brighter future for our wonderful babies!
Yay! I am so glad you are into to clean eating and have noticed a difference too. Our babes will do amazing 🙂 you keep sharing too! xoxo
What great information. I have been finding your blog and instagram very inspiring. Right now I am 22 weeks pregnant and expecting a little boy with DS. I could totally relate to your orangesocks interview. We too suffered from infertility and went through several rounds of IVF. We had finally given up. We had decided the answer was no. IVF is so hard and emotional on its own especially if you tend to be more of a holistic person. I probably tried everything I could find to get pregnant naturally. So you can imagine how excited we were when we found out we had gotten pregnant on our own just 1 month after our final failed IVF. But all of that excitement was over taken by fear and sadness after a series of events led us to a prenatal diagnosis. I am not going to lie it has been hard to cope. I still have a ways to go in my pregnancy and it can feel very lonely at times. I am so grateful for your blog and posts. It gives us hope that there is light at the end of this dark tunnel. It feels very unfair sometimes that the fertility struggles and pregnancy losses all add up to a prenatal diagnosis of DS. I hope my feelings will drastically change and I will be over the sad part by the time our sweet baby arrives. Anyways I just wanted you too know that your posts and sharing your life with Indy is doing good and bringing hope to others. I hope you do not take offense to my sadness. I think it’s just part of the journey. Mostly brought on by the fear of the unknown and nasty Internet trolls.
Okay- I am so glad you commented. I am going to email you!
Hi Jen, I have a 6 week old baby boy with DS. Mine was a post natal diagnosis and it was through IVF..so I am yet to accept the diagnosis..still grievinf I guess…how are you now? Have you accepted the fact? No offence..I am asking for myself..such stories are what is giving me motivation and hope.
Love this post Terah!!! Thanks!
Thank you so much for your blog. I especially appreciate you sharing about eating plant based whole foods and their positive effect on Indys cognitive development. I have an 8 month old daughter with DS and your article inspires me to know there is something significant I can do to help her cognitive development. Any website or book recommendations? I would love to learn more. Youre the first person who has spoken about this. Thank you
Hi! Thank you for your kind comment. I have learned about nutrition from many sources over the past 10 years. Last year I attended a medical conference about DS and treatment options, called Down syndrome innovations or Down Syndrome OPTIONS. It was great. There is a blog called “Down syndrome: A day to day guide” that I really like and you might find helpful. Lately I really love the information about nutrition medicalmedium.com. It is amazing information! Sending love to you and your daughter, I love knowing that you want to help her reach her full potential. Ask questions any time! XO
Thank you for your response and the information. I will check out those websites and look into future conferences.
I really can’t remember how I found your blog but I can tell you I am so grateful I did. This post is the first one I opened because I live as holistically and eat as healthy as I can.
As I scrolled to the bottom of the page I was shocked to see a comment from another “Jen” echoing my exact feelings right now. I am 18 weeks and our little boy has been diagnosed with DS. The range of emotions is immense and I just hope and pray we can be the parents this baby needs.
Thank you so much for your blog. It is helping me see there is light at the end of the tunnel.
Oh my goodness hi!! Congratulations! I am so happy you found us ❤️ I know the immensity of feelings that are present in those first few months, hang in there. Once that baby is placed in your arms everything will change. And you being very health conscious and taking a more natural approach with your little guy will make all the difference! He is lucky to have you 😊. Please please reach out at any time- I am here if you want someone to talk to who understands & someone who can calm your fears a bit. I honestly wouldnt change our little girl for the world. “The good life isn’t over” ❤️
Hi from Down Under! My wife and I are the parents of 4: 3 beautiful girls and our youngest, a precious 2.5 year old boy with DS. I found your blog whilst searching about nutrition for him. My wife and I have been keen to optimise his health through diet and have been encouraged by this blog post to continue our efforts to help our son be as healthy as possible.
We send our love, best wishes and prayers to you all as Indie has her treatment for MDS.
This makes me so happy! Thank you for your comment- I’m so glad you found our blog. I love hearing from like minded parents ❤️. Your son will do amazing because of you! Thank you for your thoughts and prayers on Indy’s behalf 😊. Sending love to your family!
