text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
- Read through the manuscript twice. In the first reading, make marks in pencil to note what works, what causes you to stumble. - During the second read of the manuscript, start written commentary—in margins and in paragraph form. - Focus on what is working. All writing has something worthwhile to be positive about. - Make comments in a tone that recognizes your own subjectivity. Consider yourself a reader responding to another person’s writing, not an editor. Stay “eye to eye” with the writer as you read. Put “maybe” or “in my opinion” as a preface to remarks you wish to make. - Be kind. If you cannot find something that the writer has done well, do not make suggestions for change. Merit must come first. What’s working must come first. Not easy praise, but truthful acknowledgment. - Be honest. It’s all right to say, “I have trouble with …” as long as it’s prefaced in your own subjectivity. - Refrain from crossing out phrases or sentences or rewriting another persons’ work. If you have an idea for a revision, it could be presented to the writer when we meet. Note: Try use brackets like this—[writer’s text here]—to suggest words or sections of text to delete.
<urn:uuid:c63f0ffd-eb81-4a3d-bb38-6b245af585b7>
CC-MAIN-2020-34
https://writersquarry.org/preparing-for-a-manuscript-workshop/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735823.29/warc/CC-MAIN-20200803170210-20200803200210-00351.warc.gz
en
0.937532
288
2.71875
3
Intensive driving courses can help you prevent getting into automobile accidents, whether they are your fault or someone else’s. Every time you drive you should be mindful of the principle of safe driving. First, when you stop at traffic signs, such as a stop sign, and other road signs, check the roadway to make sure it is clear and then recheck it. Another driver may not be paying attention and enter the intersection without looking. The other driver may not even notice that you are there and that it is your turn. Be sure that they have stopped and that your way is clear. That principle of rechecking an intersection is vital to your safety. Many accidents occur at intersections due to driver carelessness. Parking lots are busy places. Be sure to check to the left and right when backing out of a parking space, but also check to make sure that the path directly behind you is clear as well. Another driver may choose the same time to back out of his parking spot. There may also be pedestrians who are attempting to cross behind your vehicle. Take the time to look out for their safety and avoid accidentally backing into them. This will benefit both you and others. Another tip for intersection safety is to make sure the roadway is clear after your light turns green. A careless driver may attempt to go through on a yellow light, and someone may also follow that driver. Careless drivers do not usually observe the principle of roadway safety. They may not slow down at a yellow light, but instead speed up hoping to make it through. In such cases the light may change at the time they come into the intersection. Do not be overzealous to get where you are going and make sure the roadway is clear. If the driver going through the yellow light is speeding up to make it through his vehicle may be going quite fast. An accident between your vehicle and his would not end well. As a general rule you should always check the roadway in both directions before proceeding across an intersection. If you are going to turn right recheck the traffic flow to the right after checking it to the left. If you do not recheck there may be a car or person there that you don’t see before it is too late. Many accidents occur when drivers fail to recheck and are not aware of what is in their path. If you fail to make sure that your path is clear, the ensuing accident would be your fault. It would be a terrible thing to be the cause of the injury or death of another human being. Again, if you are too impatient you may crash into a low trailer being pulled by a vehicle. This can be hazardous if you do not take the time to properly check. This same principle of caution is relevant when changing lanes during busy traffic, or at any time for that matter. There are blind spots which are not shown in your rearview mirrors so it is important to take the time to look behind and to the side of your vehicle. You may not believe that an entire car could remain hidden in your blind spot, but it is possible. You may not imagine that an accident could happen to you, but it can happen to any of us, any time. Tractor-trailer trucks are a hazard because they are such big vehicles but have mirrors that are not much bigger than those of an average car. It is possible that truck drivers do not see you while you are driving near them in traffic. It is an established fact that they are not able to see you. Be sure that you are able to see the driver because that is the only way to be sure he can see you. Take the time to remember and observe these principles of safe driving because your safety is far more important than arriving to a destination on time. If you observe these principles of safe driving, you will be a safe driver. Driving defensively is as vital as driving proactively. Other people may not be safe drivers, but if you observe these principles you will be safe on the road.
<urn:uuid:a1c8157a-ad8e-41ef-9dfe-853e16980304>
CC-MAIN-2023-23
http://damagedcarsinfo.com/observe-the-principle-of-road-safety/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00797.warc.gz
en
0.971684
832
2.96875
3
The ability to manage information is an important competence. It is important that a student has the skill to work with information when acquiring new knowledge. It is especially important in respect of writing a paper that you can locate and manage different information. On these pages you can read about ... - Help with information searches - Academic integrity - Source criticism - Source criticism of internet media - Information searches especially for students writing their theses The university library has produced a useful handout about how to search for information (PDF format - only available in Danish). Is your academic information management correct? Take the UB test and get the answer (Only available in Danish). The test shows how good you are at navigating around the information jungle and it provides you with good advice about how you can improve.
<urn:uuid:f5e8d502-05d8-49f5-83ee-eddae23dcbd3>
CC-MAIN-2017-34
http://www.sdu.dk/en/information_til/studerende_ved_sdu/vejledning/studieteknik/informationssoegning
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104565.76/warc/CC-MAIN-20170818043915-20170818063915-00509.warc.gz
en
0.923003
163
2.65625
3
What is the Fastest Way to Cure Stomatitis? Among the more bothersome side effects of chemotherapy are the twin conditions stomatitis and mucositis, terms that can sometimes be used interchangeably. Stomatitis is the more general term; it technically refers to any condition involving irritation of the mouth, though it is most often linked to either canker sores or cold sores. Mucositis, on the other hand, is inflammation of the body’s mucous membranes, which line the digestive system (including the mouth). While mucositis can sometimes affect the intestines, it is a term typically used to describe a collection of oral symptoms that could also fall under the umbrella of “stomatitis.” Of course, regardless of what the problem is called, the priority of those who experience it is figuring out how to treat their symptoms and cure their condition. So, what is the fastest and most effective way to cure stomatitis? To find out, keep reading as the people at Chemo Mouthpiece™ explain. Common Causes of Stomatitis and Mucositis Though they may sound like a severe issue, mouth sores are surprisingly common in one form or another. Many Americans get canker sores – the small, somewhat painful lesions that can show up on the soft tissues of the mouth – and their cause is still unknown. Cold sores, which are caused by a herpes simplex virus, are also common, and they cannot be cured (though they can often be treated). For most people, neither issue is particularly alarming, and the symptoms tend to disappear on their own within a week or two. However, the symptoms of stomatitis are a much greater threat to cancer patients than to your average healthy individual. That’s because stomatitis frequently plagues those undergoing chemotherapy and certain forms of radiation treatments in the form of oral mucositis, one of the more serious side effects of these procedures. Not only is this condition painful, but it can lead to a host of complications that can threaten a patient’s life and cause serious delays in treatment. The cost of oral mucositis caused by chemo can be in the tens of thousands of dollars, making it a threat to patients’ wallets as much as it is to their physical well-being. The reason for this is that chemotherapy drugs affect more than just cancerous tissues; they circulate throughout the body, attacking healthy tissues that display some of the same traits as cancer. This collateral damage is what leads to the many side effects that accompany chemo, from the loss of hair to the appearance of painful sores in the mouth. Treating Stomatitis and Oral Mucositis If your stomatitis symptoms are minor – i.e., if you have cold sores or canker sores – then you probably won’t have to do much to get rid of the problem. Most of these symptoms will dissipate after less than two weeks; if they do not, contact your doctor right away. In any case, there isn’t much that can be done to get rid of stomatitis. The best most patients can do is to mitigate the symptoms until they clear up on their own. If you have stomatitis and want to relieve the discomfort associated with this condition, you can find some self-care tips for dealing with your symptoms below. - Practice good oral hygiene – It may sound overly simplistic, but oral hygiene is often a factor in the development of stomatitis and mucositis. Brushing your teeth two to three times per day with a soft-bristled brush can improve symptoms, as can using a mouthwash. If you have extensive mucositis, try rinsing with saltwater or a baking soda mixture after each meal as part of a good oral care routine for chemo. - Treat the pain – There are a number of over-the-counter and prescription medications that can help with the pain of stomatitis. Common drugs like acetaminophen and ibuprofen can provide relief in minor cases. For cancer patients with more severe symptoms, a topical anesthetic like lidocaine may bring relief, either by itself or as part of the “magic mouthwash” that so many chemo patients use. - Avoid irritating food and drinks – Salty, spicy, and acidic foods and beverages can all exacerbate the symptoms of stomatitis, as can those that are especially hot. Try avoiding anything that causes excessive pain or irritates your mouth. - Talk to your doctor – If your symptoms last for more than two weeks, they may require medical intervention; talk to your doctor if this is the case. If the cause of your symptoms is chemotherapy or radiation, your oncologist may be able to alter your treatment to alleviate your symptoms or recommend ways to help limit their severity. Dealing with the effects of stomatitis can be frustrating, especially given the fact that there may be little you can do except wait for your condition to improve. In the meantime, try some of the suggestions listed above and see what works for you. Fight Stomatitis Caused by Cancer Treatments with the Chemo Mouthpiece™ There may not be a way to entirely prevent the symptoms of stomatitis in chemo patients, but one method of treatment has shown great promise at helping limit the severity of oral mucositis symptoms. Cryotherapy – the use of freezing temperatures to affect the body – can cause the blood vessels in the mouth to shrink, which makes it harder for toxic chemo drugs to reach the sensitive tissues there. If you or someone you know is going through chemo and would benefit from less severe stomatitis or oral mucositis, the Chemo Mouthpiece™ may be able to help. Learn more about this simple, easy-to-use oral cryotherapy device today by visiting us online or calling (866) 461-7518 right away.
<urn:uuid:995ac597-88a5-4066-96b5-50bd6455f806>
CC-MAIN-2020-16
https://www.chemomouthpiece.com/fastest-way-to-cure-stomatitis/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506477.26/warc/CC-MAIN-20200401223807-20200402013807-00439.warc.gz
en
0.947234
1,246
2.515625
3
Shimon Peres is a former prime minister of Israel. He shared the Nobel Peace Prize in 1994 with Yasser Arafat and Yitzhak Rabin. Jerusalem—The Palestinians see in Yasser Arafat the father of their nation. Like a father, he has done much for his children, but he was also often over-protective of them. Arafat is a difficult figure with whom to come to terms. He has done more than any other leader to forge a unique and separate Palestinian identity. He was the voice and symbol of the Palestinian cause. His tireless efforts brought the Palestinian cause to the forefront of the international agenda and kept it there for four decades. Unfortunately, these achievements came all too often by way of the sword. He fought bitterly against Israel and Israelis. He perpetrated numerous heinous acts that left a sad trail of broken families and tortured lives. Despite his commitments for change, he never truly abandoned terrorism as a way of keeping the Palestinian cause alive. Arafat enjoyed the love and respect of his people. This love was dear to him. He lived a modest life and wanted little for himself. He lived for his people. From his position of leadership he opened the door for a historic resolution with Israel of a division of the land between a state for the Jewish people and a state for the Palestinians. He showed courage in breaking with the past. He accepted a painful compromise with Israel based on the pre-1967 borders, finally leaving behind the map offered by the United Nations in 1947 in its Resolution 181, which the Palestinians at the time rejected. He accepted the changed realities. But he did not go far enough. In the choice between the love of his people and the betterment of their lives, he unfortunately chose their love. He was not willing to risk losing his popularity and standing in the name of tough decisions he estimated as too controversial. He once bitterly said to me, after we signed the Oslo accords, "Just see what you did to me: From a popular figure in the eyes of my people, you have turned me into a controversial personality in the eyes of the Palestinians and the whole of the Arab world." Ultimately, popularity triumphed over controversy. His declared policies were courageous, but he did not carry them out. He did not turn his back on terrorism and hate. He failed the hopes of many people and lost his credibility with those who could have done most to help his cause. Arafat kept alive for the Palestinian people dreams and hopes that had no place in this world. He did not open the way for the painful but necessary process that every person and nation must go through, of leaving behind dreams of grandeur that bring nothing but misery, and learning to live, love and prosper in this world. Arafat had the choice between the path of negotiations and the path of terror and violence. He would have done much more for the Palestinians and their cause had he truly abandoned terror in favor of negotiations. Arafat was a talented man. He was sharp and focused. Few things escaped his attention. Arafat was intrigued by the ways of the West, but all too often judged them irrelevant to his own experience. He thrived in anarchic situations. He lorded over an archaic and highly centralized system, keeping extremely close reins over the armed groups and the financial flows. In response to demand for transparent financial management from the donor countries, he retorted that he was "no belly dancer." He had no intention in engaging in what he judged indecent exposure. He was bemused by Israel's chaotic democracy, telling me once, "My God, democracy, who invented it? It's so exhausting." He had an excellent memory for names. He chose to forget many facts. The passing of a father is always a cause for deep grief. But it is also an opportunity to emerge as a mature adult. The world is watching now the orphaned Palestinian people. The world hopes to see them take control of their own fate, bid farewell to their dreams of youth and exhibit the courage to live in this world as it is, rather than as they wish it to be. The Palestinians must recognize that Israel is here to stay. The Jewish people are deeply attached to their historical land, but we also desire to live together in peace. We must all share this small tract of land. The Jewish people are a moral people, and our tradition and values mandate that we learn to live together in peace. We grow up as people when we learn to recognize and live with the other—no matter how different he is from us and no matter that his dreams are different from our own. We grow up when we learn to share. And we grow up when we substitute our anger with the world for the productive energy of making it a better place for all to live. My prayer for all of us—Palestinians and Israelis, Jews and Arabs—as we look today to our future: that we will learn to want that which matters most in life. No more, no less. A life has ended. It is time for many lives to begin.
<urn:uuid:416b0daa-72fc-4e95-a4eb-cc01676f6771>
CC-MAIN-2017-30
http://digitalnpq.org/archive/2005_winter/19_peres.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425737.60/warc/CC-MAIN-20170726002333-20170726022333-00537.warc.gz
en
0.98283
1,043
2.90625
3
Memory is the process the brain uses to comprehend, store, and retrieve a wide variety of information ranging from autobiographical facts to complex procedures. It is typically broken down into three subcomponents: sensory memory, short-term memory, and long-term memory. The Different Types of Memory The process of remembering something happens in stages, the first of which involves sensory memory. Memories of sensory perceptions are stored in the brain for just an instant (less than one second). These can be iconic (visual), echoic (auditory), or affect any of the other senses. A memory is then transferred to short-term memory, which is also referred to as working memory. Short-term memory is limited and brief, with a typical capacity of about 7 items. It is possible for some people to increase the capacity of their short-term memory with practice. If items in short-term memory are not rehearsed or otherwise actively maintained, they will disappear within a few seconds. Some memories progress to long-term memory, where they can be stored for years or even permanently. The name long-term memory can be somewhat deceiving, because it does not necessarily mean that something occurred long ago. Instead, this type of memory is distinct from short-term memory in that it lasts more than a few seconds. Memories of events that occurred very far in the past are referred to as remote memories. How Are Memories Encoded and Stored? The encoding of a memory is a complicated process that involves different areas of the brain. The process begins with the perception of a stimulus. Though people are constantly perceiving things, only those things that are given selective attention continue to become memories. Emotion, which tends to increase attention, is controlled in the brain by the amygdala. From there, perceived sensations are processed by the hippocampus, a part of the brain that serves as a type of memory center, comparing new memories with existing ones and then linking them together—memories associated with previously acquired knowledge are more easily stored. The final step of storage involves some memories being transferred to long-term storage. Reliability of Memory Memory does not function as a perfect photograph or recording of a specific event or piece of information, and memories are not always reliable. Because memory is known to be highly suggestible, several factors may affect the accuracy and reliability of specific memories. If a parent repeatedly tells a child about their first birthday, for example, the child may begin to remember it exactly as the parent does. People also frequently conflate two memories or elements of two memories, so they might, for example, believe that an event from a 16th birthday party actually occurred during an 18th birthday party. In the late 20th century, many therapists claimed to be able to help people recall repressed memories of abuse and trauma using hypnosis. Many of these memories subsequently proved to be false, even though some of those who had “uncovered” memories fervently believed in them. The ability of people to access repressed, unconscious memories is still extensively debated, though the practice of trying to access repressed memories has fallen out of favor with many mental health professionals. Physical and Mental Concerns Related to Memory While everybody forgets things occasionally, memory can be more substantially impaired by a number of issues. It is typical to notice a decline in memory with aging. Normal age-related loss does not typically impair one’s functioning but may involve small slips in memory such as forgetting somebody’s name or where an item was placed. Dementia, a broad term describing significant memory loss in the presence of other symptoms, may result from a number of conditions, such as Alzheimer’s disease, vascular dementia, or Parkinson’s disease, among others. The specific memory issues associated with dementia typically vary based on type and severity. Amnesia, a loss of memory or the inability to create new memories, can be caused by a brain tumor, stroke, traumatic head injury, or oxygen deprivation. It can also be caused by a traumatic event, such as combat, abuse, or being the victim of a crime. In such cases, it is referred to as dissociative amnesia. Anterograde amnesia is the inability to make new memories. Retrograde amnesia involves the loss of memories that occurred before the event that caused the amnesia, but there is typically no impairment in the ability to make new memories. Other causes of memory loss can include medications, depression, alcohol dependence, and hypothyroidism. In these cases, memory loss is typically reversible once the underlying issue is treated. The Impact of Memory on Mental Health While mental health issues can negatively impact memory—such as when an individual living with depression has difficulty remembering things—it is also true that memories (especially traumatic ones) can negatively impact mental health. Posttraumatic stress (PTSD), a mental health condition that results from the experience of trauma, often involves intrusive memories of the traumatic event. Such memories may occur following a trigger (experience of something reminiscent of the trauma) or can come on suddenly and without warning. They frequently cause strong emotional reactions, including anxiety and panic, and it can be difficult for some individuals with PTSD, when they are overwhelmed with intrusive memories, to discern what is real in the present from what happened in the past The treatment of memory problems depends on the underlying cause of the memory issue. For individuals who experience memory impairment as a result of depression, anxiety, or another mental health issue, treating the primary issue can often result in a complete disappearance of all memory problems. People whose memory issues are due to aging, a medical condition, or dementia may benefit from therapy that teaches them compensatory strategies for dealing with memory loss. Therapy can also provide support to such individuals and help them to process their feelings about their memory loss. For individuals who have PTSD or who are otherwise troubled by the content of their memories, specific types of trauma-oriented treatment exist. Cognitive processing therapy (CPT) and Eye Movement Desensitization and Reprocessing (EMDR) are two types of therapies that aim to help individuals experience less distress related to the memories and thoughts associated with a traumatic event. - American Psychological Association. APA concise dictionary of psychology. Washington, DC: American Psychological Association, 2009. Print. - Colman, A. M. (2006). Oxford dictionary of psychology. New York, NY: Oxford University Press. - Cherry, K. (2016, April 22). What is short-term memory? Retrieved from https://www.verywell.com/what-is-short-term-memory-2795348 - Ellis, H.C. (1987). Recent developments in human memory. In V.P. Makosky (Ed.), The G. Stanley Hall Lecture Series, Vol. 7. Washington, DC: American Psychological Association. - Mastin, L. (2010). Declarative (explicit) and procedural (implicit) memory. Retrieved from http://www.human-memory.net/types_declarative.html - Mastin, L. (2010). Memory encoding. Retrieved from http://www.human-memory.net/processes_encoding.html - Memory loss: When to seek help. (2014, June 5). Retrieved from http://www.mayoclinic.org/diseases-conditions/alzheimers-disease/in-depth/memory-loss/art-20046326 - Nordqvist, C. (2015, July 27). Amnesia: Causes, symptoms, and treatment. Retrieved from http://www.medicalnewstoday.com/articles/9673.php - Substance Abuse and Mental Health Services Administration. (2014). Trauma-informed care in behavioral health services. Retrieved from https://www.ncbi.nlm.nih.gov/books/NBK207191 Last Updated: 12-22-2016 Please fill out all required fields to submit your message. Invalid Email Address. Please confirm that you are human. Leave a Comment By commenting you acknowledge acceptance of GoodTherapy.org's Terms and Conditions of Use.
<urn:uuid:502c4f68-53c7-4511-91e1-939dab68b647>
CC-MAIN-2020-10
https://www.goodtherapy.org/blog/psychpedia/memory
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143646.38/warc/CC-MAIN-20200218085715-20200218115715-00299.warc.gz
en
0.934406
1,689
3.765625
4
We Served the People My Mothers Stories Original GN HC (W/A/CA) Emei Burrell In China, an entire generation's most formative years took place in remote rural areas when city kids were sent to the countryside to become rusticated youth and partake in Mao's mandated Great Leap Forward. In an inspiring tale, Emei Burrell shares her mother's true experience during the Countryside Movement of the early 1970s, which sought to increase agricultural outreach and spur social and ideological change amongst youth. Burell's stunning illustrations honor her mother's courage, strength, and determination during a decade of tremendous political upheaval, where millions of lives were lost, families were torn apart, and an entire generation grew up in an era of self-discovery.
<urn:uuid:b7cac55e-81e1-456f-9c50-085d03aa57cc>
CC-MAIN-2023-23
https://www.instocktrades.com/products/DEC191230/DEC191230
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00569.warc.gz
en
0.961757
158
2.5625
3
Assyria was one of the most influential kingdoms of the Ancient Near East. In this Very Short Introduction, Karen Radner sketches the history of Assyria from city state to empire, from the early 2nd millennium BC to the end of the 7th century BC. Since the archaeological rediscovery of Assyria in the mid-19th century, its cities have been excavated extensively in Iraq, Syria, Turkey and Israel, with further sites in Iran, Lebanon, and Jordan providing important information. The Assyrian Empire was one of the most geographically vast, socially diverse, multicultural, and multi-ethnic states of the early first millennium BC.Using archaeological records, Radner provides insights into the lives of the inhabitants of the kingdom, highlighting the diversity of human experiences in the Assyrian Empire. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.
<urn:uuid:8e2c3620-3e23-45c7-9f2b-1856fb31acb8>
CC-MAIN-2020-10
https://books.mondadoristore.it/Ancient-Assyria-Very-Short-Karen-Radner/eae978019102494/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144722.77/warc/CC-MAIN-20200220100914-20200220130914-00421.warc.gz
en
0.91685
226
3.328125
3
A Bosch painting is a marvel to look at, regardless of how familiar someone is with their creator. But once you realize when and perhaps why they were made, they become truly uncanny. Luckily for those new with the language, the town of s’-Hertogenbosch in the Netherlands is normally referred to as “Den Bosch” (pronounced “Den Boss”). The name means “The Duke’s Forest”, the Duke being Henry I of Bravant, and the city gets most of its renown from once being the home of extraordinar(il)y (insane) painter Hieronymus Bosch. The Garden of Earthly Delights, his most famous triptic, was made sometime between 1490 and 1510. The extensive range is such because very little is known about the man himself. He left no letters or diaries, we ignore where or how he trained, what his personality was like or the reasons behind his fantastic, apparently pessimistic creations. To our misfortune, only 25 paintings and 8 drawings can be confidently attributed to him. One thing we do know is that he probably witnessed, as a teenager, the 1463 fire which engulfed 4,000 houses -and most likely their inhabitants too- in fire. Whether this event forged the man’s unique perception, we cannot know, but something lurks for me in those paintings, something dark and catastrophic. Was Hieronymus dealing with his early memories as he went through life creating images of hell and heaven, bloated fruits and anthropomorphic animals? Many have attempted, without success, to link him to fringe sects and the occult. Nothing came out of it. All we know is that five hundred years ago and, for reasons we will probably never figure out, the man managed to produce a highly individualistic expression of human desires and fears that I can only attempt to compare to Dali, Gaudi and other contemporaries. The question remains, who was he, and why did he do it?
<urn:uuid:9605d9bf-98b4-47d0-8ec5-1fed847a91d3>
CC-MAIN-2023-40
https://visualsquirrels.net/art-illustration/trauma-or-paradise-the-incredible-genius-of-hiernonymus-bosch/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00172.warc.gz
en
0.978124
414
2.59375
3
Arctic sea ice extent plunged precipitously from 2001 to 2007, then barely budged between 2007 and 2013. Even in a warming world, researchers should expect such unusual periods of no change--and rapid change--at the world's northern reaches, according to a new paper. "Human-caused global warming is melting Arctic sea ice over the long term, but the Arctic is a variable place, said Jennifer Kay, a fellow of the Cooperative Institute for Research in Environmental Sciences at the University of Colorado Boulder and co-author of the new analysis out today in Nature Climate Change. Natural ups and downs of temperature, wind and other factors mean that even as sea ice slowly melts, random weather can mask or enhance the long-term trend. For example, even in a warming world, there's still a one-in-three chance that any seven-year period would see no sea ice loss, such as in 2007-2013, the new analysis shows. And the chaotic nature of weather can also occasionally produce sea ice loss as rapid as that seen in 2001-2007, even though the long-term trend is slower. Neither time period should be used to forecast the long-term future of the region, Kay and her colleagues concluded. Some commentators tracking sea ice trends have used the recent "pause" in sea ice loss to claim that human-caused climate warming is not occurring; others previously used the rapid decline from 2001-2007 to speculate about ice-free Arctic summers by 2015. Neither claim is warranted, the authors report. "To understand how climate change is affecting the Arctic, you cannot cherry pick short stretches of time," Kay said. "Seven years is too short." The research team, led by Neil Swart of Environment Canada, analyzed both long-term records of Arctic sea ice observations and an extensive dataset of results from global climate models. From the model runs, they could calculate the chances that certain types of scenarios could play out in a slowly warming Arctic: For example, just how likely is it that sea ice would not decline during a seven-year stretch? The team focused on September measurements of sea ice, which is when the extent reaches a yearly minimum. By early October, Arctic sea ice generally begins growing again, a seasonal response to colder temperatures and shorter days. The researchers determined that a seven-year period is too short to accurately capture long-term sea ice trends in the region. Even given long-term melting, there's a 34-percent chance of randomly getting an unusual period of no change or even growth in sea ice, and a 5-percent chance of a period of very rapid loss, similar to the decline in 2001-2007. The team also increased the time period of analysis, to see if longer spans of time would be long enough. In about 5 percent of model simulations, there were even 20-year time periods with no loss of sea ice, despite strong human-caused warming. "It is quite conceivable that the current period of near zero sea-ice trend could extend for a decade or more, solely due to weather-induced natural variability hiding the long-term human caused decline," said Ed Hawkins, a co-author and researcher at the National Centre for Atmospheric Science, University of Reading. "Human caused climate warming has driven a decline in Arctic September sea-ice extent over the past few decades," the new paper reports, and "this decline will continue into the future." But understanding how and why natural variability affects sea ice trends should help scientists better predict how sea ice will evolve in upcoming years and decades, with implications for natural ecosystems, shipping routes, energy development and more. CIRES is a partnership of NOAA and CU-Boulder. Co-authors of the Nature Climate Change paper, "Influence of internal variability on Arctic sea-ice trends," include Neil Swart and John Fyfe (Environment Canada), Ed Hawkins (University of Reading National Centre for Atmospheric Science), Jennifer Kay (CIRES, University of Colorado Boulder Department of Atmospheric and Oceanic Sciences) and Alexandra Jahn (National Center for Atmospheric Research, now at University of Colorado Boulder, Department of Atmospheric and Oceanic Sciences and Institute for Arctic and Alpine Research). Swart, Fyfe, Hawkins, Kay & Jahn, 2015, 'Influence of internal variability on Arctic sea-ice trends', Nature Climate Change, 5, 86, doi:10.1038/nclimate2483
<urn:uuid:25fdd3c9-d6d3-4875-9294-a20b36b1f774>
CC-MAIN-2020-24
https://www.eurekalert.org/pub_releases/2015-01/uoca-ean012815.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348519531.94/warc/CC-MAIN-20200606190934-20200606220934-00440.warc.gz
en
0.932186
908
3.3125
3
Test tube holders come in two main types: tongs and racks. Tong types are either wood or metal. They're designed to grasp and transfer test tubes that are too hot or dangerous to safely handle bare-handed. Wood versions resemble clothespins with a long handle. Metal versions resemble kitchen tongs, except they're spring-loaded to hold something securely. Rack type holders serve to store and organize test tubes on the work surface. They may hold a single row of tubes, or a grid of rows. Convenience and Safety in Performing Experiments Many science fair projects employ test tubes in various ways. Since a test tube won't stand on its own, a helper is often needed to carry out an experiment. Having a test tube holder allows a single person to perform many experiments. It's also safer for experiments on pressure like popping corks or foaming reactions, where the directions say something like "do not point the tube at your face or anyone else," because a test tube holder will keep tubes pointing straight up. You can even make a xylophone out of water-filled test tubes. Test Tube Holders as General-purpose Grabbers Since clamp type holders are spring-loaded to close around items, they're handy in setting up a science fair display booth. Wooden versions can serve as clips to hold things together, or to support hanging items like display boards. Combined with an easel, they can help to improvise a standing flip-page presentation. Metal versions can help you retrieve test items from an immersion bath, or hold them over a flame. They allow a safe distance between the hand and the item being held. Test Tube Holders Support Classroom Activities A single-row rack is perfect for holding classroom experiments and demonstrations with plants and cuttings in test tubes. They're good for long-term experiments with side-by-side comparisons like measuring water uptake or the effects of different rooting solution formulas. Another popular experiment is to set up two tubes with different food colorings, and split a white carnation flower stem so one side is in each solution. The rack supports the tubes while the flower absorbs the colors. Storage Racks Make Good Organizers A multiple-row rack is good for organizing narrow items like marker pens, pencils, and scissors in a classroom or laboratory. Since test tubes come in a range of sizes, so do the compartments in the racks. Each item has its own compartment, so there's no jumble to sort through. This makes them useful in the classroom for teaching the principles of sorting and organization. They are a stable and portable form of storage, so they can be easily secured when not in use. An ecological blogger, technical writer and trainer, Alex Silbajoris also leads a nonprofit watershed group. He is an avid gardener and cook. He holds a bachelor's degree in English and a master's degree in journalism, from The Ohio State University. Other studies include geology and biological sciences.
<urn:uuid:05aa5608-3994-4f42-9008-fdeb0f089936>
CC-MAIN-2023-40
https://ourpastimes.com/uses-of-a-test-tube-holder-12330556.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00040.warc.gz
en
0.932434
617
3.5
4
A simple reading about a town and questions to answer from text. Students can easily find the answers with some key words from the questions. I did this with my students and it was successful! Students were asked to read the text on their own and find the meaning of words they did not understand. They were then given the questions and were in pairs to answer and locate the answer quickly in a short form.
<urn:uuid:7e531114-8f1b-4444-8745-09c2cf2a557d>
CC-MAIN-2017-43
http://busyteacher.org/10724-reading.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00365.warc.gz
en
0.995526
81
2.921875
3
Wrinkles initially form on a person’s face because of facial expressions. However sun damage, smoking, medications, dehydration, genetics, and environmental factors also play a role with the development of wrinkles. You’ll typically find them on areas where sun exposure has been maximized. They are a natural part of the aging process although few people embrace their arrival. As people age, skin loses its elasticity and becomes thinner and drier. When that happens, wrinkles take hold. Many environmental factors can speed up the aging and wrinkling process of the skin. They are all avoidable too. Too much prolonged exposure to UV rays from being out in the sun or using tanning beds can increase the chance for developing wrinkles sooner. UV light tears down collagen and elastin in the skin. When they break down, this protective layer of skin becomes less flexible and weakens. Smoking reduces blood supply to the skin and accelerates the age process. If you want to look younger, quit smoking. Frequent alcohol consumption dehydrates the skin. As it dries out, more wrinkles will appear. While aging is a natural process, no one ever has to look their age. Prevent wrinkles from showing up too soon by protecting yourself when you go outdoors. Wear sunscreen and clothing that helps protect the skin. Quit smoking, reduce drinking, and get more sleep each night. Eat healthfully and get plenty of exercise too. By taking care of your body, you’ll drastically decrease your chances of getting wrinkles too soon. If you’ve noticed wrinkles on your skin, it’s still not too late to soothe your skin and get a younger, more refreshed appearance. To treat wrinkles, there are many creams and serums that can reverse the signs of aging. Find one here!
<urn:uuid:157594e8-c747-48ad-865a-899aa9585586>
CC-MAIN-2017-26
https://www.beautifiedyou.com/wrinkles
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00545.warc.gz
en
0.941042
371
2.875
3
Want someone to blame for your credit card bills? On this date, the banker Claude de Sachinus wrote to John Calvin, whom he described as a brother (frère) in the faith, and asked him for his opinion on levying interest. Contemporaries, he said, were of the view that levying interest, in so far as it was honest, fair (“une sorte d’usure honnête”), and in moderation (the right “proportion”), could also be advocated as Christian. But for him, indebted as he was to the Reformation, Holy Scripture alone was the criterion, even if it ran counter to his own business interests. Calvin for his part, in great intellectual honesty, wanted to do justice to the biblical text which in the Old Testament pronounces a prohibition on usury and sought to interpret it for his time. He did this in a long letter, now known as De Usuris Responsum, which in all probability was addressed to the banker (although not published until 1575). In his letter: - After a short introduction, he began his argument with “‘First, there is no scriptural passage that totally bans all usury”. - He then makes the claim, “For Christ’s statement, which is commonly esteemed to manifest this [the total ban on all usury], but which has to do with lending, has been falsely applied to usury”, reminding the reader of the simple but often neglected fact that just because Christians have (perhaps for centuries) related a saying of Scripture to discussion of a particular moral issue does not infallibly prove that such a text is being correctly interpreted or that it is right to appeal to it in their moral argument. - Calvin paid close attention to the plain sense of the text in its original languages and in the original context of that text. Calvin’s argument against a blanket prohibition on usury is therefore in part a careful study of key Hebrew terms showing that because the Hebrew word tok can generally mean “defraud”, ‘it can be translated otherwise than “usury” and that other terms refer to usury which “eats away at its victims”‘. - Calvin was quite frank about the strength of biblical opposition to usury, speaking in his letter of “the Holy Spirit’s anger against usurers” displayed in the prophets and psalms and even acknowledging that “the Holy Spirit … advises all holy men, who praise and fear God, to abstain from usury”. His commentary on Ps 15.5 admitted that David seems to condemn all kinds of usury in general, and without exception. Nevertheless, despite statements such as these his letter still maintained that “we need not conclude that all usury is forbidden”. - Calvin then turned to the rationale offered in Lev 25:35-36 to argue that “the end for which the law was framed was that men should not cruelly oppress the poor”. This then qualifies Ezekiel who “seems to condemn the taking of any interest whatever upon money lent; but he doubtless has an eye to the unjust and crafty art of gaining, by which the rich devoured the poor people”. In effect, Calvin was arguing that the purpose (or justification) behind a biblical moral rule carries greater weight than the rule itself. - Calvin argued that “we ought not to judge usury according to a few passages of scripture, but in accordance with the principle of equity”. In stating his limits on usury, he insisted that “everything should be examined in the light of Christ’s precept: Do unto others as you would have them do unto you. This precept is applicable every time” and argues that what is lawful in regard to usury is to be based on “a principle derived from the Word of God”. - The crucial paragraph in Calvin’s letter followed his discussion of Ezekiel which concluded that “the prophets only condemned usury as severely as they did because it was expressly prohibited for Jews to do”. It reads as follows: Today, a similar objection against usury is raised by some who argue that since the Jews were prohibited from practicing it, we too, on the basis of our fraternal union, ought not to practice it. To that I respond that a political union is different. The situation in which God brought the Jews together, combined with other circumstances, made commerce without usury apt among them. Our situation is quite different. For that reason, I am unwilling to condemn it, so long as it is practiced with equity and charity. - In his rejection of the tradition’s appeal to Lk 6.35 as referring to usury, Calvin highlighted Christ’s command “to lend to those from whom no hope of repayment is possible” and called on Christians “to help the poor” as “Christ’s words far more emphasize our remembering the poor than our remembering the rich”. He insisted that nobody should take interest from the poor and those lending must not neglect their duties or disdain their poor brothers. It is important to recognize what a radical change Calvin’s work represented. In the words of John T Noonan: Once upon a time, certainly from at least 1150 to 1550, seeking, receiving, or hoping for anything beyond one’s principal – in other words, looking for profit – on a loan constituted the mortal sin of usury. The doctrine was enunciated by popes, expressed by three ecumenical councils, proclaimed by bishops, and taught unanimously by theologians. The doctrine was not some obscure, hole-in-the-corner affection, but stood astride the European credit markets, at least as much as the parallel Islamic ban of usury governs Muslim countries today…The great central moral fact was that usury, understood as profit on a loan, was forbidden as contrary to the natural law, as contrary to the law of the church, and as contrary to the law of the gospel. In fact, Martin Luther regarded the biblical prohibition of usury as permanently binding. In his 1524 sermon on trade and usury, Luther lashed out at any attempt to charge interest. In his view, Christians “should willingly and gladly lend money without any charge.” The Elizabethan Protestant bishop John Jewel reflected the views of his age when he raged from his pulpit against the iniquities of usury. “It is theft, it is the murdering of our brethren, it is the curse of God and the curse of the people.” This uncompromising opposition to usury was embodied in a statute passed by the English Parliament in 1571, which had the unforeseen and unintended effect of legitimating usury at a fixed rate of 10 percent. It is generally acknowledged by those who have studied Calvin’s economic and political views that he was the first of the Reformers to give a theological defense of the practice of lending money at interest. Calvin’s views, which were seen by many as running counter to the clear meaning of the Bible, took some time to become accepted. By the middle of the seventeenth century – more than one hundred years after Calvin’s groundbreaking analysis – usury was fully regarded as acceptable. Protestant jurists such as Hugo Grotius and Samuel Pufendorf supplemented Calvin’s theological analysis with clarifications of economic concepts, especially in relation to price and value, that finally removed any remaining scruples about lending money at interest. The Catholic church did not sanction usury, however, until 1830, apparently in response to the widespread acceptance of the practice within predominantly Protestant western Europe. - Alister McGrath. Christianity’s Dangerous Idea: The Protestant Revolution-A History from the Sixteenth Century to the Twenty-First. (New York: Harper Collins Publishers, 2007).
