text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
A team of international researchers using NASA’s James Webb Space Telescope has ruled out the possibility of life on the distant exoplanet, TRAPPIST-1 c. Graduate student Sebastian Zieba who participated in the study said the research team set out to determine “if rocky planets have atmospheres or not.” “In the past, we could only really study planets with thick, hydrogen-rich atmospheres,” Zieba said, according to NASA. “With Webb we can finally start to search for atmospheres dominated by oxygen, nitrogen, and carbon dioxide.” TRAPPIST-1 c is one of seven rocky planets orbiting an ultracool red dwarf star approximately 40 light-years from Earth. Though similar in size and mass, researchers are unsure whether they have similar atmospheres. Nor is it clear whether these plants have enough water, carbon dioxide, and other elements necessary for making an atmosphere and sustaining life. The research team observed TRAPPIST-1 c on four separate occasions as it orbited around a star to determine how much atmosphere it has. If a planet has any atmosphere at all, it will redistribute heat from the dayside to the nightside, causing the dayside temperature to be lower than it would be without an atmosphere, NASA said. Zieba said the team’s research is consistent with the planet being a bare rock, with no atmosphere or the planet having less CO2 atmosphere than Earth or even Mars with no cloud. The absence of any thick atmosphere suggests the exoplanet could have possibly formed with relatively little water, NASA said.
<urn:uuid:90a6d58b-4624-40f7-b39a-65c2409cddaa>
CC-MAIN-2023-40
https://icebutik.com/james-webb-space-telescope-diminishes-possibility-of-life-on-distant-exoplanet/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00022.warc.gz
en
0.927522
337
4.09375
4
Natural gas offers many advantages over standard petroleum products. CNG is the intelligent and affordable selection for any fleet of vehicle. CNG helps save money on fuel, reduce emission levels, and is a key to sustainable mobility. Reduced Fuel Costs CNG can represent almost a 50% savings over petroleum products such as gasoline and diesel fuel. Abundant domestically produced fuel 98% of the natural gas we use in the United States is produced right here in North America. Alternative Fueling Infrastructure CNG refueling stations are available across the United States with new stations opening daily. Eco-friendly for the Eco-conscious CNG is the cleanest burning transportation fuel on the market today and burns cleaner than petroleum based products because of its lower carbon content. It also produces the fewest emissions of all other fuels and contains significantly less pollutants than gasoline 5 Facts about Natural Gas Vehicles (NGV) There are about 165,000 NGVs on U.S. roads today and more than 15.2 million worldwide. There are 1,600+ CNG fueling stations in the U.S. Natural gas currently costs from $1.50 to $2.00 less per gasoline gallon equivalent (GGE). NGVs meet the strictest emission standards, including California’s AT-PZEV standard. NGVs are as safe as or safer than traditional gasoline or diesel vehicles.
<urn:uuid:f84dbd55-ea61-4ccb-8341-f8bcbf6cb953>
CC-MAIN-2017-39
http://www.landiusa.com/about/why-cng/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696696.79/warc/CC-MAIN-20170926212817-20170926232817-00617.warc.gz
en
0.933312
291
2.6875
3
Balance for Beginners Inner ear canals exercises Use this video to self assess your balance and your inner ear! Exercises for your inner ear's velocity sensors! Improve your ability to balance while moving! Balance and coordination if the VORs didn't help yet try practicing these for a while first. Test your skills balance and movement practice Let's practice maintaining balance while moving! Remember to use your Vors or Vorcs to reset as needed. Eyes and your balance! vision and your inner ear work together to create balance. You can use your eyes to improve your balance! in this class we go ove a few ways to do that! Use this chart to help to help with your VORs. Place the chart on the wall at eye level look at the letter in the middle and follow the lines with your nose to do the head turns! M.I.S. Cassandra Fitness L.L.C. Copyright©2020 all rights reserved
<urn:uuid:72d900bb-30ed-4a5e-8f9d-6f5c1954e0d1>
CC-MAIN-2023-14
https://www.athleticadventurer.com/balance-for-beginners
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00441.warc.gz
en
0.857597
241
2.625
3