My little guy is four now and he’s been whole food plant based for three years since he stopped formula I’m his grandma and his sole caregiver. We both eat this way. I’ve searched far and wide for any other people with DS who eat this way and I’m all my groups and organizations there is none I can find. So I searched this morning online and found your blog in sooooo happy you can’t understand. Why is this not more widely discussed for families with DS children it’s bizarre. I want his best self and best future and I started him this way for optimal health for his future and disease prevention not knowing now that it can also help his cognition and development. I’m so happy to find you. I’m going through all the lessons currently on TNI therapy and so excited. Where else can I find you so I can follow? Thank you and best to you and Indy
|
<urn:uuid:a82dea62-b7cf-44f0-a1a5-37d862902a70>
|
CC-MAIN-2023-14
|
https://terahbelle.com/all-the-difference-how-whole-foods-can-treat-the-effects-of-down-syndrome/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00529.warc.gz
|
en
| 0.962188 | 2,514 | 2.6875 | 3 |
Florida Tangerines may be slightly smaller than Florida Oranges, but they shine just as brightly on the nutritional stage. A medium-sized Florida Tangerine has just 50 calories, and packs a huge nutritional punch. Just one of these nutritional super stars (and who can eat just one?) provides half of the daily recommended amount of vitamin C, a lengthy list of beneficial vitamins and minerals, and several times more disease-fighting antioxidants than an orange.
Once called “Christmas oranges” because they were a handy size to stuff into the toes of children’s Christmas stockings, tangerines didn’t arrive in North America until the mid-1800s. Believed to have originated in Southeast Asia, this sweet, tasty citrus fruit arrived in Europe in the early 19th century through the North African port of Tangier, Morocco; hence its name. Today, Florida is the top U.S. producer of tangerines.
Lunchbox favorites, Florida Tangerines have a thin, bright orange, easy-to-peel skin. When peeled, they break easily into juicy, bite-sized sections; perfect for snacking out of hand or tossing into salads, yogurt, cereal or smoothies. Low-cal and fat, cholesterol and sodium-free, sweet Florida Tangerines make a guilt-free addition to weight-loss menus.
In addition to being an excellent source of vitamin C, Florida Tangerines contain many essential vitamins and minerals important to good health, including vitamins A, B6 and E and thiamin, folate, riboflavin, niacin, potassium, calcium, magnesium, phosphorus, zinc and copper. Like all Florida citrus, Florida Tangerines are a good source of carbohydrates and fiber; but they also contain more disease-fighting antioxidant flavonoids than most other citrus fruits. A daily Florida Tangerine promotes healthy skin and strong bones, nourishes the immune system and may reduce the risk of cancer, arthritis, coronary heart disease and obesity.
Choose Florida Tangerines that feel heavy for their size, have a rich orange color, and are free of soft or brown spots. They can be stored in the refrigerator for up to two weeks.
|
<urn:uuid:5f0837af-4f9d-45cb-a46d-41a0d7896c49>
|
CC-MAIN-2017-26
|
https://grovenotes.floridaorange.com/2013/12/04/florida-tangerines-small-but-mighty-nutrition-super-stars/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320736.82/warc/CC-MAIN-20170626115614-20170626135614-00370.warc.gz
|
en
| 0.916188 | 455 | 2.546875 | 3 |
UK papal visit background: Palace of Holyroodhouse
CWN - September 13, 2010
As Pope Benedict began his apostolic journey to the United Kingdom, he was received by Queen Elizabeth II at the Palace of Holyroodhouse, her official residence in Scotland. The palace holds an important place in the history of the Catholic Church in Scotland.
Founded by King David I in 1128, Holyrood Abbey housed Augustinian canons for four centuries. In the fifteenth century, a guesthouse for the Scottish royal family was constructed near the abbey, and construction of the palace was completed in 1501.
Invasions by English armies damaged the abbey in 1544 and 1547, and a local Protestant mob destroyed its altars in 1559. King James II, a convert to Catholicism (and the United Kingdom’s last Catholic monarch), established a Jesuit college at Holyrood in 1686. Two years later, during the Glorious Revolution, a Protestant mob ravaged the new Catholic royal chapel there and destroyed the royal tombs.
An appeal from our founder, Dr. Jeffrey Mirus:
Dear reader: If you found the information on this page helpful in your pursuit of a better Catholic life, please support our work with a donation. Your donation will help us reach five million Truth-seeking readers worldwide this year. Thank you!
Our Fall Campaign
Progress toward our final 2013 goal ($17,486 to go, assuming receipt of matching funds):
All comments are moderated. To lighten our editing burden, only current donors are allowed to Sound Off. If you are a donor, log in to see the comment form; otherwise please support our work, and Sound Off!
|
<urn:uuid:9c90ebb7-6c2b-44b4-b869-b3ee041a9448>
|
CC-MAIN-2013-48
|
http://www.catholicculture.org/news/headlines/index.cfm?storyid=7551
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164022934/warc/CC-MAIN-20131204133342-00068-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.933968 | 351 | 3.203125 | 3 |
Forecast for 2100: Massive rainstorms in the tropics
In at least one respect, climate math just got simple. A 1 degree Celsius increase in temperature yields 10 percent heavier rainfall extremes in the tropics. I mean, it’s algebra. Where t is temperature and r is rainfall extreme:
t + 1 = r x 1.1
There you go. Oh, we should probably note, this is bad news for the tropics. From MIT’s description of its study that produced this formula:
Extreme precipitation in the tropics comes in many forms: thunderstorm complexes, flood-inducing monsoons and wide-sweeping cyclones like the recent Hurricane Isaac.