<urn:uuid:1c116312-590f-439f-a6cb-31ed9633fea5>
CC-MAIN-2017-39
https://diogenesii.wordpress.com/category/economics/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00405.warc.gz
en
0.977424
1,659
2.765625
3
ANOREXIA is a serious and potentially-fatal mental health condition which affects an increasing number of British men as well as thousands of women. The mental illness can lead to fragile bones, infertility and heart problems if left untreated. These are the signs to look out for... What is anorexia nervosa? Anorexia nervosa, often known as just anorexia, is a very serious mental health condition which causes the person to restrict the amount they eat. The sufferer of the eating disorder aims to keep their body weight as low as possible by avoiding food, vomiting or exercising excessively. The condition usually affects girls and women, however, more recently it has started affecting more boys and usually it develops at around 16 or 17 years old. Despite being less common than some other conditions, anorexia is one of the leading causes of mental health-related deaths - as a result of malnutrition or suicide. What are the signs of anorexia nervosa? Usually a sufferer will go to great lengths to disguise the fact they are not eating or pretending they have eaten already. But if you suspect someone is battling the condition there are a few signs to look out for, according to the NHS. These include: - Missing meals, eating very little, or avoiding eating any fatty foods - Obsessively counting calories in food - Leaving the table immediately after eating so they can vomit - Taking appetite suppressants, laxatives, or diuretics (a type of medication that helps remove fluid from the body) - Repeatedly weighing themselves or checking their body in the mirror - Physical problems, such as feeling lightheaded or dizzy, hair loss, or dry skin What are the symptoms of anorexia nervosa? The main symptom of anorexia is purposely losing weight by skipping meals, lying about what they've eaten or exercise to excess, although there are a few others that indicate an issue. Someone suffering from anorexia will likely have low self-esteem or a negative body image and feelings. Sometimes they'll wear baggy clothes to hide their figure and will weigh themselves a lot or frequently measure themselves around the waist. Other symptoms are physical, such as: - Bloating or constipation - Feeling lightheaded or dizzy - Feeling very tired - Feeling cold - Discoloured hands and feet caused by poor circulation - Fry skin - Hair loss from the scalp - Abdominal pain - Problems sleeping - Fine downy hair (lanugo) growing on the body - Brittle nails What is the treatment for anorexia nervosa? Treatment for anorexia is usually a combination of psychological therapy and supervised weight gain but it's important for a person to start treatment as quick as possible. There are a variety of psychological treatments that can be used to treat anorexia and depending on the severity of the condition, treatment will last for at least 6 to 12 months or more. Cognitive analytic therapy (CAT) Cognitive analytic therapy (CAT) is based on the theory that mental health conditions such as anorexia are caused by unhealthy patterns of behaviour and thinking developed in the past. CAT involves a three-stage process: - Reformulation – looking at past events that may explain why the unhealthy patterns developed - Recognition – helping people see how these patterns are contributing towards the anorexia - Revision – identifying changes that can break these unhealthy patterns Interpersonal therapy (IPT), Focal psychodynamic therapy (FPT) and family interventions are all other techniques used to help a sufferer, as is gaining weight safely. Around 50 per cent of people with anorexia will continue to have some level of eating problems, even after treatment. For more information, or to seek help, please visit eating disorder charity Beat's website. What is To The Bone and why has the Netflix show proven so controversial? Netflix recently launched an original series called To The Bone. The drama follows Ellen, a 20-year-old character that is battling anorexia nervosa. Lily Collins plays the leading role alongside Keanu Reeves, who is one of the doctors working for a recovery group. To The Bone tackles a sensitive subject, so it's unsurprising that viewers have concerns about the content of the series. One Twitter user accused the Netflix creation of generalising the eating disorder. Another suggested that the show was glamorising the illness. They said: "I wish anorexia recovery was as romantic and funny as in Netflix's 'To The Bone'. But it's bulls***."
<urn:uuid:d34c2fe0-0623-4a63-aa00-697561c38e8d>
CC-MAIN-2017-34
https://www.thesun.co.uk/living/2013250/anorexia-nervosa-symptoms-treatment-men/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110774.86/warc/CC-MAIN-20170822123737-20170822143737-00217.warc.gz
en
0.948145
965
3.15625
3
A new study involving Oxford researchers has revealed how the anti-inflammatory cytokine IL-10 and lipid mediator prostaglandin E2 (PGE2) work together to prevent inflammatory tissue damage and maintain a healthy gut balance. Inflammatory bowel diseases (IBD), which include Crohn’s disease (CD) and ulcerative colitis (UC), are chronic painful inflammatory conditions of the gastrointestinal tract, which affect at least 5 million people worldwide. Generally, inflammation is controlled by particular immune cells together with molecules such as cytokines and lipid mediators. How these molecules work together, however, has been poorly understood. A new study reveals a novel regulation between cytokine IL-10 and lipid mediator PGE2 that functionally connects them to intestinal inflammation. Published in the Journal of Experimental Medicine, the study shows that IL-10 and PGE2 pathways are intrinsically linked and function as an integrated module to maintain intestinal homeostasis, the balance in our gut. Any disruption to the balance impacts on their ability to control macrophage function in the intestine which may have important consequences for both host defence against infection as well as maintenance of intestinal balance. The project was a collaboration between universities and institutes led by Fiona Powrie, Professor of Musculoskeletal Sciences and Director of the Kennedy Institute at the University of Oxford, Dr Subhankar Mukhopadhyay, Senior Lecturer in Innate Immunity at King’s College London, and Professor Gordon Dougan, Glaxo-SmithKline Professor of Microbial Pathogenesis at the University of Cambridge and Former Senior Group Leader at the Wellcome Sanger Institute. Dr Mukhopadhyay commented: “IL-10 is known to promote gut health by preventing immune cells called macrophages from becoming overstimulated by the large number of bacteria that inhabit the gut. Our study reveals that IL-10 fine-tunes the secretion of lipid mediator PGE2, preventing inflammatory tissue damage and ensuring that macrophages can kill harmful bacteria effectively.” Prof Powrie, the NIHR Oxford BRC Theme Lead for Gastroenterology and Mucosal Immunity, said: “Increased PGE2 signalling in the intestine has been reported in IBD patients and the new data suggest that PGE2 may contribute directly to the development and progression of disease. “Further examination of this pathway, including the role of distinct PGE2 receptors found on macrophages, may open up new therapeutic avenues.” The team studied an infantile onset IBD patient lacking a functional IL10RB gene. It was shown that a loss of IL-10 signaling induced a microbial hyper-responsiveness and over-production of PGE2 in macrophages that in turn limited their capacity to kill bacteria, fuelling chronic intestinal inflammation. When introducing functional copies of the IL10RB gene, PGE2 synthesis was inhibited and the killing of bacterial in macrophages was enhanced, showing that there is a regulatory interaction between IL-10 and PGE2. As well as being supported by the NIHR Oxford BRC, the study was funded by the Wellcome Trust, and Fondation Louis Jeantet.
<urn:uuid:79313288-b152-4c42-ae94-f0e3f7ab8f32>
CC-MAIN-2020-10
https://oxfordbrc.nihr.ac.uk/researchers-identify-link-in-the-treatment-of-inflammatory-bowel-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144027.33/warc/CC-MAIN-20200219030731-20200219060731-00503.warc.gz
en
0.935992
663
2.6875
3
HIGH SCHOOL II is a film about Central Park East Secondary School (CPESS), a successful alternative high school in New York's Spanish Harlem, 85-95% of whose graduates go on to four year colleges. The film illustrates the school's emphasis on the “Habits of Mind” program (weighing evidence; awareness of multiple points of view; seeing connections and relationships; speculating on possibilities; and assessing values.) Sequences illustrating the school's approach to learning include: classroom activities in the humanities and sciences; family conferences; discussions of race, class, and gender; faculty meetings; disciplinary problems; sex education; conflict resolution by students; and student council meetings. HIGH SCHOOL II portrays CPESS with its predominantly black and Hispanic student body as a font of nurturing and learning. Classes are small with loads of student/teacher interaction. –Lewis Beale, Daily News Wiseman’s method fits perfectly with the school’s approach to teaching. Again and again, you hear the staff of Central Park East ask the students to fill out their statements, to add detail, to provide more evidence. That’s exactly what Wiseman does devotedly and brilliantly. –Stuart Klawans, The Nation Mr. Wiseman is now a master of the epic documentary. (CPESS)… urges its students, a multiracial mix that includes political organizers and teen-age parents, to talk, listen and think for themselves. –Caryn James, The New York Times Educationalincludes public performance rights released 1994, 220 minutes A film study guide is available. Related FilmsHigh School In Jackson Heights EX LIBRIS - The New York Public Library
<urn:uuid:c38bb62f-ab3e-47aa-acd7-6b5d32e13452>
CC-MAIN-2017-47
http://www.zipporah.com/films/8
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805761.46/warc/CC-MAIN-20171119191646-20171119211646-00669.warc.gz
en
0.909041
355
2.546875
3
In today’s digital age, cryptocurrencies have become a hot topic of conversation. With the rise of Bitcoin and other digital currencies, it’s no surprise that many parents are starting to wonder how they can teach their children about cryptocurrency. If you’re interested in introducing your kids to the world of digital currencies, you’re in the right place. In this article, we’ll cover the basics of what cryptocurrencies are, why they’re important, and how you can teach your children about them. Cryptocurrency is a digital currency that uses encryption techniques to regulate the generation of units of currency and verify the transfer of funds. Cryptocurrencies operate independently of a central bank and can be exchanged for goods and services. Unlike traditional currency, cryptocurrencies are not backed by a government or other central authority, which makes them decentralized and less susceptible to manipulation. Cryptocurrency is a complex topic, but it’s important to teach your children about it for several reasons. Firstly, digital currencies are becoming more common, and your children will likely encounter them in their future careers. Secondly, cryptocurrencies offer unique investment opportunities, and your children may want to invest in them one day. Lastly, understanding cryptocurrency will help your children become more financially literate. What is Cryptocurrency? To teach your children about cryptocurrency, it’s important to start with the basics. Cryptocurrency is a digital currency that is designed to be secure and anonymous. It’s based on a technology called blockchain, which is a decentralized ledger that records all transactions. This ledger is distributed across a network of computers, which makes it extremely difficult to hack or manipulate. There are many different types of cryptocurrencies, but the most well-known is Bitcoin. Bitcoin was created in 2009 by an unknown person using the pseudonym Satoshi Nakamoto. Since then, thousands of other cryptocurrencies have been created. Why is Cryptocurrency Important? Cryptocurrency is important for several reasons. Firstly, it’s decentralized, which means that it’s not controlled by a central authority like a government or a bank. This makes it less susceptible to manipulation and more secure than traditional currency. Secondly, cryptocurrencies offer unique investment opportunities. Many people have made a lot of money by investing in Bitcoin and other cryptocurrencies. Of course, there is also a lot of risk involved in investing in cryptocurrencies, so it’s important to educate your children about the risks as well as the potential rewards. Finally, understanding cryptocurrency is important for financial literacy. As the world becomes more digital, it’s important for your children to understand how digital currencies work and how they can be used. How to Teach Your Children About Cryptocurrency Now that you understand the basics of cryptocurrency and why it’s important, it’s time to teach your children about it. Here are a few tips to get you started: - Start with the Basics Before diving into the details of how cryptocurrency works, it’s important to start with the basics. Explain to your children what cryptocurrency is, how it’s different from traditional currency, and why it’s important. - Use Real-Life Examples One of the best ways to teach your children about cryptocurrency is to use real-life examples. For example, you could use Bitcoin to explain how cryptocurrencies work, or you could use a news article about a cryptocurrency scam to teach your children about the risks involved in investing in digital currencies. - Emphasize the Risks While there are many potential benefits to investing in cryptocurrencies, it’s important to emphasize the risks as well. Explain to your children that cryptocurrencies are highly volatile and that their value can fluctuate wildly. It’s also important to teach your children about the risks of scams and fraud in the cryptocurrency world. - Use Age-Appropriate Language When teaching your children about cryptocurrency, it’s important to use age-appropriate language. Young children may not understand the technical details of how cryptocurrencies work, so it’s important to explain things in simple terms. Older children may be able to understand more complex concepts, so it’s okay to go into more detail with them. - Encourage Questions Encourage your children to ask questions about cryptocurrency. This will help them better understand the topic and will also help you gauge their understanding. If your children are struggling to understand something, try explaining it in a different way or using a different example. - Let Them Experiment Once your children have a basic understanding of cryptocurrency, consider letting them experiment with it. You could set up a mock cryptocurrency exchange where they can buy and sell digital currencies using play money. This will give them a hands-on experience with cryptocurrency and will help them better understand how it works. Teaching your children about cryptocurrency is an important part of preparing them for the future. As digital currencies become more common, it’s important for your children to understand how they work and how they can be used. By starting with the basics, using real-life examples, emphasizing the risks, using age-appropriate language, encouraging questions, and letting them experiment, you can help your children become more financially literate and better prepared for the future.
<urn:uuid:e86adcb4-a367-4f0b-8ae1-714b5d68a15f>
CC-MAIN-2023-50
https://forksdaily.com/how-to-teach-cryptocurrency-to-your-children-a-beginners-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00447.warc.gz
en
0.946866
1,079
3.4375
3
The Speed of Change - Written by UnivAdmitHelp - Category: Mentoring - Published on 25 Feb 2020 The world is changing at a breakneck speed, and leaving behind all that is old. Can we afford to risk our education on this principle? Do we not need to change the way we are preparing the new generations? There is a law in nature that states that once a thing changes, it can never go back to the old state again. It is called Dollo's law of irreversibility. As per Wikipedia, Dollo's law of irreversibility (also known as Dollo's law and Dollo's principle), proposed in 1893 by French-born Belgian paleontologist Louis Dollo states that, "an organism never returns exactly to a former state, even if it finds itself placed in conditions of existence identical to those in which it has previously lived ... it always keeps some trace of the intermediate stages through which it has passed." This holds true for our brains too. Neuroscientists call it neuroplasticity or brain plasticity. Plasticity is the capacity of the brain to change with learning. When you become an expert in a specific domain, the areas of the brain that deal with that domain, becomes larger. For example, London taxi drivers have a larger hippocampus, the region of the brain dealing with complex spatial information necessary for navigating well. For bilinguals, the left inferior parietal cortex is larger. Similarly, once some startups become famous, business models that they have disrupted become irrelevant. Even though Uber and WeWork have now lost sheen with investors and many people have written their obituaries, they have impacted mobility and workspaces in ways that ensure that the older models have been disrupted. Even though their own models are not yet completely sorted, people will not submit anymore to the tyranny of the city cabs or rigid and dull workplaces. And this sort of disruption is extending to job fronts too. Once you have access to a search engine, you won’t go back to encyclopaedias. Once you can get answers by asking a voice assistant like Siri or Alexa, you are unlikely to return to typing out your queries. Given the current exponential rate of improvement, thanks to a large number of users, endless data and immensely better algorithms, search engines are improving at a breakneck speed to incorporate voice activation. Therefore the likelihood that most kids will need to learn typing is slowly decreasing. It might sound petty, but when compared to the fact that our school/university exams still involve writing with pen and paper, we need to change our whole approach to education in order to align our childrens’ growth with the way the world is changing. With greater, easier, more seamless access and connectivity, the world is rapidly shrinking. It ruthlessly leaves behind all that is obsolete, be it any form of connectivity, or avenue for growth. In such a world, it would be foolish to think that only a limited access to local networks (read schools, neighborhoods, clubs) will be sufficient to foster a successful life. By the same logic, the changes we have undergone have left us in a plastic mould. And the generations we are helping to foster will lead the world. We are ourselves rapidly becoming obsolete. Education will help us to nurture the future in its new form. What are we doing to help future generations thrive in this new landscape? A student that joins kindergarten today will graduate in the 2030’s. By then the world would have undergone an axial shift. How can we utilise outdated methods and centres of learning? We must shift the focus from what we already know, to exploring what hasn’t happened yet. Our way of living too needs to change its entire structure to become more open and collaborative and thus remain meaningful to their members. To believe that we can remain insular from global connectedness and survive through our old rules is like burying our heads in the sand. The new world is now seamless and moving at lightning speed towards futures hitherto undreamed of. The world has changed, the genie is out of the bottle. And we will do better if we accept this change and ensure that our actions are consistent with this changed reality. Have you read:
<urn:uuid:01a62636-0745-448b-b785-38bbdff1aa49>
CC-MAIN-2023-14
https://univadmithelp.com/blog/mentoring/the-speed-of-change
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00069.warc.gz
en
0.957041
868
2.890625
3
Through societal re-education and re-motivation, providing the necessary tools to enable citizens to significantly participate in a community which acts corporately on its concerns; also enabling the individual to become skilled in participatory methodologies. This leads to leaders and task forces in the community moving into community activities and concerns, and training others. Tactics include: leadership training to prepare individuals for assuming responsibility for leading and motivating others; methods training to equip people with tools for corporate community problem solving and action; wisdom sharing to build a research and information exchange network; urban consciousness to create an awareness of urban gifts and need for intentional planning; and curriculum rationale to develop a comprehensive curriculum for all ages. An example would be community residents mobilizing their efforts and confronting the highway department with demands for street maintenance and repair, thus demonstrating the power of corporate bodies. The Encyclopedia of World Problems and Human Potential is a unique, experimental research work of the Union of International Associations. It is currently published as a searchable online platform with profiles of world problems, action strategies, and human values that are interlinked in novel and innovative ways. These connections are based on a range of relationships such as broader and narrower scope, aggravation, relatedness and more. By concentrating on these links and relationships, the Encyclopedia is uniquely positioned to bring focus to the complex and expansive sphere of global issues and their interconnected nature. The initial content for the Encyclopedia was seeded from UIA’s Yearbook of International Organizations. UIA’s decades of collected data on the enormous variety of association life provided a broad initial perspective on the myriad problems of humanity. Recognizing that international associations are generally confronting world problems and developing action strategies based on particular values, the initial content was based on the descriptions, aims, titles and profiles of international associations. Non-profit, apolitical, independent, and non-governmental in nature, the UIA has been a pioneer in the research, monitoring and provision of information on international organizations, international associations and their global challenges since 1907.
<urn:uuid:303b0afb-cd1c-485f-9519-2d0fb001e4b7>
CC-MAIN-2023-23
http://encyclopedia.uia.org/en/strategy/199888
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00742.warc.gz
en
0.932489
415
2.546875
3
Alcohol consumption declined and leveled off over time but did not decrease to the average general U.S. population level. Several indicators of ongoing problems with drinking are associated with high levels of drinking over time: having a heavy-drinking network, receiving suggestions to do something about one's drinking, and going to treatment. Factors associated with less drinking include having contact with community agencies and going to Alcoholics Anonymous (AA). Results suggest that problem and dependent drinkers continue to drink at an elevated level over the course of years. Gatekeepers, family members, and policymakers should encourage and facilitate contact with social service agencies and with AA for problem drinkers. Suggestions from others to do something about one's drinking and seeking specialty care occur more often in those with more severe problems and do not appear to be linked to less drinking over time.
<urn:uuid:7675c01a-91ab-491a-b1b9-5bf6bdb5f678>
CC-MAIN-2013-20
http://www.alcoholreports.blogspot.com/2010_10_24_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00027-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965292
169
2.625
3
I hope you all liked my first lesson that I submitted today on how to draw a dragonfly step by step. This next tutorial is going to be very cool because it is on a character that I absolutely find adorable. Right now I will show you how to draw Nemo the Fish from Finding Nemo step by step. Nemo is a ridiculously cute clown fish that wants to be able to live like any other kid fish his age. There is one problem though, his father is overprotective of his son and therefore micro manages his life so that no harm will come to him. You see, Nemo lost his mother and siblings when he was just an egg. She lost her life to a predator that feeds on the smaller fish of the ocean. The only egg left was Nemo. Now because Nemo was born with a defect (one swimming fin was formed smaller than the other), his father treats him like a forever young child. Nemo wants to go out and explore, play with other fish, and go on adventures to see and find new exciting things. I had a wicked fun time drawing out this animated character from Disney Pixar. He is wicked easy to accomplish because all you will be doing is drawing out a simple fish that most young children can do. I would like to is that what made this movie so good was, the voice talents and the action sequences. Nemo was voiced by Alexander Gould, his father Marlin is voiced by Albert Brooks, Dory the dim witted regal tang fish was voiced by the very funny Ellen DeGeneres, and the comic talent of those three sharks that Merlin and Dory were always trying to avoid. I wanted to draw Nemo because no matter how old the movie may be, his character will always remain bright, funny, caring and sweet. I will show you how easy it is to learn how to draw Nemo from Finding Nemo step by step. I hope you all have fun with this one, I know I did.
<urn:uuid:bd83c478-9502-4885-87cd-445032f2e8cd>
CC-MAIN-2014-41
http://www.dragoart.com/tuts/1596/2/1/6753/how-to-draw-nemo-from-finding-nemo-step-6.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124236.90/warc/CC-MAIN-20140914011204-00037-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.988078
403
2.640625
3
What are the causes of high African-American unemployment, particularly in Illinois? What policies and economic phenomena make a statistical impact on reducing unemployment among African Americans? Professor Robert Bruno, Professor Emily E. LB Twarog, and Frank Manzo IV discuss these questions and offer solutions to address African-American joblessness. Policies to Reduce African-American Unemployment: Investments in Education, Infrastructure, Public Employment, and Housing by Bruno, Manzo, and Manzo can be found at this link. - Chicago Tribune Editorial Board (02/01/17) – “Fix Chicago’s Violence? Start by Helping Kids Land Jobs”’ - Economic Policy Institute – State Unemployment Rates by Race and Ethnicity at the Start of 2016 Show a Plodding Recovery, with Some States Continuing to Lag Behind - Report by Bruno, Twarog, and Grant – Advancing Construction Industry Diversity: A Pilot Study of the East Central Area Building Trades Council - Report by Bruno and Manzo – The Impact of Apprenticeship Programs in Illinois: An Analysis of Economic and Social Effects - Book by Michelle Alexander – The New Jim Crow: Mass Incarceration in the Age of Colorblindness Thanks for listening!
<urn:uuid:2abfe6c5-bae5-41a6-9014-d244560f48cb>
CC-MAIN-2020-10
https://illinoisupdate.com/2017/02/06/podcast-reducing-african-american-unemployment/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147647.2/warc/CC-MAIN-20200228200903-20200228230903-00040.warc.gz
en
0.868282
253
2.640625
3
Do you need ideas for how to use cell phones in the classroom? More and more creative teachers are now exploiting the teenagers favorite mobile device in order to enhance the teaching and learning at school. Cell phones in the classroom In The Classroom, School Classroom, Phones, The O'jays, Technology, Education Class, Please Take Out Your Cell Phones: Why Cell Phones Need to Be in the Classroom "Sticky Teaching" - Smart Teaching, understanding what a brain can't ignore (infographic, from Chris Lema) these verses! All year I've been trying to study and mimic how Jesus, the Great Teacher, taught. Good reminder for me! One way to use texting in your classroom is for quick assessment of student learning. Watch you can allow students to text during class while gaining valuable information. Keep checking back for more ways to incorporate texting into lessons. Change the Reading Level of the Search Results on Google!
<urn:uuid:acb7b051-9cb3-491e-b2e1-3f3ce3433fde>
CC-MAIN-2017-39
https://www.pinterest.co.uk/pin/213921051020233985/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689411.82/warc/CC-MAIN-20170922235700-20170923015700-00057.warc.gz
en
0.911058
196
2.5625
3
Gestational diabetes is a condition in which a woman who doesn’t have diabetes develops high blood sugar during pregnancy. It usually goes away after the baby is born. But it’s vital to manage gestational diabetes because high blood sugar affects both your health and your baby’s health. It’s often possible to manage your blood sugar with the right combination of diet and exercise. This article offers up some common-sense meal planning advice for those with gestational diabetes. Exercise is a great way to complement your new diet. Walking for at least 15 minutes 3 or 4 times a week can help with gestational diabetes management and improve your blood sugar. Read on for healthy snack and meal ideas, as well as what foods to avoid or eat in moderation. Never Miss a Beat! Subscribe to Our HealthBeat Newsletter! Get Healthy Tips Sent to Your Phone! General Diet Guidelines Eating a healthy, balanced diet and following these general diet guidelines will go a long way toward managing your blood sugar. Make sure you: - Eat about every 3 hours during the day to avoid becoming overly hungry. - Pass on sugary foods and sweetened soft drinks, which can spike your blood sugar. - Choose whole grain carbs like oats, brown rice, or whole wheat pasta over refined carbs like white rice or regular pasta. Refined carbs raise your blood sugar faster. - Eat plenty of high fiber foods like vegetables, beans, nuts, and seeds to help balance blood sugar. - Include some protein (eggs, fish, chicken, or meat) with each meal and snack. It keeps you full and balances blood sugar. - Add healthy fats from nuts, seeds, nut butter, or avocado, especially if you need extra calories. It’s helpful to work with a registered dietitian to design a personalized meal plan for gestational diabetes. They’ll help you select the right foods and portions to manage your blood sugar. You will want to pay close attention to your portion sizes of carbohydrate foods. Carbohydrates turn into glucose once they’re digested. That glucose gets absorbed into your bloodstream, so eating too many carbs increases your blood sugar. Still, carbs are a vital energy source for you and your baby, so don’t cut them out altogether. Instead, make sure to eat healthy carbs from these foods: - Whole fresh fruits (small portions because they’re all carbs). - Whole grains. - Starchy vegetables like white or sweet potatoes, corn, peas, and winter squash. - Beans or legumes, including lentils, chickpeas, and black, kidney, or pinto beans. - Milk and yogurt. Gestational Diabetes Food List The key to planning healthy meals for gestational diabetes is to start with nutritious whole foods and ingredients. It’s best to steer clear of fast foods and packaged foods with long ingredient lists. It’s also wise to read food labels and avoid foods with added sugar. These foods provide essential nutrients for you and your baby, and they won’t cause a spike in your blood sugar. Keep this gestational diabetes food list handy for when you’re planning meals: - Produce: Any fresh or frozen vegetables and unsweetened fruits. - Whole grains: Oats, brown rice, quinoa, barley, farro, 100% whole grain bread. - Proteins: Eggs, peanut or almond butter, beans, hummus, tofu, chicken, lean beef, and low mercury fish like salmon or light canned tuna. - Dairy foods: Plain or low sugar Greek yogurt, regular milk, or unsweetened non-dairy milk. - Healthy fats: Avocados, nuts, olive oil, and seeds like chia, hemp, pumpkin, and sunflower. Once you stock your kitchen with the right ingredients, it’s easier to plan healthy meals. Try these balanced meal ideas: - Overnight oats with berries, nuts, and sunflower seeds. - Spinach, mushroom, and tomato omelet with a side of whole grain toast. - Beef, vegetable, and barley soup. - Roasted broccoli and cauliflower with quinoa and grilled salmon. - A burrito bowl with black beans, shredded chicken, lettuce, tomatoes, and avocado. If you want something sweet after a meal, choose a small portion of fresh fruit topped with nuts or a sprinkle of low sugar granola. It’s best to avoid desserts or other sweets because they’re too high in carbs. Best Snacks for Gestational Diabetes Snacking is important because it prevents you from getting too hungry and making less healthy choices. But it’s essential to plan out healthy snacks just as you would plan meals. Think of snacks as mini-meals — balance them with some protein, fat, and healthy carbs. Some snacks for gestational diabetes include: - Strawberries with Greek yogurt and nuts. - A handful of whole grain crackers with hummus and raw vegetables. - Deviled eggs with carrot and cucumber slices. - Avocado toast sprinkled with feta cheese. - Apple slices with peanut butter. Planning healthy meals and snacks helps manage your gestational diabetes — and it’s easier than you might think. It’s a habit that pays off for you and your baby. And it’s a healthy way to eat throughout your life. Connect with UPMC About UPMC Nutrition Services Nutrition is vital for maintaining your overall health. UPMC Nutrition Services offers comprehensive diet and nutrition counseling on a variety of topics, including eating disorders, weight management, and heart disease. Our team provides medical nutrition therapy for chronic conditions such as celiac disease, cancer, and diabetes. UPMC’s network of registered dietitians is available to help guide all patients toward a healthier life.
<urn:uuid:a7e66946-2071-4473-a9dd-cd38cf8284c1>
CC-MAIN-2023-23
https://share.upmc.com/2021/11/diet-for-gestational-diabetes/?source=archive_title&source=archive_title
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00243.warc.gz
en
0.871373
1,240
2.84375
3
Native American Heritage Month: Recommended Reading How to celebrate Native American Heritage Month? One of the best ways is simply by reading. There are so many books out there about American Indians, but figuring out which ones can best inform us about Native American history and heritage is no small task. Many books about Indians are academic, written by college professors looking to get their doctorates, and appropriately dry as a result. Moreover they tend to focus on how Indians have fared under U.S. stewardship over the centuries rather than explore the rich heritage that existed on Turtle Island before the first settlers, and smallpox, arrived. Still more books have been published about various aspects of life since this country was created. But most Native history lies outside that narrow band of existence. The books listed here serve as a broad overview for Natives and non-Natives alike, giving a bit of ancient history, post-colonial history and a snapshot of modern-day life. For a good overview of how all the nations, both in North America and South America, used to live, contrasted with how they fared after contact, one can start with Charles C. Mann’s twin volumes, 1491: New Revelations of the Americas Before Columbus (Knopf, 2005) and 1493: Uncovering the New World Columbus Created (Knopf, 2011). American Indians, of course, do not need to be reminded of the rich heritage that greeted Christopher Columbus and his ilk when they first touched these shores. Likewise, the cultural devastation that followed isn’t news. But the two books serve to give the many nations that inhabit Turtle Island an overview of all the cultures that coexisted here, and their history, while providing new perspective for a wider audience as well, enabling understanding beyond Indian country. “You wouldn’t think there was another revelatory, perspective-shifting book to be gotten out of the arrival of Columbus in the New World, but 1493 is just that,” Time magazine said in naming it the best nonfiction book of 2011. “With immense energy and curiosity, Mann chronicles what amounts to the birth of a truly global ecosphere struggling to find a new equilibrium. It was a bloody birth. These forces were hugely powerful historical actors, and every trade turned out to be a trade-off too.” For a more detailed look at events shaping pre-contact Turtle Island, This Day in North American Indian History: Important Dates in the History of North America’s Native Peoples for Every Calendar Day (Da Capo Press, 2002) by Phil Konstantin also provides an overview, detailing more than 5,000 events important to North America’s Native peoples from 715 a.d. to the present. Then there is the retooling, the books that remind us not of what was lost but of what survived, often in surprising ways. Rethinking Columbus: The Next 500 Years (Rethinking Schools Ltd., 1998) by Bill Bigelow turns notions of life at Columbus’s arrival on their head. Bonus: It is also among the books banned in Arizona schools earlier this year after the Tucson Unified School District School Board voted to eliminate so-called ethnic education. As overlooked and forgotten as the sophisticated history of American Indians often is, so too are the contributions that Indigenous Peoples made to the formation of what is today the United States, and beyond. Indian Givers: How the Indians of the Americas Transformed the World (Crown Publishers, 1988) by Jack Weatherford, is a key volume reminding us of all the things we take for granted that are actually Native inventions. Along political lines, Forgotten Founders: How the American Indian Helped Shape Democracy by Bruce Johansen (Harvard Common Press, 1982) details the Great Law of Peace and the role it played in forming the U.S. Constitution. Putting the finishing touches on Heritage 101 are books dispelling the stereotypes that surprisingly persist to this day. One such title is Everything You Wanted to Know About Indians But Were Afraid to Ask, by Anton Treuer (Borealis Books, 2012), a Q&A-style book that sets the record straight. Another myth buster is Do All Indians Live in Tipis? Questions and Answers from the National Museum of the American Indian (Harper Perennials, 2007), another straightforward Q&A. The perfect juxtaposition of old and new can be found in modern-day accounts of how Indians are living in two worlds. A prime example is the standout memoir by David Treuer, Rez Life: An Indian’s Journey Through Reservation Life (Atlantic Monthly Press, 2012) which speaks to what many modern-day Indians, Ojibwe like him or not, go through. (Read an excerpt here and a profile of the author here.) Taken together, these books form the perfect primer, putting readers on the road to understanding what Native American heritage is all about.