New Study Confirms That Earth's Inner Core Is Solid |Core Issue. Photo: Thinkstock| Researchers report that they’ve observed seismic waves traversing the Earth’s inner core, allowing them to figure out what it’s like: solid, but softer than previously thought. Associate Professor Hrvoje Tkalčić and PhD Scholar Than-Son Phạm are confident they now have direct proof that Earth's inner core is solid. They came up with a way to detect shear waves, or "J waves" in the inner core -- a type of wave which can only travel through solid objects. "We found the inner core is indeed solid, but we also found that it's softer than previously thought," Associate Professor Tkalčić said. "It turns out -- if our results are correct -- the inner core shares some similar elastic properties with gold and platinum. The inner core is like a time capsule, if we understand it we'll understand how the planet was formed, and how it evolves." Inner core shear waves are so tiny and feeble they can't be observed directly. In fact, detecting them has been considered the "Holy Grail" of global seismology since scientists first predicted the inner core was solid in the 1930s and 40s. Their so-called correlation wavefield method looks at the similarities between the signals at two receivers after a major earthquake, rather than the direct wave arrivals. A similar technique has been used by the same team to measure the thickness of the ice in Antarctica. "We're throwing away the first three hours of the seismogram and what we're looking at is between three and 10 hours after a large earthquake happens. We want to get rid of the big signals," Dr Tkalčic said. "Using a global network of stations, we take every single receiver pair and every single large earthquake -- that's many combinations -- and we measure the similarity between the seismograms. That's called cross correlation, or the measure of similarity. From those similarities we construct a global correlogram -- a sort of fingerprint of the Earth." The study shows these results can then be used to demonstrate the existence of J waves and infer the shear wave speed in the inner core. While this specific information about shear waves is important, Dr Tkalčić says what this research tells us about the inner core is even more exciting. "For instance we don't know yet what the exact temperature of the inner core is, what the age of the inner core is, or how quickly it solidifies, but with these new advances in global seismology, we are slowly getting there. "The understanding of the Earth's inner core has direct consequences for the generation and maintenance of the geomagnetic field, and without that geomagnetic field there would be no life on the Earth's surface." The above story is based on Materials provided by Australian National University.
<urn:uuid:1330b6b7-82e3-4af5-9e64-6780ea2d3587>
CC-MAIN-2023-23
https://www.geologyin.com/2018/10/new-study-confirms-that-earths-inner.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00108.warc.gz
en
0.950668
613
3.828125
4
How Do Objects Become Positive Or Negative? Lesson 3 of 6 Objective: Given a specific situation, students will be able to identify if an object will be positive, negative, or neutral. The goal of this class is to introduce students to how to determine what charge an object has after experiencing one type of charging. Students will be using the models that we created for how objects become charged from the previous class (SP2) to explain how and why an object has a certain charge. This is an application of the types of charging that students learned and read about in the previous lessons. To start out class, I ask students to do some quick review so I ask them to stand up and walk 10 steps to find a partner to work with to answer the quick review questions. I have them stay with the same partner for about 3-4 questions before moving to find a new partner. I do this because it is good for students to be moving around and working with a partner as well as to recall the ideas they learned in the previous two lessons that we will build on in this lesson. I ask them the following questions: - What is electrostatics? - What is electric charge? - In what type of situation would particles attract? Repel? - Compare and contrast a proton and electron. - Given an example where I rub a plastic rod with fur. Before I rub them together what is the charge of each object? If the fur becomes positive, what is the charge of the plastic rod? What about the amount of charge that transfers? - Compare and contrast a conductor and insulator. - Explain what an electrical grounding is. - Compare and contrast charging by conduction, induction and polarization. After I ask each question, I give students 15-30 seconds to discuss with their partner. I give more time depending on the question to discuss the answer. Then I ask the students to raise their hand to volunteer an answer to go over it. I try to get as many students participating as possible so I do not call on the same student twice to provide an answer to the whole class. After all of the questions, I ask the students to return to their seats for the next activity. After the partner review, I have students open their Guided Notes to the electrostatics charging example problems. These problems help students to understand how charge is transferred and how to determine what the overall charge of an object is. I skip the first one for time's sake at the beginning of these notes and focus on the second and third because they parallel what students practice in the worksheet later in the lesson. In the second problem, I read the problem aloud and then model drawing pictures for each situation. I start with A and B and ask the class to tell me what happens to the charges in that situation. A student volunteer tells me that the negative charges attract and the positive charges repel; so the overall charge on A is negative and B is positive. I repeat the same process with the C/D situation and the E/F situation