Global warming is expected to intensify extreme precipitation, but the rate at which it does so in the tropics has remained unclear. Now an MIT study has given an estimate based on model simulations and observations: With every 1 degree Celsius rise in temperature, the study finds, tropical regions will see 10 percent heavier rainfall extremes, with possible impacts for flooding in populous regions. …
[MIT assistant professor of atmospheric science Paul] O’Gorman found that, compared to other regions of the world, extreme rainfall in the tropics responds differently to climate change. “It seems rainfall extremes in tropical regions are more sensitive to global warming,” O’Gorman says. “We have yet to understand the mechanism for this higher sensitivity.”
The map below shows the vulnerability of various regions of the world to tropical cyclones. It takes into account various factors, including population.
Areas in the tropics — particularly south and southeast Asia — are already areas at high risk from existing climate extremes. Crank the strength of a storm up by an additional 10 percent? Much worse.
And that 10 percent is only assuming a 1 degree temperature increase. Some estimates suggest that the actual increase could be as much as 6 degrees C — meaning an increase in rainfall extremes in the tropics of 77 percent (since it’s cumulative).
Math isn’t always hard. Nor is it always reassuring.
When it rains, it pours, MIT News.
Donate now to support our work.
|
<urn:uuid:6ec17b6f-97db-4bca-aa7c-0437cc0d28e7>
|
CC-MAIN-2014-41
|
http://grist.org/news/forecast-for-2100-massive-rainstorms-in-the-tropics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663637.20/warc/CC-MAIN-20140930004103-00351-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.921059 | 452 | 3 | 3 |
|시간 제한||메모리 제한||제출||정답||맞은 사람||정답 비율|
|2 초||512 MB||7||6||6||85.714%|
Now Marty is in the past, and he wants to get back home to his 1985. He has already made his parents fall in love with each other, and has found plutonium. What is left to do is to activate the time machine and start the time travel. However, there is a problem for Marty. To activate the time machine one needs to enter the secret code. Only Doc know the secret code. All that Marty knows is that it consists of several different characters. Also he knows the length of the code. While Marty is waiting for Doc, he is trying to guess the code and enters different character combinations.
Now Doc has returned and entered the code. Marty would like to know how close he was to entering the correct code. For each Marty's attempt to enter the code, find the number of correct characters in the code that are at their correct positions, and the number of correct characters that are however at incorrect positions.
The first line contains s — the correct secret code. The code consists of uppercase letters of the English alphabet and digits. All characters in the code are different.
The second line contains a positive integer n (1 ≤ n ≤ 105) — the number of Marty's attempts.
Each of the following n lines contain information about Marty's attempts. Each of these lines contains the code of the same length as s that contains uppercase letters of the English alphabet and digits. All characters within one code are different.
For each Marty's attempt print two integers: a and b — the number of correct characters at correct positions, and the number of correct characters, but at incorrect positions.
BACKTO1985 3 BACKTO1958 BACKON1985 TOYEAR1985
8 2 8 1 4 3
|
<urn:uuid:f1450ea3-5e19-4dba-80e4-e9f3c8239ed8>
|
CC-MAIN-2017-47
|
https://www.acmicpc.net/problem/13046
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805265.10/warc/CC-MAIN-20171119023719-20171119043719-00273.warc.gz
|
en
| 0.945986 | 439 | 3.421875 | 3 |
The risk of dying from cancer is greater in the north of England than it is in the south, a new report suggests.
According to the National Cancer Intelligence Network (NCIN), people living in the north have a 20 per cent higher chance of dying from cancer, probably as a result of higher rates of smoking and deprivation.
There were 68 deaths per 100,000 men from lung cancer in the north in 2005, compared with 36 per 100,000 in Surrey, West Sussex and Hampshire.
Professor David Forman, a researcher at the University of Leeds, commented: 'More people in the north smoke, and this explains why lung cancer rates are so much higher.'
The expert, who is an information and analysis lead for the NCIN, added: 'There are also higher levels of deprivation in the north, which could contribute to cancer risk through other means - we know that deprivation is linked to later diagnosis, which can affect mortality.'
Overall cancer deaths were found to be lowest in the south and the Midlands.
© Adfero Ltd
|
<urn:uuid:d6209e07-718f-4441-a216-9501329ae922>
|
CC-MAIN-2017-39
|
http://www.netdoctor.co.uk/healthy-living/news/a16803/cancer-death-risk-higher-in-north-of-england/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689624.87/warc/CC-MAIN-20170923104407-20170923124407-00415.warc.gz
|
en
| 0.970203 | 213 | 2.546875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.