<urn:uuid:bbb11f30-f020-487c-a51e-f9d5418d5e30>
CC-MAIN-2013-20
http://indiancountrytodaymedianetwork.com/article/native-american-heritage-month:-recommended-reading-145495
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702810651/warc/CC-MAIN-20130516111330-00021-ip-10-60-113-184.ec2.internal.warc.gz
en
0.931419
1,016
3.171875
3
Phytoestrogens are substances found in plants (phyto-) that have estrogen-like properties. Phytoesterogens latch onto the receptor sites on cells meant for estrogen. This results in a partial stimulation of those receptors, less intense than if true estrogen had attached, but stronger than if nothing had stimulated those receptors at all. This leads to a dual result. In women who have considerable estrogen, high consumption of phytoestrogens tends to occupy the receptor sites and keep real estrogen away. The net effect is to reduce the overall action of estrogen. Since estrogen promotes a number of forms of cancer (such as breast cancer), this may reduce cancer risk. However, in women who have little estrogen (after menopause, for example), consumption of large amounts of phytoestrogens will tend to mimic the effect of the missing estrogen, reducing symptoms such as hot flashes. Phytoestrogens are found in numerous foods, most prominently soybeans (and many other types of beans), red clover, flaxseed, and whole grains. The phytoestrogens found in these foods include isoflavones and lignans. Herbs with high phytoestrogen content include , thyme, and verbena. Certain herbs that are often claimed to contain phytoestrogens actually do not. These include do not appear to contain phytoestrogens in the ordinary sense, but might contain substances that mimic some of the actions of estrogen under certain circumstances. hint that consuming high amounts of foods rich in phytoestrogenscan decrease risk of various forms of cancer, including breast, ovarian, uterine, and prostate cancer, as well as possibly help prevent heart disease and osteoporosis. However, observational studies are notoriously unreliable for proving a treatment effective. (Only double-blind, placebo-controlled studies can do that. For information on why such studies are essential, see Why Does This Database Rely on Double-blind Studies? ). Observational studies only show association, not cause and effect. It is quite possible that people who consume high amounts of phytoestrogens are different in other ways from people who do not. For example, the Japanese, who consume a large amount of phytoestrogens, have much lower rates of breast cancer than Americans, who do not. However, there are a great many other differences in lifestyle and diet between Japanese and Americans, and these may play a more important role in breast cancer incidence than do phytoestrogens. With observational studies, it is simply not possible to sort out which factors are most important. To see that this is not just an academic concern, consider the mistakes made regarding estrogen. Numerous observational studies indicated that treatment with estrogen as part of hormone replacement therapy could dramatically reduce risk of heart disease. However, when double-blind studies were performed, it became clear that hormone replacement therapy actually heart disease risk. Thus, all conclusions about phytoestrogens based on observational studies are suspect. Unfortunately, it is not possible to perform double-blind studies on food. For this reason, the only solid information we have regards specific phytoestrogens that can be controlled in a double-blind format. To learn more, see the following articles:
<urn:uuid:ec1f7210-0c90-4945-88f3-4241262fe9e6>
CC-MAIN-2017-34
http://portsmouthhospital.com/hl/?/108298/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109525.95/warc/CC-MAIN-20170821191703-20170821211703-00584.warc.gz
en
0.937012
674
3.265625
3
One of the most pernicious myths about democracies, and it pains me to say, even constitutional republics, is the Myth of Checks and Balances. Most of us were indoctrinated with this myth in junior high school and high school social studies class. I know I was. to this myth, also known as the Doctrine of the Separation of Powers, distributing the powers of a government among several branches prevents the undue concentration of power in any single As the Encyclopedia Separation of Powers is the] division of the legislative, executive, and judicial functions of government among separate and independent bodies. Such a separation limits the possibility of arbitrary excesses by government, since the sanction of all three branches is required for the making, executing, and administering of laws. The concept received its first modern formulation in the work of Baron de Montesquieu, who declared it the best way to safeguard liberty; he influenced the framers of the Constitution of the United States, who in turn influenced the writers of 19th- and 20th-century constitutions. See also checks and balances. Images search for "Separation of Powers" yields dozens of diagrams purporting to explain how the Doctrine of the Separation of Powers protects us from government tyranny. Google Images search: Separation of Powers political systems in the real world do not function as illustrated in these diagrams. the division of the functions of government into legislative, executive, and judicial branches does not prevent arbitrary excesses "separating the powers" doesn’t really separate the powers, and doesn’t really result in "separate and independence bodies checking and balancing each other." is Illusory, The Power is Real why is not mysterious. The reason why is quite simple. why "separating the powers" doesn’t result in separate and independent bodies checking and balancing each other, is that the separation is not real. The separation is illusory. The separation is nothing more than wishful thinking. In fact the "separate and independent bodies" remain inseparable parts of the same government, the one government, the only government that the limited government, "minarchist" paradigm permits within any given jurisdiction. perpetuates its existence by robbing individuals at gunpoint. It refers to these acts of armed robbery as "taxation," as if calling its crime by some other name absolved it of guilt. As an old joke has it, "The only difference between the Mafia and the government is a flag." The joke is funny because it is true. of an organized crime family lives off the same protection money extorted at gunpoint from hapless shopkeepers and working men unfortunate enough to live within the crime family’s reach. In what sense can the bosses, underbosses, consiglieri, and soldiers of the same crime family be considered "separate and independent" from each other? By the same token, every official of a monopolistic state lives off the same tax revenues extorted at gunpoint from hapless "taxpayers" unfortunate enough to live within the government’s reach. In what sense can members of such a criminal enterprise be considered "separate and independent" from each other? Can we really expect officials who are part of such a criminal enterprise not to perceive each other as fellow predators, and us, the taxpayers, as their common prey? Can we really expect officials who are part of such a criminal enterprise not to perceive each other as members of the same pack of wolves, and us, the taxpayers, as members of the same flock of sheep? Can we really expect officials who are part of such a criminal enterprise to perceive each other as natural enemies and therefore check and balance each other? against such a unified "crime family with a flag" is virtually impossible. The proximate reason is that it has more goons with guns. But the ultimate reason is that the overwhelming majority of citizens in "advanced nations" believe they can’t live without a monopolistic state, and their collective behavior perpetuates its existence. who believe they can’t live without a monopolistic state are the political counterpart of battered wives, who believe they can’t live without their abusive husbands, and who insist that "deep down" their abusers "really love them." is that a battered wife who rationalizes away her husband’s abusive treatment of her victimizes only herself. who believe in and demand the perpetuation of monopolistic states victimize not only themselves, but also fellow citizens who know Godfather (1972, directed by Francis Ford Coppola, written by Mario Puzo) My father is no different than any powerful man, any man with power, like a president or senator. Do you know how nave you sound, Michael? Presidents and senators don’t have men killed. Oh. Who’s being nave, Kay? Executive Branch always becomes The Government a democratically elected president is merely the highest-ranking official in one of three or more coequal branches of government, the executive branch. in any monopolistic state with a presidential system, the president is an elective dictator, the legislature is a debating society, and the judiciary is a rubber stamp. Real world experience has demonstrated that over time, the executive invariably co-opts the judiciary and marginalizes the legislature. the coequal branches of government provide "checks and balances" upon each other, preventing them from ganging up upon the individual citizens they have sworn to protect and serve. because the executive is the branch that has been delegated the power to "execute" policy (pun intended), it invariably usurps any and all powers delegated to the other branches of a monopolistic state. Real world experience has shown that "limited government" inevitably morphs into unlimited government, and that the executive is always the branch that winds up monopolizing that limitless power. It makes no difference whether the executive was popularly elected, self-appointed, or hereditary. W. Bush put it quite bluntly, "I’m the decider and I decide Montesquieu was dead right when he noted that there can be no liberty where the legislative and executive powers are united in the same person, or body of magistrates or if the power of judging is not separated from the legislative and executive powers. was dead right when he noted that the accumulation of all powers, legislative, executive, and judiciary, in the same hands, whether of one, a few, or many, and whether hereditary, self-appointed, or elective, may justly be pronounced the very definition of tyranny. and Madison unfortunately, were dead wrong about how far mankind would have to go to prevent the uniting and accumulation of all powers in the same hands. and Madison earnestly believed that establishing constitutional republics with tripartite divisions of powers would be sufficient. historical context, Montesquieu and Madison’s failure to champion market anarchism was understandable. The history of medieval Iceland had been lost to mainstream political awareness. and Madison did not realize that only a market anarchist system, featuring voluntarily funded Private Defense Agencies (PDAs), vigorously competing against each other in the open market place, could ensure a genuine separation of powers and provide genuine checks and balances against tyranny. understand why the "separation of powers" doesn’t really result in "separate branches of government" checking and balancing each other," let’s try a little thought experiment. in Big Government, particularly self-styled "champions of democracy," love to portray government as a "public service," and government officials as "public servants." know this is nonsense, but let’s pretend we buy this "service provider" nonsense for the moment, and see where it leads. for the sake of argument that government is a service provider, and that the service it provides is the use of force, specifically, a military to defend against foreign invaders, police to protect against domestic criminals, and a court system to adjudicate legal that instead of military, police, and courts, the service or product provided is computer software and software support services. netizens would accept an arrangement in which a single software company, say Microsoft, would be granted a territorial monopoly in the provision of computer software and software support services where they live? In other words, no other company would be permitted to provide computer software and software support services, only netizens would be mollified by solemn assurances from founder Bill Gates that Microsoft’s exclusive franchise would not result in arbitrary excesses because the Microsoft corporation would be divided into three "separate and independent" divisions, each charged with different functions? would be in charge of formulating Microsoft policy. Another division would be charge of executing Microsoft policy. Another division would be in charge of verifying whether the Microsoft policy being formulated and executed was in conformance with the Microsoft netizens would trust such an arrangement to ensure that Microsoft would deliver well-coded software at competitive market prices? they scream their heads off, insisting that Microsoft as a de facto monopoly is already sitting on its behind, doling out bug-ridden bloatware behind schedule at exorbitant prices, and that as a de jure monopoly it would be infinitely worse? they be right? So why don’t they scream as loud or even louder about the government’s de jure monopoly in the use of brute force? Microsoft may be able to flood the market with overpriced, bug-ridden bloatware, but it certainly can’t force us to buy it. It can’t compel us to upgrade to Windows Vista upon threat of arrest and imprisonment, at least not without favoritism from a monopolistic this with so-called democratic governments, which have been empowered by self-styled "champions of freedom and human rights" to compel us to subscribe to its products and services – or else. I never wanted to become an anarchist, even a free market anarchist. I wanted to remain a constitutional republican in the tradition of the French Physiocrats, the British Classical Liberals, and the American an advocate of market anarchism reluctantly, after concluding that the limited government "minarchist" paradigm simply does not work as advertised. years ago, around 2004, I still held out hope that Checks and Balances would in fact check and balance, and that the Doctrine of the Separation of Powers would be vindicated. evolution, or rather, devolution within the American Imperium of Bill Clinton and George W. Bush; and within the Taiwanese kleptocracy of Lee Teng-hui and Chen Shui-bian, disabused me of any such hopes. reality is that the Doctrine of the Separation of Powers, within the context of a monopolistic state, is a contradiction in terms. reality is that as long as a nation is ruled by a conventional monopolistic state rather than Private Defense Agencies, any allegedly "separate and independent branches" of government will always perceive themselves as integral parts of the same government, the one government, the only government within any given jurisdiction. how one attempts to divide a monopolistic state into "branches" the reality is that all such "branches" live off the same "tax revenues," better known as protection money, extracted by force from "taxpayers," better known as victims of extortion. of Powers was supposed to be the primary firewall between constitutional republicanism and democracy. Tragically it has proven to be inadequate. Given enough time, it burns right through. republicanism is unquestionably superior to democracy. Unfortunately, that’s just not good enough. Constitutional republicanism, given enough time, degenerates into democracy, aka elective dictatorship. meanwhile, takes no time at all to degenerate into dictatorship. That’s because democracy isn’t separated from dictatorship by any firewalls whatsoever. That’s because democracy is a form of dictatorship. It always was, and it always will be. terrific political cartoon. But an even better caption would be: "We think people should be separated from power so that they can’t commit crimes." It is high time defenders of natural rights and individual liberty forsook their irrational attachment to that discredited system known as "limited government." Limited government never remains limited. It always becomes unlimited. As long as a government, any government, wields a legal monopoly in the use of brute force within a given territorial jurisdiction, that government’s powers can never really be separate. It is high time aspiring nation builders began drafting constitutions predicated on a system that truly separates the powers – free market anarchism. Chu [send him mail] is an American architect of Chinese descent registered to practice in Texas. Currently living and working in Taiwan, Chu is the son of a retired high-ranking diplomat with the ROC (Taiwan) government. His column, “The Strait Scoop” is published on his website, The
<urn:uuid:bad115ac-885a-473e-8c88-3cafbb4be705>
CC-MAIN-2013-48
http://www.lewrockwell.com/2007/03/bevin-chu/the-myth-of-checks-and-balances/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163809293/warc/CC-MAIN-20131204133009-00058-ip-10-33-133-15.ec2.internal.warc.gz
en
0.925697
2,900
3.171875
3
Maine's Wetlands: Their Functions and Values September 1996 Phone: (207)-287-3901 Our famous jagged coastline and generally rugged terrain statewide have provided Maine with an abundance and diversity of wetlands unequalled in the Northeastern United States. Fully 25 percent of Maine's land area is wetlands, four times the wetland area of the other five New England States combined. Over five million acres of Maine's wetlands are freshwater types (wooded swamps, shrub swamps, bogs, freshwater meadows, freshwater marshes and floodplains). Only 157,500 acres are tidal types (tidal flats, salt marsh, brackish marsh, aquatic beds, beach bars and reefs). Wetlands are valuable not only for their beauty and the recreation opportunities they support, but also for critically important functions they perform in our environment. What natural functions do wetlands perform? Wetlands are important to natural systems including water storage, flood conveyance, groundwater recharge and discharge, shoreline erosion control and water quality improvement. Wetlands are the source of timber resources highly valuable to Maine's forest products industry. Perhaps most important, wetlands provide habitat vital to fish and wildlife, including many rare and endangered species. How do wetlands serve as water storage areas? Because of the capacity of their water retention associated with their abundant vegetation, wetlands serve as natural water storage areas. Along the coast, tidal flooding creates two readily identifiable zones in coastal wetlands: (1) regularly flooded areas which are alternately flooded and exposed at least twice daily; and (2) irregularly flooded areas, the so-called high marsh, that is usually flooded for only brief periods but may be saturated near the surface during each high tide. Nontidal wetlands receive their water mainly from surface water runoff, groundwater discharge and direct precipitation. Surface water runoff collects in isolated depressions surrounded by high ground, or overflows from rivers and lakes following snowmelt or periods of heavy rainfall. In other areas where the groundwater is close to the surface, water may pond on the surface when there is a period of sustained rainfall. Groundwater also discharges periodically to spring or seepage areas when groundwater recharge exceeds subsurface capacity. What is the value of this water storage function? In the case of coastal wetlands, because tides vary with the seasons, this storage role has a major impact on the types and abundance of vegetation and wildlife. Similarly, in the case of freshwater wetlands, this storage capacity plays a vital role releasing water to lakes and streams to help maintain water levels needed for fish and wildlife, especially during critical spawning seasons, and for recreation uses. The value of water storage is most easily seen in terms of flooding events. How do wetlands help to control floods? Wetlands play a vital role in controlling floods. Wetlands help to lessen the impacts of flooding by absorbing water and reducing the speed at which flood waters flow. Upstream wetlands can serve to store flood waters temporarily and release them slowly downstream. Along rivers, wetlands usually form natural pathways for flood waters from upstream to downstream points. If those pathways are altered or removed, flood waters can go elsewhere, potentially damaging property and threatening public safety. Without wetlands as a natural flood control mechanism, flooding can become more severe. How do wetlands contribute to shoreline erosion control? Natural tidal action, river currents, waves and currents generated by wind on lakes, and waves and wakes from motorboats can all contribute to erosion. Erosion can result in loss of valuable beaches, other property damage and loss, increased sedimentation harmful to fish and wildlife, and other costly and harmful effects. By stabilizing soil, encouraging sediment deposit, and dampening the effects of wave action, the vegetation found in wetlands along the coast, around lakes and along the shorelines of rivers and streams help to control erosion. What role do wetlands perform in groundwater recharge and discharge? In a natural cycle, water moves from the atmosphere through rain and other precipitation to surface storage areas in the oceans, rivers and lakes, and to sub-surface storage areas known as groundwater aquifers. In Maine, fully half of the population depends on public or private wells drawing drinking water from such groundwater aquifers. Wetlands provide a key link in this cycle. Under specific circumstances, wetlands can provide a pathway for surface water to enter and thereby recharge groundwater. Wetlands also play an important role as the primary natural discharge path of some groundwater aquifers. Altering or filling wetlands can interfere with this natural cycle. How do wetlands help to improve water quality? Wetlands improve the quality of water flowing over and through them, a critical role in nature's own water quality restoration process. Wetland vegetation slows water flow and captures sediment suspended in the water, reducing turbidity, that murky quality that makes some waters unattractive for swimming and other recreation uses. Wetlands also filter out, trap and naturally recycle nutrients like nitrogen and phosphorous that run off from the land and might be harmful in excessive quantities in surface waters. This filtration process saves millions of dollars that might otherwise be required to build and operate facilities to perform this function. Wetlands can also capture pollutants like heavy metals, organic chemicals like pesticides and petroleum hydrocarbons, removing them at least temporarily and sometimes permanently from aquatic ecosystems. Unfortunately, when wetlands accumulate them, these harmful compounds can also enter the food chain through wetland vegetation and wildlife, ultimately finding their way into fish and wildlife people consume. How are wetlands important to fish and wildlife? With their diverse and abundant vegetation, wetlands support many valuable species of fish and wildlife that thrive only in a wetland habitat. Still other species that do not inhabit wetlands feed upon fish and wildlife that originate in wetlands. For example, coastal wetlands provide critical habitat for shellfish like clams and mussels and for migratory and nesting shorebirds like sandpipers, plovers and the endangered piping plover. Salt marshes are renowned as duck habitat. Nesting birds like osprey, herons and the endangered bald eagle feed on both freshwater and saltwater wetland species. Certain mammals, including furbearers, live in or near wetlands. Muskrat, for example, live on wetland banks in houses made from wetland vegetation. Are there rare and endangered species that rely upon wetlands? Researchers estimate that about 30 plant species have been extirpated, that is totally eliminated, from Maine since European settlement. Yet Maine wetlands are treasure troves of many rare plants, including some that botanists once thought extirpated. Studies of bogs during the 1970s and 1980s, for example, resulted in the discovery of abundant collections of rare orchids that live only in rich wetland habitat. Similarly, certain wetland types are vital to endangered wildlife, including shore birds like the piping plover which nests in coastal wetlands and raptors like the bald eagle which feed in both marine and freshwater wetlands. How do wetlands contribute to Maine's economy and quality of life? The functions wetlands perform are not only crucial to our environment, they contribute immeasurably to Maine's economy and to the quality of life Maine people and visitors to Maine enjoy. There are practical, economic and public health and safety values to each of the functions described above. Maine's wetlands save millions of dollars annually through erosion control, reduced flood damage and pollution abatement. Their water quality and flood control functions protect the public from otherwise harmful effects. Wetlands are also the source of over three million acres of productive timberland, vital to Maine's $4.5 billion forest products industry which provides jobs for 25,000 Maine workers. By far, however, the greatest contributions from Maine's wetlands are those associated with their importance to our fish and wildlife resources. Countless commercial and sport fish species spend some portion of their life cycle in wetland habitat. Clam flats are one wetland habitat that coastal communities recognize as critically important local economic assets. With the advent of mussel harvesting and emerging oyster and other commercial shellfish operations, the economic value of Maine's coastal wetlands continues to increase. Hunters and trappers know that wetlands mean valuable game, whether it is ducks in coastal salt marshes or deer, bear and small furbearers foraging in freshwater wetland habitat. Commercial fishing in Maine is a $270 million a year industry that employs 25,000 Mainers. Sport fishing and hunting are important attractions to the tourists and seasonal residents who make tourism a $1.5 billion a year industry employing another 25,000 Mainers. Even without their economic worth, wetlands have other values incalculable to Maine people. Hunting and fishing are traditional recreation stalwarts enjoyed by tens of thousands of Mainers. Other thousands of our citizens and visitors value wetlands for their beauty, the opportunity they afford to view rare plants and wildlife and as living laboratories for scientific studies. For more information about Maine's wetlands, their functions and values, look for the following publications in your State library: Maine Wetlands Conservation Priority Plan by Lissa Widoff, Maine State Planning Office, July 1988 Maine Wetlands and Their Boundaries: A Guide for Code Enforcement Officers by Ralph W. Tiner, Maine Department of Economic and Community Development, Office of Comprehensive Planning, June 1991 For more information about wetlands protection and Maine's Natural Resources Protection Act contact DEP staff at one of the following locations: 17 State House Station Ray Building, AMHI Complex Augusta, ME 04333 Eastern Maine Regional Office 106 Hogan Road Bangor, ME 04401 Northern Maine Regional Office 528 Central Drive Presque Isle, ME 04769 Southern Maine Regional Office 312 Canco Road Portland, ME 04103
<urn:uuid:adbd77f2-011e-4fd7-85cf-800391000cb7>
CC-MAIN-2014-35
http://www.state.me.us/dep/water/wetlands/ipwetfv2.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909043919-00141-ip-10-180-136-8.ec2.internal.warc.gz
en
0.920117
1,997
3.875
4
1. To remove cerebrospinal fluid by gravity flow in order to: - Secure specimen for diagnosis - Relieve intracranial pressure - Introduce drugs in therapy. - Introduce air or opaque liquid before taking X-ray for diagnosis 2. To determine the pressure within the cerebrospinal canal. Point to Remember: - Observe strict asepsis. - See to it that the patient does not move during procedure. - To prevent the needle from breaking inside the spinal column. - Keep patient flat in bed without pillow for about 8 hours. May turn to sides 1. Skin disinfection tray with a bottle of colledion 2. Sterile tray with: - Two spinal needles with stylets g-19 or 20 - Hypodermic needle no.24 - Intramuscular needle no. 22 - One 5-cc syringe - One 1.0 cc syringe - Medicine glass - Four 0.5 - Specimen bottles or test tubes - Treatment sheet or operating towels - Rubber gloves 3 drugs ordered 3. local anesthetic 4. Sterile manometer, three-way stop cock 5. bed screen 6. bed protector 7. fracture board 1. Assemble equipment and bring to bedside. 2. Explain the procedure to the patient. Gain his cooperation. Get consent for puncture. 3. Screen the bed, replace top sheet with blanket. 4. Assist to assume the desired position for lumber puncture either. - Recumbent position—if mattress is soft bed hoards should be placed under the mattress to make the surface less flexible. Place the patient on his side on he edge of the bed. Ask patient to assume the “Fatal position”. - Sitting position—place the patient on sitting position in hood or on the chair with the back arched. 5. Uncover the lower hack. 6. Disinfect the area about the site of puncture. 7. Physician put the gloves. He drapes the area 8. Assist in the procedure as needed—The doctor gives the anesthetic, inserts the needle. 9. Receive the specimen as it drops from the hub of the needle, not the rate of drops per minute 10. Physician inserts the stylets then removes the needles 11. Press the site of puncture with alcohol sponge, apply collodion 12. Place patient in dorsal recumbent without pillow 13. Make patient comfortable 14. Clean and keep equipment. Record treatment performed, amount of fluid color character, rate of flow, drugs instilled if any, amount of drugs, person who did the procedure reaction of the patient.
<urn:uuid:4189561b-1e92-4b12-b6fc-379b94783ee3>
CC-MAIN-2020-24
https://www.rnpedia.com/nursing-notes/medical-surgical-nursing-notes/lumbar-puncture-procedure/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00338.warc.gz
en
0.817232
577
3.078125
3
Note that old cities of the classical era (like Rome and Athens) may have something approaching this, as the ancient Greeks, Romans, the Minoans of Crete, the Chinese, and Mayans all had the technology and know-how necessary for pipes and plumbing, built canal systems and aqueducts, and in some cases invented the water toilet, remains of which can still be seen today. But many preindustrial "sewers" were essentially just very large holes in the ground meant to store, not transport, sewage, until the city contracted someone to break in and clean it out. In medieval European cities after the Dark Ages, the concept of "sewer" was reduced to a simple trench in the middle of the street; any waste would be thrown into the street, where rainwater would (eventually) wash it away. If the population were extremely lucky. And now you know why it's called The Dung Ages. The pre-Victorian London sewers, for instance, started out as rivers and creeks flowing into the Thames, which were later covered over as they became clogged with sewage washing in from the streets and draining from nearby cesspits. The old tunnels still exist and generally contain clean-ish river water now that the filth had been diverted to a more modern sewer system. However, many ancient cities were built over the ruins of previous cities and had some tunnels beneath them. A few also had catacombs. Modern cities have storm drainage systems, some of which meet all the qualifications for this trope, although they aren't actually sewers, since their purpose is to drain rainwater and/or snowmelt from the city into the nearest body of water. For game purposes, these can be treated like Absurdly Spacious Sewers. This trope is ultimately innaccurate. Even modern sewers can have impressively spacious and large tunnels and pathways. Many are to allow high volumes of material and easier maintenance access. Plenty of old sewers are also fairly spacious for the same reason. There is a large variety of sewers, sewer lines, and general sewage handling. It should be noted there is a difference between a sewer and a sewer pipe. The pipes are what tend to be small. As for creatures living in them. It happens more then a few animals are hardy enough to survive in the sewer. A simple image search shows sewers ranging from small to massive cavernous underground structures across the world. ~Tuefel Hunden IV
<urn:uuid:d968b063-7107-40dd-adce-285cf0d19fd0>
CC-MAIN-2017-43
http://tvtropes.org/pmwiki/pmwiki.php/Analysis/AbsurdlySpaciousSewer
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823016.53/warc/CC-MAIN-20171018161655-20171018181655-00605.warc.gz
en
0.978105
517
2.9375
3
Coming to the United States offers many immigrants the chance to better themselves through education, jobs, and possible upward mobility. However, once in the United States, they face discrimination and stereotyping, which often hinders their ability to access the American Dream. This is true of Bolivian immigrants who began immigrating after the passage of the Hart-Celler Act (1965). Most of the Bolivians who were coming were economic immigrants, hoping to make money to both have a good life in America and send funds back to Bolivia. According to the 2010 Census, Bolivians comprised the largest number immigrants from South American countries to come to Alexandria, Virginia. Despite being the largest group coming from South America, Bolivians immigrants are often either ignored by the media or when covered, they are often grouped in a large catch-all group of other immigrants coming from Central and South America and the stories are negative. They report on gang violence, drug trafficking, political coups, and earthquakes. These stereotypes, which the media perpetuates, forces immigrants to work harder to gain the trust of Americans, in order to get the jobs or investments in small business start-ups. In an effort to combat this negative image of Bolivians as well as other Central and Southern American immigrants, Julio Duran, a Bolivian immigrant, decided that he was going to begin to publish his own newspaper Impacto in 1986. Duran was born in Tarija, Bolivia and was trained as in journalism at the University of La Plata, in Buenos Aries Argentina. After graduating, Duran began working for different newspapers and even started a few of his own papers La Tablada in La Paz, Bolivia. In 1979, Duran moved to the United States to become a Washington correspondent for the newspaper El Diario. Despite his education and experience in Bolivia, Duran struggled to find a job in the United States. He was repeatedly turned down for jobs with the federal government despite passing the writing exams and a background check. In the face of this opposition, Duran decided that he would write and publish his own newspaper and focused on stories that were neglected by the U.S. media but were important to those Spanish-speaking immigrants from Central and South America. Duran knew that in order to finance his newspaper, he would need to get advertisers interested in investing in his newspaper. In an interview with the Washington Post, Duran describes how he was forced to go around carrying his degree to prove his credentials. Still, many were hesitant to advertise in his newspaper and instead insisted to see the first edition before making any decision. So Duran was forced to invest $8,000 his own money into his newspaper while only taking in $4,000 in advertisements. Partially due to his status as a Latino immigrant, Julio was denied a job with the federal government (despite his qualifications) and struggled to get advertising in his newspaper, despite his extensive experience. However, due to his determination and hard work, Julio Duran was eventually able to get his newspaper Impacto published. While the American Dream and belief in the equality is central to the American psyche, immigrants often face a number of struggles. One of the hardest to overcome is the racial stereotypes held by those born in the America. These stereotypes are often portrayed by the media and cause immigrants to struggle to have access to jobs that they are qualified for. . Tom Gjelten, A Nation of Nations: A Great American Immigration Story (New York: Simon & Schuster, 2015). . 2010 U.S. Federal Census: Community Facts; Hispanic or Latino, Alexandria, Virginia, American Fact Finder, digital image, accessed November 09, 2016, http://factfinder.census.gov/faces/nav/jsf/pages/community_facts.xhtml. . Dianna Saenz, “Fledgling Va. Publisher Puts Out a Paper with Latin American Beat,” The Washington Post, December 11, 1986, accessed November 09, 2016, https://www.washingtonpost.com/archive/local/1986/12/11/fledgling-va-publisher-puts-out-a-paper-with-latin-american-beat/6344a7f8-c047-4758-a935-769d7924046a/.
<urn:uuid:d9c92856-fad7-4b48-b906-670e7bfc2ac8>
CC-MAIN-2017-47
http://immigrantalexandria.org/blog/immigrants-struggles-in-search-for-the-american-dream/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806316.80/warc/CC-MAIN-20171121040104-20171121060104-00543.warc.gz
en
0.979128
896
3.53125
4
Biology is the study of Life. It helps us understand such things as how our body works, how our body keeps warm, what we are made of and many other things. Biology is very important to know. Some subjects in Biology are Genetics, Zoology, Botany, and Ecology. What is life? Living things are not like things that are not alive. Living things are like each other. They share some things. - Living things can change and grow. - Living things need nutrition. - Living things can move. - Living things can reproduce. - Living things can respond to stimulation (touch). - Living things can excrete. - Living things can breathe. Examples of living things are animal and plants. Cars and tables are not living things because they cannot satisfy the above 7 statements of living things. Levels of Life Living things can be many sizes. A living creature is called an organism. From small to large, these are how living things are grouped.
<urn:uuid:eee7404a-8136-44b0-9308-3f29cca3d6d5>
CC-MAIN-2013-20
http://simple.wikibooks.org/wiki/Biology/Introduction
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698354227/warc/CC-MAIN-20130516095914-00089-ip-10-60-113-184.ec2.internal.warc.gz
en
0.922286
210
3.453125
3
Many of the explanations offered for the sharp pain runners feel during hard breathing, usually on the right side, involve muscle stress or spasms in or near the diaphragm. Because the muscle stress is probably caused by a rhythmic, repetitive activity, the solution is to develop techniques to break up that stressful rhythm. Runners could try changing their breathing patterns by breathing slower and deeper and forcefully exhaling through pursed lips. Other suggestions involve changing running position by leaning forward, backward, or sideways, stretching before running, having the stomach as empty as possible before running, and changing the foot one lands on when exhaling. A more direct explanation is that the rhythm of running causes bouncing of the liver, stretching the ligaments that link liver and diaphragm. In this case, the suggestion is to stop running and use a hand to press the liver up against the diaphragm until the pain ends.
<urn:uuid:5fa569f2-157e-46c6-bab9-96cd7bfa5a92>
CC-MAIN-2020-05
https://zippyfacts.com/what-is-a-stitch-in-your-side-and-how-can-you-prevent-it/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00388.warc.gz
en
0.946251
189
3.171875
3
University Psychologist Dr Alan Gow is looking for volunteers to help with a new study exploring how taking up different activities might help thinking skills as we age. People often think of changes in their thinking skills in terms of decline. While some people do experience these changes, others do not. The study will explore how taking up a new activity might affect the changes we experience. Given international trends in ageing demographics, there is an increasing interest in how we might best protect or enhance our thinking skills as we age. The study is being led by researchers in the The Ageing Lab at Heriot-Watt's Psychology Department at the Edinburgh Campus. Dr Gow, Associate Professor in Psychology and leading the research, said, “One suggestion why some people retain their thinking skills better than others is about keeping mentally, socially or physically active. In our new study, we're going to be asking people to take up an activity they've not done before, to then see how becoming more engaged might benefit their thinking skills”. Over the course of the study up to 300 adults aged 65 and over will be recruited. They will undergo a range of cognitive and psychological assessments before being asked to take up their new activity. The activities will vary in terms of the mental, social or physical engagement, but might include participating in language classes, taking up a new exercise or sport, meeting new people in social clubs or groups. After following their new activity for 2-3 months, the volunteers will return for repeat testing. Dr Gow added, “Increasing activity and engagement have been incorporated in interventions for cognitive ageing, though these are often developed and tested in lab-based settings that may not translate to realistic environments. The new study will test a range of activities within existing community-based programmes as potential interventions to reduce cognitive ageing in old age. Quality of life and independence “Change in our thinking skills are among the most feared aspects of growing older, and are related to lower quality of life and loss of independence. The project's community-based setting has been designed to reduce barriers in translating the findings for real-world benefit. “As we age, we may experience general declines in our thinking, memory and reasoning skills (cognitive ageing). There is, however, large variation in the degree of decline experienced. Keeping intellectually, socially or physically engaged have all been proposed as potentially protective. “Given international trends in ageing demographics, there is an increasing interest in how we might best protect or enhance our thinking skills as we age. The new project is part of an ongoing national and international research agenda exploring how a range of lifestyle factors affect cognitive skills in older people.” The research team are looking to hear from people aged 65 and over living in Edinburgh and the Lothians who might be interested in taking part. Details about getting involved can be found on the research team's website, by emailing [email protected], or by calling 0131 451 8009.
<urn:uuid:7210d0e9-aa74-4dfa-8e6f-f41dd4698a29>
CC-MAIN-2023-23
https://www.hw.ac.uk/news/articles/2017/volunteers-needed-for-new-ageing-research.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00195.warc.gz
en
0.955885
615
2.703125
3
For centuries, America has relied on wood, steel and concrete to build its infrastructure. But while these traditional materials dominate the market, they are susceptible to corrosion, degradation and deterioration. In many cases, composites have the characteristics to serve as a replacement to traditional materials used in roads, bridges, dams and pipelines. Although composites have the potential to improve our nation’s infrastructure, one of the biggest obstacles the composites industry has faced is a lack of data about how composites perform. Without reliable data, engineers and designers cannot confidently build bridges with composites. From 1999 through 2004, the Federal Highway Administration (FHWA) had provided funding to study bridges made with composites. But soon after that, the FHWA had stopped tracking their performance. This made it difficult to assess the effectiveness of composites in those bridges, and as a result, composites have struggled to compete against traditional materials in infrastructure. However, thanks to ACMA’s work with both chambers of Congress, the study was revived as part of the 2015 highway bill. The study will not only assess the performance of the bridges made with composites, it will also compare them to bridges built with conventional materials and technologies. The study will also provide recommendations to Congress on how the installed lifecycle costs of bridges could be reduced through the use of composites. The following year, ACMA scored another legislative victory with the Water Resources Development Act – Title I of the Water Infrastructure Improvements for the Nation Act. ACMA worked to ensure the legislation included a directive to the Army Corps of Engineers to study the performance of composites and other innovative materials in water resources projects. Both of these victories would not have been possible without groundwork laid during ACMA’s annual Infrastructure Day – the association’s signature advocacy affairs event that allows association staff and members to tell their stories and to advocate for policies that benefit the composites industry. “ACMA’s Infrastructure Day on Capitol Hill allowed us to educate our congressional leaders about the benefits that our materials and technology offer for infrastructure applications,” says Scott Reeve, President of ACMA member Composite Advantage. “Visiting key offices every year demonstrates to the elected officials and staffer that we are serious about our message. It is also important that we, as businesses and taxpayers, remind them of their oversight duties to ensure that provisions of the FAST Act and WRDA pertaining to new technologies are carried out by the responsible federal agencies.”
<urn:uuid:4718aa76-2c1e-41be-9202-851598b1104c>
CC-MAIN-2020-05
https://acmanet.org/2018/02/acma-infrastructure-advocacy-leads-to-policy-victories-for-composites-industry/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250620381.59/warc/CC-MAIN-20200124130719-20200124155719-00005.warc.gz
en
0.962157
505
2.859375
3
Many people get annoyed to see ants inside homes and consider these harmful because these crawling insects can reach every possible spot, from the kitchen to the bathroom. How Are Ants Harmful to Humans? Ants are harmful to humans as their bites and stings are painful and contaminate food leading to food-borne diseases. Moreover, they can cause damage to property, wooden furniture, and electric appliances or outlets. A heavy infestation of nuisance pests can compromise the aesthetic appeal of your house and pose a danger to pets. Furthermore, they can cause infections, attract more pests, and cause damage to plants and crops. Ants are usually helpful creatures that positively impact the environment, but they become nuisance pests inside the home. Painful bites and stings Every species of ants has varying stinging abilities depending on the size of their stinger and the poison in their glands. The poison can cause undesired allergic reactions, itching, and severe infections. A few are deadly and poisonous, like bullet and velvet ants, leading to a burning sensation on the skin. It becomes challenging to tolerate extreme pain as it feels like a bullet piercing through skin tissues. Moreover, fire ants can grab the skin tissues with their strong mandibles and try to break the skin’s protective layer to inject the poison. However, carpenter and argentine ants are not dangerous and do not cause a painful sensation on the body, but they can cause slight irritation in the affected area. Contamination of food Ants keep crawling within the garbage can to consume nutrients from the discarded pieces of fruits and vegetables that are useless to humans. The rotting fruits are heavily loaded with bacteria and many other germs that can get transferred to food on the kitchen countertop when these insects crawl inside in search of food. They carry toxic microorganisms on their bodies and shift them inside the home when they move through towels, dirty dishes, laundry clothes, and uncovered food in the kitchen. The sugar and pharaoh ants keep moving from outdoor to indoor areas. So, they can be responsible for making you ill by biting and transferring their gut bacteria into the body. Cause property damage Ants are not only harmful to humans, but they can cause damage to properties and destroy their foundations by building nests under the ground. They can weaken the house’s base by digging deep into the soil, leading to the fall of huge buildings. These tiny creatures have strong teeth that can help chew through hard surfaces like concrete, but they take several years to cause noticeable damage to the building. In addition, they can even enter concrete surfaces and build their nests under the slab in the driveway or sidewalks. They can chew solid window caulks or rubber of electrical wires to make their way inside the house, leading to expensive repairs. Heavy infestation of nuisance pests It seems frustrating to have annoying pests inside the home that are crawling in every corner of the house. They can get inside through tiny cracks close to the windows or plumbing lines. The presence of sweet candies on the dining table and juice spills on the ground are detected by their smell receptors and make them come inside. Almost everything inside the house seems attractive to them, from the wet floor of the bathroom, and dirty laundry room, to the kitchen sink filled with dirty dishes. The presence of hair and the sweet smell of towels can capture these insects’ attention and allow them to reach towels, resulting in biting your face and other body parts. Furthermore, they can come back even if you sweep them out of the house until you make your house unattractive to them. Damage wooden furniture Carpenter ants like to build their house inside rotting wooden logs that are slightly damp, making it easy for these chewing pests to make tunnels. They prefer to attack wooden structures, like sofa or bed frames, consoles, and windows, to make a house for the colony and are not interested in eating the wooden shavings. In addition, chewed pieces of wood are thrown close to the colony in the form of sawdust and affect the structural stability of the wooden furniture. Exposure to insecticides Many people prefer to use insecticides to get rid of the infestations permanently because natural ingredients like a cinnamon stick can only repel them from coming inside the house. Professional exterminators remove ant colonies by spraying harmful chemicals on their mounds that are not only effective at killing these pests but are also dangerous for humans. Accordingly, they can only be controlled with the spray of toxic chemicals in insecticides. Attract more pests Ants control the population of garden pests that can destroy the lawn grass or plants. However, they can attract more pests inside the home that are interested in eating these insects. Beetles, flies, spiders, and caterpillars like to eat ants navigating in the garden as their tiny bodies are full of proteins. In addition, termites also get attracted to these insects to kill them. Moreover, antlion larvae and phorid fly like to eat fire ants and come into the house by following the smell of these creatures. So, these insects can create a significant problem by attracting these destructive pests inside the house, posing a safety risk as these insects can harm humans living there. Pose a danger to pets They can be dangerous for pets as they get attracted to pet food and water bowl in their house. In addition, the fire ants usually climb on their bodies and sting them, leading to painful sensations. You have to keep them away from pet dogs or cats as these tiny insects can lead to their death by initiating a series of anaphylactic reactions after stinging. They can make your rabbits, birds, and dogs exhausted due to severe pain, and you have to take them to the vet clinic for treatment to save their life. Damage plants and crops Some harmful species of these insects, like argentine, big-headed, browsing, and crazy ants, can cause significant damage to crops in the garden and are known as environmental pests. They are commonly found in the plant’s roots due to moist environments and suck nutrients from plant roots and sap from the stem region. However, they disturb the roots of plants affecting the transport of water and nutrients to leaves. It can lead to the death of plants because they cannot survive without efficient water transport. They prefer to build nests in potted plants due to the humid environment and food availability. So, they are also harmful to you because they affect your food source and crop plants. What Will Happen If All Ants Die?
<urn:uuid:22bba051-3a09-4107-b537-fff2274223ed>
CC-MAIN-2023-23
https://antsauthority.com/how-are-ants-harmful-to-humans/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00241.warc.gz
en
0.952082
1,359
3.109375
3
Catalonia’s planned independence referendum has been suspended by Spain’s Constitutional Court. Spain’s Constitutional Court said it first needed to consider arguments whether the November 9 vote breached the country’s constitution. It acted on a request from the Spanish central government in Madrid. Catalonia leader Artur Mas signed a decree on September 27 calling for the referendum. However, Spanish PM Mariano Rajoy told reporters that the vote was not “compatible with the Spanish constitution”. “Nobody and nothing will be allowed to break up Spain.” Mariano Rajoy was speaking in a televised statement to the nation after holding an emergency cabinet meeting. Hundreds of thousands of Catalans joined a protest in Barcelona recently, calling for their right to vote. Unhappy at Spain’s refusal to give Catalans more powers, protesters have been energized by Scotland’s recent independence referendum and many also waved the Scottish flag. Catalonia’s 7.5 million inhabitants make up approximately 16 % of the population of Spain. Yet it is one of Spain’s richest and most highly industrialized regions, as well as one of its most independent-minded. Spain’s deepening economic crisis, though, has seen a surge in support for separation. A recent poll for Spain’s El Pais newspaper showed that 45% of Catalans were in favor of suspending the referendum if the Constitutional Court declared it illegal. Only 23% would like the referendum to go ahead regardless, the survey suggested. Artur Mas has only recently become a supporter of full independence. Since 2007, he has spearheaded a push to revitalize Catalan nationalism known as the Refoundation of Catalanism. [youtube iM9XOLbKmDo 650]
<urn:uuid:83ab9fff-77df-4ec5-b276-d29d66afb32a>
CC-MAIN-2020-24
https://www.bellenews.com/2014/09/29/world/europe-news/catalonia-independence-spains-constitutional-court-suspends-referendum/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347399820.9/warc/CC-MAIN-20200528135528-20200528165528-00448.warc.gz
en
0.954953
372
2.546875
3
Chapter 6 - Learning. Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. Our next chapter is on learning...As high school seniors, if you could write to your past self as a freshman entering high school, what advice would you give yourself? Consider your experiences thus far, the lessons you have learned, and the situations you wish you had handled better or would have preferred not to have experienced at all. This entry MUST be at least ONE full page. “Quiz” 1. In Your own words, define UCS, UCR, CS, CR.2. Develop a fear of teddy bears by using the principles of classical conditioning.Identify the UCS, UCR, CS, CR3. What could be done to extinguish this fear? Is punishment an effective method of discipline to modify behavior??? DEBATE will be on MONDAY!!! Remember: If you are on the PRO or CON side…be ready to present your side with supporting evidence Jury Members – 2 sources must be summarized relating to either side of the debate. Include source. They see me rollin’… The average US student has witnessed about 8000 murders and well over 100,000 violent acts by the end of elementary school. Based on ACTIVE LEARNING!
<urn:uuid:8926d95d-2e88-4af9-b046-a7a9ee6eb694>
CC-MAIN-2017-43
http://www.slideserve.com/anne-cash/chapter-6-learning
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825436.78/warc/CC-MAIN-20171022184824-20171022204824-00710.warc.gz
en
0.932016
321
2.59375
3
A Lark made her nest in a field of young wheat. As the days passed, the wheat stalks grew tall and the young birds, too, grew in strength. Then one day, when the ripe golden grain waved in the breeze, the Farmer and his son came into the field. “This wheat is now ready for reaping,” said the Farmer. “We must call in our neighbors and friends to help us harvest it.” The young Larks in their nest close by were much frightened, for they knew they would be in great danger if they did not leave the nest before the reapers came. When the Mother Lark returned with food for them, they told her what they had heard. “Do not be frightened, children,” said the Mother Lark. “If the Farmer said he would call in his neighbors and friends to help him do his work, this wheat will not be reaped for a while yet.” A few days later, the wheat was so ripe, that when the wind shook the stalks, a hail of wheat grains came rustling down on the young Larks’ heads. “If this wheat is not harvested at once,” said the Farmer, “we shall lose half the crop. We cannot wait any longer for help from our friends. Tomorrow we must set to work, ourselves.” When the young Larks told their mother what they had heard that day, she said: “Then we must be off at once. When a man decides to do his own work and not depend on any one else, then you may be sure there will be no more delay.” There was much fluttering and trying out of wings that afternoon, and at sunrise next day, when the Farmer and his son cut down the grain, they found an empty nest. Self-help is the best help. The AESOP for CHILDREN WITH PICTURES BY MILO WINTER RAND McNALLY & CO. CHICAGO Copyright, 1919, by Rand McNally & Company
<urn:uuid:f8ba14d0-ecbf-4f04-9b90-ce01263923f1>
CC-MAIN-2020-10
https://smartkids123.com/the-lark-and-her-young-ones-aesop-fables-for-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00347.warc.gz
en
0.979758
437
3.015625
3
hill; mound, the long, narrow, rounded promontory on the southern slope of the temple hill, between the Tyropoeon and the Kedron valley ( 2 Chronicles 27:3 ; 33:14 ; Nehemiah 3:26 Nehemiah 3:27 ). It was surrounded by a separate wall, and was occupied by the Nethinim after the Captivity. This wall has been discovered by the engineers of the Palestine Exploration Fund at the south-eastern angle of the temple area. It is 4 feet below the present surface. In 2 Kings 5:24 this word is translated "tower" (RSV, "hill"), denoting probably some eminence near Elisha's house.