getting a new student volunteer each time. Finally, we go through how to rank these based on charge but the most important part of the second example. In the third example, the goal is to help students see how charging by conduction and charging by polarization works. So I start out with Ball B in the first example and I show them that with charging by conduction, the charge transfers because it is a neutral ball and a charged rod and the rod will want to take the excess electrons. Then if you have a charged object with a neutral object, they attract because the charged object polarizes the neutral object. We then do the second example and see that they are both charged by conduction and are the same charge so they repel. After the charging notes, I have students complete the Electrostatics Charging Practice with their table groups. I do the first problem with them so they get the idea of what I am expecting them to do. I ask them to draw a picture and show where the charge goes with arrows, as well as providing the answer. After the example, I give them about 8-10 minutes to work on it and I tell groups that they are assigned one problem to put up on the board. The goal of this activity is to give students some practice with determining the charge of an object and how the charge transfers. When all groups have sent a representative up to put the answer on the master answer sheet (as shown below), I go through the answers that the students put by asking if students agree or disagree by raising their hands. If most of the class agrees, and it is correct, I move on. If it is incorrect or most of the class disagrees, I ask the table that had written the answer to explain or I explain why the answer is correct. After the charging worksheet, my students typically want more practice. So I project the Electrostatics Practice up on the board and I go through about 10 questions with them. I have them get up out of their seats and walk to find a partner across the room from them. Then I show the problem on the screen, I read the problem to them and give them about 30 seconds to talk with their partner. When I bring them back together as a class, I ask them to vote on the right answer so I can see what each group came up with. We continue until most groups are getting correct answers and they feel comfortable with these types of problems. If a majority of the class votes for the incorrect answers, I ask students who voted correctly to explain it to the rest of the class or I explain it to the class. I do this to help students feel more comfortable with different charged objects. Triboelectric Series Notes After the partner quick practice, I have students turn to the Triboelectric Series notes in the Guided Notes packet. I introduce students to the triboelectric series by projecting it on the screen which tells what the charge of each material will be when two materials are rubbed together. I tell them that this is like a continuum where you only need to focus on the two objects you are concerned about. Whichever object is higher up on the series becomes positive and the lower object becomes negative. I ask students why we would not have a neutral object. They respond that when two objects touch and charge is transferred, one object gains electrons and becomes negative and the other object loses electrons and becomes positive so charge is conserved. We then complete a few examples as a class. I go through the first example and I show them how to answer. For the other two examples, I ask students to try to complete them on their own first. Then we discuss the answers as a class and I ask for student volunteers to share their answers. After the triboelectric series notes, I have students complete the Charging Checkpoint. This asks them three different questions ways to find the charge of an object. There are two versions of question 3 depending on how well the triboelectric series notes went. I want to get an idea of what the students learn during this lesson and to give them a formative grade for it. Students work individually on this checkpoint and I show each slide for about 1 minute before moving to the next slide. As you can see below, this checkpoint gives me an idea of which students I needed to work with. To end class, I tell students to complete the Triboelectric Series WS for homework. Since we completed the notes, the worksheet should be pretty straight forward. I tell my students to spend no more than 15 minutes on the worksheet at home. I give them this homework so that my students can get some practice using the triboelectric series.
<urn:uuid:a4200131-58be-4187-800f-232835f0c8e7>
CC-MAIN-2017-26
https://betterlesson.com/lesson/reflection/23616/students-succeed-with-a-difficult-concept
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00480.warc.gz
en
0.960624
1,588
4.34375
4
- glumr, n. Støi, Brag, Larm. Mork. 5011. Part of speech: n Possible runic inscription in Medieval Futhork:ᚵᛚᚢᛘᚱ Medieval Runes were used in Norway from 11th to 15th centuries. Futhork was a continuation of earlier Younger Futhark runes, which were used to write Old Norse. Also available in related dictionaries: This headword also appears in dictionaries of other languages related to Old Norwegian.
<urn:uuid:9fc14b56-f882-4fa5-a2c6-c4e7ee579ab9>
CC-MAIN-2023-50
https://old-norwegian-dictionary.vercel.app/word/glumr
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00286.warc.gz
en
0.919253
120
3.046875
3
WASHINGTON – It really is rocket science and it really is hard. North Korea proved that again. The giant explosion that gets a rocket off the ground isn't that complicated. The superhot, superfast exhaust from that giant fire is funneled in a way that shoots the rocket upward. North Korea's Unha-3 rocket combines two liquid propellants — hydrazine and nitric acid — that ignite when mixed, space experts say. That's the easy part. Controlling that reaction and going where you want, when you want — that's where engineers earn their money and ulcers. And it's where past rockets and spaceships have ended in spectacular and sometimes deadly failures. "Anybody can make something go boom. Controlling it is hard," said former NASA associate administrator Scott Pace, director of space policy at George Washington University. All that power has to be confined by metal and controlled by electronics. It takes the power of about a ton of TNT just to get 60 pounds into orbit at almost 18,000 mph. One tiny mistake, one mismatch in devices, one miscommunication, one bubble, and boom. In 1986, the fiery power of the space shuttle Challenger burned through an O-ring seal and seven astronauts died. Other control problems have doomed spaceships. Aerodynamics — keeping the pointy end straight up — is key. If a rocket veers too much it just breaks apart, said Jonathan McDowell of Harvard University. New countries launching rockets generally fail half the time, he said. John Glenn recalled how NASA's first astronauts watched in horror as an Atlas rocket blew up in front of them. More recently, private U.S. company SpaceX failed on its first three Falcon 1 launch attempts before finally succeeding twice. Even the normally reliable Russians couldn't get a rocket to Mars last fall because of a post-launch failure that ended up with the spaceship on board falling back to Earth. What doomed the North Korea rocket minutes after launch Friday isn't yet known. Failure often comes from not putting things together right. Tens of thousands of parts have to match perfectly and talk to each other. NASA's 2001 Mars Odyssey probe took 10,000 separate actions to go right to get there, said Scott Hubbard of Stanford University. Two years earlier, NASA mistakenly used both metric and English measuring units, dooming a $125 million Martian probe. Former NASA deputy administrator Hans Mark said most failures are from human error. He pointed to a dropped oxygen tank that caused the near-fatal Apollo 13 explosion. Poor communication between engineers and managers about known problems was a factor in both the 1986 and 2003 space shuttle disasters and that's a bigger issue for totalitarian societies like North Korea, Pace said. "In many ways, the worst enemy of NASA is 'Star Trek'," Pace said. "Captain Picard says 'engage' and the ship moves. And people think 'How hard can this be?'" North Korea knows.
<urn:uuid:8fd2af02-1072-4117-87a2-078dda487b5c>
CC-MAIN-2017-39
http://www.foxnews.com/us/2012/04/13/with-rockets-so-many-things-can-and-do-go-wrong.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689490.64/warc/CC-MAIN-20170923052100-20170923072100-00187.warc.gz
en
0.950686
602
2.8125
3
The problem below appeared on the latest round of Google Code Jam: Maria has been hired by the Ghastly Chemicals Junkies (GCJ) company to help them manufacture bullseyes. A bullseye consists of a number of concentric rings (rings that are centered at the same point), and it usually represents an archery target. GCJ is interested in manufacturing black-and-white bullseyes. Maria starts with t millilitres of black paint, which she will use to draw rings of thickness 1cm (one centimetre). A ring of thickness 1cm is the space between two concentric circles whose radii differ by 1cm. Maria draws the first black ring around a white circle of radius r cm. Then she repeats the following process for as long as she has enough paint to do so: Maria imagines a white ring of thickness 1cm around the last black ring. Then she draws a new black ring of thickness 1cm around that white ring. Note that each "white ring" is simply the space between two black rings. The area of a disk with radius 1cm is π cm2. One millilitre of paint is required to cover area π cm2. What is the maximum number of black rings that Maria can draw? Please note that: - Maria only draws complete rings. If the remaining paint is not enough to draw a complete black ring, she stops painting immediately. - There will always be enough paint to draw at least one black ring. The first line of the input gives the number of test cases, T. T test cases follow. Each test case consists of a line containing two space separated integers: r and t. For each test case, output one line containing "Case #x: y", where x is the case number (starting from 1) and y is the maximum number of black rings that Maria can draw. **Sample Input** 5 1 9 1 10 3 40 1 1000000000000000000 10000000000000000 1000000000000000000 **Sample Output** Case #1: 1 Case #2: 2 Case #3: 3 Case #4: 707106780 Case #5: 49 The inputs were very large, so a brute force approach wouldn't solve it in time. I looked at the top solutions, and most used a variation of the formula below: 2*R*X + (2*X-1)*X <= T where R is the radius of the first white circle, X is the total number of rings she can paint, and T is the milliliters of ink she has available. To find the answer you would basically do a binary search looking for the highest X that would make the equation true. My question: Where does that formula come from? Is it possible to explain how come this solves the problem, in simple terms? Any light you can shed will be appreciated.