<urn:uuid:a5d550b0-3019-4cbd-a8d2-2169f290745a>
CC-MAIN-2014-41
http://www.biblestudytools.com/dictionaries/eastons-bible-dictionary/ophel.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124771.92/warc/CC-MAIN-20140914011204-00108-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.966874
147
3.390625
3
What is the Commission's position? Today the European Commission has adopted the Communication 'Towards the World Humanitarian Summit – A global partnership for principled and effective humanitarian action'. It lays out the EU's strategic vision for reshaping humanitarian action. The underlying message is to build and reinforce a global partnership to advance on achieving the common objectives of saving lives, preventing and alleviating suffering and maintaining human dignity. The concrete recommendations aim to reaffirm and strengthen principled and effective global humanitarian action. Why is it important? There has been an unprecedented rise in humanitarian crises over the last 25 years. Today nearly 80 million people are in need of humanitarian assistance because of conflicts, natural disasters, and social and economic fragility. The number of forcibly displaced people reached nearly 60 million and is the highest since World War II. The humanitarian system is being challenged to do more, for more people, and at greater cost. Given the scale of today’s crises and disasters, funding to cover humanitarian needs cannot keep up with demand, despite record contributions by donors. To address these alarming trends, the United Nations Secretary-General has called the World Humanitarian Summit. This is a unique opportunity to improve operating methods to serve people in needbetter. The European Union and its Member States play a leading role in world humanitarian affairs. They are not only major humanitarian donors but also key policy-setters with global operational experience. The EU and its Member States are expected, by many stakeholders, to contribute to the success of the Summit. What is the World Humanitarian Summit? The first ever World Humanitarian Summit (WHS) will take place on 23-24 May 2016 in Istanbul in response to an unprecedented increase in the number of people affected by conflicts and natural disasters. The Summit presents the global community with a unique opportunity to establish an international consensus that reaffirms the principles of humanitarian aid and strengthens humanitarian action. Unlike other international summits, the WHS is a multi-stakeholder process involving governments, donors, implementing organisations, the private sector and representatives of affected populations who, where needed, should commit to more effective ways of working together towards the common objective of saving lives and alleviating suffering. As a result, the Summit will aim to influence and change the current humanitarian modus operandi to serve people in needbetter. What are the key proposals of the Commission? The Commission's Communication recommends seven action areas under two overall priorities for reshaping humanitarian action. It aims to build and reinforce a global partnership to work together to serve people in need. Priority I: Principled humanitarian action 1. Reaffirming humanitarian values The summit is an opportunity to renew the collective commitment confirming our shared responsibility to protect human lives and deliver humanitarian aid. The common basics underpinning humanitarian action should be confirmed: the values of dignity, integrity and solidarity; humanitarian principles; the respect of obligations under international law; and the commitment to keep humanitarian work distinct from political agendas. Every player should deploy all means – humanitarian, development, political – to save lives and end human suffering. 2. Ensuring access to assistance The European Commission suggests that humanitarian players should engage in dialogue with those involved in conflicts to ensure access to assistance, protection and security. Local communities and civil society should advocate for the application of humanitarian principles. Governments should ensure a safe and secure environment for humanitarian action, including by adopting suitable legal and policy frameworks to facilitate access to assistance. Organisations delivering humanitarian aid should increase their presence in remote and dangerous areas to ensure proximity to affected populations. 3. Putting protection at the heart of response The humanitarian community should systematically integrate protection into its actions, taking into account the vulnerabilities and capacities of specific population groups in given contexts and the threats they face. Cooperation between the humanitarian and human rights communities should be reinforced. At the same time, humanitarian staff should remain exempt from actions that could compromise their neutrality, impartiality and independence, or be harmful to access. Priority II: Effective humanitarian action 4. Consensus on the basics of humanitarian effectiveness The humanitarian community should develop a comprehensive on-stop IT platform which should work as a repository of shared data on needs, capacities, risks, financial allocations, vulnerabilities, shared quality markers, common results indicators, evaluations and research. Donors should require organisations delivering assistance to coordinate needs assessments based on data and quality indicators. Donors should use these for funding decisions and to help them streamline their contractual and reporting mechanisms. Those delivering assistance should report results and measure quality. Donors should commit to include accountability to affected populations in the programmes they fund, while organisations delivering assistance should set standards on engagingwith populations in their programmes. The Inter-Agency Standing Committee (IASC) - the primary forum for inter-agency coordination of humanitarian assistance, involving the key UN and non-UN humanitarian partners - should demonstrate the implementation of the Committee's’ Transformative Agenda' which sets the parameters for improved collective action in humanitarian emergencies. Donors should consider reviewing working methods to ensure results. 5. Subsidiarity and solidarity International and national coordination structures should include all players, through formal or informal cooperation. Risk assessments or fragility analyses should be conducted for all countries. There should also be an inventory of the preparedness and response capacities of players on all levels. The humanitarian community should develop guidelines for specific scenarios, clarify responders’ roles and establish triggers for international assistance. Governments and donors should support local responders’ capacity building and consider supporting their response, where appropriate. Regional organisations should establish a network for sharing experience and training exercises. They should consider including solidarity provisions in their mandates to help those affected by natural or man-made disasters. 6. Efficient and sufficient funding Implementing organisations should reform the appeals procedures to give a complete picture of needs and funding requirements. Individual organisations should coordinate appeals, to avoid competition at the expense of efficiency. Appeals should facilitate the delivery of quality aid. Donors should systematically coordinate their efforts and evaluate the services provided by implementing organisations, to identify their added value and possible cost efficiencies. Donors and organisations delivering assistance should increase the proportion of people receiving cash-based assistance depending on the context. The traditional donor community should activate closer dialogue with donors who are not on the OECD Assistance Committee, such as with middle-income countries, regional organisations, the private sector, charities and foundations funding humanitarian action. Incentives should be given to the private sector to contribute to humanitarian assistance. 7. Partnership with the development community A new model for humanitarian-development cooperation is needed. It should include joint multi-hazard risk analysis and, where relevant, multiannual programming and financing, and exit strategies for humanitarian players. Donors should try to facilitate more predictable multiannual financing through joined-up programming and implementation of humanitarian and development funds. Donors should consider introducing crisis modifiers in development programmes, allowing resources to be reallocated to crisis response, creating a more flexible approach. What are the next steps? The ideas presented in this Communication will be the basis of further dialogue with EU Member States, the European Parliament, and other stakeholders ahead of the Summit including during the Global Consultation in Geneva on 14-16 October 2015. The outcomes of this dialogue will feed into the preparatory process for the WHS. For more information
<urn:uuid:4da92ac1-1279-401d-98d7-9bbd480e7d55>
CC-MAIN-2017-30
http://europa.eu/rapid/press-release_MEMO-15-5577_en.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436330.31/warc/CC-MAIN-20170728042439-20170728062439-00352.warc.gz
en
0.909289
1,512
2.5625
3
Why can't I upload files using FTP? The most common cause of FTP problems is that passive FTP transfer mode is not turned on in your FTP program. "Passive mode" is usually needed: - If you use a DSL or cable modem; or - If you use some kind of Internet sharing device or software to connect multiple computers to the Internet using one ISP connection; or - If you use a personal firewall on your computer, or you're connecting from a company or ISP network that uses a firewall. (There may be other situations where it's needed, too — try the solution below even if you don't think you fall into any of these categories.) "Passive mode" is especially likely to be the problem if your FTP program seems to connect to our server, but is then unable to transfer a file or show a list of files. It's also the problem if you see an error message mentioning a "PORT" command. Turning on passive FTP transfer mode To solve these kinds of connection problems, turn on passive FTP transfer mode in your FTP program: If you use a different FTP program, it almost certainly has a checkbox to turn on "passive mode" in either the connection setup screen or the program preferences screen. Consult the documentation for your FTP program if you're unsure how to do it. (Look for the words passive or PASV in the settings; the checkbox is often labeled "PASV FTP" or something similar.) Turning on passive mode almost always fixes FTP connection problems. What if FTP still doesn't work? The first thing we recommend is turning off any firewall software as a test (this includes the Norton AntiVirus "Internet Worm Protection" feature, which is really a firewall). If this fixes the problem, consult your firewall's documentation or support to learn how to allow FTP connections with the firewall turned on. If it doesn't help, try disabling SSL/TLS encryption in your FTP program if you've enabled it. Encryption is not compatible with all firewalls. If that doesn't solve it, try connecting to a completely different public FTP server. This will show whether the problem is just with the connection to our FTP server or if your computer is having problems connecting to any FTP servers. An example of a public FTP server is: - Server hostname: ftp.earthlink.net - Username to use: anonymous - Password to use: anonymous If your computer cannot connect to that server, then either your FTP software is not working correctly, or something on your computer (probably a firewall or other security software) is blocking all FTP connections. You may want to try using other FTP software such as the free FileZilla. If you still having problems connecting, try making a text connection as described in the next section. Try a text connection to our servers These instructions explain how to make a text-based connection to our servers, mimicking what your FTP program usually does invisibly. This allows you to see exactly what response our servers send back to your FTP program, and we can use that information to determine the source of the problem. You can do this in a few easy steps: 1. Enable telnet (Windows Vista, Windows 7, Windows 8) Telnet is not installed by default on Windows Vista, Windows 7, or Windows 8, so you may need to install it. You can skip this step if you use Windows XP or Mac OS X. - Click the Windows Start button, then choose Control Panel. (In Windows 8, type control panel at the Start screen and press enter.) - Choose Programs (this may be called Programs and Features). - Choose Turn Windows features on or off. - Check the Telnet Client checkbox. - Click OK, then finish the installation. 2. Open a command window. To open a command window: - If you're using Microsoft Windows 7 or earlier, click the Start button, then choose All Programs > Accessories > Command Prompt, which will open a new window with a black background. - With Windows 8, type command prompt at the Start screen and press enter. - With Mac OS X, open the "Terminal" application. 3. Type a "telnet" command. Once the command window is open, type this text and press "Enter": telnet ftp.tigertech.net 21 You should see these two lines (among others) in the response: 220-This is a private system - No anonymous login 220 You will be disconnected after 2 minutes of inactivity. If you don't see these lines in the response, contact us and let us know exactly what you do see, because it means that something is blocking your computer's connections to our FTP server. Please be sure to copy and paste all of the command window text into your message to us, since it's all important. We'll do our best to help you figure out what's causing the problem, although in some cases you may need to ask your network administrator. (By the way, you can just close the command window when you're finished with the tests above.)
<urn:uuid:c83cc4b1-93a0-4112-b452-1530c8e7ce4f>
CC-MAIN-2013-48
http://support.tigertech.net/ftp-errors
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164018912/warc/CC-MAIN-20131204133338-00029-ip-10-33-133-15.ec2.internal.warc.gz
en
0.888324
1,069
2.5625
3
NCO Leadership Center of Excellence & U.S. Army Sergeants Major Academy March 4, 2019 Download the PDF Deeper learning in the context of military leadership emphasizes the use of a leader’s core competencies: the ability to formulate military concepts and principles, and the capability to solve problems and disseminate ideas. Deeper learning is synonymous with Army learning as “Army learning is the act of acquiring, maintaining, or improving knowledge skills, and attitudes to achieve required performance” (U.S. Army Training and Doctrine Command, 2017b, p. 21). The graduates of the United States Army Sergeants Major Course (USASMA) will be able to think critically, apply knowledge, and solve problems under uncertain, complex, and chaotic operational environments. More importantly, according to the Army Learning Concept (2017b), it is important for the students to gain deeper understanding because “Effective critical and creative thinking are essential for successful application of all three Army Planning Methodologies: Troop Leading Procedures, Mission Decision Making Process, and the Army Design Methodology” (U.S. Army Training and Doctrine Command, 2017b, p. 21). Yet in today’s schoolhouse environment, there is currently no way to measure the critical thinking skill set that is desperately needed. To remedy that, the proposed qualitative action research study seeks to understand USASMA students’ perceptions of the Joint Interagency Intergovernmental Multinational (JIIM) curriculum and will determine the impact of student-centered summative assessments on students’ critical thinking skills after the recommended Phase III JIIM Mission Readiness Exercise. The goals of this research are to help students increase their knowledge, skills, and abilities to achieve higher levels of cognition during their pursuit of one of the most fundamental learning outcomes (Evaluation), and to aid their development and metacognition in the JIIM discipline. Paul and Elder’s (2007) framework for critical thinking and Anderson’s et al. (2001) A Revision of Bloom’s Taxonomy of Educational Objectives, are crucial to ensuring the JIIM curriculum sets the conditions for future senior enlisted leaders to learn at maximum capacity in the 21st century. Background of the Problem As USASMA educators, we are required to educate and evaluate each student on JIIM curriculum (i.e., a minimum of every six weeks for a total of six semesters). We, as instructors, realize that the gap that exists between theoretical learning and the practice within the force, creates significant inconsistencies. This need motivated us to expand our exposure to literature on curriculum theory, curriculum design, and assessment strategies that converge in andragogy theoretical educational principles in order to construct a research study to measure these deficiencies, and then propose solutions to fix them. According to Noddings (1983), John Dewey often advised, “Any subject freely undertaken as an occupation as a set of tasks requiring goal-setting, means-ends analysis, choice of appropriate tools and materials, exercise of skills, living through the consequences, and evaluating the results—is educative” (p. 193). As members of an all-volunteer force, Army senior enlisted leaders freely accept the demands of their occupation; however, many are denied a complete education when they are required to follow a one-size-fits-all mentality within the operational enlisted force that, by design, does not consider the nature of the students’ past experiences, learning preferences, environment, or personal background. The Army Institutional Noncommissioned Officers Professional Development System’s rote research methods and summative assessments currently limit the ability to educate senior enlisted leaders at Bloom’s top level of evaluation. John Dewey (1929) believed rote memorization to be ineffective and that educators should devote their time “training the child’s power of imagery and in seeing to it that he was continually forming definite vivid, and growing images of the various subjects with which he comes in contact in his experience” (p. 38). Summative assessments and associated rubrics, if modified, provide an opportunity to go from strict analyzation to instead allowing the student to evaluate the effectiveness between theories of metacognition and constructivism. Dewey’s constructivist theory is just as important to adult learners as it is to children, but knowledge construction, left to itself, risks reinforcing erroneous data. For these reasons, this proposed action research study aims to improve senior enlisted leaders’ education regarding curriculum, pedagogy, and assessment through a thought-infused and guided constructivism. The research study is based off of Dr. Richard Paul and A. J. Binker’s teachings (Socratic Questioning, n.d.): What we need to do, in contrast, is to stimulate student's thinking right from the start, especially about the most basic ideas in a subject so that they are motivated from the beginning to use their thinking in trying to understand things, and so that they base their thinking on foundational ideas that make sense to them. (p. 372) In the United States Army senior enlisted profession, leaders are assigned to organizations where they are required to be the subject matter experts regarding their ability to provide advice to their respective officer counterpart. Their lack of critical thinking skills, tied to a curriculum that only expects a student to reach the analyzation learning level, limits the senior enlisted leader in providing advice that is sound and articulated in a manner that allows for common understanding at the lowest levels of command. A senior enlisted leader must be able to both analyze and evaluate in an environment associated with mission command (Department of the Army, 2014a). Purpose of the Study Understanding USASMA students’ perceptions of curriculum leads to an understanding of the level of thought Sergeants Major Course students’ apply towards the subject. It also lends clues as to how summative assessments might be used in a traditional behaviorist curriculum. The following research questions, representing separate iterations of the action research cycle, are the recommended guiding principles of this proposed qualitative action research study: - What are USASMA students’ perceptions of JIIM curriculum concerning the experiential learning model and andragogy principles? - What is the impact of summative assessments on the critical thinking skills of USASMA students regarding Bloom’s taxonomy in Phase III of the JIIM Readiness Exercise? The study’s goal of helping students develop a standard of critical thought leading to practice is fundamental to the study, and it is fueled by additional recommendations that are being purposed to encourage continual intellectual growth that would help Sergeants Major Course students further develop their abilities throughout their senior leader careers. This action research study follows a qualitative design that is guided by the following research question: What are the USASMA students’ perceptions of the efficacy of education in their professional military educational experience while attending USASMA? This study proposes using two iterations of the action research cycle to understand students’ perceptions of the curriculum and to determine the impact of the experiential learning model and summative assessments on their performance and critical thinking abilities. Informal survey data would be captured from 16 USASMA students during the first action research cycle. After an inferential analysis of the data, an action plan informs the second action research cycle where during the second semester, 16 more students (i.e., “MSG X,” “MSG Y,” and “MSG Z”) are selected for semi-structured interviews and would participate in a guided summative assessment during phase III, Mission Readiness Exercise. In addition to the semi-structured interviews, data collection during the second cycle would include participant/researcher-developed field observations and informal interview data. If action research is conducted in a two-phase scenario using a control group in the first semester made up of 16 USASMA students and an experimental group during the second semester of 16 more students, the results would show that the experimental group would reach a higher level of learning and evaluation. This would be achieved by using the dependent variables of the phase III Mission Readiness Exercise and the independent variable being the associated modified curriculum and rubric to facilitate and perform a final summative assessment. In the first semester, the control group would receive no treatment and would only be monitored and evaluated based on the current curriculum plus an informal survey data. When the first semester finishes, the experimental group would be evaluated with the treatment and then evaluated based on the modified curriculum and rubrics set in place for the second-semester evaluation. The difference being during the final assessment the students would be asked questions associated with the learning level of evaluation. From these questions, and subsequent follow-on interviews with both groups, the research results would show that the experimental group reached a higher level of learning achievement and critical thinking ability. A change in JIIM curriculum is needed in the USASMA portfolio to guide students’ development of deeper learning and critical thinking skills that go beyond just analysis, and rise to the level of profound evaluation and creation. This requirement is born of the need for a United States Army Sergeants Major Academy student to critically evaluate all facts and scenarios and provide sound advice to superiors, peers, and subordinates concerning the commanders’ intent, especially in combat zones. Ultimately, the goal is to educate all future senior enlisted leaders to a level equal to the top tier of Bloom’s Taxonomy. This will decrease the amount of mistakes on the multi-domain battlefield, resulting in fewer Soldier deaths due to poor mission planning and negligence. Anderson, L.W. (Ed.), Krathwohl, D.R. (Ed.), Airasian, P.W., Cruikshank, K.A., Mayer, R.E., Pintrich, P.R., Raths, J., & Wittrock, M.C. (2001).A taxonomy for learning, teaching, and assessing: A revision of Bloom’s taxonomy of educational objectives (Complete edition). New York: Longman. Dewey, J. (1929). My pedagogic creed. In D. J. Flinders & S. J. Thornton (Eds.), The curriculum studies reader (4th ed.) (p. 33-40). New York: Routledge. Headquarters, Department of the Army. (2014a, March). ADP 6-0: Mission command. Washington, DC: Department of the Army. Mertler, C. (2014).Action research: Improving schools and empowering educators (4th ed). Thousand Oaks, CA: SAGE Publications, Inc. Noddings, N. (1983). The false promise of the paideia: A critical review of the paideia proposal. In D. J. Flinders & S. J. Thornton (Eds.), The curriculum studies reader (4th ed). (p. 187-194) New York: Routledge. Paul, R. & Binker, A. (n.d.). Socratic questioning. Retrieved from www.criticalthinking.org Paul, R. & Elder, L. (2007). A critical thinker’s guide to educational fads Tomales, CA: Foundation for Critical Thinking. U.S. Army Training and Doctrine Command. (2017a). Army learning policy and systems. Retrieved from https://adminpubs.tradoc.army.mil/regulations/TR350-70.pdf U.S. Army Training and Doctrine Command. (2017b). Pamphlet 350-70: The U.S. Army learning concept for training and education. Retrieved from http://adminpubs.tradoc.army.mil/pamphlets/TP525-8-2.pdf Sgt. Maj. Dennis J. Collins is an instructor at the United States Army Sergeants Major Academy. He currently serves in the Department of Joint, Interagency, Intergovernmental and Multinational. He has previously served as brigade command sergeant major for the 414th Contracting Support Brigade, Vicenza, Italy and battalion command sergeant major for 129th CSSB, Fort Campbell, Kentucky. His education includes five master’s degrees in Adult Education, Master of Business Administration, MA Human Resource Development, MS Human Resource Management, and Master of Healthcare Administration. Sgt. Maj. Collins is also working on a Doctorate in Strategic Leadership. Sgt. Maj. Matildo Coppi is a U.S. Army Penn State Fellow and an adult educator. He is currently serving as the Vice-Chair for the Department of Joint, Interagency, Intergovernmental, and Multinational at the United States Army Sergeants Major Academy. He previously served as the command sergeant major for the Defense Language Institute Foreign Language Center at the Presidio of Monterey, California. Prior to that, he served as the battalion command sergeant major for the 344th Military Intelligence Battalion, Goodfellow Air Force Base, Texas. Mr. Alex Santos is an instructor at the United States Army Sergeants Major Academy, NCO Leadership Center of Excellence, Department of Joint Interagency Intergovernmental and Multinational. Mr. Santos is a sergeants major course subject matter expert and was a staff group advisor for Class 59, 60, 61, and 62, and an Associate Professor for class 65, 66, 67 and 68. He earned a Master of Arts in Education from University of Phoenix, 2011, and his Education Specialist degree in 2018.
<urn:uuid:9cf98f8b-03fd-4dec-b01b-ed00216aeb0d>
CC-MAIN-2020-29
https://www.armyupress.army.mil/Journals/NCO-Journal/Archives/2019/March/Pathway-Forward/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657172545.84/warc/CC-MAIN-20200716153247-20200716183247-00134.warc.gz
en
0.9289
2,798
2.84375
3
Wildlife Accident Reporting System - Protecting B.C.'s Wildlife The ministry has a comprehensive program to help mitigate wildlife-vehicle crashes on B.C.'s network of highways and roads. Hundreds of ministry employees and contractors are actively involved in monitoring wildlife incidents and developing solutions. Caribou, Kootenay Pass. The ministry's Wildlife Accident Reporting System (WARS) started in 1978. Ministry maintenance contractors identify and record the species and location of each animal killed on the highways. This helps to identify where mitigation efforts are needed the most. To make travel safer for motorists and to protect B.C.'s wildlife populations, the ministry has reduced wildlife collisions through wildlife exclusion fencing, overpasses, underpasses and warning signs, located on rural highways across the province. So far, this program has contributed: - Over 500 km of wildlife exclusion fencing - 4 wildlife overpasses - 29 large wildlife underpasses - More than 70 small underpasses - Approximately 1,200 species-specific wildlife warning signs Wildlife Exclusion Fencing, Hwy 5 For camera images of animals using the ministry’s small animal underpasses, go to: For tips on how to be a responsible driver and watch for wildlife on the road, go to: Tips for drivers - Pay attention and drive at the posted speed limit - Drive at reduced speeds from dusk to dawn when animals are most active - Keep windshields clean as animals are not always easy to spot - Keep vehicles in good repair - Have good tires and brakes for safe stopping - Check the route on DriveBC
<urn:uuid:8ca84cf3-1263-48fb-bd06-9cb1972a477f>
CC-MAIN-2017-43
http://www.th.gov.bc.ca/mot_org/hwyeng/wars.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822488.34/warc/CC-MAIN-20171017200905-20171017220905-00193.warc.gz
en
0.895163
341
2.546875
3
Here's how it works. A student completes a survey that asks questions either about the child or about the topic being covered. Here's an example of a survey I use with an apple unit. After the student completes the survey, the child uses a legend to learn how to visually display their results. For this example, I've included the legend with the survey. You'll notice that if the child is a boy, the apple will have a brown stem. This child adds a brown stem to his apple. This particular glyph is a back to school glyph for classroom management. All the kids that ride a bus will visually display that information with a red apple. If all the apples are on a bulletin board, it would be easy to know how students go home. In fact, glyphs are super tools for writing prompts too. I try to use a social studies or science topic for my glyphs so that students are using these subject in a seamless integration with math and language arts. I try to use a glyph each month. It's fun to teach with glyphs throughout the year. So far, I have created the following glyphs for throughout the school year. Please click on the images to learn more. I use this apple glyph for back to school and this is a fall glyph to use during apple studies. Another back to school glyph and classroom discipline glyph I have is my fish glyph. It works well as a behavior chart once it is completed. My cowboy glyph and cowgirl glyph is a great glyph at anytime in the year. I used it with one of our cowboy reading selections. I like this cute Valentine's Day Glyph. This plant glyph is a super across the curriculum example. Students learn about sunflowers, math, and writing. I love this kite glyph. It also incorporates shapes. I even have a shamrock glyph and a leprechaun glyph for Saint Patrick's Day. I really worked hard on this Earth day Glyph. Students use only recycled items to create it. I have several spring glyphs and Easter glyphs too. One of my favorite science glyphs is my Life Cycle of a Butterfly Glyph. This glyph also includes shape and color recognition. Thanks and enjoy! Robin
<urn:uuid:ef37231e-97a8-45e3-aeaa-d3a7902fdb59>
CC-MAIN-2020-29
http://www.sweetteaclassroom.com/2012/08/seasonal-glyphs-for-kids-throughout-year.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906934.51/warc/CC-MAIN-20200710082212-20200710112212-00141.warc.gz
en
0.948834
463
2.671875
3
|MadSci Network: Computer Science| It is known as a fact that computers do not do things in random order. They need a preset number, a seed number, to calculate and simulate a random feeling. This is often achieved using the seconds and hours as seed numbers since that is constantly changing. My question is, how do cd players and other devices that has no timer achieve randomness? What do they use as a seed number? It cannot be the number of songs because that is always the same and the first song played in random is always different. I know a similiar answer has been indirectly posted but It was only a brief explanation that I did not understand very well. The scientist said something about key presses and the order of data on cd-roms but my question goes to music cd-players. thank you. Re: How can a cd player be random with no seed number? Try the links in the MadSci Library for more information on Computer Science.
<urn:uuid:c3690952-bed0-4364-b5fb-ece86e41b4ec>
CC-MAIN-2017-43
http://www.madsci.org/posts/archives/2001-07/994640757.Cs.q.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828178.96/warc/CC-MAIN-20171024052836-20171024072602-00003.warc.gz
en
0.972467
201
3.359375
3
A while back, I wrote a blog post that discussed how people in the past predicted the future, and I promised a sequel. Here it is, with another sequel to follow. Back in 1895, several prominent newspaper editors were asked to speculate on what newspapers would look like in the 20th Century. Some of their predictions were quite uncanny, and some were, well, a bit off the mark. Who would have thought that by the end of the 20th Century, traditional newspapers would be disappearing and moving to electronic versions of themselves? When I began my career in journalism with the Chicago Tribune, the weekday circulation of the paper was about 800,000 and the Sunday paper was about 1.3 million. Today, the Tribune is but a shadow of its former self, and it has even abandoned its iconic Tribune Tower home on Michigan Avenue, where it had been since about 1925. The Tribune’s once enormous, bustling newsroom is gone–downsized from hundreds of editors, reporters, photographers, graphic designers, copyboys (and girls), and others to what, by comparison, is a mere handful of people. For me, the continued downsizing and death of America’s once-traditional and prototypical newspapers is like losing a family member. It’s sad but also inevitable, given new digital technologies, the advent of social media platforms, and the patterns of modern-day life where news is delivered electronically to and read on hand-held devices such as cell phones and i-pads. It’s a brave new world that none of those journalists in 1895 could have envisioned. Or did they? Here are a couple of examples: - Felix Agnus, Editor of the Baltimore American: “Today I saw a new invention that distributes written messages to its customers, the matter clearly printed on convenient sheets. The inventor tells me he can afford to place these at a very moderate cost in offices or in homes. All it needs is a long roll of paper. It does the rest. Now, what is to prevent the people of the next century from having their news continuously? As soon as an event occurs, it is broadcast over the wires and is immediately printed by the automatic machine. How will a newspaper published once a day compete with a scheme such as that?” Sounds a lot like something we used to call a telex machine. They never made it into homes, at least not on a large scale, but they were in just about every newsroom in the world. - Then there was this prediction from A.G. Boynton, editor of the Detroit Free Press: “Keeping…with the limits of the possible, this much is safe to forecast….there will be great and marked progress in independence—that the newspaper of the twentieth century will not be tied, as the newspaper of the nineteenth century is far too often, to a party, a sect or a creed.” Sadly, Mr. Boynton’s vision of today’s newspaper has proven to be more aspiration than reality. News today is too often skewed by reporters, editors, producers, and publishers to fit their own political agendas or worldviews. I should acknowledge, however, that for a while in the 20th Century the concept of trying to achieve some form of objectivity and fairness in reporting was rigidly adhered to in the best newspapers. At least it was at the newspapers I worked at. Mr. Boynton’s predictions and others appeared in an article that appeared in the Tacoma Daily News March 30, 1895. We can enjoy this 120-year-old article because of Readex, a company that for seven decades has specialized in providing access to primary source research materials such as early American Newspapers. Here is a link to the Readex blog: http://www.readex.com/blog and a link to the actual article: http://www.readex.com/sites/default/files/Notable%20Forecasts%20Tacoma%20Daily%20News%2003.30.1895.pdf Many of these editors had already personally witnessed amazing advancements in newspaper publishing, the Readex article pointed out. They had seen newspapers progress from the old Washington hand press to enormous printing presses capable of producing tens of thousands of newspapers in just a few hours; from the Pony Express and stagecoach to the telephone and telegraph; from hand-setting type to typesetting linotype machines and the halftone photo reproduction process. And while some of the predictions may seem a little quaint, given The Internet and today’s 24-hour news cycles, I am amazed at how prescient these editors were. Here is James Elverson, editor of the Philadelphia Inquirer: - “The chief characteristic of the twentieth-century newspaper must necessarily be correlated with the twentieth-century scientific inventions….If the flying machine is perfected, every first-class reporter will have one. If the airship is a success, they will distribute tons of newspapers daily. If telegraphy becomes an exact science, the inmost heart of man will be revealed daily to the public. If Esoteric Buddhism gathers the world to its bosom and Mahatmas drops messages about the present, past, and future through newspaper roofs from the desert of Gobi, then every first-class newspaper will have its staff of Mahatmas to preach ethics to its readers. Pneumatic tubes may distance trains; photo scopes may reproduce pictures 10,000 miles away, and possibly the kinescope may be so adapted that every reader may have one in his house in which to view the scenes of which he reads in his favorite newspaper, the photographic strips, therefore, being issued as supplements. Possibly we shall not use type anymore, but by some complex arrangement, issue rolls that shall run through phonographs. Then, as the twentieth-century man sits down to breakfast, he can have the news read to him while he sees every event in the kinescope, and at the same time, he can swallow his morning meal.” Sounds a lot like watching CNN or FOX while eating your oatmeal. And don’t forget, this was BEFORE the invention of the radio or television. Percy S. Heath, the editor of the Cincinnati Commercial Gazette, may have foreseen the ubiquitous “Op-Ed” page of today’s newspaper: “A forum, where the people may go with ideas and grievances, and appeal to public opinion. This, to my mind, will be the feature and the characteristic of the future newspaper. I believe the forceful utterances of the press will come directly from the people; that the intelligent reader is becoming every day a man or woman of opinion, of fixed ideas, and that sentiment will be expressed more and more freely through the press by those not directly connected with it. There will be less arbitrary editorial expression. The ‘fourth page’ will contain that thought of the reader which up to this time the editor has sought to forestall or anticipate.” Charles W. Knapp, the editor of the St. Louis Republic, seems here to presage the way many of us customize the news we get from our online newspapers. - To fulfill its mission perfectly, (the newspaper) will be issued not once or twice but half a dozen times every day. Perhaps also the great fin de siècle newspaper of the twentieth century will be published in several different editions varying radically in the character of their contents so as to meet the varying wants of different classes of subscribers and at the same time obviate the undue enlargement of its size. It is bound to be more comprehensive in the exhaustive completeness of its information than the newspaper of today, but it will not be necessary for every reader to take the whole daily encyclopedia. Those who wish will have the opportunity to designate specific classes of news to be sent to them, and in some degree, every subscriber will have the privilege of ordering his newspaper made to fit his own individual and particular wants.” .George A. Robertson, editor of the Cleveland World, sees newspapers using several “new” inventions to collect and disseminate news faster. He also sees the use of more photography. However, his vision falls a little short when it comes to his altruistic view of the 20th Century newspaper. - “Already within sight are numerous remarkable inventions that will be made use of to improve the newspaper of the future. A machine is already patented and in limited use that sends messages by wire ten times as fast as the present telegraphic code, and these messages are automatically written out as they arrive. This will be employed by the coming newspaper to improve its news facilities. A machine for transforming pictures by wire will be fully perfected within the near future, and there will be such a cheapening of engraving processes that newspapers will be much more fully and beautifully illustrated than at present. Telegraphic accounts of happenings in all parts of the world will be accompanied, as received, with engravings ready to be dropped into the forms….Sensationalism is on the wane, and the time will come early in the next century when the newspaper that lies will be considered as despicable as the man who does the same thing now. The twentieth-century newspaper will not be entirely composed of the record of the ‘evil that men do,’ but some of the good things will also be mentioned.” Finally, here is Frank A. Richardson, editor of the Baltimore Sun. While I applaud his optimism concerning the human condition and his laudable vision of scrupulous and truthful editors, there are far too few of these trustworthy souls toiling in today’s newsrooms. - “As mankind, with the march of time, becomes more noble and elevated, the newspaper, which is at once the leader and the follower of public sentiment, must share in this. Therefore I should say the newspaper of the twentieth century must be conducted on a higher plane. Its great aim must be to instruct and purify rather than merely amuse for an idle hour and increase its circulation by pandering to the baser instincts of humanity. There are a few striking instances among the leading newspapers of this day where the desire for gain is not made the paramount consideration. In the twentieth century, this will become more and more apparent, for incentives to the contrary course which exist now will disappear. The newspaper of the next century will be guided by the hand of strictest truth and honor, for policy, if not conscience, will make it so.” Perhaps the most troubling part of this story is the fact that of the 13 newspapers polled in this 1895 exercise, only four are still being published today. That none of the editors could foresee the demise of their own newspapers is not surprising to me. The 1890s was an optimistic decade in American history, with a young nation just beginning to flex its political and economic muscles on the world stage. Given the gloomy, often deplorable world we live in today with its poverty and wars waged by zealous fanatics; its pervasive drug use; the decline of the traditional family; the inexorable secularization of society, and with it, the relentless obliteration of morality, integrity, and civility; I wonder how today’s 21st Century editors would foretell the world of the 22d Century. With much less optimism, I would wager.
<urn:uuid:4430561f-134c-4641-a409-d5219dbd863f>
CC-MAIN-2023-14
https://ronaldyatesbooks.com/2022/10/19th-century-newspaper-editors-imagine-newspapers-of-the-future-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00191.warc.gz
en
0.968084
2,356
2.625
3
A CT (computed tomography) scan uses X-rays to make detailed pictures of structures inside the body. A CT scan of the head can give your doctor information about your child's eyes, bones of the face and nose, inner ear, and brain. During the test, your child will lie on a moving table that is attached to the CT scanner. The CT scanner is a large doughnut-shaped machine. The table will move in and out of the centre of the machine during the scan. If you aren't pregnant, you can stay in the room with your child during the test. You will wear an apron that protects your body from X-rays. A CT scan of the head can help find the cause of headaches or look for fractures or bleeding after a head injury. Talk to your doctor about all of your child's health conditions before the test. For example, tell your doctor if: Follow-up care is a key part of your child's treatment and safety. Be sure to make and go to all appointments, and call your doctor or nurse call line if your child is having problems. It's also a good idea to keep a list of the medicines your child takes. Ask your doctor when you can expect to have your child's test results. Go to https://www.healthwise.net/patientEd Enter K882 in the search box to learn more about "CT Scan of the Head: About Your Child's Test." Current as of: October 14, 2016 Adam Husney, MD - Family Medicine & E. Gregory Thompson, MD - Internal Medicine & Howard Schaff, MD - Diagnostic Radiology © 2006-2017 Healthwise, Incorporated. Healthwise, Healthwise for every health decision, and the Healthwise logo are trademarks of Healthwise, Incorporated. Care instructions adapted under license by your healthcare professional. If you have questions about a medical condition or this instruction, always ask your healthcare professional. Healthwise, Incorporated disclaims any warranty or liability for your use of this information.
<urn:uuid:a9e65134-8eb1-4b73-8ccd-c6e38fdfe782>
CC-MAIN-2017-26
https://myhealth.alberta.ca/health/AfterCareInformation/pages/conditions.aspx?hwid=abo4518
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320261.6/warc/CC-MAIN-20170624115542-20170624135542-00376.warc.gz
en
0.922278
424
3.125
3
Above is an image from Wikimedia commons of an Olmec figurine, discovered in what is now Mexico, and thought to date from the 6th century BC to as far back as the 10th century BC. It is made of greenstone, which is a material that is notably treasured by the Maori of Aotearoa and used by them for centuries to make figurines and jewelry, as discussed in this previous post. This particular Olmec figurine displays features of a man, but also of a bird of prey, possibly an eagle, including a plume between two wide-spread eyes, and a beak-like mouth. Here is a link to the page at the Metropolitan Museum of Art describing the figurine. The discussion there notes that some scholars believe that: such figures are representations of a shaman's transfiguration into his nahual, or powerful animal counterpart. It is believed that, in this altered state, a shaman is able to interact with the spirit world and use his abilities to heal, punish, or predict the future. In the Pyramid Texts of ancient Egypt, the king is described as transforming into a bird of prey as well. Scholar Jeremy Naydler has argued that the Pyramid Texts do not describe the hoped-for journey of the soul of a departed king, but rather that they describe a deliberate out-of-body journey taken by a living king. In other words, he believes the Pyramid Texts are primarily shamanic rather than funerary. See this previous post and this previous post for further discussion of Jeremy Naydler's important thesis. You can visit the Pyramid Texts online through an outstanding website called the Pyramid Texts Online. There, you can read the texts as they are laid out in the pyramid of Unas, last king of the Fifth Dynasty of ancient Egypt, whose reign ended circa 2345 BC. On the south wall of the passageway between the sarcophagus chamber and the antechamber, you can find Utterance 245, in which Unas is transformed into a hawk: This Unas comes to you, O Nut, this Unas comes to you, O Nut! He has thrown his father down to earth he has left a Horus behind him. His two wings have grown as those of a hawk, (his) two feathers (are those) of a holy hawk. His soul has brought him (here), his magical power has adorned him. May you open your place in heaven amongst the stars of heaven! You are indeed the unique star, the comrade of Hu. May you look down on Osiris, when he gives orders to the spirits! You stand high up, far from him. You are not of them, you shall not be of them.