<urn:uuid:38ff3921-d2b1-4411-b0ad-8071a9b48e27>
CC-MAIN-2014-10
http://math.stackexchange.com/questions/378492/math-puzzle-area-of-concentric-rings
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021901207/warc/CC-MAIN-20140305121821-00094-ip-10-183-142-35.ec2.internal.warc.gz
en
0.935227
592
3.296875
3
The topic of urbex equipment is often a subject of debate. Some explorers prep like they are going on a moon shot while others will show up empty-handed in shorts and flip flops. Every aspect of explorer equipment is debatable with one exception: Light. This short article is meant to help get your mind right about one of the most valuable tools in all of exploring and survival. Exploring can be very dangerous. The number one way to stay safe is to be able to see. So let’s talk about lights. These days nearly every flashlight you’ll find is an LED light. These lights are available everywhere and at every price point but it is important to select a light that is reliable and durable. Your exploring light must be waterproof (not water-resistant, see here) and shockproof. Variable brightness is a nice feature to have since it allows you to extend the total run time of the light by using a lower setting. A lot of exploring happens in low light so having very low lumen settings or an optional red light setting can be useful as well. Although flashlights are sold with “lumens” as the primary factor, anything more than 100 lumens is wasted in most situations. Remember, a brighter light will always burn shorter. In a survival situation you may need your light to last for days. Expect to spend at least $25 for a quality metal flashlight. We recommend brands like Fenix, Quark, and 4Sevens. Typical exploring flashlights will use AAA, AA, or CR123 batteries and you should always carry spare batteries stored in a ziplock bag. Before I explore, the batteries in every single light are thrown away and replaced. Some explorers are quite happy to run lights dry and depend on spare batteries. Personally, I want to live so every light gets new batteries every time and each light is function tested. Does the light stay on when clicked? Does the light stay on when shaken or bumped? Any failure of these test should be addressed. But you’re really reading because you want to know why anyone would carry five flashlights. Let’s talk them through one at a time. - Light one is easy to understand. This is your main light and can be a headlamp or handheld. - Light two is your backup. There is an old saying, “Two is one and one is none” that is why we have light two. So this is a duplicate of light one. - Light three is your backup’s backup. Sounds silly at first but think about being deep underground or in an elevator shaft at 2am with a twisted ankle. Your backup light isn’t working for some reason. This really happens. You may develop strong feelings for light three. - Light four! This light is to give to that jerk who didn’t bring any lights. Later you might need to push that person down so the lion eats them while you escape. But you will want this person to have a light so the lion can see and catch them easily. - Light five is stored away from the other lights, ideally in your pants pocket. This light is for the situation where you are unexpectedly separated from your gear. Don’t think this can happen? Maybe you should consider a safer hobby. Exploring can be dangerous. Take 5 lights with you, give one to your friend, feed your friend to a lion, then post your photos on Flickr. To buy some cool lights, check out Fenix and Foursevens.
<urn:uuid:ead02523-b3b9-41dc-815e-48a8746de36d>
CC-MAIN-2017-39
http://urbanexplorationmag.com/2015/10/26/why-five-lights/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687906.71/warc/CC-MAIN-20170921205832-20170921225832-00169.warc.gz
en
0.946031
731
2.515625
3
In college classes, lectures are still the primary way faculty deliver information to students. Progress has been made to make college a more collaborative learning process, but lectures are alive and well. Consequently, note taking is still the primary means of sorting, organizing, and processing this material. An essential skill for good note taking is good listening. Most people believe that they are good listeners, but research has shown that most students do not listen well. So first of all, you should try to sharpen your listening skills. Taking notes during a lecture can be a frustrating, almost overwhelming, job. Getting organized is the best way to deal with the rush of incoming information. Here are some tips: - Use a standard size notebook. A loose-leaf three-ring binder is the best because it allows you to insert handouts and rearrange your own notes. - Sit near the front and center of the class. You will have the most direct communication with your professor, and you will less likely be distracted. - Put a heading and a date on your notes for each day. - Attend all lectures, even if attendance is not mandatory. Using someone else's notes can help, but it is no substitute for attending the lecture. When you hear the information, process it, and write it in your notes, you are already beginning to learn the information. Reinforcement of the information through review of your notes completes the learning process. - Try to prepare for each lecture by pre-reading the material in your text. You will find that you will understand the lecture better if you have some basic background. This preparation is one that very few students take seriously. - Learn to identify main points and not get bogged down in detail. Professors often give cues to what's important by repeating information, changing their voices or rate of delivery, listing items in order of importance, and, of course, by writing on the chalkboard. These tips will help you prepare to take good notes, but what about the actual notes themselves? What should your notebook look like after a lecture? Well, let's hope that it isn't full of doodles in the margins which would indicate that your mind had wandered. In general, it should look a little like an outline with clear main ideas (not labeled with Roman Numerals, of course) and some subpoints with a moderate amount of details and examples. There should probably be some white space so that you add notes from your text or from the next day's lecture.
<urn:uuid:59c5571d-4f92-4f0b-b3d3-3d3b47bf2c46>
CC-MAIN-2014-35
http://glendale.edu/index.aspx?page=1476
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909040517-00429-ip-10-180-136-8.ec2.internal.warc.gz
en
0.94872
512
3.890625
4
THE FAIRCHILD OAK The Fairchild Oak is one of the largest Live Oak trees in the south. The tree has stood for centuries, over 400 years as a silent witness to the clearing of the wilderness for plantations, and, in 1836, the destruction of the settlements on Bulow Creek by raiding Seminole Indians. The park contains numerous plantation ruins, most hidden in the undergrowth of the forest.
<urn:uuid:71ca5c89-f528-4e24-915b-c08ee2973a18>
CC-MAIN-2020-05
http://www.plfallinphotography.com/2013/04/the-fairchild-oak.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251773463.72/warc/CC-MAIN-20200128030221-20200128060221-00096.warc.gz
en
0.889791
87
2.625
3
3.5 Sorted sets ZSETs offer the ability to store a mapping of members to scores (similar to the keys and values of HASHes). These mappings allow us to manipulate the numeric scores,2 and fetch and scan over both members and scores based on the sorted order of the scores. In chapter 1, we showed a brief example that used ZSETs as a way of sorting submitted articles based on time and how many up-votes they had received, and in chapter 2, we had an example that used ZSETs as a way of handling the expiration of old cookies. In this section, we’ll talk about commands that operate on ZSETs. You’ll learn how to add and update items in ZSETs, as well as how to use the ZSET intersection and union commands. When finished with this section, you’ll have a much clearer understanding about how ZSETs work, which will help you to better understand what we did with them in chapter 1, and how we’ll use them in chapters 5, 6, and 7. Let’s look at some commonly used ZSET commands in table 3.9. |Command||Example use and description| |ZADD||ZADD key-name score member [score member …] — Adds members with the given scores to the ZSET| |ZREM||ZREM key-name member [member …] — Removes the members from the ZSET, returning the number of members that were removed| |ZCARD||ZCARD key-name — Returns the number of members in the ZSET| |ZINCRBY||ZINCRBY key-name increment member — Increments the member in the ZSET| |ZCOUNT||ZCOUNT key-name min max — Returns the number of members with scores between the provided minimum and maximum| |ZRANK||ZRANK key-name