<urn:uuid:cdfdfa93-3d29-4969-9d9c-dedd397295c3>
CC-MAIN-2017-30
http://mathisencorollary.blogspot.com/2013/07/utterance-245-transformation-into-hawk.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424247.30/warc/CC-MAIN-20170723042657-20170723062657-00055.warc.gz
en
0.963172
575
3.234375
3
UCLA researchers in the Department of Electrical Engineering have developed a new portable device to rapidly measure yeast cell viability and concentration using a lab-on-chip design. Yeast cells are frequently used in the alcoholic beverage and baking industry to make beer, wine, and bread. Recently, biofuel production using yeast has emerged to replace fossil fuels. Monitoring the concentration and viability of yeast cells allows for fine-tuning of fermentation parameters, which is crucial for both research laboratories and the industry. Therefore, biofuel, alcoholic beverage and baking industries can benefit from a rapid and cost-effective yeast viability and concentration analysis method. Current methods to test yeast viability are time-consuming, large form factor, and require expensive equipment. UCLA researchers led by Prof. Aydogan Ozcan have developed a novel portable lab-on-chip lens free microscope system to monitor yeast cell viability and concentration. Furthermore, the device utilizes machine learning algorithms to process images, eliminating user subjectivity, and reducing acquisition and analysis time. These dual developments have allowed for the development of the Automated Yeast Analysis Platform technology, which yields data that agrees well with current gold-standard technologies. Yeast cell viability, yeast cell concentration, haemocytometer, fermentation, yeast, brewers’ yeast, lab-on-chip, microfluidics, machine learning, imaging, cell imaging, cell quantification, dead or alive assay, cell concentration
<urn:uuid:ec3ca907-084a-4355-bd70-a4d8f1fd7747>
CC-MAIN-2020-29
https://techtransfer.universityofcalifornia.edu/NCD/27515.html?int_campaign=OnHoldTech_Inventors-Other-Tech-section
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657149205.56/warc/CC-MAIN-20200714051924-20200714081924-00565.warc.gz
en
0.920693
289
3.171875
3
Selaginella, commonly known as meadow spike moss. In nature it’s found primarily in damp soils with shade. From our horticulture Selaginella Apoda is a beautiful, shaped plant with a very fresh green color, and Selaginella Martensii Variegata likes and responds to the colder temperature – the more white tips it gets – however, it cannot not tolerate frost. Selaginella should be watered regularly, always kept slightly moist and fertilized sparingly. It likes high humidity, shade and must not dry out. |6 cm||6 cm||8 cm||8 cm||10,5cm|
<urn:uuid:25b5ee8f-18cd-4e44-816d-d3bc3858e565>
CC-MAIN-2023-14
https://www.timmermann.dk/selaginella/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00293.warc.gz
en
0.813228
194
2.5625
3
NASA, SpaceX move forward toward launching first commercial vehicle ever to ISS HOUSTON (KTRK) -- With the space shuttle program in retirement, NASA is working with commercial companies to transport supplies to the International Space Station. And in just two weeks, we'll get our first real look at how that partnership will work. On Monday, NASA officials gathered at the Johnson Space Center to discuss the upcoming mission. This is a significant milestone. After a readiness review Monday, NASA and SpaceX are moving forward toward launching the first commercial vehicle ever to the International Space Station. April 30 is now the official launch date targeted for the SpaceX Falcon 9 and Dragon. That's two weeks from Monday. It's a demonstration test and a chance for the California company to prove it can safely deliver cargo to the space station. "I think our odds of success on this mission are grater than 50 percent," said SpaceX CEO Elon Musk. He told us in a one-on-one interview he is optimistic the mission will prove a success. But he knows there are hurdles to overcome. "But it is a test flight, and there's certainly any number of things that could go wrong," Musk said. Once launched the Dragon will perform eight tasks, attempting to prove itself ready and safe for flight, eventually with astronauts on board. The unmanned capsule will fly around the space station before being grabbed by its giant robotic arm and birthing with the orbiting outpost. Onboard will be 1,100 pounds of cargo including food and provisions for ISS crews. After more than two weeks, it will bring home nearly 1,400 pounds of hardware and experiments, landing off California in the Pacific Ocean. SpaceX is one of four companies contracted with NASA to build a vehicle that will help service the ISS, replacing the recently retired space shuttle. SpaceX has a $1.6 billion contract for at least 12 flights to the station. NASA officials say getting to this point where they feel comfortable confirming a launch date has been no easy task. "It's been a tremendous learning experience for both of us. We have definitely learned some things from SpaceX and hope they've learned some things from us as we go through," said William Gerstenmaier with NASA. Weather constraints are very similar to that for a shuttle launch. NASA says rain, lightning and winds will always be a concern. If for some reason the launch on April 30 is scrubbed, they can try again the first week of May. nasa, local, kevin quinn - Girl finds mother shot to death in SW Houston 51 min ago - College student from Baytown fatally shot - Kubiak era ends in Houston - Shots fired during robbery on UH campus - Cold, damp weather to continue 48 min ago - Dog rescued from fire in Conroe - Apartments under construction burn in 2-alarm blaze - Pearl Harbor ceremony marks bombing anniversary - Ice to linger over much of Texas - Dad's murder trial too much for him to watch - Texans fire special teams coach Joe Marciano - Homeowner questions handling of Christmas package - Methodist: Personal info of 1,300 transplant patients stolen - Video: Dog shoplifts and buries treats
<urn:uuid:7b74730c-909a-462f-a6c0-982154fc7ad8>
CC-MAIN-2013-48
http://abclocal.go.com/ktrk/story?section=news/local&id=8623288
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055217/warc/CC-MAIN-20131204131735-00041-ip-10-33-133-15.ec2.internal.warc.gz
en
0.946128
660
2.765625
3
Skin Lesion Removal Many types of skin lesions can be removed for medical and cosmetic reasons. While skin lesion removal is typically recommended if the lesion shows signs of possible skin cancer, such as changing color or shape, many of these lesions may still be harmless. Biopsies are performed on removed lesions to know for sure. The University of Kansas Health System offers skin lesion removal for both cancerous and noncancerous skin lesions. In conjunction with The University of Kansas Cancer Center, our specialists treat skin lesions and melanoma in a way that prioritizes optimal healing after skin lesion removal or other types of skin cancer treatment. What is skin lesion removal? Skin lesion removal is a procedure that’s performed to remove growths or other irregularities on the skin. People can have skin lesions removed for cosmetic reasons even if the lesion is benign (noncancerous). Some skin lesions can be removed during a normal office visit, while others require surgery to remove. In some cases, your doctor may remove a portion of the skin lesion and then send the tissue to the lab for a biopsy to determine whether the cells are cancerous. If so, skin cancer treatment may be recommended. Who can have skin lesion removal? Lesions that have not displayed any signs of cancer will be treated initially with nonsurgical procedures such as medicines, creams, lotions or over-the-counter treatments. Lesions that do not respond to these treatments may then be considered for skin lesion removal. Lesions that do show cancerous signs will be removed. In addition, some noncancerous lesions in sensitive or highly visible areas may also be removed surgically without trying nonsurgical methods in order to minimize scarring. How does skin lesion removal work? Depending on the size, severity and type of lesion to be removed, there are a number of procedures that may be used for skin lesion removal. The simplest procedures include cutting skin tags with surgical scissors and shaving noncancerous lesions down to the skin level. More serious surgeries include removing the lesion and surrounding skin through surgical excision, laser therapy or photoactivated chemicals. Freezing skin tags, lesions or moles with liquid nitrogen is also common. Cancer care you can count on The University of Kansas Health System is part of The University of Kansas Cancer Center – 1 of just 54 NCI-designated comprehensive cancer centers in the nation. Benefits and risks of skin lesion removal Skin lesion removal can be beneficial for cosmetic and functional reasons. From an aesthetic perspective, skin lesion removal can result in smoother skin with fewer blemishes. Those who remove skin lesions to improve their appearance often feel more confident after skin lesion removal. Other skin lesions may be abnormal, sore, lumpy or uncomfortable. Some may be cancerous. Removing the lesion not only improves discomfort, it can also protect your health. The skin lesion removal procedure is extremely common and very safe, but there is a low risk of complications, including infection, scarring, bleeding and changes to sensitivity. You will receive instructions on how to care for your skin after your procedure to ensure full healing. What happens during skin lesion removal? Some warts and lesions may be removed through a freezing procedure that uses liquid nitrogen to remove the lesion and requires no anesthetic. Most other surgical removals require the use of local anesthetic to numb the area during the procedure. When removing a suspected cancerous lesion, it is often critical to remove an entire barrier of healthy tissue around the lesion to ensure the cancer does not spread. More invasive procedures, such as Mohs surgery, involve the careful layer-by-layer removal of skin tissue – going as deep as necessary to ensure the entire lesion and a healthy barrier of tissue have been removed. Following surgical skin lesion removal, simple incisions are closed with sutures, while larger surgical areas may be closed using skin grafts from other areas on the body.
<urn:uuid:6ad0f10c-fa56-4b37-8129-dfda9e65ff20>
CC-MAIN-2023-40
https://www.kansashealthsystem.com/care/treatments/reconstructive-surgery/skin-lesion-removal
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00125.warc.gz
en
0.922419
829
2.671875
3
The creative coding concept that encourages kids to learn to code early is making the jump to another Apple device. Apple has come out with some pretty great ideas in recent years, but one of our favourites is built to teach kids how to code. Whether you have a child interested in learning how to think like a programmer, or how to actually code and make something people can use, Swift Playgrounds for iPad has actually made it possible to get kids into programming from an early age by gamifying it. The games are simple, but work on teaching through not just the brain and logical paths behind coding, but Apple’s Swift programming language, too, which means anyone using Swift Playgrounds to learn isn’t just learning a programming method, but a language to apply it to. Now, Apple is bringing that platform to another place to use it, as Swift Playgrounds jumps from the mobile environment of the iPad to more desktops on macOS. Whether it’s used on an MacBook Air or MacBook Pro laptop, or even an iMac, Swift Playgrounds for Mac is effectively a desktop counterpart for its portable iteration, and brings the learning tool to more screens. Moving from Swift Playgrounds, budding programmers could download Apple’s Xcode platform, which could see them jump from learning to code with Swift Playgrounds to real-world programming on the Mac, which is how you program apps for the iPhone and iPad, too. Apple has said Swift Playgrounds for the Mac is also a native macOS app, too, which means it can adapt to your screen size and provide extra room to write code as you learn, while an addition brings code suggestions as you type, allowing you to get any coding for those lessons sorted a little faster. Folks with am OLED Touch Bar-equipped MacBook Pro will also find some support, complete with commands for Swift Playgrounds, built to assist and keep your fingers working away at learning and building code, no interruptions. Swift Playgrounds for Mac even supports a dark mode, thanks to the recent support of a dark interface found in macOS. Handy for folks who want to work in the dark, and don’t want a white screen blowing out their eyes. However if you’re game to try the Swift Playgrounds educational game — or you’re a school teacher keen to install and show students what’s going on — you’re going to want to make sure any Macs you have support macOS Catalina 10.15.3, the latest release (at the time of publishing). Swift Playgrounds for Mac needs that latest update, and can’t be downloaded from the Mac App Store without it, so if you want it, update your OS and then you can use Swift Playgrounds to learn some code.
<urn:uuid:8c9ec94a-2d34-46e5-bc0c-58ccb2b91751>
CC-MAIN-2020-16
https://www.pickr.com.au/news/2020/apple-gets-students-coding-on-macos-as-swift-playgrounds-expands/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371618784.58/warc/CC-MAIN-20200406035448-20200406065948-00498.warc.gz
en
0.94069
577
2.671875
3
Silver weddings (25 years of marriage) or gold ones (50 years together) are celebrated by most couples, even renewing their vows with a family party. But do you know why they are so called? In fact, every year have a name. It is a tradition that comes from the Middle Ages. On each wedding anniversary the couple used to give each other a gift made in a different material. The first year would be paper, and as the years passed the material would become more solid, along with the strengthening of the relationship. This way, if the first year corresponds to paper, the second is cotton, third leather, fourth linen, fifth wood, sixth iron, seventh wool, eighth bronze, ninth pottery, tenth aluminum, eleventh steel, twelfth silk, thirteenth lace, fourteenth ivory, fifteenth crystal, sixteenth ivy, seventeenth alhelí, eighteenth quartz , nineteenth honeysuckle, twentieth porcelain, twenty-first oak, twenty-second copper, twenty-third water, twenty-fourth granite, and twenty-fifth, most famous, to silver. This is followed by roses, jet, amber, garnet, pearl, ebony, copper, tin, poppy, coral, flint, stone, jade, agate, ruby, topaz, jasper, opal, turquoise, sapphire, mother-of-pearl, amethyst, feldspar, and zircon until reaching gold, equivalent to the fiftieth anniversary. Then it goes from luster in luster, emerald, diamond, platinum, titanium, brilliants, oak, marble, granite, onyx and bone, equivalent, this last with one hundred years of married, something really difficult. One last curiosity: although currently they are deceased, the American couple Herbert and Zelmyra Fisher, holds the Guinness record of the longest-lived marriage, 86 years and 290 days. This is to celebrate!
<urn:uuid:5f62a5ab-2eca-4aa6-8190-261d5effed62>
CC-MAIN-2020-05
https://www.panateneasevents.com/en/wedding-anniversaries/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251788528.85/warc/CC-MAIN-20200129041149-20200129071149-00258.warc.gz
en
0.904684
405
2.578125
3
Python File write() Method The method write() writes a string str to the file. There is no return value. Due to buffering, the string may not actually show up in the file until the flush() or close() method is called. Following is the syntax for write() method: fileObject.write( str ) str -- This is the String to be written in the file. This method does not return any value. The following example shows the usage of write() method. This is 1st line This is 2nd line This is 3rd line This is 4th line This is 5th line #!/usr/bin/python # Open a file in write mode fo = open("foo.txt", "rw+") print "Name of the file: ", fo.name # Assuming file has following 5 lines # This is 1st line # This is 2nd line # This is 3rd line # This is 4th line # This is 5th line str = "This is 6th line" # Write a line at the end of the file. fo.seek(0, 2) line = fo.write( str ) # Now read complete file from beginning. fo.seek(0,0) for index in range(6): line = fo.next() print "Line No %d - %s" % (index, line) # Close opend file fo.close() Let us compile and run the above program, this will produce the following result: Name of the file: foo.txt Line No 0 - This is 1st line Line No 1 - This is 2nd line Line No 2 - This is 3rd line Line No 3 - This is 4th line Line No 4 - This is 5th line Line No 5 - This is 6th line
<urn:uuid:d0518bfe-3a1c-447b-871c-f88a68cf9cd3>
CC-MAIN-2014-15
http://www.tutorialspoint.com/python/file_write.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00305-ip-10-147-4-33.ec2.internal.warc.gz
en
0.911427
374
4.6875
5
Define Work Life Balance and Organisation Health Safety. What are the barriers to the implementation of work life balance policies? Is there a relationship between Work Life Balance and Organisation Health Safety? (Please use around 400 to 500 words to answers this section) Part B (Please answer this part in paragraph, like an essay) i. What is individualism and collectivism? ii. How individualism and collectivism demonstrated the workplace. iii. What are the Pros and Cons of individualism and collectivism? iv. What are the characteristic of individualistic employment relation and the rationale for collectivism.
<urn:uuid:5313dc9f-ef62-43a1-85e9-11e4e5a7353c>
CC-MAIN-2020-29
https://usaonlineessays.com/coursework-15/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655929376.49/warc/CC-MAIN-20200711095334-20200711125334-00034.warc.gz
en
0.88535
123
2.59375
3
Submarine Computational Fluid Dynamics Project reference: 2021 CFD is solving time dependent partial differential equations (PDE) and PDE is solved by numerical approximation. Which brings the system of equations (matrices and vectors) that need to be solved either by direct or indirect solvers. These solvers need a huge computational power in terms of the chosen problem. Pre-processing and post-processing (time step solutions) also requires lot of computational power to visualize or to make a movie. Submarines are typically optimized for the high performance and noise reduction. DARPA Suboff is a basic model for submarine with experimental data available. DARPA Suboff has a different configuration with parts and angle of attack. Use of the CFD in here is to bench marking the existing model and later this will be used to design new model with optimized performance of submarine. Project Mentor: Dr. Ezhilmathi Krishnasamy Project Co-mentor: Dr. Sebastien Varrette Site Co-ordinator: Prof. Pascal Bouvry - Computational fluid dynamics using either open source or commercial tools to solve the given problem on a HPC setting. - Pre-processing, computation and post processing techniques (data analysis). - Parallel visualization - Optimization (load balancing on HPC setting and design parameters for DARPA Suboff) Student Prerequisites (compulsory) Fluid mechanics and basic programming skills. Student Prerequisites (desirable): Familier with any of the open source or commercial CFD software and computational mathematics. - Paraview : https://www.paraview.org/hpc/ - VisIt : https://wci.llnl.gov/simulation/computer-codes/visit/ - OpenFOAM : https://www.openfoam.com/ - Geometry detail : https://archive.org/details/DTIC_ADA210642 - Experimental results : https://archive.org/details/DTIC_ADA227715/page/n31 - Week 1: HPC training - Week 2: Project preparation - Week 3: Preprocessin - Week 4: Simulation - Week 5: Simulation - Week 6: Post processing - Week 7: Results analysis - Week 8: Report writing Final Product Description: Compare the simulation results against any one of the model with its wind tunnel experimental results. Adapting the Project: Increasing the Difficulty: Including more parameters would make it difficult. For example, considering different angle of attack with different configuration of DARPA Suboff model. Adapting the Project: Decreasing the Difficulty: If we do not need to compare the results with experimental results that could make the project just easier. Considering just few parameters with simulation makes it even simpler ANSYS and OpenFOAM are available. Other open source tools (both for simulation and pre-processing) can be installed upon student request. Paraview and VisIt (data processing and visualization) are also available. University of Luxembourg
<urn:uuid:d66020fe-a6f4-4776-85b7-087f2eac4e27>
CC-MAIN-2020-29
https://summerofhpc.prace-ri.eu/computational-fluid-dynamics/?utm_source=rss&utm_medium=rss&utm_campaign=computational-fluid-dynamics
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00289.warc.gz
en
0.857672
643
2.65625
3
The bird order Procellariiformes (albatrosses, shearwaters, petrels) have evolved a specialized mode of chick provisioning, where adults concentrate the oils from prey for direct delivery of energy-rich lipids (“stomach oil”) to offspring. This contrasts with the approach used by most seabirds in which chicks are supplied with whole prey. The stomach oil strategy is assumed to have evolved to supply chicks with an energy-rich food supply that buffers them from variation in parental foraging success. However, this strategy may have health implications for chicks, as any contaminants in the prey will be concentrated in the stomach oil. We are investigating this stomach oil strategy in Leach’s storm petrels (LHSPs; Oceanodroma leucorhoa), an abundant Procellariiform seabird that nests on remote islands in the Northwest Atlantic. Petrels spend most of their lives at sea and only come to land to breed. Stomach oil was collected from one adult in the monogamous breeding pair and from their chick in a population of LHSPs nesting on Kent Island, a small island southeast of Grand Manan in the Bay of Fundy, in 2010 and 2011. The stomach oil is then analyzed for energy content and lipid composition. From stomach oil samples collected in 2010, we have found that the energy content is more energy dense than whole prey items that other seabirds would feed their chicks, suggesting LHSPs can concentrate energy in stomach oil. Contaminant analysis of stomach oil revealed that the stomach oil is more concentrated than in prey items, suggesting that contaminants are concentrated in the stomach oil. This project will provide insights into the costs and benefits associated with a highly evolved provisioning strategy that is used by Procellariiformes across the globe.
<urn:uuid:552830c3-b9ef-484a-aca4-b9fb703d9844>
CC-MAIN-2017-26
http://www.gmwsrs.info/research/seabirds/leachs-storm-petrel/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320368.57/warc/CC-MAIN-20170624235551-20170625015551-00584.warc.gz
en
0.944542
374
3.046875
3
Marijuana was on the ballot this year in California. Voters decided to pass Proposition 64- what does this mean? Starting in January, the law allows adults over age 21 to use marijuana recreationally. It also means people can grow 6 pot plants in their home for personal use. Smoking pot while driving and in public is illegal, and so is having more than 28.5 grams of product on your person. It’s also illegal to have this substance around children. In October I visited Colorado, a state where marijuana is legal. I was curious to learn about how the plant is grown indoors. My friends and I stopped in at L’Eagle, a dispensary in Denver. There, I had a chance to see the plants growing and learn more about the various types of marijuana. I’m not a smoker, and I have an extremely sensitive sense of smell. I personally dislike the odor of pot. However, my horticultural curiosity needed to be satisfied so I asked a lot of questions and found out some cool facts. The plant is thought to have originated in Asia, and the use of cannabis goes back 12,000 years. There are two psychoactive species of the plant, Cannabis sativa, and C. indica. Cannabis sativa L. is a subspecies known as hemp that is used in manufacturing oil, clothing and fuel. Marijuana Growing Facts – Indoors Indoor growers use artificial lights to mimic the effects of the sun. Plants need 18-24 hours of light daily for vegetative growth. The plant is grown for 2-6 weeks before it’s time to initiative flowering. To produce flower buds, lighting is decreased to 12 hours per day. Buds are produced in about 18 weeks. Cannabis Concerns – Indoors and Out Since growing marijuana was illegal in California, many illegal practices occurred. Growers didn’t have a resource for pest problems. They couldn’t ask at local nurseries or Cooperative Extension offices for pest help. Instead, they had to guess about pests and pesticide/s. Unfortunately, many “guerrilla” marijuana growers grew plants outdoors in fragile ecosystems in Northern California. These places just started to recover from decades of logging. Many of these growers have destroyed native plant systems and contaminated nearby streams and ruined salmon habitats. The legalization of marijuana will benefit the environment and users. Agricultural crops are regulated, so growers will need permission to grow and licenses to purchase and apply pesticides. This means the incidences of ground and surface water contamination will decrease. To read about how to garden naturally with the least impact on the environment, read Eco Gardening. Of course all of this is my opinion. I hope to hear your thoughts on this issue. Please leave a comment! Published: October 26, 2016 Updated: November 20, 2016
<urn:uuid:fcd0e672-75c2-45b0-a94d-2430eacbe735>
CC-MAIN-2020-29
http://anneofgreengardens.com/blog/cannabis-marijuana-prop-64-california/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887377.70/warc/CC-MAIN-20200705152852-20200705182852-00599.warc.gz
en
0.959139
586
2.71875
3
Levels of Data LEVELS OF DATA There are 3 types of data - "this is a measure of how many things occur within a category" eg when measuring what kind of toy children have in their room, we would count how many board games, card games, cars ect to give us categorised data. This type of data gives us the least amount of information as we don't know anything about the type of board game for instance, just how many of a category there is. Often used when conducting observations as categories of behaviour are set out at the start of an observation. "Measure of each item or person in the data set" e.g. organising a group of people into height order from tall to short ..... ...this would allow an understanding on where each people falls in relation to others in the data set "Giving individual values for each participant" - Gives the most information - Tended to be gathered when conducting experiment
<urn:uuid:ab492054-33ef-4eb5-9ae1-990e50212e93>
CC-MAIN-2017-47
https://getrevising.co.uk/revision-cards/levels_of_data
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805023.14/warc/CC-MAIN-20171118190229-20171118210229-00086.warc.gz
en
0.925165
201
4.09375
4
Deciding about hormone therapy HRT - deciding; Estrogen replacement therapy - deciding; ERT- deciding; Hormone replacement therapy - deciding; Menopause - deciding; HT - deciding; Menopausal hormone therapy - deciding; MHT - deciding Hormone therapy (HT) uses one or more hormones to treat symptoms of menopause. Menopause and Hormones - A woman's ovaries stop making eggs. They also produce less estrogen and progesterone. - Menstrual periods slowly stop over time. - Periods may become more closely or more widely spaced. This pattern may last for 1 to 3 years once you start skipping periods. Menstrual flow may come to a sudden halt after surgery to remove the ovaries, chemotherapy, or certain hormone treatments for breast cancer. Menopause symptoms may last 5 or more years, including: - Hot flashes and sweats, usually at their worst for the first 1 to 2 years after your last period - Vaginal dryness - Mood swings - Sleep problems - Less interest in sex HT can be used to treat menopause symptoms. HT uses the hormones estrogen and progestin, a type of progesterone. Sometimes testosterone is also added. Some symptoms of menopause can be managed without HT. Low-dose vaginal estrogen and vaginal lubricants may help vaginal dryness. HT comes in the form of a pill, patch, injection, vaginal cream or tablet, or ring. Taking hormones can have some risks. When considering HT, learn about how it can help you. You're a woman nearing middle age. It's that time in your life when your periods are starting to stop and your body is going through changes. You may be starting to have hot flashes that you've heard about before. Could menopause be around the corner? So, what is menopause? Menopause typically happens to women somewhere around the ages of 45 to 55. During menopause, your ovaries stop making eggs and produce less estrogen and progesterone, hormones that play a vital role in pregnancy and how your body uses calcium and maintains healthy cholesterol levels, among other things. Changes in these hormones cause menopause symptoms. You will often begin having fewer periods, and eventually they stop. Menopause is complete when you have not had a period for over a year. Women who are post-menopausal can no longer get pregnant without a donor egg. Symptoms can vary from woman to woman. And these symptoms may last 5 or more years. Also, some women have worse symptoms than others. The first thing you may notice is that your periods start to change. They might occur more often or less often. Some women get their period every 3 weeks during menopause. These changes may last several years before periods completely stop. Other common symptoms include your heart pounding or racing, hot flashes, night sweats, skin flushing, and problems sleeping. You may have a decreased interest in sex, develop forgetfulness, have headaches, and suffer from mood swings, and have vaginal dryness and painful sexual intercourse. Treatment for menopause depends on many things, including how bad your symptoms are, your overall health, and your preference. It may include lifestyle changes or hormone therapy. Hormone therapy may help if you have severe hot flashes, night sweats, mood problems, or vaginal dryness. Hormone therapy is treatment with estrogen and, sometimes, progesterone. Talk to your doctor about the benefits and risks of hormone therapy. Hormone therapy may increase your risk of developing breast cancer, heart attacks, strokes, and blood clots. Topical hormone therapy has some of the benefits and fewer of the risks. Your doctor can tell you about other options besides taking hormones, including antidepressants, a blood pressure medicine called clonidine, and Gabapentin, a seizure drug that can help reduce hot flashes. Lifestyle changes may help in reducing your menopause symptoms, though it's not been proven. You might consider trying to avoid caffeine, alcohol, and certain spicy foods. Or to try eating soy foods and other legumes, because they contain phytoestrogens. You'll want to remember to get plenty of calcium and vitamin D in your food or supplements, and plenty of exercise especially during this time. Consider Kegel exercises every day to strengthen the muscles of the vagina and pelvis. Practice slow, deep breathing if you feel a hot flash coming on. Yoga, tai chi, or meditation may also helpful. After menopause, you may be at risk for bone loss, higher cholesterol, and heart disease, so make sure you work with your doctor to manage or even prevent these problems. Benefits of Hormone Therapy When taking hormones, hot flashes and night sweats tend to occur less often and can even go away over time. Slowly reducing HT may make these symptoms less bothersome. Hormone therapy can also be very helpful in relieving: - Problems sleeping - Vaginal dryness - Moodiness and irritability At one time, HT was used to help prevent thinning bones (osteoporosis). That is no longer the case. Your doctor can prescribe other medicines to treat osteoporosis. Studies show that HT does not help treat: - Heart disease - Urinary incontinence - Alzheimer disease Risks of Hormone Therapy Be sure to talk with your doctor about the risks for HT. These risks may be different depending on your age, medical history, and other factors. Taking HT may increase your risk for blood clots. Your risk for blood clots is also higher if you are obese or if you smoke. Your risk for blood clots may be lower if you use estrogen skin patches instead of pills. Your risk is lower if you use vaginal creams and tablets and the low-dose estrogen ring. - Most experts believe that taking HT for up to 5 years does not increase your risk for breast cancer. - Taking estrogen and progestin together for longer than 3 to 5 years may increase your risk for breast cancer, depending on the type of progestin you are prescribed. - Taking HT can make the mammogram image of your breasts look cloudy. This can make it hard to find breast cancer early. - Taking estrogen alone is associated with a reduction in risk of breast cancer. However, if you take estrogen and progestin together, your risk of breast cancer may be higher, depending on the type of progesterone you take. ENDOMETRIAL (UTERINE) CANCER - Taking estrogen alone increases your risk for endometrial cancer. - Taking progestin with estrogen protects against this cancer. If you have a uterus, you should take HT with both estrogen and progestin. - You cannot get endometrial cancer if you do not have a uterus. It is safe and recommended to use estrogen alone in this case. HT is safest when taken before age 60 or within 10 years after starting menopause. If you decide to take estrogen, studies show that it's safest to begin the estrogen shortly after being diagnosed with menopause. Beginning estrogen more than 10 years after the onset of menopause does increase the risk of heart disease. - HT may increase the risk of developing heart disease in older women. - HT may increase the risk in women who began using estrogen more than 10 years after their last period. Women who take only estrogen and who take estrogen with progestin have an increased risk for stroke. Using the estrogen patch instead of an oral pill decreases this risk. However, risk may still be increased compared to not taking any hormones at all. Lower HT dosage also reduces the risk for stroke. Taking HT may increase your risk of developing gallstones. RISK OF DYING (MORTALITY) Overall mortality is reduced in women who begin HT in their 50s. The protection lasts for about 10 years. Making a Decision Every woman is different. Some women aren't bothered by menopause symptoms. For others, symptoms are severe and affect their lives significantly. If menopause symptoms bother you, talk to your doctor about the benefits and risks for HT. You and your doctor can decide if HT is right for you. Your doctor should know your medical history before prescribing HT. You should not take HT if you: - Have had a stroke or heart attack - Have a history of blood clots in your veins or lungs - Have had breast or endometrial cancer - Have liver disease However, for many women, taking HT is a safe way to treat menopause symptoms. Currently, experts are unclear on how long you should take HT. Some professional groups suggest that you can take HT for menopause symptoms for longer periods if there is no medical reason to discontinue the medicine. For many women, low doses of HT may be enough to control troublesome symptoms. Low doses of HT tend to have few side effects. These are all issues to discuss with your health care provider. When to Call the Doctor If you have vaginal bleeding or other unusual symptoms during HT, call your doctor. Be sure to continue seeing your doctor for regular checkups. ACOG Committee Opinion No. 565: Hormone therapy and heart disease. Obstet Gynecol. 2013;121(6):1407-1410. PMID: 23812486 Cosman F, de Beur SJ, LeBoff MS, et al. Clinician's guide to prevention and treatment of osteoporosis. Osteoporosis Int. 2014;25(10):2359-2381. PMID: 25182228 de Villiers TJ, Hall JE, Pinkerton JV, et al. Revised Global Consensus Statement on menopausal hormone therapy. Climacteric. 2016;19(4):313-315. PMID: 27322027 Lobo RA. Menopause and care of the mature woman: endocrinology, consequences of estrogen deficiency, effects of hormone therapy, and other treatment options. In: Lobo RA, Gershenson DM, Lentz GM, Valea FA, eds. Comprehensive Gynecology. 7th ed. Philadelphia, PA: Elsevier; 2017:chap 14. Magowan BA, Owen P, Thomson A. The menopause and hormone replacement therapy. In: Magowan BA, Owen P, Thomson A, eds. Clinical Obstetrics and Gynaecology. 4th ed. Elsevier; 2019:chap 9. Stuenkel CA, Davis SR, Gompel A, et al. Treatment of symptoms of the menopause: an Endocrine Society Clinical Practice Guideline. J Clin Endocrinol Metab. 2015;100(11):3975-4011. PMID: 26444994 Last reviewed on: 1/1/2020 Reviewed by: John D. Jacobson, MD, Professor of Obstetrics and Gynecology, Loma Linda University School of Medicine, Loma Linda Center for Fertility, Loma Linda, CA. Also reviewed by David Zieve, MD, MHA, Medical Director, Brenda Conaway, Editorial Director, and the A.D.A.M. Editorial team.
<urn:uuid:1d05fe29-e56b-4d2a-842d-9ad1e680cff5>
CC-MAIN-2020-34
https://www.mountsinai.org/health-library/special-topic/deciding-about-hormone-therapy
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738699.68/warc/CC-MAIN-20200810205824-20200810235824-00054.warc.gz
en
0.90082
2,354
2.65625
3
1. Is it possible to lend purchased content to others? In the UK, when you purchase an analogue copy of a work (e.g. a CD, a DVD, a book), the rightsholder cannot control the distribution of that copy any longer (this is called exhaustion of rights). This means that you can resell or lend that copy to others without the copyright owner’s consent. However, this principle does not always apply to online distribution, meaning that if you purchase something online, like a song from iTunes, you often cannot share or lend that digital copy. Usually in these cases the end-user licence states what you can or cannot do with that work. It is important to notice that the exhaustion of rights applies only to the single analogue copy you purchase, not to the creative work within the analogue copy. Therefore, whilst you are allowed to lend a CD you have purchased to your family or friends, if you want to use some of its tracks in the production of new work (e.g. a video), then you would need to get permission from the copyright owner. 2. How many notes can be used from someone else’s song? In UK Copyright Law there are no rules about the exact number of notes that can be used from someone else’s song. Although it is natural to be inspired by other songs when producing new music, there is a fine dividing line between simply being inspired and copying. In the UK, your song is considered original, and thus protected by copyright, if you use your own skill, labour, judgement and effort to create it as opposed to merely interpret someone else’s piece of music. In order to be protected, your song needs to be fixed in writing or some other permanent form. The number of notes used in a song is not a criterion to assess originality. It is the quality of the part taken that matters, not the quantity. A tune consisting of only a few notes can carry copyright. For example, Fourscore by Lord David Dundas – the signature tune used by Channel 4 for ten years – is copyright protected even though it includes only four different notes. Another basic principle of copyright law is that it protects only the expression of ideas, not the ideas themselves. This can be crucial when writing the lyrics of a song; for example, the fact that U2’s Pride (In the Name of Love) is copyright protected should not prevent you from writing your own song about Martin Luther King, Jr., as long as your work is substantially different and you add your own skill, labour, judgement and effort on it. You can find more information about originality here and here. 3. Is there a maximum length that can be used from an original song? As there are no rules about the exact number of notes, there are no provisions about a maximum length that can be used from an original song either. According to UK Copyright Law, using another’s song is copyright infringement when ‘the work as a whole or any substantial part of it’ has been copied. The meaning of these terms is not precise and they are considered on a case-by-case basis. Usually the court focuses on the quality of the parts taken, not necessarily the amount, and the circumstances of each work. You can find more information about using someone else’s work here. For a good review of music plagiarism cases heard before the English courts, check the CREATe Public Lecture by Dr Simon Anderson. Going for a Song tells the story of Tina and Ben, a music composer and a lyricist who create an original song and discuss how to market it. When creating new work, it is natural to be inspired by the work of others. However, there is an important distinction between simply being inspired and unlawfully copying. When you want to use a work that is in copyright, you need to get permission from all copyright owners. Some works have several rights attached to them and each right may have more than one owner…
<urn:uuid:1534f090-90e1-47ef-8980-b1e23cfa651e>
CC-MAIN-2020-24
https://www.copyrightuser.org/create/creators-discuss/musician/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347400101.39/warc/CC-MAIN-20200528201823-20200528231823-00046.warc.gz
en
0.950105
825
2.828125
3
Summer is a wonderful time for learning about the night sky and the stars and planets that live there. If you’re teaching your children to speak Spanish, these Spanish solar system flashcards are excellent for reviewing the planets of the solar system and working on Spanish vocabulary! Since there’s an English set included, these are also good for ESL students who are practicing their English. Read on to see how to get your copy of these printable Spanish flashcards and how you can use them to work on Spanish language skills with the kids! Enjoyed these? Don’t miss our All About the Solar System printable pack, which features a lesson about the members of the solar system, a solar system diagram activity, a word jumble, and more! Printable Spanish Flashcards: Spanish Solar System Flashcards To use these Spanish solar system flashcards, you’ll need the following: (Affiliate links provided here for convenience. For details, see our Disclosure Policy.) This product includes five sets of flashcards: - One set of solar system flashcards with pictures and Spanish names - One set of solar system flashcards with pictures and English names - One set of flashcards with just the pictures of the solar system members - One set of flashcards with just the Spanish names - And one set of flashcards with just the English names A pronunciation guide is also included. So you’ll have no trouble saying the Spanish names correctly! Along with the eight planets, this set includes cards for the sun and the moon. They’re members of the solar system too! 🙂 We spent some time sifting through the English and Spanish sets. We gathered the English cards in one pile and the Spanish cards in another. Then we spent some time matching up the sets in both languages! The pictures are a big help with this activity. So if you want to challenge the kids, have them match the flashcards that show the names only! Scroll down to get your copy of our Spanish Solar System Flashcards! Check out these other solar system learning ideas! And see more fun science activities to try with your children on my It’s Science Pinterest board! To get your copy of our Spanish Solar System Flashcards, click the image or the link below to visit our Store!
<urn:uuid:9723f3e1-b985-444d-b33b-6c0da9663233>
CC-MAIN-2020-16
https://www.lookwerelearning.com/spanish-solar-system-flashcards/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506959.34/warc/CC-MAIN-20200402111815-20200402141815-00490.warc.gz
en
0.924612
481
3.5625
4
Beannachtai na Féile Pádraig oraibh! The most Irish town in America How the world sees Ireland St Patrick's Day around the world Did you know the Caribbean island of Montserrat is the only country besides Ireland to celebrate St Patrick’s Day as a national holiday? In fact, a whole week of events takes place on the island to mark the occasion from 13-20 March. The island’s Irish heritage dates back to the 17th century and the connections are still evident today from the moment visitors arrive on the island and receive their shamrock passport stamp. Events taking place during the week will include the annual St Patrick’s dinner at the Montserrat Cultural Centre; a Freedom Run to commemorate an 18th century slave uprising; an island pub crawl starting at Garry Moore’s Wide Awake Bar; and a Heritage Day and feast in Festival Village, with local food, music, dances, games and Jamboree.
<urn:uuid:809e9545-ead3-476e-b38f-8c0ab5304618>
CC-MAIN-2014-15
http://www.fsuniverse.net/forum/showthread.php?78011-Happy-St-Patrick-s-Day-2011&p=3113300
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532374.24/warc/CC-MAIN-20140416005212-00371-ip-10-147-4-33.ec2.internal.warc.gz
en
0.911316
207
2.546875
3
DiSC® and True Colors® Over the years, other personal profiling systems have cropped up, two of the most well known, DiSC and True Colors. Where the MBTI® profiles core personality traits and how people approach the environment intellectually and attitudinally and how they process information, DiSC describes behavior based on how people view themselves in their various environments. The DiSC® assessment, first created and published in 1972, is based on William Moulton Marston’s model that divides behavior into four dimensions: dominance, influence, steadiness and conscientiousness, the four kinds of responses that people have to their environments. The assessment tool measures individual perceptions: does the individual have a positive or negative perception of the environment, and does the individual feel more powerful or less powerful than the environment. Based on the individual’s scores in each of the four dimensions, one falls within one of 16 “behavior patterns.” Achiever. Agent. Appraiser. Counselor. Creative. Developer. Inspirational. Investigator. Objective Thinker. Overshift. Perfectionist. Persuader. Practitioner. Promoter. Result-Oriented. Specialist. Results from DiSC and the Myers-Briggs Type Indicator do not necessarily correlate as they were designed for different purposes, however, they could provide a very comprehensive picture if an individual completed both assessments. True Colors® is a personality assessment tool based on the work of Myers-Briggs and Keirsey that was created to translate the somewhat complicated personality and learning theory into a simpler format. The four colors correspond to the four temperment types of the MBTI: SP (sensible playful), SJ (sensible judicious), NT (intuitive thinking) and NF (intuitive feeling), respectively. - Those with Blue as a Primary Color value balance and harmony. They prefer lives free from tension … settled, united, and secure. - Gold represents a need to be responsible, to fulfill duties and obligations, to organize and structure our life and that of others. - Green expresses itself psychologically as human will in operation: as persistence and determination. Green is an expression of firmness and consistency. - Those with Orange as a Primary Color feel the will to achieve results, to win, to be successful. They desire all things that offer intense living and full experience. Many individuals are highly visual, so this assessment is relatively simple to understand and apply to real-world applications. However, because it is a generalization of the MBTI, the results are a little more vague and open to interpretation. Organizations would do well to recognize the need for tools like True Colors or MBTI, asking not “whether” but “which one.” A team with a greater understanding of their attributes can take ownership for them, and a team that is confident and in full possession of their strengths can overcome most weaknesses.
<urn:uuid:41f07e97-ea06-4ae8-8e54-8dc84eb084bf>
CC-MAIN-2020-34
https://www.adventureassoc.com/white-papers-book-reviews/disc-and-true-colors/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738562.5/warc/CC-MAIN-20200809162458-20200809192458-00064.warc.gz
en
0.946219
602
2.59375
3
How to Store Solar Energy Deep Cycle Batteries Batteries used in boats, recreational vehicles and electric golf carts are called deep cycle batteries. These differ from car batteries because they are made to provide continuous power rather than just a quick burst of starting power. Deep cycle batteries, despite their name, wear out after many cycles of charging and discharging. They are the low end of your battery options and should be used only if you are on a very limited budget. Industrial Strength Batteries Also deep cycle, but much more resistant to deterioration over multiple charging/discharging cycles, industrial strength batteries include these types: These are similar in function to older kinds of car batteries, but much more robust. They are called flooded because there are caps on the top of the battery that you open and pour in distilled water in order to keep the internal lead and acid components wet. The downside of using flooded batteries is that they emit a chemical gas discharge when in use. This is a caustic and potentially explosive emission, so these batteries are not safe to use inside an enclosed area such as your home, attic or garage, If installed in an outside shed or weather-enclosure, you need to also install vents so the gas can be dispersed outside the enclosure. Gel batteries belong to a category of batteries called valve-regulated lead-acid (VRLA). Gel batteries aren’t really filled with gel at all. These are also lead-acid batteries, but are constructed in a way that you do not need to add water, and no hazardous fumes are vented during usage or storage. This makes gel batteries safe to use inside your home or in other enclosed areas. These are a much better option than flooded batteries, but there is still one that is much better. Absorbed Glass Mat (AGM) Most experts, including me, agree that AGM batteries are the best for storing solar energy. A woven glass mat is placed between the plates inside the battery. This mat absorbs and holds the electrolyte making them both spill- and leak-proof. They are as safe as Gel batteries, but they hold their charge longer, discharge slower, and survive well over extended charging and discharging cycles. If you can afford them, AGM batteries are the preferred way to go. Solar energy scientists are experimenting with other high-tech ways to store solar energy. But for now, batteries are your best option.
<urn:uuid:8617395c-36a8-49bc-aaed-a06036c084b4>
CC-MAIN-2023-50
https://solarhelp.info/how-to-store-solar-energy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00515.warc.gz
en
0.952331
504
2.78125
3
Prof. Thomas Scott, a UC Davis entomologist, says that distribution of the mosquito "tends to be patchy." Even in places where it's very common, like Thailand, he said, "distribution will fluctuate, even through the course of a season." The Aedes aegypti mosquito was introduced to the Americas from Africa, likely on slave ships, perhaps as early as the 16th century, Georgetown historian Prof. John McNeill told CNN. Along with it came yellow fever, dengue, chikungunya and now Zika virus. While the spread of the virus has been very rapid across much of South and Central America, Scott says it is less likely to spread as swiftly in the U.S. primarily because "our lifestyle is different than places where [many] people are infected." In the U.S. window screens or air conditioning are common, so mosquitoes are less likely to be in people's homes. In Central and South America, people's homes are more open, the "mosquitoes move frequently [in homes] and bite frequently," Scott noted. Case in point: the Aedes aegypti mosquito has been present across southern Arizona "for a long time," Scott says, but the risk of dengue fever in Arizona is low. Meanwhile, just across the border in Mexico, the risk of dengue to people is much higher. Zika spreads when a mosquito bites a person who is infected. Then the mosquito becomes infected itself. But Scott says it cannot spread Zika to another person right away. The virus must replicate within the mosquito first. Then the virus must travel to the insect's salivary glands and replicate there. Only then has the mosquito moved from being infected to being infective, Scott said, and that takes awhile. "That period of time is about the average life span of the mosquito, 10-14 days, for them to become infective," Scott says. In other words, it's possible the mosquito could die before it's able to infect another person. Zika can also be sexually transmitted and a pregnant women can transmit the virus to her fetus during pregnancy, according to the CDC. The California Department of Public Health lists the cities where Aedes aegypti has been found. It did not get back to us by deadline to tell us when the mosquito was found in these places. Fresno: Clovis, Fowler, Fresno, Kerman, Mendota, Sanger Imperial: Andrade, Brawley, Calexico, El Centro, Heber, Holtville, Imperial, Seeley Los Angeles: Commerce, East Los Angeles, Florence, La Mirada,Los Angeles, Maywood, Montebello, Pico Rivera, South Gate Madera: Madera, Madera Ranchos, Parkwood Orange Anaheim, Costa Mesa, Garden Grove, Lake Forest, Mission Viejo, Orange, Santa Ana Riverside Coachella, Riverside, San Jacinto San Bernardino: Colton, Montclair San Diego: Bonita, Chula Vista, El Cajon, Escondido, Imperial Beach, Oceanside, San Diego, Spring Valley, Tecate, Vista San Mateo: Atherton, Menlo Park
<urn:uuid:7dd8cd77-b68b-4bc5-afb7-a131d8289b37>
CC-MAIN-2023-23
https://www.kqed.org/stateofhealth/205650/map-where-zika-mosquitoes-are-likely-found-in-california
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00577.warc.gz
en
0.943474
699
3.578125
4
October 23, 2019 Most complete exploration of fly landing maneuvers to advance future robots To inspire advanced robotic technology, researchers in the Penn State Department of Mechanical Engineering have published the most complete description of how flying insects land upside-down. The paper was published today (Oct. 23) in Science Advances."Through this work, we sought to understand how a fly executes the maneuvers of landing upside down in the blink of an eye," said Bo Cheng, assistant professor of mechanical engineering and lead author of the paper. It's arguably the most difficult and least-understood aerobatic maneuver conducted by flying insects, according to Cheng. "Ultimately, we want to replicate that in engineering, but we have to understand it first," Cheng said. Along with Penn State's Jean-Michel Mongeau, assistant professor of mechanical engineering, and Pan Liu, doctoral student in mechanical engineering, Cheng aims to understand the biomechanical and sensory processes that flies use to land on different surfaces like ceilings and moving objects. To gather their data, the team first examined the flies' inverted landing behaviors in a flight chamber using high-speed videography. Their study found that the insects usually execute four perfectly timed maneuvers to land upside down: they increase their speed, complete a rapid body rotational maneuver (likened to a cartwheel), perform a sweeping leg extension and, finally, land through a leg-assisted body swing when their feet are firmly planted on the ceiling. The researchers also believe these actions are set in motion by a series of complex visual and sensory cues the flies perceive as they approach their desired landing spot. "Within the blink of an eye, these flies can totally invert their body and land, which is quite spectacular," Mongeau said. "We see it all the time happening around us, but we've demonstrated the complexity of the maneuver. There is a lot of interest for robots to be able to do the same." However, current robotic technology sorely lacks the speed and efficiency needed to execute the same maneuvers. "We look at nature for inspiration," Mongeau said. "This helps drive the fundamental science of engineering, to understand how flies are able to solve these problems so we can apply them to future technologies." In addition to advancing robotics, the implications of this work can also be applied to the field of neuroscience. "How is a fly's nervous system able to do this so quickly?" Mongeau said. "This work reiterates how fast these maneuvers are executed within an extremely small nervous system. This data can lead to new hypotheses for understanding how brains function."
<urn:uuid:6565f8fd-4111-40a4-9097-6068d54151de>
CC-MAIN-2020-24
https://techxplore.com/news/2019-10-exploration-maneuvers-advance-future-robots.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439019.86/warc/CC-MAIN-20200604032435-20200604062435-00441.warc.gz
en
0.948329
532
3.828125
4
The history of the United States is substantial and also intricate, but can be broken down into moments and time periods that split, merged, and altered the United States right into the country it is now. The American flag did not resemble like it does now. Apart from that, it undertook a lot of modifications and also alterations. The American Revolutionary War Enter the American Revolution. Occasionally referred to as the American War of Independence, or the Revolutionary War, it was a dispute which lasted from 1775-1783 as well as enabled the initial 13 colonies to remain independent from Great Britain. Starting in Great Britain in the late 1790s, the Industrial Revolution ultimately made its way to the United States and changed the emphasis of the country’s economy and the way it manufactures items. These problems arose from growing stress in between locals of Great Britain’s 13 North American colonies as well as the early american government (which stood for the British crown). Efforts by the British federal government to increase revenue by collectin tax from the colonies (especially the Stamp Act of 1765, the Townshend Tariffs of 1767 and also the Tea Act of 1773) met with negative demonstration among lots of colonists, that disliked their absence of depiction in Parliament and required the exact same rights as various other British people. George Washington was made its leader. Congress hoped they might require the British to work out however George III rejected to negotiate. Rather, in August 1775 he declared that all the American colonies were in a state of rebellion. By the autumn of 1781, the American forces had begun to force the enemy to retreat to Virginia’s Yorktown peninsula, near where the York River clears into Chesapeake Bay. Claiming illness, the British general sent his deputy, Charles O’Hara, to surrender; after O’Hara came close to Rochambeau to surrender his sword (the Frenchman deferred to Washington), Washington offered the nod to his very own replacement, Benjamin Lincoln, that accepted it. After French help assisted the Continental Army require the British surrender at Yorktown, Virginia, in 1781, the Americans had actually successfully won their freedom, though the battle would not formally end until 1783. The motion for American freedom successfully won at Yorktown, modern observers did not see that as the decisive success. British forces remained based around Charleston, as well as the powerful main army still stayed in New York. The British removal of their troops from Charleston as well as Savannah in late 1782 finally indicated the end of the conflict. British and also American mediators in Paris signed initial peace terms in Paris late that November, and also on September 3, 1783, Great Britain formally identified the independence of the United States in the Treaty of Paris. At the same time, Britain authorized separate peace treaties with France and also Spain (which had gotten in the dispute in 1779), bringing the American Revolution to a close after eight lengthy years. Just how the American Flag happened The American flag was created to stand for the brand-new union of the thirteen original states: it would certainly have thirteen stripes, alternate red and white, as well as thirteen stars, white on a blue field. Among the first flags had the stars arranged in a circle, based on the concept that colonies were equal. The thirteen stripes, resting side by side, represented the struggle for independence; red represented valiance, white signified pureness and blue stood for loyalty. In 1818, after a few style changes, the United States Congress chose to retain the flag’s initial thirteen stripes and add brand-new stars to show each new state that got in the union. While there is no doubt that the genuine Betsy Ross was worthy of interest in her own right, it is the tale of Betsy sewing the very first stars and stripes that has actually made her a memorable historic figure. The Betsy Ross tale was offered public attention in 1870 by her grandson, William Canby, in a speech he made to the Historical Society of Pennsylvania. Canby and other members of Betsy’s household authorized sworn affidavits stating that they heard the story of the making of the initial flag from Betsy’s very own mouth. Based on the narrative history, in 1776, 3 men – George Washington, Robert Morris, as well as George Ross, checked out Betsy Ross in her furniture shop. She escorted them to her parlor, where they can have a private meeting. Right here, Washington pulled a folded up paper from his inside coat pocket. On it, was a sketch of a flag with thirteen red and white stripes as well as thirteen 6-pointed stars. Washington asked if Betsy could make a flag from the layout. Betsy responded: “I don’t know, but I will attempt.” This line was made use of in the sworn statements of a number of Betsy’s family members, recommending that it is a straight quote from Betsy. As the story goes, Betsy suggested altering the stars to 5 points as opposed to 6. She showed them the best ways to do it with simply one snip of her scissors. They all agreed to alter the design to have stars with five points. Nevertheless, some chroniclers think that it was Francis Hopkisnon who brought to life the suggestion of the Stars and Stripes. Francis Hopkinson was a prominent patriot, a lawyer, a Congressman from New Jersey, an endorser of the Declaration of Independence, poet, artist, as well as identified civil servant. He was selected to the Continental Navy Board on November 6,1776. It was while working on the Continental Navy Board that he turned his attention to designing the flag of the United States. Using stars in that style is thought to have actually been the result of an experience in the war directly related to his propriety. A book in Hopkinson’s collection at his residence in Bordentown was taken by a Hessian soldier in December 1776, a dark year of the war. The soldier, an I. Ewald, composed on the within cover that he had seen the author near Philadelphia and also that he, Ewald, had taken the publication from a fine country seat near Philadelphia. The soldier had created above and listed below Hopkinson’s bookplate, which had three six pointed stars and also his household slogan, “Semper Paratus”, or “Always Ready”. In a letter to the Board of Admiralty in 1780 Hopkinson asserted that he had designed “the flag of the United States of America” as well as a number of ornaments, devices, and checks showing up on bills of exchange, ship documents, the seals of the boards of Admiralty and Treasury, and also the Great Seal of the United States. Hopkinson had actually received absolutely nothing for this job, as well as currently he submitted a bill as well as asked “whether a Quarter Cask of the public wine” would certainly not be a reasonable and also appropriate reward for his labors. Even so, no one could be so certain that produced the American flag. The American flag is the sacred emblem of the nation. As you see the flag silhouetted in front of the relaxed skies of the nation, you are reminded that the American flag stands for exactly what you are – no more, no less. Top American Flags close to California state As quoted from the Star Spangled Banner: O say can you see, by the dawn’s early light, What so proudly we hailed at the twilight’s last gleaming, Whose broad stripes and bright stars through the perilous fight, O’er the ramparts we watched, were so gallantly streaming? And the rockets’ red glare, the bombs bursting in air, Gave proof through the night that our flag was still there; O say does that star-spangled banner yet wave O’er the land of the free and the home of the brave? ZIP codes in Amboy we serve: 92304
<urn:uuid:93511715-47ea-4e36-b100-b3a6c338b295>
CC-MAIN-2017-39
http://americanflaggroup.com/american-flag-around-amboy-ca-92304.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00283.warc.gz
en
0.975756
1,659
3.546875
4
This essay Acid Rain has a total of 2788 words and 22 pages. 1.1 Terms of reference 1.2 Source of information 2. What is Acid Rain? 2.1 The definition of Acid Rain 2.2 How to Measure Acid Rain? 3. What cause Acid Rain? 3.1 History of Acid rain 3.2 Causes of Acid rain 4. What Are Acid Rain\'s Effects? 5. What Society Can Do About Acid Deposition ? 5.1 Understand acid deposition\'s causes and effects 5.2 Clean up smokestacks and exhaust pipes 5.3 Use alternative energy sources List of References Our environment has been suffering from many problems that have plagued earth for years. These problems cannot be ignored or it might have catastrophic results on our environment. Acid rain is a wide spread term used to describe all forms of acid precipitation, rain snow and dust. Acid rain is a serious problem with disastrous effects and this problem is increasing each day. It causes grave damage to our natural wild and aquatic life and can also have an adverse effect on human life. It causes fish and plants to die in waters. As well it causes harm to our own race as well, because we eat these fish, drink this water and eat these plants. However acid rain on its own is not the biggest problem. It causes many other problems such as aluminum poisoning. As Acid rain is a serious problem with disastrous effects, each day this serious problem increases, this issue should be met head on and solved before it is too late. This report focuses on what is acid rain, what cause acid, what are the effect of acid rain and try to find how to reduce and eliminate Acid rain causes. 1. Introduction1.1 Terms of reference This report was required by Mrs. Daria Hahn, EAP course tutor at the North Sydney College of TAFE. It is to research what are the causes and effects of Acid rain, it focuses on how to reduce the Acid rain effects. 1.2 Source of information The main sources of the research come from the library in the North Sydney College of TAFE, which include: . The Australian Acid rain web site . Some books on the Acid rain research . Some article about Acid rain from the Internet and ANZRC 2. What is Acid rain? 2.1 The Definition of Acid Rain According to acid rain and the facts (2002, p1) acid rain is rain, snow or fog that is polluted by acid in the atmosphere causing damages to the environment ", Acid rain is a broad term used to describe several ways that acids fall out of the atmosphere. A more precise term is acid deposition, which has two parts: wet and dry. Wet deposition refers to acidic rain, fog, and snow. As this acidic water flows over and through the ground, it effects a variety of plants and animals. The strength of the effects depend on many factors, including the level of acid in the water, the chemistry and buffering capacity of the soils involved, and the types of fish, trees, and other living life that rely on the water. Dry deposition refers to acidic gases and particles. About half of the acidity in the atmosphere falls back to earth through dry deposition. The wind then blows these acidic particles and gases onto buildings, cars, homes, and trees. However, dry deposited gases and particles can be washed from trees and other surfaces by rainstorms. When that happens, the runoff water adds those acids to the acid rain, making the combination more acidic than the falling rain alone. 2.2 How to Measure Acid Rain? Acid rain is measured using a scale called "pH". The lower a substance\'s pH is, the more acidic it is. Normal rain is slightly acidic because carbon dioxide dissolves into it, resulting in a pH of approximately 5.5 while pure water has a pH of 7.0. (Elsom,1987:p34) 3. Causes of Acid rain 3.1 History of Acid rain During the 1970s many countries started to notice changes in fish populations in lakes and damages to certain trees. It was found that the high acidity levels in the lakes, rivers, bays and streams caused it. Acid rain was identified to be the major cause of the changes and the damages in those environments. The USA, Germany, Czechoslovakia, Netherlands, Switzerland and Australia DrugsDrugs TOBACCO Tobacco is a plant grown for its leaves that are smoked, chewed, or sniffed for a variety of effects. It is considered an addictive substance because it contains the chemical nicotine. The tobacco plant is believed to have originated in the Western Hemisphere. The cultivated species most often grown for North American and European tobacco products is Nicotine Tabacum. The leaves of the plant are prepared for smoking, chewing, or sniffing. In addition nicotine tobacco contains over Organic Molecules ChallengeOrganic Molecules Challenge Silicon\'s Reign as King of Semiconductors There is a revolution fomenting in the semiconductor industry. It may take 30 years or more to reach perfection, but when it does the advance may be so great that today\'s computers will be little more than calculators compared to what will come after. The revolution is called molecular electronics, and its goal is to depose silicon as king of the computer chip and put carbon in its place. The perpetrators are a few clever ch The Chaos TheoryThe Chaos Theory Where Chaos begins, classical science ends. Ever since physicists have inquired into the laws of nature, the have not begun to explore irregular side of nature, the erratic and discontinuous side, that have always puzzled scientists. They did not attempt to understand disorder in the atmosphere, the turbulent sea, the oscillations of the heart and brain, and the fluctuations of wildlife populations. All of these things were taken for granted until in the 1970\'s some American an OxygenOxygen Oxygen and its compounds play a key role in many of the important processes of life and industry. Oxygen in the biosphere is essential in the processes of respiration and metabolism, the means by which animals derive the energy needed to sustain life. Furthermore, oxygen is the most abundant element at the surface of the Earth. In combined form it is found in ores, earths, rocks, and gemstones, as well as in all living organisms. Oxygen is a gaseous chemical element in Group VA of the per BiologyBiology Biology is the science of living systems. It is inherently interdisciplinary, requiring knowledge of the physical sciences and mathematics, although specialities may be oriented toward a group of organisms or a level of organization. BOTANY is concerned with plant life, ZOOLOGY with animal life, algology with ALGAE, MYCOLOGY with fungi, MICROBIOLOGY with microorganisms such as protozoa and bacteria, CYTOLOGY with CELLS, and so on. All biological specialties, however, are concerned with l The Effects of Aristotelian Teleological Thought oThe Effects of Aristotelian Teleological Thought on Darwin\'s Mechanistic Views of Evolution Jordan Hoffman The need to understand organisms has been a much sought goal of science since its birth as biology. History shows Aristotle and Charles Darwin as two of the most powerful biologists of all time. Aristotle\'s teleological method was supported widely for over 2,000 years. One scientist remarks that the Aristotelian teleology has been the ghost, the unexplained mystery which has haunted biol ESTERIFICATION AND HYDROLYSIS ESTERIFICATION AND HYDROLYSIS Experiment #1: Methyl Benzoate by Fisher Esterification Post Lab Organic Chemistry II Lab Section 7515 February 25, 2004 INTRODUCTION The Fischer esterification reaction reaches equilibrium after a few hours. This equilibrium can be shifted by adding more of the acid or of the alcohol. The mechanism of the reaction involves initial protonation of the carboxyl group, followed by attack by nucleophilic hydroxyl, a proton transfer, and finally loss of water follow TeachingTeaching Background and Setting My teaching practice is being carried out in Blackrock College. This is a large, fee paying all boys secondary school with roughly 1000 pupils from second to sixth year, with first years attending the feeder school Willow Park. My assignment relates to my experiences with second year classes. There are eight streamed classes, roughly 24 pupils per class, ranging highest to lowest from 2.8 to 2.2. The junior syllabus has been divided up, with a different teacher re Organic ChemistryOrganic Chemistry Organic Chemistry branch of chemistry in which carbon compounds and their reactions are studied. A wide variety of classes of substancessuch as drugs, vitamins, plastics, natural and synthetic fibers, as well as carbohydrates, proteins, and fatsconsist of organic molecules. Organic chemists determine the structures of organic molecules, study their various reactions, and develop procedures for the synthesis of organic compounds. Organic chemistry has had a profound effect on Analytical ChemistryAnalytical Chemistry -Analysis -determination of quality and quantity of a sample -steps of chemical analysis -determine objective -determine a method -acquire sample -sample preparation -quantitation (experiment) -interpretation of results -evaluation of error -Errors -determinate errors -affect accuracy -can be constant or proportional -are controllable (errors in procedure) -lead to differences between the obtained results and the truth -detection of constant error -compare to a norm value -s The Nature of ScienceThe Nature of Science 1) THE NATURE OF SCIENCE- Pitjendara tribe of Australia finds answers about nature in stones called Ayers Rock; it contains 2 pictures of 2 snakes; Liru and Kunia; also contains sand-lizard man digging for water. The goal of science is to understand the world around us. Scientific Method-1) Observing & state problem 2) Forming hyp. 3) Test hyp. 4) Record & analyze data 5) Form conclusion 6) Replicate work. Control exp. allow researchers to isolate & test the effects of a s The Metallurgy of Copper WireThe Metallurgy of Copper Wire Introduction Copper is the preferred and predominant choice in the electrical industry because of its high conductivity, both electrical and thermal. In order to obtain the required properties, unalloyed high purity copper is almost always used. This article discusses the rationale for this choice, and pays particular attention to the underlying metallurgical principles. It is intended to serve as a technical discussion of pertinent developments spanning the past se Magic of the MindMagic of the Mind PART ONE CONTENTS --------------------3 SELFREALISATION AND DIRECTION FOR THE ADOLESCENT PART TWO CONTENTS ---------------------59 MANIFESTATIONS OF AWARENESS PART THREE CONTENTS -----------------104 PHILOSOPHICAL CONTENTS PART ONE. BOLD = MAIN TITLES. REGULAR = SUB TITLES. ----------------------------------------------------------------PAGE FORWARD -----------------------------------------------------4 INTELLECTUALITY -----------------------------------------8 DEDICATION -----
<urn:uuid:4f25cd97-6654-4a74-abc8-5d2e96b25c63>
CC-MAIN-2017-34
https://digitaltermpapers.com/essays/acid-rain_17
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104204.40/warc/CC-MAIN-20170818005345-20170818025345-00521.warc.gz
en
0.922626
2,308
2.8125
3
Researchers at MIT's Computer Science and Artificial Intelligence Laboratory have developed a new computational model of a neural circuit in the brain, which could shed light on the biological role of inhibitory neurons -- neurons that keep other neurons from firing. The model describes a neural circuit consisting of an array of input neurons and an equivalent number of output neurons. The circuit performs what neuroscientists call a "winner-take-all" operation, in which signals from multiple input neurons induce a signal in just one output neuron. Using the tools of theoretical computer science, the researchers prove that, within the context of their model, a certain configuration of inhibitory neurons provides the most efficient means of enacting a winner-take-all operation. Because the model makes empirical predictions about the behavior of inhibitory neurons in the brain, it offers a good example of the way in which computational analysis could aid neuroscience. The researchers will present their results this week at the conference on Innovations in Theoretical Computer Science. Nancy Lynch, the NEC Professor of Software Science and Engineering at MIT, is the senior author on the paper. She's joined by Merav Parter, a postdoc in her group, and Cameron Musco, an MIT graduate student in electrical engineering and computer science. For years, Lynch's group has studied communication and resource allocation in ad hoc networks -- networks whose members are continually leaving and rejoining. But recently, the team has begun using the tools of network analysis to investigate biological phenomena. "There's a close correspondence between the behavior of networks of computers or other devices like mobile phones and that of biological systems," Lynch says. "We're trying to find problems that can benefit from this distributed-computing perspective, focusing on algorithms for which we can prove mathematical properties." In recent years, artificial neural networks -- computer models roughly based on the structure of the brain -- have been responsible for some of the most rapid improvement in artificial-intelligence systems, from speech transcription to face recognition software. An artificial neural network consists of "nodes" that, like individual neurons, have limited information-processing power but are densely interconnected. Data are fed into the first layer of nodes. If the data received by a given node meet some threshold criterion -- for instance, if it exceeds a particular value -- the node "fires," or sends signals along all of its outgoing connections. Each of those outgoing connections, however, has an associated "weight," which can augment or diminish a signal. Each node in the next layer of the network receives weighted signals from multiple nodes in the first layer; it adds them together, and again, if their sum exceeds some threshold, it fires. Its outgoing signals pass to the next layer, and so on. In artificial-intelligence applications, a neural network is "trained" on sample data, constantly adjusting its weights and firing thresholds until the output of its final layer consistently represents the solution to some computational problem. Lynch, Parter, and Musco made several modifications to this design to make it more biologically plausible. The first was the addition of inhibitory "neurons." In a standard artificial neural network, the values of the weights on the connections are usually positive or capable of being either positive or negative. But in the brain, some neurons appear to play a purely inhibitory role, preventing other neurons from firing. The MIT researchers modeled those neurons as nodes whose connections have only negative weights. Many artificial-intelligence applications also use "feed-forward" networks, in which signals pass through the network in only one direction, from the first layer, which receives input data, to the last layer, which provides the result of a computation. But connections in the brain are much more complex. Lynch, Parter, and Musco's circuit thus includes feedback: Signals from the output neurons pass to the inhibitory neurons, whose output in turn passes back to the output neurons. The signaling of the output neurons also feeds back on itself, which proves essential to enacting the winner-take-all strategy. Finally, the MIT researchers' network is probabilistic. In a typical artificial neural net, if a node's input values exceed some threshold, the node fires. But in the brain, increasing the strength of the signal traveling over an input neuron only increases the chances that an output neuron will fire. The same is true of the nodes in the researchers' model. Again, this modification is crucial to enacting the winner-take-all strategy. In the researchers' model, the number of input and output neurons is fixed, and the execution of the winner-take-all computation is purely the work of a bank of auxiliary neurons. "We are trying to see the trade-off between the computational time to solve a given problem and the number of auxiliary neurons," Parter explains. "We consider neurons to be a resource; we don't want too spend much of it." Parter and her colleagues were able to show that with only one inhibitory neuron, it's impossible, in the context of their model, to enact the winner-take-all strategy. But two inhibitory neurons are sufficient. The trick is that one of the inhibitory neurons -- which the researchers call a convergence neuron -- sends a strong inhibitory signal if more than one output neuron is firing. The other inhibitory neuron -- the stability neuron -- sends a much weaker signal as long as any output neurons are firing. The convergence neuron drives the circuit to select a single output neuron, at which point it stops firing; the stability neuron prevents a second output neuron from becoming active once the convergence neuron has been turned off. The self-feedback circuits from the output neurons enhance this effect. The longer an output neuron has been turned off, the more likely it is to remain off; the longer it's been on, the more likely it is to remain on. Once a single output neuron has been selected, its self-feedback circuit ensures that it can overcome the inhibition of the stability neuron. Without randomness, however, the circuit won't converge to a single output neuron: Any setting of the inhibitory neurons' weights will affect all the output neurons equally. "You need randomness to break the symmetry," Parter explains. The researchers were able to determine the minimum number of auxiliary neurons required to guarantee a particular convergence speed and the maximum convergence speed possible given a particular number of auxiliary neurons. Adding more convergence neurons increases the convergence speed, but only up to a point. For instance, with 100 input neurons, two or three convergence neurons are all you need; adding a fourth doesn't improve efficiency. And just one stability neuron is already optimal. But perhaps more intriguingly, the researchers showed that including excitatory neurons -- neurons that stimulate, rather than inhibit, other neurons' firing -- as well as inhibitory neurons among the auxiliary neurons cannot improve the efficiency of the circuit. Similarly, any arrangement of inhibitory neurons that doesn't observe the distinction between convergence and stability neurons will be less efficient than one that does. Assuming, then, that evolution tends to find efficient solutions to engineering problems, the model suggests both an answer to the question of why inhibitory neurons are found in the brain and a tantalizing question for empirical research: Do real inhibitory neurons exhibit the same division between convergence neurons and stability neurons? PAPER: Computational tradeoffs in biological neural networks: Self-stabilizing winner-take-all networks ARCHIVE: Exploring networks efficiently ARCHIVE: New frontier in error-correcting codes ARCHIVE: New approach to vertex connectivity could maximize networks' bandwidth ARCHIVE: Reliable communication, unreliable networks
<urn:uuid:be1e65da-fb5d-4970-8b43-f7e04d39bb80>
CC-MAIN-2020-10
https://www.eurekalert.org/pub_releases/2017-01/miot-msl010917.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145818.81/warc/CC-MAIN-20200223154628-20200223184628-00092.warc.gz
en
0.930937
1,558
3.203125
3
What Weather Prediction Tells Us About Programmatic As I write this there is a major snow storm bearing down on New England, where I live. The storm could either hit us with a wallop or whimper. Which is more likely? Depends on which weather model you believe. The National Oceanic and Atmospheric Administration (NOAA) makes the results of multiple weather models available free of charge. The Global Forecasting System, or GFS, is the primary US weather forecasting model. But, NOAA also operates the North American Meoscale (NAM) Forecast System. Not to be outdone, the Canadians produce weather forecasts on the basis of their own model, and a coalition of 34 European countries operate the ECMWF model. There are hundreds of additional smaller scale and experimental weather models in operation around the globe. Each of these weather models have different strengths and weaknesses. Some are designed for short-range forecast accuracy, while others attempt to get the long view right. MOAA’s GFS model uses a 28 kilometer grid, while the European ECMWF uses a shorter side length and calculates more points. Some of the models are best applied to specific forecasting problems, or specific areas, while others are general purpose and try to get the broad picture more or less right. Wallop or whimper? Only time will tell. All of these models have access to exactly the same raw weather data at massive scale, yet they all produce different forecasting results and the variability of forecasts can be significant Tremendous resources are deployed trying to interpret the data. NOAA claims that there are 6,773 scientists and engineers on its staff. The department within NOAA responsible for the GFS and NAM models has a multi-billion dollar annual budget with some of the largest supercomputing facilities in the world. The combined total spent annually on weather modeling across the globe easily exceeds $10 B. Clearly lots of shared data, lots of PhDs, lots of computing resources and heaps of money are required to interpret and use the raw weather data. The important – and profound – takeaway for marketers is this: despite the current worship of raw data among marketers and investors, either at the church of data scale or at the church of data quality, the ability to interpret data and transform it into useful, predictive information, is the more important trick and is perhaps the one with the most added value. The corollary conclusion is that interpreting data and creating useful information isn’t easy. In the early days of getting ownerIQ off the ground I came to this conclusion myself, the hard way. We had then (and still do) direct data on a consumer’s behavior in retail. If an advertiser wanted a particular outcome, say, finding consumers who are likely to buy washing machines, I was sure that all I had to do was find those consumers who were browsing washing machines, put an ad in front of them and everything would turn out great for my advertiser. I was wrong. The simplistic technique of looking for a single signal about a consumer’s behavior and showing them an ad just doesn’t work very well. When it didn’t work we checked to see if our data signals were polluted? Did we segment our users incorrectly? No. We found over and over again that rigidly segmenting users by a single behavior, or some combination of behaviors, and then indiscriminately targeting that segment was not a recipe for programmatic success. The fundamental media problem is understanding how to sort through billions of ad placement opportunities appearing in front of hundreds of millions of users and use the limited budget to find the combination of these opportunities, users and ad frequency that produce the best result for the advertiser. Only in extremely limited cases is the presence of a single signal, and a rigid segment based on that behavior, sufficient to use as a filter to winnow down the number of possible opportunity-user-frequency combinations to a manageable number and produce great outcomes. The only time this technique works is in the presence of both a single highly predictive signal – and a very small user population. That scenario, highly predictive signal and small user population, describes only one common tactic: retargeting. In fact, the only situation where we find the simplistic technique works with reliability is in the case of retargeting. This explains why site retargeting was the first widely adopted programmatic use case and it also explains why any programmatic provider can make retargeting work. In all other cases the simplistic technique fails and data alone, of any type, or at any scale, will not deliver the marketing outcome because the data signal alone is not sufficiently predictive to overcome the noise that is inherent in the programmatic landscape. This is where we started carefully building models to combine the highly predictive data we were bringing to market, including consumer behavior at retail, with meticulous evaluation of each placement opportunity. Noise comes in many forms. Fraud and brand safety are the obvious ones. But, there are many others. Publishers who load up a page with lots of ad units. Publishers who have content so eye catching that it overwhelms any ads placed on the page. Users who seem to have nothing better to do than to surf the web and explore everything, so much so that each of their observed behaviors is of marginal importance. Users who never intended to be browsing washing machines and were really looking for dishwashers. Users who share a family computer with their teenage daughter and therefore present a confusing bag of behaviors. This is a fact that marketers who have bought into the idea of raw data as the most important, or only, determining factor in media placement are now finding out to their dismay. A DSP software license combined with data from third-party aggregators, or even just with large quantities of first party data, cannot produce great results in the absence of models that interpret that data in the context of the specific marketing problems to be solved. Just like weather forecasting, the marketer needs programmatic forecasting models that score each of the billions of possible opportunity-user-frequency combinations according to each business use case and makes a prediction about what is going to happen if the advertiser’s media is placed in a given opportunity. And, it turns out, that the quality of these models and how they are built add more value to the marketer than the mere data alone. Recall, that in weather forecasting everybody has access to the same data, yet the predictive results are anything but the same. Data isn’t unimportant, to be sure. False signals will mislead any model. Some signals are more predictive than others. Raw data inputs do matter. But, when it comes to programmatic excellence, data isn’t the only thing that matters. Raw data deployed without a model to sort through the billions of opportunity-user-frequency combinations is really just a baby step up from the often derided spray-and-pray techniques. Models matter too, and marketers should be as focused on how their data is going to be interpreted and used – the model – as they are in the data inputs themselves. Oh, and that snow storm. Whimper. The Canadian model got it right. NOAA got it wrong. If you cancelled your vacation expecting the wallop, you lost out. Same data, different prediction, different outcome. The model matters. This article was recently featured in AdExchanger
<urn:uuid:46ad8035-c0ea-4e81-8aab-6bafee87c86f>
CC-MAIN-2017-39
http://www.owneriq.com/blog/2016/03/25/what-weather-prediction-tells-us-about-programmatic
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686169.5/warc/CC-MAIN-20170920033426-20170920053426-00550.warc.gz
en
0.950941
1,513
2.578125
3
Today, just about everyone agrees that the Everglades is a national treasure. It's the focus of the largest environmental restoration project ever attempted. It's also a World Heritage Site, an International Biosphere Reserve, the most famous wetland on earth. It's a cultural icon, featured in Carl Hiaasen novels, Spider-man comics, country songs and the opening credits of "CSI: Miami," as well as the popular postcards of its shovel-faced alligators and spindly legged wading birds. It's the ecological equivalent of motherhood and apple pie; when a presidential aide on NBC-TV's "The West Wing" was asked the most popular thing the president could do for the environment, he replied, "Save the Everglades." From This Story But there was once an equally broad national consensus that the Everglades was a worthless morass, an enemy of civilization, an obstacle to progress. An 1848 government report deemed it "suitable only for the haunt of noxious vermin, or the resort of pestilential reptiles." Explorers described it as a muddy, mushy, inhospitable expanse of razor-edged saw grass in shallow water—too wet to farm, too dry to sail, too unpredictable to settle. Americans believed it was their duty and destiny to drain this "God-forsaken" swamp, to "reclaim" it from mosquitoes and rattlesnakes, to "improve" it into a subtropical paradise of bountiful crops and booming communities. "Draining the swamp" came to mean solving a festering problem, and converting wetlands into productive lands was considered the essence of conservation. Hadn't God instructed man to subdue the earth and take dominion over all the living creatures that moveth upon it? In the Everglades, man would learn the limits of that dominion. He would recognize the cost of his abuses against nature, and he would finally begin to try to make amends. Abstract of an article by Michael Grunwald
<urn:uuid:99c92043-1c7c-40b0-8dba-55832f73866d>
CC-MAIN-2014-23
http://www.smithsonianmag.com/science-nature/everglades-112072394/?onsite_source=relatedarticles&onsite_campaign=SmithMag&onsite_medium=internallink&onsite_content=Everglades
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776440207.64/warc/CC-MAIN-20140707234040-00021-ip-10-180-212-248.ec2.internal.warc.gz
en
0.961912
419
2.96875
3
There are different reasons why students have a difficult time staying awake in a classroom--late-night partying, juggling between a full-time job and school or getting ready for an early morning class. Students sleeping in class can be problematic for both the teacher and the student.It will definitely affect your grades. Here's how to keep bright-eyed and avoid snoring away in class. Wake up an hour early before leaving the house. This may seem to make a person more tired than ever, but believe it or not, this can help you prepare for a busy day and get energized. Try getting in a work out before class to get the blood pumping. Drink caffeine before going to class such as a soda, coffee or tea so it can keep you alert. Energy-boosted drinks, "Red Bull" or "Monster" helps build stamina and keep you energized during the time you're in class. Eat healthy portions of fruits, cereal or oatmeal as it contains low carbs. It helps rejuvenate your body and mind so that you will be more focused and be able to pay more attention during lectures throughout the class period. Restore your energy by visiting a nutritional store to buy vitamins-- preferably vitamin B which increases your energy level. You can take the tablets before heading to class and in no time, you will feel a sudden burst of energy and freshness to your body. You can get plenty of these vitamins at health food markets. Participate in class discussions whenever you feel the need to doze off. While some students believe that most lectures from their professors are a bore, there are a few that can be quite thought-provoking and grab your attention to keep you mentally responsive to what is going on in the classroom. Tips & Warnings - Chew on "Stay Alert" gum so it gives you something to do and to help you concentrate. - Stand up in the back of your class. - Move from the back or the middle of the class to the front to focus on the professor and class discussions. - If you'd tried different alternatives to stay awake in class, go to a doctor because you might have a health problem. - Avoid frequent naps during class as it may result in failing the class. - Photo Credit student image by Dmitri MIkitenko from Fotolia.com - How to Stay Awake 72 Hours Straight - How to keep yourself awake What Is the Best Way to Stay Awake in the Morning? Some people find it difficult to stay away in the morning for various reasons. You may feel sluggish or tired and therefore...
<urn:uuid:012567d0-4982-4c99-9a5a-e690f0e323b1>
CC-MAIN-2017-39
http://www.ehow.com/how_2312411_stay-awake-class.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688966.39/warc/CC-MAIN-20170922130934-20170922150934-00232.warc.gz
en
0.948529
538
2.96875
3
Your complimentary articles You’ve read one of your four complimentary articles for this month. You can read four articles free per month. To have complete access to the thousands of philosophy articles on this site, please Ethics in Politics Massimo Pigliucci trawls the history of politics to see how closely ethics fits it. A good number of politicians talk about character, virtue, morality, and doing the right thing. But if you look at what they actually do rather than just listen to what they say, their behavior is often anything but virtuous. They lie, they cheat, and sometimes, they self-aggrandize, or start wars which bring misery to countless people. Did you think I was talking about current politics in the US, the UK, or perhaps Russia? No, actually I was thinking of Renaissance Europe. It was a time when Popes, arguably the highest role models in Christendom (after Jesus himself, of course), sometimes donned armor and rode into battle – when they were not scheming to augment their power, their purses, or both. Niccolo Machiavelli and his legacy The Genesis of Realpolitik As you can appreciate, the gap between words and actions hasn’t narrowed that much in the last five centuries. But this stark discrepancy in politics between theory and practice impressed a brilliant Florentine diplomat named Niccolò Machiavelli (1469-1527) so much that he wrote The Prince, in which he gives advice to statesmen on the basis of a frank assessment of political realities rather than on pious fantasies. Machiavelli had many experiences which inspired his insights. One such was meeting Cesare Borgia. For a time Machiavelli considered him Italy’s best hope for unification against the French and Spanish invaders. (It didn’t happen.) In 1503, Machiavelli met Borgia for a second time, in the course of a diplomatic mission. During the encounter he learned a thing or two about Borgia’s modus operandi. At one point, Borgia ran into problems with some noblemen of a nearby town run by the Orsini family, who weren’t too happy about Borgia’s plans for territorial expansion. The Orsinis were invited by Borgia to the city of Senigallia, allegedly to conduct peace talks and reach a reciprocally suitable agreement. As soon as they set foot inside the walls they were captured and executed. Diplomacy Italian style, circa 1500 CE. Another illuminating episode took place in the Borgia-occupied city of Cesena, a territory that needed to be ‘pacified’. I’ll let Machiavelli tell the story: Cesare Borgia “appointed Remirro de Orco, a cruel, no-nonsense man, and gave him complete control. In a short while de Orco pacified and united the area… As soon as he found a pretext, he had de Orco beheaded and his corpse put on display one morning in the piazza in Cesena with a wooden block and a bloody knife beside. The ferocity of the spectacle left people both gratified and shocked” (The Prince). So Borgia first had one of his henchmen do his dirty work, knowing that this would anger the people; but since a prince needs popular support, he then found an excuse to execute the henchman, thus giving the people what they wanted and deflecting their ire. No wonder Bertrand Russell called The Prince “a handbook for gangsters.” As Tim Parks aptly puts it in his Introduction to the Penguin translation, “Machiavelli’s little book was a constant threat. It reminded people that power is always up for grabs, always a question of what can be taken by force or treachery, and always, despite all protests to the contrary, the prime concern of any ruler.” Machiavelli was the first modern writer to systematically think in terms of what is called realpolitik, or, ‘political realism’. Since then, political realism has seen a number of developments, and has gathered an impressive array of supporters. Arguably the most influential early philosopher in this vein was Thomas Hobbes, whose Leviathan, or The Matter, Forme and Power of a Commonwealth Ecclesiasticall and Civil (1651) articulated the need for a strong ruler in order to avoid the violent ‘state of nature’ to which, according to Hobbes, we would otherwise inevitably revert. This state he famously characterized as ‘a war of all against all’: “In such condition there is no place for industry, because the fruit thereof is uncertain, and consequently no culture of the earth, no navigation nor the use of commodities that may be imported by sea, no commodious building, no instruments of moving and removing such things as require much force, no knowledge of the face of the earth, no account of time, no arts, no letters, no society, and which is worst of all, continual fear and danger of violent death, and the life of man, solitary, poor, nasty, brutish, and short.” Well, who wouldn’t give up a few liberties here and there in order to avoid that? Among the practitioners of Machiavellianism, as one might fairly label the approach, is a who’s who of early-modern and contemporary statesmen; from the French Cardinal Richelieu (of Three Musketeers fame), to the Prussian monarch Frederick the Great; from the Italian Camillo Benso of Cavour, to another Prussian, Otto von Bismarck; all the way down to Mao Zedong, Charles de Gaulle, and Henry Kissinger. A Socratic Way Yet there is another way of looking at the relationship between ethics and politics, without having to give in to the hypocrisy of Renaissance popes and modern politicians. It was put forth by Socrates in the fifth century BCE, and hinges on the wannabe statesman’s character. Socrates was known as the annoying ‘gadfly’ of ancient Athens, always intent to show people that they really didn’t know what they were talking about when it came to crucial concepts such justice (as shown in Plato’s Republic) or piety (as in his Euthyphro). But another major aspect of Socrates’ activities emerges from less appreciated sources. For instance, Xenophon’s Memorabilia (c.370 BCE) gives two episodes in which Socrates makes it his business to advise about a political career – against or in favor of, depending on who he’s talking to. On one occasion, Socrates meets up with a very young Glaucon, Plato’s elder brother. Glaucon is bent on a political career, and he thinks he knows what that entails. Socrates appears duly impressed, but as usual he begins questioning his interlocutor: “‘Well, Glaucon, as you want to win honor, is it not obvious that you must benefit your city?’ ‘Pray don’t be reticent, then; but tell us how you propose to begin your services to the state.’… Glaucon remained dumb, apparently considering for the first time how to begin.” (Memorabilia, 3.6.3–4.) At one point Glaucon tells Socrates that Athens will be able to raise its revenues by waging war. To this Socrates responds: “‘In order to advise her whom to fight, it is necessary to know the strength of the city [of Athens] and of the enemy, so that, if the city be stronger, one may recommend her to go to war, but if weaker than the enemy, may persuade her to beware.’ ‘You are right.’ ‘First, then, tell us the naval and military strength of our city, and then that of her enemies.’ ‘No, of course I can’t tell you out of my head.’” (3.6.8.) Next Socrates asks whether Glaucon has a good estimate of how long the grain reserves will last, as those are crucial to feed the city. Glaucon’s response is that that task is too overwhelming, and he didn’t feel like carrying it out. Socrates at this point chides Glaucon, reminding him that if one wishes to take charge of a household, one must bother with exactly the sort of details that Glaucon has so far neglected when it comes to affairs of state. Glaucon replies: “‘Well, I could do something for uncle’s household if only he would listen to me.’ ‘What? You can’t persuade your uncle, and yet you suppose you will be able to persuade all the Athenians, including your uncle, to listen to you? Pray take care, Glaucon, that your daring ambition doesn’t lead to a fall! Don’t you see how risky it is to say or do what you don’t understand?’” (3.6.15–16) That apparently did the trick, and Glaucon postponed his dream of becoming a statesman. In fact, he never became one. Instead, he fought valiantly at the battle of Megara, at the height of the Peloponnesian War with Sparta, in 424 BCE, the year after this conversation took place. He later became a competent musician, as Socrates attests in the Republic. Contrast this episode with one that took place years later involving Charmides, Glaucon’s son: “Seeing that Glaucon… was a respectable man and far more capable than the politicians of the day, [who] nevertheless shrank from speaking in the assembly and taking a part in politics, [Socrates] said: ‘Tell me, Charmides, what would you think of a man who was capable of gaining a victory in the great games and consequently of winning honor for himself and adding to his country’s fame in the Greek world, and yet refused to compete?’ ‘I should think him a poltroon and a coward, of course.’” (3.7.1) Soon Charmides realizes to his chagrin that Socrates is talking about him in relation to politics, and is setting up the usual Socratic trap: “Don’t refuse to face this duty then: strive more earnestly to pay heed to yourself; and don’t neglect public affairs, if you have the power to improve them” (3.7.9). In this particular case, however, things did not go well. Charmides did enter into politics, but had the misfortune to serve Athens under the Spartan-appointed Thirty Tyrants after Sparta’s defeat of Athens in the war. Charmides died in the battle of Munichia in 403 BCE. This underscores a point appreciated many centuries later by Machiavelli: the statesman needs skill, but also luck. Cesare Borgia was very skilled, at least by Machiavelli’s standards, but in the end he ran out of luck. His strongest supporter, his father, Pope Alexander VI, died before the two of them could make enough progress in the pursuit of their projects. Socrates, however, would have insisted on a third ingredient besides skill and luck: virtue. This insistence becomes very apparent in the course of the First Alcibiades (which is generally ascribed to Plato, despite some doubts about its authorship). Alcibiades was a friend and student of Socrates, and very much wanted to be his lover – at least according to the speech he gives in Plato’s Symposium. At the time of the dialogue in the First Alcibiades, he was twenty years old, handsome, rich, charismatic, and full of self-confidence. Alcibiades wanted to make a difference in the world, so he went to Socrates for advice on how best to follow the path of virtue. But in the course of the conversation it becomes increasingly clear that Alcibiades is more interested in glory and self-aggrandizement. At one point Socrates diagnoses his problem in blunt terms: “Then alas, Alcibiades, what a condition you suffer from! I hesitate to name it, but, since we two are alone, it must be said. You are wedded to stupidity, best of men, of the most extreme sort, as the argument accuses you and you accuse yourself. So this is why you are leaping into the affairs of the city before you have been educated.” (Alcibiades I.26). Naturally, Alcibiades does not listen to his mentor and follows his instincts instead. This results in one of the most astounding series of political disasters in all antiquity, including a major role in the Athenian defeat in the Peloponnesian War, and ending with Alcibiades’ death at the hand of Persian agents acting on behalf of Sparta. I tell the whole sordid tale as part of the bigger picture concerning ethics and politics in my new book, How To Be Good: What Socrates Can Teach Us About the Art of Living Well (Basic Books, 2022). Cesare Borgia seizing power Cicero’s Third Way While Machiavelli argued that skill and luck, not virtue, make for a good leader, Socrates bet everything on virtue. The Roman advocate, statesman, and philosopher, Marcus Tullius Cicero would say they both only got part of the picture: a good leader needs not only a good character, but also needs to be able to pragmatically navigate complex situations through trade-offs and compromises. That is why Cicero was critical of his friend Cato the Younger, a stern and uncompromisingly virtuous Stoic who eventually did more damage than good to the Roman Republic: “As for our friend Cato, you do not love him more than I do: but after all, with the very best intentions and the most absolute honesty, he sometimes does harm to the Republic. He speaks and votes as though he were in the Republic of Plato, not in the scum of Romulus” (Letters to Atticus, 2.1.8). The fact is that we all live in ‘the scum of Romulus’ (Romulus was the legendary founder of Rome). Good leaders realize that their followers are flawed, and act accordingly – without going to the extremes of a Cesare Borgia. Cicero knew what he was talking about, since he struggled his whole life to save the Roman Republic. He shifted his political allegiances and his short-term objectives in order to always keep his eyes on the ultimate prize. And he did this while trying to maintain his integrity of character and his philosophical commitments. In the end he failed to save the Republic, possibly because the Republic was no longer a sustainable model and had to give way to Empire as a matter of historical necessity; or perhaps because too many others around him behaved in a Machiavellian fashion, putting their own thirst for power and glory ahead of the common good. They could get away with such behavior because the Roman people had given up demanding that their leaders at least try to behave as virtuously as they talked. Let us not make the same mistake. © Massimo Pigliucci 2022 Massimo Pigliucci is the K.D. Irani Professor of Philosophy at the City College of New York. His books include How to Be a Stoic (Basic Books) and The Quest for Character (Basic Books). More by him at massimopigliucci.org.
<urn:uuid:88855e08-4e78-4af5-9db7-5943c2b428a3>
CC-MAIN-2023-23
https://philosophynow.org/issues/153/Ethics_in_Politics
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655446.86/warc/CC-MAIN-20230609064417-20230609094417-00301.warc.gz
en
0.970576
3,324
2.734375
3
Charles Norris (medical examiner) Charles Norris (seated) |Born||4 December 1867 Hoboken, New Jersey |Died||11 September 1935 (age 67) New York City, New York State, United States Cause of death |Home town||New York City, New York State, United States| |Parents||Father: Joseph Parker Norris Mother: Frances Stevens Norris Norris was born on December 4, 1867. He was first educated at Cutler's Private School in Manhattan, later entering Yale University and earning a bachelor of philosophy with emphasis on science. He then went to the Columbia University College of Physicians and Surgeons, earning a doctorate in medicine in 1892. After studying for four years in Europe, he returned to New York, and in 1904 became the laboratory director at Bellevue and Allied Hospitals. New York medical examiner In 1917, Norris, applying for the job of chief medical examiner, took a civil service examination and passed. Mayor John F. Hylan immediately took legal action against him, claiming that in performing autopsies as part of the examination he had violated the law. Fortunately for Norris, the state government took notice and intervened, forcing Hylan to appoint Norris chief medical examiner. Norris immediately set about improving his department. After hiring several distinguished scientists and chemists, including Alexander Gettler, he was forced, due to the lack of any supplies, to buy them all out of his own money. Other problems included the possibility of his workers being drafted to serve in the army (which he solved by writing to Hylan), and the low salaries of his workers, which averaged less than $4,000 a year. Tetraethyl lead and the "looney gas building" In 1924, Norris was called in to investigate the mysterious insanity and deaths of workers in a plant that made tetraethyllead also known as TEL. It was mostly made in Standard Oil's plant at the Bayway Refinery in New Jersey. TEL was compounded in a small red brick building which was soon nicknamed the "looney gas building", due to the insanity of the workers there. Although Standard Oil had tried to deny that the deaths were due to tetraethyllead, New Jersey ordered the plant shut down. Although a federal investigation, by chemical industry scientists, responded to the concerns by recommending certain safety measures be adopted by production workers, it concluded the the risk posed to the public was low and the plant resumed production soon afterwards. It was not until decades later that the leaded gasoline ban hoped for by Norris would be adopted. Carbon Monoxide Poisoning and the case of Francesco Travia In December, 1926, Francesco Travia was caught carrying parts of Anna Fredericksen's body towards the Brooklyn waterfront in New York city. Detectives found the remains of Fredericksen's dismembered body in Travia's apartment and charged him with murder. Travia claimed that he and the victim had fallen asleep after drinking whiskey in his apartment, and that after waking up he found her dead on the floor. Dr. Norris concluded that the victim had died of monoxide poisoning and could not have been killed by Travia. The police department ignored the conclusions of Norris and charged Travia with murder. At Travia's trial in March, 1927, the forensic analysis of Charles Norris and chemist Alexander Gettler proved that the carbon monoxide gas from Travia's stove had poisoned her to death. Travia was acquitted of murder, convicted instead of illegally dismembering a dead body. Advisory Board of the Association Against Impure Liquor On February 12, 1927, Norris was elected to the chairmanship of the Advisory Board of the Association Against Impure Liquor. The purpose of the organization was to organize physicians, hospital administrators, and pharmacists who "realize the necessity of purity of liquors administered to the sick." In the spring of 1935, Norris began to feel ill. He began staying away from public events. That summer, he took a vacation to South America, hoping to improve his health. Unfortunately, however, once he returned in late August, his health steadily deteriorated. He died at 8:30 p.m. on September 11, 1935, of heart failure. - Deborah Blum. The Poisoner's Handbook: Murder and the Birth of Forensic Medicine in Jazz Age New York. New York: Penguin, 2011. - "Eckert, W. G. "Charles Norris (1868-1935) and Thomas A. Gonzales (1878-1956), New York's Forensic Pioneers." National Center for Biotechnology Information. U.S. National Library of Medicine, 8 Dec. 1987. Web. 28 Dec. 2013. - "Norris Succeeds Riordan." The New York Times 1 Feb. 1918: n. pag. Print. - "Forensic science was not always CSI-style teamwork" The Guardian, Deborah Blum, 23 September 2010 - "Norris Heads Fight On Impure Liquor." The New York Times 13 Feb. 1927: n. pag. Print.
<urn:uuid:a30f7883-bfe9-4278-8160-3eb7f2b4497c>
CC-MAIN-2014-10
http://en.wikipedia.org/wiki/Charles_Norris_(medical_examiner)
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011231453/warc/CC-MAIN-20140305092031-00038-ip-10-183-142-35.ec2.internal.warc.gz
en
0.968132
1,065
2.515625
3
TOPIC: Urban Development Subject: Researched Data Posted: September 20, 2008 4:47 PM MDT Comments: Considering that there is no textbook (although I keep hearing that one is coming) for New Mexico History, I find it difficult to put together a lesson plan that is concise and shows the relationship of military bases, the atomic bomb, and interstate highways to the development of certain communities. I teach NM History thematically and when I teach Economic New Mexico (1912- )it requires too much individual research for a one-semester course. Posted By: Versa Clark Subject: Related to WWII Posted: November 4, 2008 4:55 PM MST Comments: Versa, your frustrations are understandable. The New Mexico Digital History Project does offer an accessible alternative to a textbook. Though I am not immediately aware of all the site has to offer with regard to "Economic New Mexico" in the context you are looking, I am aware of a few pieces relating to WWII that may be a good place to start. If nothing else they will provide your students with a basis from which to draw their own conclusions. Some articles include, "1943-Establishment of Los Alamos National Laboratory," "1945-Establishment of the White Sands Missile Range," "Los Alamos," "Los Alamos Post Office," and "White Sands Missile Range." I am not sure of the title but I know there is also something in the Time section about the establishment of Sandia Laboratories. You can find all of these in the appropriate navigation themes or simply by doing a search. I hope this helps for next year if it is too late for this year! Posted By: Jennifer Post your comments to this discussion Please login or sign up for an account to post your comments to this discussion. SIGN UP FOR AN ACCOUNT Back to TOPICS LIST»
<urn:uuid:487fa9d1-854f-4220-b1a9-2a29341ce577>
CC-MAIN-2013-20
http://www.newmexicohistory.org/discussion/?threadID=0209
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706484194/warc/CC-MAIN-20130516121444-00089-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942256
386
2.5625
3
Shoppers are brain-scanned to test their reactions to promotions and special offers in a cutting-edge project Shoppers are not as good at bargain hunting and taking advantage of supermarket “offers” as they may think, a study which brain-scanned people undertaking a virtual supermarket shopping trip to buy party-food found. The shoppers were brain-scanned to test their reactions to promotions and special offers in a cutting-edge project led by Bangor University’s School of Psychology. Senior lecturer Dr Paul Mullins said: “We know from other research people are not as good at making rational decisions as they might expect, often using “rules of thumb” and educated guesses to evaluate decisions. “Using brain imaging techniques we hope to get a better understanding of how the brain responds to special offers and how this may influence the decisions we make. This also gives us the chance to do some research on how we make decisions in a real world context.” Volunteers had their brains scanned using Bangor University’s MRI scanners while they took part in an especially devised virtual grocery-shopping task. Dr Mullins said the “shoppers” were asked to imagine they were shopping for a party and asked to save as much money as possible. Gallery: Boxing Day Sales in North Wales Images of generic versions of various products, combined with an offer were projected onto a screen. Participants were asked to push a button to choose how many items of the product to ‘purchase’, before moving on to the next item. The offers included discount offers, multi-buy offers such as 2 for £2 or 3 for £4 and “special offers” which had no information about savings. Some of the offers were actually “bad” offers that did not provide a saving and which actually cost more than the original price. The volunteers, spanned a considerable age range and of both genders, although there were slightly more women then men. Dr Mullins added: “It turns out we are not as good at picking good offers as you might expect, with the average shopper in our experiment only picking 60% of good offers compared to bad. “We also found that age had a strong negative affect on the ability to choose good offers, with older people less able to choose good offers over bad ones. We find this latter effect very interesting and would like to do some more research to find out why this may be the case.” The team have deeper analyses planned on the data and are excited to see what additional results they will find.
<urn:uuid:c01a5f35-8701-4aaf-932b-302d8c1d4793>
CC-MAIN-2014-15
http://www.dailypost.co.uk/news/north-wales-news/bangor-university-study-shows-shoppers-6460223
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206770.7/warc/CC-MAIN-20140423032006-00233-ip-10-147-4-33.ec2.internal.warc.gz
en
0.983849
542
2.734375
3
Laurel is broadly right, but there is a peculiarity in your first example that I can see would make it confusing. It’s that em-dash between “bad” and “tempered”, giving bad—tempered. Because it’s a dash, it leaves the two words separate. The “bad” means “bad news”, in reference to the earlier mention of good news. And so the “tempered” stands on its own and is a verb, meaning to balance, or moderate, or dilute, etc. But if the reader mistakes the dash for a hyphen, then we get the adjective, “bad-tempered”, meaning grumpy, or annoyed, or mildly angry (and which breaks the sentence and makes no sense). Given all that, the intended meaning here, of “tempered with” is “balanced with”, or “moderated with”, and so on. In other words, the speaker is saying that they are going to do something to compensate for some possible imbalance created by something else.
<urn:uuid:33ae0072-5810-48dd-8de8-96db40cd8822>
CC-MAIN-2020-05
https://ell.stackexchange.com/questions/183994/what-does-temper-with-mean
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251705142.94/warc/CC-MAIN-20200127174507-20200127204507-00230.warc.gz
en
0.947802
239
3.171875
3
Two things are inherently true when it comes to cybercriminals. The first is that they follow the money. This is why ransomware grew to a billion dollar business overnight. The second is that like water, their efforts flow towards the path of least resistance. Cybercriminals are like many people, they go for the easy money. Phishing has been the dominant delivery method for malware and cyberattacks for a number of years now. However, phishing is not as easy as it used to be. Spam filters and email gateways now react quickly in shutting down a malicious email domain. Email security technology is now using analytics to more accurately identify behavior abnormalities and possible email threats. Even users are growing more guarded when opening emails and are becoming more astute at identifying suspicious links and attachments. We have a long way to go of course, but it is getting better. Which is why smishing attacks are growing more prominent today as cybercriminals turn to a medium that users trust more than their email. Smishing is a social engineering attack that utilizes SMS text messaging instead of email. There are over 6 billion smart phones in circulation today and a third of them are smartphones. Because cell phones today are part of our persona and extension of our day-to-day lives, users look to them as trusted devices that they can count on. Unfortunately, from a cybersecurity point of view, a personal cellphone is a vulnerable computer with a direct connection to the Internet. With the proliferation of BYOD within companies today, the enterprise is now exposed to personal cell phones on a regular basis. Just like laptops and more traditional computer devices, personal cell phones can become launching pads to spread malware, DoS attacks and seize control of privileged accounts. Texting is an Ideal Medium for Social Engineering Attacks. Here is why: - There are approximately 913,242,000 texts sent every hour of every day around the globe. That is 15.2 million per minute. This rapid open rate velocity of text messages makes it highly favorable for perpetrators. - More than 90% of SMS text messages are opened within 3 seconds. This accents the sense of urgency that is a necessity for a social engineering attack. Users need to feel that an action must be performed right away without proper venting and consideration. - There is no current text filter technology in text numbers are confirmed as trusted sources. Examples of SMS phishing attacks exemplifying this sense of urgency look something like this: - “Congratulations, your entry in our store drawing has won you a $100 gift card. Please click the link to accept your prize.” - “You have received an alert notice concerning a large withdrawal from your account. Please respond with your account number to confirm your identity.” - “As a valued customer, we are now offering our new banking app. Please click the link to install.” - “You have been selected for jury duty. If you cannot make it, please call the following number and have your name and social security number ready.” How to Protect Yourself Thanks to the highly publicized mammoth data breaches over the past couple of years involving millions of personal records, cybercriminals have access to a large pool of legitimate phone numbers. This makes it possible to extrapolate these records in order to better target the users who have these numbers. Most SMS phishing attacks however are sent like traditional phishing attacks in which a large net is cast to catch easy prey. Users should be wary of text messages that come from a “5000” number, as this is indicative of an SMS message send over the web rather from a cell phone. Below are some other tips to protect yourself from smishing attacks. - Never install an app from a web link that appears in a text message. All apps should only be downloaded from verified app stores. If possible, set your phone to block apps from unknown sources. - Never respond to a text message that conveys a high sense of urgency or panic and demands an immediate action - Verify all links sent by family and friends to confirm they knowingly sent you the specific link - Never respond to a text from a financial, healthcare of governmental institution. Call the verified number of these organizations to confirm the contents of a text message that asks you to take some type of immediate action. - Do not respond to a text message asking them to stop sending you spam messages. This will only confirm your number and encourage them. You can block numbers that consistently send you message through your cellular provider’s portal or by calling them. - Consider a NAP or NAC policy for all BYOD mobile devices. Many companies create policies enforcing minimum-security standards for laptops and tablets. Requiring users to have malware protection on their phones is a legitimate request considering today’s environment. While the majority of SMS phishing attacks are implemented for a quick payoff from an unsuspecting user, smishing attacks are rapidly growing in sophistication and can be used as a method to target an entire enterprise in the future. It is important to ensure that SMS messages are an area of least resistance. HALOCK is headquartered in Schaumburg, IL, in the Chicago area and advises clients on information security throughout the US.
<urn:uuid:f72c1866-9c07-4c09-9acb-445d33677b41>
CC-MAIN-2020-10
https://www.halock.com/smishing-attacks-increasing/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145538.32/warc/CC-MAIN-20200221203000-20200221233000-00064.warc.gz
en
0.943385
1,070
2.953125
3
The UCSB Reads 7th annual program is distributing free copies of Donovan Hohn’s Moby-Duck this Thursday in the Davidson Library’s main lobby for participants in the communal reading initiative. The program features Hohn’s literature concerning humans’ environmental impact to spark discussion on consumerism, global trade, science and the media in keeping with this year’s theme, ‘Making an impact. What’s yours?’ Moby-Duck, which chronicles the journey of 28,800 bath toys released into the Pacific Ocean after a storm destroyed their shipping container, was selected for its exposure of controversial shipping and manufacturing practices. College of Creative Studies Dean and earth science professor Bruce Tiffney, who serves on the UCSB Reads Advisory Committee, said the work demonstrates civilization’s far-reaching effects on Earth. “Among many other things, the plastic ducks that set this book going bring us face-to-face with another way in which our dependence on oil impacts our planet –– plastic pollution,” Tiffney said in a press release. “We know global warming results from fossil fuels but these same fuels create plastic bags, bottles and … ducks — structures whose individual environmental impact will be with us for decades if not centuries, but which are normally hidden from our consciousness.” The book was chosen by the program’s new Campus Committee, which is comprised of students, professors and other Advisory Committee members. According to UCSB Library Outreach Coordinator Jane Faulkner, the program educates students about various sustainable issues to encourage environmentally conscious behavior on campus. “Not withstanding Floatopia, UCSB has always been very energetic and active in the green movement,” Faulkner said. “But even on campus, we sell something like 225 plastic water bottles a day. We want to plant the seed of interest and awareness about sustainability [in students].” Although the Davidson Library and the Office of the Executive Vice Chancellor traditionally present UCSB Reads, several additional organizations including the Associated Students Coastal Fund and the Plastic Pollution Coalition are sponsoring this year’s installment. Various local institutions including Westmont College, Santa Barbara Community College, public libraries and local high schools will also participate in promoting Moby-Duck. According to Hohn, Moby-Duck provides insight into the ecological struggles within our oceans. “I’m tempted to say that we can never know the full extent of the impact our actions have, as parts of the book illustrate,” Hohn said. “I hope the book is for [students] a voyage of discovery. I hope it helps them see and understand the world a little more clearly, the watery part of the world especially.” Chancellor Henry T. Yang will help distribute copies Thursday at 8:30 a.m. while the library will hand out special edition copies containing an essay written by Executive Vice Chancellor Gene Lucas until 11:30 a.m. Additionally, UCSB will host a series of Community Conversations to engage faculty in discussion about the book and Hohn will present a free lecture on March 5 at Campbell Hall. Visit http://guides.library.ucsb.edu/ucsbreads for more information about scheduled events. The book giveaway is this Thursday at the Library, starting with Chancellor and Dilling Yang handing out the first copy. Executive Vice Chancellor Gene Lucas will be at the Library at 11:30. The book giveaway continues all day, as long as there are copies available. Plastic Pollution Coalition is really thrilled to be a part of this. Visit http://www.plasticpollutioncoalition.org to learn how to get started on refusing single-use and disposable plastic.
<urn:uuid:d23254c9-054e-4e9f-a617-a98ceda2b182>
CC-MAIN-2023-23
https://dailynexus.com/2012-01-10/yearly-free-book-program-tackles-plastic-pollution/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00637.warc.gz
en
0.931237
785
2.546875
3
George Read is a prominent man not only in Delaware history, but also American history. As the plaque to the right (which is currently found on the wall surrounding the George Read II House garden) says, he was a “MEMBER OF THE CONGRESS OF THE REVOLUTION, THE CONVENTION THAT FRAMED THE CONSTITUTION OF THE UNITED STATES AND OF THE FIRST SENATE UNDER IT, JUDGE OF ADMIRALTY PRESIDENT AND CHIEF JUSTICE OF DELAWARE AND A SIGNER OF THE DECLARATION OF INDEPENDENCE.” His second born son, George Read II aspired to one day surpass his father’s fame. While his political and occupational attempts never quite reached such a high level, his home did. It was said to be the largest and most magnificent house in all of Delaware at the time. Aside from his grand residence, he also led a successful personal life. He married his cousin Mary Thompson from Carlisle, Pennsylvania and fathered eight children. He made his living as a lawyer. Considering all that went into the house, many contractors and specialists that contributed to its construction, and the constant upkeep and renovations (like the kitchen), one can gather that George Read II was a successful lawyer. The engraving on the left was taken from a portrait by Adolf Ulrich Wertmuller. *Click here for a Read Family Genealogy -Researched by: Amy Cunningham
<urn:uuid:da970e9d-23bd-4886-a772-927b47172ef5>
CC-MAIN-2014-35
http://www.udel.edu/anthro/decunzo/read/bb.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829210.91/warc/CC-MAIN-20140820021349-00065-ip-10-180-136-8.ec2.internal.warc.gz
en
0.975061
302
2.546875
3
Like us, animals also get sick and, of course, also suffer medical emergencies (cuts, burns, bites …) that require immediate medical intervention. Therefore, and in the same way we do with ourselves, we must prepare a first aid kit that contains the necessary tools to act effectively. Preparing the kit will take up little time and can get you out of more than a minor trouble and can help you buy time while the vet arrives or the pet is transferred to a veterinary hospital. It is also recommended that, in addition to at home, you have an emergency kit in the car. Below we give you the keys to what a first aid kit for dogs should be and how to use some of the tools. WHAT SHOULD THE FIRST-AID KIT CONTAIN? To make the kit as complete as possible, we recommend incorporating the following elements: - Sterile rubber gloves: this is the first thing you have to use to protect both you and your pet from infections. - Scissors: use them for short gauze or bandages - An antiseptic solution to clean wounds such as soap, alcohol, iodine, hydrogen peroxide - Cotton, gauze and bandages - Splints to be able to splint - Sticking plaster - Elastic rubber for turnstiles If after putting all the above there is still space, it would be a good idea to introduce a flashlight and batteries, antibacterial ointment, wet wipes, a muzzle, leash, common medicines, eye wash drops and a copy of your pet’s veterinary card. In order for your dog to become familiar with the medicines and other utensils, it is good to approach the kit, as long as you are alert to not take anything. On the other hand, you should reward him with prizes and applaud his collaborative attitude when taking medications. Finally, and although it sounds logical, we want to warn you that the most advisable in case of accidents and emergencies is to go to the vet to attend your dog. If this is not possible, you can also follow the instructions of the veterinarian via telephone to act quickly and effectively, so first-hand knowledge in this regard will help you stay calm.
<urn:uuid:2b40606c-c767-4bbf-b2ed-68d4c8a818f5>
CC-MAIN-2020-29
https://petszone99.com/basic-kit-of-your-pet/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657167808.91/warc/CC-MAIN-20200715101742-20200715131742-00526.warc.gz
en
0.948775
454
2.671875
3
How many medals might the UK win in the 2012 Olympics, and does the country hosting the Games have an advantage? What are the mechanics involved in the pole vault? Could the altitude of the Olympic venue affect performance in the long jump? What kind of science goes into designing tennis rackets? These and many other questions are addressed by an exciting new project - 'Maths and Sport: Countdown to the Games'. Developed by the award-winning Millennium Mathematics Project at the University of Cambridge, 'Maths and Sport: Countdown to the Games' celebrates London 2012 with free online mathematical articles and activities exploring maths and science through the Olympic and Paralympic Games, aimed at a wide audience from school students and their teachers to members of the public. 'Maths and Sport: Countdown to the Games' has been awarded the prestigious Inspire Mark, the badge of the London 2012 Inspire programme. The London 2012 Inspire programme recognises exceptional and innovative projects that are directly inspired by the 2012 Olympic and Paralympic Games. Seb Coe, Chair, London Organising Committee of the Olympic Games and Paralympic Games said: “‘Maths + Sport: Countdown to the Games’ will encourage young people to fulfil their potential. I am proud that partners such as the University of Cambridge’s Millennium Mathematics Project are delivering on our vision to use the power of the Olympic Games and Paralympic Games to boost participation in education.”
<urn:uuid:6682a8c0-a557-40c5-9d26-995cf5791155>
CC-MAIN-2017-30
https://maths.org/node/157
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423723.8/warc/CC-MAIN-20170721062230-20170721082230-00052.warc.gz
en
0.91774
298
2.921875
3
The Way of the Heavenly Sword: The Japanese Army in the 1920's This text examines the history of the Japanese army in the 1920s. In this decade, the 'Meija military system' disintegrated and was replaced by a new 'Imperial Army System'. The Japanese victory over Russia in 1905 had changed the direction of Japanese military thought from almost total dependence on western rational military thinking to a more traditional reliance on morale as the preponderant factor for victory in combat. The author focuses on the intense and complex struggle which took place over leadership of the Army, the application of the principle of the primacy of morale, and the quite contradictory but obvious necessity for the army to modernize. This internal turmoil was intensified by a background of increasingly difficult economic circumstances, and the terrible effects of the great earthquake and fire of 1923. This crucial decade of Japanese history set the stage for the shattering events of the 1930s and 1940s. Specifications of The Way of the Heavenly Sword: The Japanese Army in the 1920's |Publisher||Stanford University Press| |Number Of Pages||268| Write a review Note: HTML is not translated! Rating: Bad Good Enter the code in the box below:
<urn:uuid:a9dabd42-4137-496b-a1df-5f67a418bf4c>
CC-MAIN-2017-34
https://ergodebooks.com/index.php?_route_=the-way-of-the-heavenly-sword-the-japanese-army-in-the-1920-s-DADAX0804723753
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117874.26/warc/CC-MAIN-20170823055231-20170823075231-00330.warc.gz
en
0.886475
249
3.21875
3
Did you know a mother elephant seal can lose 600 pounds in one month while she’s nursing her pup!? (And now some of my readers are feeling jealous of elephant seals for the first time in their lives.) Did you know African elephants have pregnancies that last almost 2 years!? (The aforementioned readers are no longer feeling jealous.) Many animal mothers are incredible, but none of them compare to the significance of the investment made by human mothers. Here are some Mother’s Day activities for kids to help you celebrate moms and other caretakers in a meaningful way! (And the last one even briefly uses a mother elephant!) 6 Meaningful Mother’s Day Activities for Kids Bible Mom Match Game On a whiteboard or paper, make one column with the names of Bible mothers and another column with the children of those mothers (see list below), mixing them in random order. Let the kids take turns trying to match each Bible hero with his mom. Bible Moms/Bible Heroes: Eve (Seth), Sarah (Isaac), Rebekah (Jacob), Leah (Judah), Jochebed (Moses), Ruth (Obed), Hannah (Samuel), Elizabeth (John the Baptist), Mary (Jesus), Eunice (Timothy) After the game, talk briefly about the significance of these Bible characters and point out how each of these mothers played an important role in God’s great rescue plan! Some people act like taking care of kids is insignificant unimportant work, but it’s actually a very important job that changes the world! Moses was used to deliver God’s people from slavery, Samuel led God’s people as a prophet, John the Baptist prepared people to meet Jesus, Timothy served as a missionary and pastor, and the rest of these people are ancestors of Jesus Christ! Dinosaurs Coloring Page I grew up in a foster home; not as a foster kid, but as a bio kid with foster siblings. I’ve seen up close evidence that family holidays like Mother’s Day are rough on kids who don’t have their mom at home. Giving them crafts with messages like “Mom, You Rock!” or “Happy Mother’s Day!” can unintentionally hurt these kids. That’s one of the reasons I made this dinosaur coloring page. It’s not “Mom” specific so it works as a craft that includes everybody. (And it has dinosaurs!!! That pretty much guarantees that this is a brilliant idea!) Click the picture to download and print copies for kids in your home or church. Mother’s Day Scavenger Hunt This scavenger hunt is a fun way for kids to enjoy discovering new things about Mom. Read the descriptions one at a time and have kids rush to find something to match each description. If they don’t know Mom’s favorite color, food, movie, etc. they’ll have to ask Mom for that clue. (Be sure to give Mom the list ahead of time so she can be prepared to provide kids with the clues they’ll need.) For kids who do not live with their mom, you can substitute the name of a foster parent, grandparent, or anyone else who takes care of them. Click the picture to download and print this Mother’s Day game for kids. After the game, read Ephesians 6:2 and explain that one way to honor Mom is to get to know her and treat her like the super special person she is. When we honor the people who take care of us, we are also showing honor to God. Encourage the kids to remember what they have learned about Mom and use it to honor her in special ways. Perhaps they could use her favorite color the next time they color a picture for her or offer to help with her least favorite chore. Maybe they can help prepare her favorite food or make up a story about her favorite animal to share with her. (P.S. If you like scavenger hunts you should totally check out this other article about 5 super simple scavenger hunts with a purpose!) “Mom Says” Game This is basically “Simon Says,” except Mom (or another caregiver) is in charge. The kids have to listen closely and follow every instruction mom gives that begins with the words “Mom says…” Mix in silly instructions like “Mom says freeze in place,” with more practical instructions like “Mom says wash your hands,” or “Mom says put away one toy.” Afterward, read Ephesians 6:1 and explain that Mom’s instructions have authority because God has given parents authority (power) over their children. When kids obey their parents, they’re also obeying God! Mother’s Day Bible Lesson & Craft Since many of us will be celebrating Mother’s Day at home this year, I’ve made this Mother’s Day Bible lesson video for kids to enjoy at home. You can even download this Mother’s Day Bible Craft so kids can make their own copy of the extra cool card in this video. Baby Animal Matching Game After watching the video above, you can play this Baby Animal Matching Game to review and reinforce what the kids have learned. Take turns matching the baby animals with their moms to answer the questions! You can click the various pictures and links throughout this article to access free Mother’s Day resources to your hearts content. If you want to grab most of them all from one place, you can find them in the “Mother’s Day” section of our resources page. What other fun ideas have you used to celebrate Mother’s Day with kids in a meaningful way? I’d love to read your ideas in the comments! If you’d like a bit more explanation about some of these ideas (or if you just really like to watch me talk!) you can check out this video from our YouTube channel.
<urn:uuid:a8d3c012-6996-495a-86ee-c29317b106f2>
CC-MAIN-2023-40
https://kidsenjoyingjesus.com/a-meaningful-mothers-day-activities-for-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00515.warc.gz
en
0.941467
1,259
2.625
3
Comparisons and IF Statements - Compare Numbers Assignment Please complete the following exercises on this page. When complete post this page to your server. Make a link in your WDV221 homework page for this assignment. Include a comment in each script with the exercise number and a description of what the script is supposed to do. Using Blackboard submit this Assignment. - Create a function called compareNumbers( ). - The function will compare two numbers entered in the form above. - The function should display the largest number or "Equal" if both values are the same. - The results will be displayed in a span element using the .innerHTML property. - Provide a reset function that will properly clear the form between attempts.
<urn:uuid:f0a08482-483a-45f7-8ded-bc19cabea7aa>
CC-MAIN-2023-23
https://kalliefields.com/wdv_221/compare_numbers/compare_numbers.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00061.warc.gz
en
0.792564
162
2.984375
3
Coronary arteries, which supply the heart with oxygenated blood, can slowly narrow due to a build-up of plaque leading to angina. In a heart attack, there is a sudden plaque rupture leading to blood clot formation, blocking the artery. In spite of the treatment given, there is still a 10% mortality rate in patients with a heart attack. This is usually caused by abnormal heart rhythm (ventricular fibrillation) due to electrical instability of the heart or heart failure due to a massive heart attack. Occasionally, the heart muscle can rupture after a heart attack and this is usually fatal. The diagnosis of heart attack is based on three findings: An early diagnosis is crucial to the treatment of a heart attack as it allows interventional cardiologists to open up the blocked artery quickly and effectively to minimise the extent of damage to the heart muscle. Currently, there are two treatment options to remove the blockage in the artery. The fastest way to treat a heart attack is to give a powerful blood-thinning medication (thrombolytic agents) to dissolve the clot and therefore remove the blockage in the artery. Any qualified physician can administer this immediately upon diagnosis of a heart attack. However, it is only effective in slightly more than 50% of the patients and may cause serious bleeding complications in other areas, including the brain. A more effective way to unblock the artery is by inserting a balloon or stent through a small puncture in the groin or wrist to open up the artery This procedure is known as coronary angioplasty and has been successful in more than 90% of the cases. However, this is a procedure needs to be performed in the procedure suite or catheterisation laboratory and requires experienced operators. At the National Heart Centre Singapore (NHCS), emergency angioplasty for patients who are admitted for heart attack is available round the clock. A balloon is inserted into the narrowed or blocked artery through a stent and inflated As a heart attack is serious and can be fatal, immediate medical attention should be sought when one experiences any sort of chest pain or discomfort which is not relieved by rest or medication.One should follow the following steps when encountering a heart attack episode: Subscribe to our mailing list to get the updates to your email inbox... SHP-Head Office, 167 Jalan Bukit Merah Connection One (Tower 5), #15-10, Singapore 150167
<urn:uuid:29c3df67-c141-45e3-afce-99655256b471>
CC-MAIN-2023-50
https://polyclinic.singhealth.com.sg/patient-care/conditions-treatments/heart-attack
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00595.warc.gz
en
0.928447
497
2.671875
3
Ethernet Randomly Disconnects Ethernet is a widely used technology that allows devices to connect to the internet or local networks through a wired connection. However, sometimes users may experience random disconnections, which can be frustrating and disrupt their online activities. In this article, we will explore the possible reasons behind Ethernet randomly disconnecting and provide solutions to resolve the issue. I. Physical Factors 1. Loose Connections One of the common reasons for Ethernet disconnecting is loose or faulty connections. Make sure that the Ethernet cable is securely plugged into both the device and the router or modem. If the cable is damaged or worn out, it is advisable to replace it with a new one. 2. Damaged Cables or Ports Inspect the Ethernet cable for any visible damage, such as cuts or frays. Additionally, examine the Ethernet ports on both the device and the router or modem for any signs of physical damage. If any damage is found, it may be necessary to replace the cable or have the ports repaired. II. Network Configuration Issues 1. IP Address Conflict An IP address conflict occurs when two devices on the same network have the same IP address, leading to connectivity issues. To resolve this, ensure that each device on your network has a unique IP address assigned. On Windows, you can use the \”ipconfig\” command in the Command Prompt to check and change the IP address if necessary. 2. Outdated Network Drivers Outdated or incompatible network drivers can cause intermittent connectivity problems. Check the manufacturer’s website for the latest driver updates for your network adapter. Install the updated driver and restart your computer to see if it resolves the issue. III. Network Interference 1. Wireless Interference If you are using a wireless connection alongside your Ethernet connection, interference from nearby devices or networks can cause random disconnects. Move your wireless router away from other electronic devices such as cordless phones, baby monitors, or microwave ovens. Additionally, try changing the wireless channel on your router to avoid interference from nearby networks. 2. Power Surges Power surges can cause temporary interruptions in the Ethernet connection. Ensure that your router or modem is connected to a surge protector to protect it from sudden voltage spikes. This can help prevent random disconnections due to power surges. IV. ISP Issues 1. Service Outages Sometimes, random Ethernet disconnects may be caused by issues with your Internet Service Provider (ISP). Contact your ISP to inquire about any service outages or maintenance activities that may be affecting your connection. They can provide you with information and assistance in resolving the issue. 2. Plan Limitations Check if your internet plan has any limitations, such as data caps or bandwidth restrictions. Exceeding these limits can result in throttled or disconnected Ethernet connections. Consider upgrading your plan if necessary. Experiencing random Ethernet disconnects can be frustrating, but by considering the possible factors mentioned above, you can troubleshoot and resolve the issue. Always ensure that your connections are secure, check for physical damage, update network drivers, and address any network interference. If the problem persists, contact your ISP for further assistance. By taking these steps, you can enjoy a stable and uninterrupted Ethernet connection.
<urn:uuid:a03b685a-056e-40af-9274-996694f9696a>
CC-MAIN-2023-40
https://www.fs-transceivers.com/ethernet-randomly-disconnects/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510319.87/warc/CC-MAIN-20230927171156-20230927201156-00315.warc.gz
en
0.89796
673
2.578125
3
By Shari M. Ling, M.D. and Joan M. Bathon, M.D. - OA is primarily a disease of cartilage - Is OA simply a process of aging of cartilage? - What molecules are responsible for degrading cartilage matrix? - What factor(s) is responsible for inducing metalloprotease synthesis? - Can cartilage repair itself? Although epidemiological studies have promoted our understanding of the risk factors that predispose to OA, we do not yet understand the initiating events that trigger the disease. Cartilage is a unique tissue with viscoelastic and compressive properties which are imparted by its extracellular matrix, composed predominantly of type II collagen and proteoglycans. Under normal conditions, this matrix is subjected to a dynamic remodeling process in which low levels of degradative and synthetic enzyme activities are balanced, such that the volume of cartilage is maintained. In OA cartilage, however, matrix degrading enzymes are overexpressed, shifting this balance in favor of net degradation, with resultant loss of collagen and proteoglycans from the matrix. Presumably in response to this loss, chondrocytes initially proliferate and synthesize enhanced amounts of proteoglycan and collagen molecules. As the disease progresses, however, reparative attempts are outmatched by progressive cartilage degradation. Fibrillation, erosion and cracking initially appear in the superficial layer of cartilage and progress over time to deeper layers, resulting eventually in large clinically observable erosions. OA, in simplistic terms, therefore, can be thought of as a process of progressive cartilage matrix degradation to which an ineffectual attempt at repair is made. A critical question is whether OA is truly a disease or a natural consequence of aging. Several differences between aging cartilage and OA cartilage have been described, suggesting the former. For example, although denatured type II collagen is found in both normal aging and OA cartilage, it is more predominant in OA. In addition, OA and normal aging cartilage differ in the amount of water content and the in ratio of chondroitin-sulfate to keratin sulfate constituents. The expression of a chondroitin-sulfate epitope (epitope 846) in OA cartilage, that is otherwise only present in fetal and neonatal cartilage, provides further evidence that OA is a distinct pathologic process. A final but important distinction is that degradative enzyme activity is increased in OA, but not in normal aging cartilage. The primary enzymes responsible for the degradation of cartilage are the matrix metalloproteinases (MMPs). These enzymes are secreted by both synovial cells and chondrocytes and are categorized into three general categories: a) collagenases; b) stromelysins; and, c) gelatinases. Under normal conditions, MMP synthesis and activation are tightly regulated at several levels. They are secreted as inactive proenzymes that require enzymatic cleavage in order to become activated. Once activated, MMPs become susceptible to the plasma-derived MMP inhibitor, alpha-2-macroglobulin, and to tissue inhibitors of MMPs (TIMPs) that are also secreted by synovial cells and chondrocytes. In OA, synthesis of MMPs is greatly enhanced and the available inhibitors are overwhelmed, resulting in net degradation. Interestingly, stromelysin can serve as an activator for its own proenzyme, as well as for procollagenase and prostromelysin, thus creating a positive feedback loop of proMMP activation in cartilage. One candidate is interleukin-1 (IL-1). IL-1 is a potent pro-inflammatory cytokine that, in vitro, is capable of inducing chondrocytes and synovial cells to synthesize MMPs. Furthermore, IL-1 suppresses the synthesis of type II collagen and proteoglycans, and inhibits transforming growth factor-ß stimulated chondrocyte proliferation. The presence of IL-1 RNA and protein have been confirmed in OA joints. Thus, IL-1 may not only actively promote cartilage degradation, but may also suppress attempts at repair, in OA. In addition to these effects, IL-1 induces nitric oxide production, chondrocyte apoptosis, and prostaglandin synthesis, which further contribute to cartilage deterioration. Under normal conditions, an endogenous IL-1 receptor antagonist regulates IL-1 activity. A relative excess of IL-1 and/or deficiency of the IL-1 receptor antagonist could conceivably result in the cartilage destruction that is characteristic of OA. It is likely that other cytokines or particulate material from damaged cartilage may also contribute to this inflammatory, degradative process. Growth factors are produced locally in cartilage and synovium and are likely to contribute to local cartilage remodeling by stimulating the de novo synthesis of collagen and proteoglycans. Transforming growth factor ß (TGFß) is the best characterized and most potent of the chondrocyte growth factors. Not only does TGFß stimulate de novo matrix synthesis, but it also counteracts cartilage degradation by down regulating IL-1 receptor expression and by increasing IL-1 receptor antagonist release and TIMP expression. Insulin-like growth factor (IGF-1) and basic fibroblast growth factor (b-FGF) are also present in OA cartilage and likely to contribute to reparative attempts, although, as noted, degradation ultimately outstrips repair in OA cartilage. In summary, MMPs and pro-inflammatory cytokines (e.g., IL-1) appear to be important mediators of cartilage destruction in OA. Synthesis and secretion of growth factors and of inhibitors of MMPs and cytokines are apparently inadequate to counteract these degradative forces. Progressive cartilage degradation and OA result. New therapies (see Treatment), focused on reducing MMP activity and on stimulating matrix synthesis, are in development. - Lohmander LS et al. Cartilage matrix metabolism in osteoarthritis: markers in synovial fluid, serum, and urine. Clin Biochem 25:167-1674,1992. - Hollander AP et al. Increased damage to type II collagen in osteoarthritic articular cartilage detected by a new immunoassay. J Clin Invest 93:1722-1732, 1994. - Poole AR et al. Changes in cartilage metabolism in arthritis are reflected by altered serum and synovial fluid levels of the cartilage proteoglycan aggrecan, implications for pathogenesis. J Clin Invest 94:25-33, 1994 - Woessner Jr. MF, Gunja-Smith Z., Role of metalloproteinases in human osteoarthritis. J Rheumatol 18;99-101, 1991 - Lotz M et al. Cytokine regulation of chondrocyte functions. J Rheumatol 22:104-108, 1995. - Guerne P-A, et al. Growth factor responsiveness of human articular chondrocytes in aging and development. Arthritis Rheum 38:960-968, 1995 - Sharif M et al. Serum hyaluronic acid level as a predictor of disease progression in osteoarthritis of the knee. Arthritis Rheum 38:760-767, 1995 - Hochberg MC et al. Serum levels of insulin-like growth factor 1 in subjects with osteoarthritis of the knee. Arthritis Rheum 37:1177-1180, 1994 - Campion GP, Delmas P, Dieppe P. Serum and synovial fluid osteocalcin (bone gla protein) levels in joint diseases. Br J Rheumatol 28:393-398, 1989 - Caterson B. Immunological aspects of markers of joint disease. J Rheumatol 18:19-26, 1991.
<urn:uuid:da7e68a1-d341-496d-9dde-d194f4bfa949>
CC-MAIN-2017-47
https://www.hopkinsarthritis.org/arthritis-info/osteoarthritis/oa-pathophysiology/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809160.77/warc/CC-MAIN-20171124234011-20171125014011-00166.warc.gz
en
0.906689
1,703
2.71875
3
Viking burials yield uncontaminated Viking DNA for important analysis Vikings are well known in mythology and stories for wearing their famous helmets and being buried with their treasures. Archeaology has discovered some of these helmets, which has provided much detail about the lives of Vikings. Now scientists have now used the human teeth and tissue from the Viking skeletons that have lain undisturbed, buried with their artefacts for over 1000 years, to extract pure Viking DNA to tell us more... The researchers overcame problems that have plagued previous studies - that of contamination. All living things have DNA and examining archeaological finds always leads to investigators DNA being left on the finds. Danish researchers planned this excavation carefully. They took samples from teeth and bones for DNA testing moments after the ancient skeletons were first unearthed, before any DNA could contaminated the area. For more information and links visit http://www.familytreefolk.co.uk/page_11065.html
<urn:uuid:475dd302-1534-43d9-8584-4f872fdbf01e>
CC-MAIN-2014-15
http://newatfamilytreefolk.blogspot.com/2010/09/viking-dna.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202774.3/warc/CC-MAIN-20140423032002-00307-ip-10-147-4-33.ec2.internal.warc.gz
en
0.968536
195
3.453125
3
I knew my daughter will have to learn about odd and even numbers, even before it was taught. I was presented with a golden opportunity to teach her this when Delhi had the odd- even rule for cars. First was the concept of odd and even. After the initial pairing off exercise to show what is meant by odd and even, the simple rule was: any number ending with anyone of 0,2,4,6,8 was even and any number ending with any one of 1,3,5,7,9 was odd. So the game that I played with daughter was this. I took “even” and she took “odds”, and we had to count how many cars had these, and who got more cars. This pushed the playful but competitive streak in my daughter and in no time she was able to just look at any number and determine odd and even within a few seconds
<urn:uuid:ecbfbaff-276d-47cf-8875-ea961d362d61>
CC-MAIN-2020-29
https://maximumchildhood.com/journey/28/Odds_and_Evens
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00180.warc.gz
en
0.997161
187
3.078125
3
(Published June 2009) Genital human papillomavirus (HPV) infection is the most commonly diagnosed sexually transmitted infection in the United States and is a necessary cause of cervical cancer.1,2 HPV also is associated with external genital warts and cancer of the penis, vagina, vulva, anus, and oropharynx.2 Approximately 11,150 women are diagnosed with cervical cancer each year in the United States.3 Most cases of invasive cervical cancer and death due to cervical cancer occur in women who did not receive proper screening.4 Cervical cancer screening has not been equally accessible to all women, and the incidence of cervical cancer is higher among ethnic minorities and poor women.4 |Table 1: HPV Types Associated with Cancer and External Genital Warts5-7| |High-Risk Types||Low-Risk Types| |Selected types||16, 18, 31, 33, 35, 39, 45, 51, 52, 56, 58, 59, 68, 82||6, 11, 40, 42, 43, 44, 54, 61, 72, 81| |Associated abnormalities||Low-grade cervical lesions High-grade cervical lesions |External genital warts| One hundred percent of the cervical cancer cases diagnosed each year are believed to be attributable to HPV.3 This means that essentially all cervical cancers are associated with persistent infection with “high-risk” HPV. High-risk types are associated with cervical and other cancers, whereas low-risk types are associated with external genital warts but not cancer. These HPV types (see Table 1) have been shown to be carcinogenic for the cervix.2 HPV infection is common among sexually active individuals, with a lifetime risk of about 75 percent.7 As shown in Figure 1, HPV prevalence varies by age and is highest for young women, decreasing in the middle age range (30 to 60 years old). Prevalence by type varies somewhat by region, for reasons that are not yet known. This figure compares data from cohorts in Portland, Oregon, and Guanacaste, a rural province in Costa Rica. The high prevalence of HPV infection among young women has been confirmed in several studies. A study of 603 female college students found that 19.7 percent of the women were already HPV DNA positive at study initiation.9 Over 2 years of follow-up, 39 percent of the women who were initially HPV DNA negative became HPV DNA positive. High-risk types of HPV such as HPV 16 and 18 were the types most commonly identified in these young college-aged women. Unlike most sexually transmitted infections (STIs), which spread via body fluids, HPV is transmitted through direct genital contact, most commonly by sexual intercourse.10 Genital contact in the absence of intercourse is a plausible means for HPV transmission, but the risk associated with such contact is much lower than that for intercourse.10-11 Transmission via inanimate objects such as clothing is thought to be unlikely, but the true risk is unknown.10 Progression to precancer occurs when infection with high-risk HPV persists over time (see Figure 2). In most cases, HPV infection—with either a low- or high-risk type—is cleared by the body. Observational studies have shown that about 90 percent of women infected with a particular HPV type will clear the infection within two years.12 Less than half of women who develop HPV infection will have persistence of the same HPV type 12 months later.1 HPV type 16 combines high rates of persistence with carcinogenicity, resulting in a risk of CIN-3 of 40 percent at 5 years.12 |When counseling a patient about HPV prevalence and transmission, make sure she understands these points before she leaves your office or clinic: |When counseling a patient about risk factors for HPV infection, make sure she understands these points before she leaves your office or clinic: In almost all studies of HPV infection, the most consistent predictors of infections are measures of sexual activity. Specific risk factors for HPV infection include:14 - Multiple partners - Younger compared to older age at sexual debut - Lack of condom use In a study of college women, the strongest risk factor for infection was having a regular sexual partner who had six or more lifetime partners.15 Risk factors for persistent HPV infection and/or neoplastic progression are slightly different and include:12,16,17 - HPV type - Increasing age - Lack of condom use - Immunodeficiency (e.g., HIV) - Possibly other STIs, such as chlamydia - Possibly oral contraceptive (OC) use Some studies have suggested that OC use for more than 5 years and the presence of STIs other than HPV may act as weak cofactors in neoplastic progression and/or persistence of HPV infection.18-20 - Trottier H, Franco EL. The epidemiology of genital human papillomavirus infection. Vaccine. 2006;24(suppl 1):S1/4-15. - Munoz N, Castellsagué X, de Gonzalez AB, Gissmann L. HPV in the etiology of human cancer. Vaccine. 2006; 24(suppl 3):S3/1-10. - American Cancer Society. Cancer Facts and Figures. 2007. Available at: www.cancer.org/downloads/STT/CAFF2006PWSecured.pdf. Accessed March 20, 2007. - Anhang R, Goodman A, Goldie SJ. HPV communication: review of existing research and recommendations for patient education. CA Cancer J Clin. 2004;54:248-59. - Lacey CJN, Lowndes CM, Shah KV. Burden and management of non-cancerous HPV-related conditions: HPV-6/11 disease. Vaccine. 2006;24S3:S3/35-41. - Munoz N, Bosch FX, de Sanjose S, Herrero R, Castellsagué X, Shah KV, et al. Epidemiologic classification of human papillomavirus types associated with cervical cancer. N Engl J Med. 2003;348:518-27. - Koutsky L. Epidemiology of genital human papillomavirus infection. Am J Med. 1997;102:3-8. - Schiffman M, Kjaer SK. Natural history of anogenital human papillomavirus and neoplasia. J Natl Cancer Inst Monogr. 2003;31:14-9. - Winer RL, Lee S-K, Hughes JP, Adam DE, Kiviat NB, Koutsky LA. Genital human papillomavirus infection: incidence and risk factors in a cohort of female university students. Am J Epidemiol. 2003;157:218-26. - Centers for Disease Control and Prevention. Human Papillomavirus: HPV Information for Clinicians. November 2006. - Burchell AN, Winer RL, de Sanjose S, Franco EL. Epidemiology and transmission dynamics of genital HPV infection. Vaccine. 2006;24(suppl 3):S3/52-62. - Moscicki AB, Schiffman M, Kjaer S, Villa LL. Updating the natural history of HPV and anogenital cancer. Vaccine. 2006;24S3:S3/42-51. - Figure Courtesy of M. Schiffman, National Cancer Institute. - Ley C, Bauer HM, Reingold A, Schiffman MH, Chambers JC, Tashiro CJ, et al. Determinants of genital human papillomavirus infection in young women. J Natl Cancer Inst. 1991;83:997-1003. - Ho GYF, Bierman R, Beardsley L, Chang CJ, Burk RD. Natural history of cervicovaginal papillomavirus infection in young women. N Engl J Med. 1998;338:423-8. - Hogewoning CJ, Bleeker MC, van den Brule AJ, Voorhorst FJ, Snijders PJ, Berkhof J, et al. Condom use promotes regression of cervical intraepithelial neoplasia and clearance of human papillomavirus: a randomized clinical trial. Int J Cancer. 2003;107:811-6. - Moscicki AB, Ellenberg JH, Farhat S, Xu J. Persistence of human papillomavirus infection in HIV-infected and -uninfected adolescent girls: risk factors and differences, by phylogenetic type. J Infect Dis. 2004;190:37-45. - Castellsagué X, Muñoz N. Chapter 3: Cofactors in human papillomavirus carcinogenesis—role of parity, oral contraceptives, and tobacco smoking. J Natl Cancer Inst Monogr. 2003(31):20-8. - Castle PE, Giuliano AR. Chapter 4: Genital tract infections, cervical inflammation, and antioxidant nutrients—assessing their roles as human papillomavirus cofactors. J Natl Cancer Inst Monogr. 2003(31):29-34. - Moreno V, Bosch FX, Muñoz N, Meijer CJ, Shaj KV, Walboomers JM, et al. Effect of oral contraceptives on risk of cervical cancer in women with human papillomavirus infection: the IARC multicentric case-control study. Lancet. 2002;359(9312):1085-92.
<urn:uuid:63678820-7428-4c29-8110-3c41be28bf25>
CC-MAIN-2023-40
https://www.arhp.org/managing-hpv-a-new-era-in-patient-care-impact-and-epidemiology/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00352.warc.gz
en
0.861826
2,050
3.21875
3
The development of tourism contributed to English becoming the most prominent language in the world. Some people think this will lead to English becoming the only language to be spoken globally. what are the advantages and disadvantages to having one language in the world The increasing of tourism recently gave impact to people to use English more frequently over others languages in the world. People said that it can make English become the only language which people use to communicate internationally. This essay will discuss about benefits and drawbacks if it happens. On the one hand, being easily connected all over the word is one of benefits if English was mother of tongue for everyone. If vigorous communication was built, diplomacy amongst countries, especially for two-conflict-countries, will result a win-win solution. Furthermore, this condition make peace happened and solve a lot of world problems such as hunger, poverty, equality and many more. On the other hand, there are some problems will appear. People who understand English do not need read subtitle when they watch movie, and they will read international book version more often. it means translator job is not necessary anymore, and companies are beginning to retire their employees, which lead unemployed rate rise. this phenomenon has domino effect, which can give negative impact to others life aspects. for instance, when the quantity of jobless increase, the crime rate will rise as well. to sum up, there are both positive and negative side, when English become one language people spoken globally. The benefits is no more language barrier and The drawbacks is interpreters will loss their job.
<urn:uuid:8df92e36-aa61-4c0b-87e9-5b069781376a>
CC-MAIN-2020-24
https://essayforum.com/writing/development-tourism-contributed-english-80245/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439019.86/warc/CC-MAIN-20200604032435-20200604062435-00414.warc.gz
en
0.96731
314
2.859375
3
Aleutian island volcano spurts ash 20,000 feet in the air The latest eruption of the Aleutian island volcano, which has been sputtering for the past week, prompted the FAA to issue an aviation code red. —A volcano on a remote island in Alaska's Aleutian chain has erupted again, prompting an aviation alert. The Alaska Volcano Observatory says the Bogoslof (BOH-goh-slawf) volcano sent an ash plume about 20,000 feet in the air by early Friday morning. The eruption caused the observatory to issue its highest alert level for aircraft. During an eruption of the volcano last week, the Federal Aviation Administration said flights were rerouted around the plume. The center says the volcano began erupting shortly before midnight Thursday and its activity was recorded by seismic data and in satellite images. The volcano is located on an island of the same name in the Bering Sea about 850 miles southwest of Anchorage. An ash-producing eruption started at 23:45 Dec 29 AKST (08:45 Dec 30 UTC) and is continuing as recorded by seismic data on nearby islands and as seen in recent satellite images. Cloud-top temperatures from satellite suggest a cloud height of around 20,000 ft asl. Regional winds are from the southwest. We are raising the Aviation Color Code to RED and the Alert Level to WARNING. AVO has no ground-based volcano monitoring equipment on Bogoslof volcano. We continue to monitor satellite images, information from the Worldwide Lightning Location Network pertaining to volcanic-cloud lightning, and data from seismic and infrasound instruments on other islands for indications of volcanic activity. At present, these observations should allow timely detection of additional explosive events. Bogoslof's last major eruption occurred in 1992 when a large new lava dome grew on the north side of Bogoslof Island, according to the Smithsonian Institution's Global Volcanism Program at the National Museum of Natural History. That event lasted 18 days, with pilots and fishermen reporting columns of steam, a rapidly rising mushroom shaped cloud, and a rocky new island.
<urn:uuid:b8385d7e-e3c6-4227-a626-b85fd5e2aaca>
CC-MAIN-2017-34
https://www.csmonitor.com/Environment/2016/1230/Aleutian-island-volcano-spurts-ash-20-000-feet-in-the-air
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126017.3/warc/CC-MAIN-20170824004740-20170824024740-00423.warc.gz
en
0.931195
436
2.796875
3
Mar 10, 2014 Return of Bigger Northern Brook Trout By: Bob Obma At a recent Oconto Trout Unlimited meeting, better fishing came up for discussion (again.) We have many small fish, but big brook trout are scarce. In an honest moment, someone admitted that a twelve-inch brookie is rare, and probably the best catch of the year. We fish hard and are blessed with 112 trout streams in the county. Most of these streams have enough natural reproduction to make stocking unnecessary. Why only smaller fish? There were once many bigger fish here. Historic records include Shattuck’s 1892 fishing trip to the north branch of the Oconto River, yielding over 400 brook trout ranging from a quarter to two and a half pounds. The anglers mentioned that they were staying at a lumber camp, so the “cutover” was going on. Timber was clear cut, tops left to fuel future forest fires, and logs floated downstream to saw mills. The river was too shallow to float logs, so “flush dams” were built to create floods as needed. Boulders were dynamited and brush cut to clear the way. Thousands of logs went downriver in these log drives, battering fishable stream banks out of existence. The Oconto, like other logged rivers, became wide, shallow and devoid of cover or habitat for older fish. The logged landscape was called a “slashing;” old photos look bleak and bare. Pine and hardwoods were followed by pioneer species, sedge meadows with speckled alder on wetlands, and aspen on the highlands. The alder thicket inhibits growth of grasses on the banks, leading to further bank erosion. Beaver thrive on a poplar diet (beaver candy) to build dams that heat up the water. Coldwater trout are replaced by chubs in the warm-water ponds. Imported brown trout were stocked in the warmer rivers before it became apparent that they crowd out larger brook trout for choice feeding lies. Trophy brook trout retreated to northern headwaters. Since these upstream cold refuges have little habitat for older fish, the population became skewed toward small native trout. Today when you fish a stretch of our north branch, it is still wide and shallow with few midstream rocks and a lot of flat sandy bottom. Your eye sees the truth: few fish will be there, and none of interesting size. The fish agree with you; older fish are scarce here. Still, trout survived there; young-of-the-year trout can survive to spawn in degraded habitat, and some of them spawn at five inches. This left anglers with a sizable remnant population of young-of-the-year fish. The rare sixteen-inch fish is now taken every five years from the Oconto, where they were once common. The fishery biologists are well aware that the population became skewed toward young-of-the-year fish, so many remedies have been tried over the years. Anglers initially wondered whether spawning was inadequate, so hatchery fish were stocked. That didn’t work because hatchery fish rarely last long enough to spawn and grow to a desirable size. Perhaps fishermen were too successful. Daily bag limits were set, but few big fish were caught. The stream was fully occupied by enough small fish to consume all of the available food, but they don’t live long enough to grow. How to allow more fish to grow for two or three years has been debated for a hundred years. Since hatchery fish and bag limits didn’t work, the changes in the river from the log drives were questioned. Did they wipe out the habitat needed by older fish? Were all the choice feeding lies filled up with big aggressive brown trout? You have learned where the few remaining brook trout are through your own experience, talking with other anglers and the fish shocking crews. Older brook trout favor deeper water, just over the top of your hip boots. Prime feeding lies have abundant food from the fertile rocky bottoms, with current breaks to protect from oncoming current. Autumn spawning riffles, prime summer feeding lies and winter shelter areas can be miles apart. Streams fragmented by dams, beavers or perched culverts have few older fish. Competing exotic brown trout hog the best feeding lies and crowd out bigger brookies. The trophy native trout are found in cold brook-trout-only water that is more common in the North where they evolved. When the limited results of stocking and bag limits became apparent, efforts to restore the pre-log-drive habitat were begun; streams are narrowed, which makes them run faster to dig out the sediment and restore productive stone bottoms for food organisms. Current breaks from replaced midstream boulders, logs and root wads hold older fish in the deeper pools. These techniques have been refined over the years, but a fishery with both numbers and older, bigger brookies remained elusive until the last several years. Across Northern Wisconsin, from Dunn County to Langlade County, areas that held only 4”-6” trout are now showing more 8”-12” fish in rehabilitated areas. Natural or created large woody habitat hold better fish on the stream surveys. Control of beaver and alder overgrowth remains necessary. Once brown trout are present, shocking and transplanting them to more welcoming areas has not worked. Recall that they are both edible and delicious, but they spawn faster than one catches them. There are several ways you can get in on the fun. Since the stream rehab is a lot of work, the areas are done in segments of longer streams. Make friends with someone who has worked on these projects and is familiar with the structures. These are not the familiar lunker structures of Timber Coulee, so help put one in to understand what is underwater; it saves a large quantity of nymphs. Fish holding in large woody habitat are notoriously hard to draw out. One of my favorite stream rebuilders told me that big brookies are notoriously hard to get out of the root wads. I said her job description was to get fish in there whereas mine is to get them out! These streams don’t have many dense hatches, so fish feed opportunistically. If it looks buggy, it’s edible, and the last fish to bite goes hungry. That said, these fish are not pushovers. Gastric lavage on these fish shows scuds, terrestrials and some caddis, which is about what shows up on in stream samples. Parachute Adams # 12, crickets appropriate for the season and carpenter ants float high enough to be practical. When that doesn’t work, red squirrel nymphs and # 12 soft hackle wooly warms floated, perhaps with a Liesenring lift, just before they become as one with a root, can tease out these fish. Have fun. These are lovely places.
<urn:uuid:91024eb4-264e-489a-ae64-8a1fabb65f5f>
CC-MAIN-2017-30
http://www.badgersportsman.com/issues/back/2014-issues/2014-02/2017-01-03-brook-trout
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426050.2/warc/CC-MAIN-20170726062224-20170726082224-00012.warc.gz
en
0.970428
1,453
2.765625
3
This section focus on how to design the webpage to appear the same to both the Search Engine and the users. The key to Design SEO is to Keep It Simple (KIS). A page with complicated design elements and pictures will not help much in SEO. The following explains how the webpage design affects the SERP (Search Engine Result Page). 1. Optimize page size This not only helps Search Engine to have an easier time indexing your site but also helps you to save valuable resources. Keeping everthing (text and images) under 15KB is perfect. Click the above link to learn techniques on how to skimp down the page size. 2. Navigation menu for Search Engine 3. Avoid Frames There are several problems for Search Engine to index your page if the page is made up of frames. Search Engine index single pages, therefore, each framed page is indexed seperately. Click on the above link to learn some techniques to overcome this problem. One advise: Avoid frames if you are going for SEO. 4. Keep It Simple and Valid (KISV) All in all, Search Engine loves simple webpage with rich content. Always validate your webpage so that Search Engine will not encounter errors along the way. We never know what will the spiders do when they encounter problems.. do they ignore and proceed? Or worst, give up.. 5. Optimize Flash embedded sites Flash movies are getting more popular nowadays because of their visual and audio effects. User always like to see graphics and images but this is not the case for Search Engine. Search Engines do no have the ability to extract 100% of the Flash content so your potential customers may not even know about your site when they are doing a search. Click the above link to learn about how to optimize your Flash movies for the Search Engines. 6. The Power of robots.txt File The robots.txt file is a text file that contain instructions to Search Engine not to index certain part of the website. This file can be easily coded in Notepad (PC) or SimpleText (Mac). Robots.txt is especially useful when you do not want Search Engine to index your pages which are currently under construction. Click on the link above to learn on how to use this text file to your advantage.
<urn:uuid:b762af27-754b-4f8f-a95f-931a9a325d48>
CC-MAIN-2017-26
http://useseo.com/design-seo/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320206.44/warc/CC-MAIN-20170623235306-20170624015306-00012.warc.gz
en
0.893357
467
2.59375
3
Before Brown v. Board of Education ruled that the segregation of public schools violated the 14th Amendment, the landmark case Méndez v. Westminster ended school segregation in California – setting an important precedent for the future. Fueling this case was puertorriqueña Felicitas “La Prieta” Méndez, along with her husband, Gonzalo. Born in Juncos, Puerto Rico, Felicitas Gómez moved to Arizona with her family at age 12. Hers was one of hundreds of Puerto Rican families recruited to work on cotton fields in Arizona in the 1920s. Within six months of their arrival, her father moved them to California, where Méndez met and married Gonzalo Méndez. The couple established roots – starting a family, a restaurant business, and becoming owners of a farm they had leased for many years. In the 1940s, when Soledad, Felicitas’ sister-in-law, went to enroll her kids, niece, and nephews at a white school closer to the family farm, a school administrator told her, “Well, you can leave your children here, but you’ll have to take your brother’s kids to a Mexican school.” Soledad’s kids had a lighter complexion and the last name Vidaurri (their father was part French). The Méndez kids had skin like their mother, known as “La Prieta.” Soledad refused the offer; her children wouldn’t attend a school where their cousins weren’t welcome. “We can do it alone. We have the money right now.” Soledad’s brother assured her that it must have been a mistake – until officials gave him the same answers they’d given his sister. Livid, Gonzalo requested support from a local Latino organization to challenge the county’s policy of school segregation. They wouldn’t back him. Felicitas intervened on her dejected husbands path and persuaded him to take on the school district independently. Their farm was prospering, she reasoned, “We can do it alone. We have the money right now.” The couple set out to sue the Westminster school district, but their lawyer made a bigger case of it. Méndez v . Westminster was filed in March of 1945 as a class-action lawsuit against four Orange County school districts so they would be legally forced to integrate. The American Civil Liberties Union, National Association for the Advancement of Colored People, the National Lawyers Guild, the American Jewish Congress, and the Japanese American Citizens League also filed friends of the court briefs in favor of desegregation. While the lawsuit consumed her husband’s time, Felicitas managed the farm for than a year. Under her leadership, it prospered more than ever before. Revenue from the farm paid for most of the legal proceedings. In addition to lawyer fees, the Méndez couple covered transportation costs and reimbursed pay for theother four families who appeared as witnesses in the case. Felicitas also organizedthe Asociación de Padres y Niños México-Americanos, a group which consisted of mostly farm workers and their families who were in support of the case. The school district offered a compromise – if Gonzalo dropped the suit, they’d allow his three kids to attend the white elementary school. He refused, saying the the purpose of the lawsuit was to benefit the whole Mexican community, not just a handful of fortunate kids. Felicitas’s racialization informed her fight. In Arizona, people labeled her Black. While in California, they considered her Mexican. “We had to do it. Our children, all of our children, brown, Black, and white [“bronceados, negros y blancos”] must have the opportunity to be whatever they want to be, and education gives them that opportunity,” she said. In the final ruling in April 1946, the Ninth Federal Circuit Court of Appeals in San Francisco upheld that segregation practices were unconstitutional and violated the 14th Amendment. Two months after this ruling, the legislature of California passed Assembly Bill 1375, which eliminated all segregation in California schools, including the segregation of Indian, Chinese, Japanese, and Mongolian children. The bill came into law in June 1947 and made California the first state in the country to end school segregation. Méndez v. Westminster was soon used as precedent for suits against school segregation in Texas, Arizona, and seven years later for the historic Brown v. Board of Education of Topeka, the case that ended legal school segregation in the US in 1954. But it’s mostly a forgotten case – one not taught in school or known to the general public. In 1998, the year she died, Felicitas attended the groundbreaking of the Gonzalo and Felicitas Méndez Fundamental Intermediate School, a campus named after the couple by the Santa Ana Unified School District. In coming years, a documentary about the case aired on PBS and won an Emmy. Additionally, in 2007, the United States Postal Service created a stamp to commemorate the case, and in 2011, Felicitas daughter received the Presidential Medal of Freedom for her educating others about her parents contributions to racial desegregation. During one of her last days, Felicitas told her daughter, “We didn’t just do it for you, Sylvia. We did it for all the children…I think this is history of the United States and everybody should know about it, Sylvia.”
<urn:uuid:ef57e816-a515-4fad-98c3-6a1f6eb30bcb>
CC-MAIN-2020-34
https://remezcla.com/features/culture/mendez-v-westminster-integrate-public-schools-in-california/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740679.96/warc/CC-MAIN-20200815035250-20200815065250-00256.warc.gz
en
0.97296
1,163
3.796875
4