member — Returns the position of the given member in the ZSET| |ZSCORE||ZSCORE key-name member — Returns the score of the member in the ZSET| |ZRANGE||ZRANGE key-name start stop [WITHSCORES] — Returns the members and optionally the scores for the members with ranks between start and stop| We’ve used some of these commands in chapters 1 and 2, so they should already be familiar to you. Let’s quickly revisit the use of some of our commands. You’ll likely remember our use of ZADD, ZREM, ZINCRBY, ZSCORE, and ZRANGE from chapters 1 and 2, so their semantics should come as no surprise. The ZCOUNT command is a little different than the others, primarily meant to let you discover the number of values whose scores are between the provided minimum and maximum scores. Table 3.10 shows several more ZSET commands in Redis that you’ll find useful. |Command||Example use and description| |ZREVRANK||ZREVRANK key-name member — Returns the position of the member in the ZSET, with members ordered in reverse| |ZREVRANGE||ZREVRANGE key-name start stop [WITHSCORES] — Fetches the given members from the ZSET by rank, with members in reverse order| |ZRANGEBYSCORE||ZRANGEBYSCORE key min max [WITHSCORES] [LIMIT offset count] — Fetches the members between min and max| |ZREVRANGEBYSCORE||ZREVRANGEBYSCORE key max min [WITHSCORES] [LIMIT offset count] — Fetches the members in reverse order between min and max| |ZREMRANGEBYRANK||ZREMRANGEBYRANK key-name start stop — Removes the items from the ZSET with ranks between start and stop| |ZREMRANGEBYSCORE||ZREMRANGEBYSCORE key-name min max — Removes the items from the ZSET with scores between min and max| |ZINTERSTORE||ZINTERSTORE dest-key key-count key [key …] [WEIGHTS weight [weight …]] [AGGREGATE SUM|MIN|MAX] — Performs a SET-like intersection of the provided ZSETs| |ZUNIONSTORE||ZUNIONSTORE dest-key key-count key [key …] [WEIGHTS weight [weight …]] [AGGREGATE SUM|MIN|MAX] — Performs a SET-like union of the provided ZSETs| This is the first time that you’ve seen a few of these commands. If some of the ZREV* commands are confusing, remember that they work the same as their nonreversed counterparts, except that the ZSET behaves as if it were in reverse order (sorted by score from high to low). You can see a few examples of their use in the next listing. ZSET union and intersection can be difficult to understand at first glance, so let’s look at some figures that show what happens during the processes of both intersection and union. Figure 3.1 shows the intersection of the two ZSETs and the final ZSET result. In this case, our aggregate is the default of sum, so scores are added. Unlike intersection, when we perform a union operation, items that exist in at least one of the input ZSETs are included in the output. Figure 3.2 shows the result of performing a union operation with a different aggregate function, min, which takes the minimum score if a member is in multiple input ZSETs. In chapter 1, we used the fact that we can include SETs as part of ZSET union and intersection operations. This feature allowed us to easily add and remove articles from groups without needing to propagate scoring and insertion times into additional ZSETs. Figure 3.3 shows a ZUNIONSTORE call that combines two ZSETs with one SET to produce a final ZSET. In chapter 7, we’ll use ZINTERSTORE and ZUNIONSTORE as parts of a few different types of search. We’ll also talk about a few different ways to combine ZSET scores with the optional WEIGHTS parameter to further extend the types of problems that can be solved with SETs and ZSETs. As you’re developing applications, you may have come upon a pattern known as publish/subscribe, also referred to as pub/sub. Redis includes this functionality, which we’ll cover next. 2 Scores are actually stored inside Redis as IEEE 754 floating-point doubles.
<urn:uuid:3e8aa67d-8631-491c-bf32-a52662a31802>
CC-MAIN-2020-34
https://redislabs.com/ebook/part-2-core-concepts/chapter-3-commands-in-redis/3-5-sorted-sets/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740679.96/warc/CC-MAIN-20200815035250-20200815065250-00232.warc.gz
en
0.923399
1,421
2.828125
3
Explorations: The El Niño–Southern Oscillation NOAA’s El Niño Web page is the best place to begin looking for information about the El Niño–Southern Oscillation (ENSO), which includes El Niño, La Niña, and neutral phases of ENSO. This site has links to the latest ENSO updates and forecasts, educational materials—many illustrated with animated graphics—descriptions of research projects, articles on the effects of ENSO around the world, and links to further sources of information. Books for General Readers - Michael Glantz, Currents of Change: El Niño’s Impact on Climate and Society (Cambridge: Cambridge University Press, 1996) tells the story of how scientific understanding of El Niño grew from the nineteenth century until late in the twentieth century. - J. Madeleine Nash, El Niño: Unlocking the Secrets of the Master Weather-Maker (New York: Warner Books, 2002) also tells the story of how scientists came to understand ENSO, including taking readers along as scientists work to learn more by extracting ice cores from glaciers atop a South American mountain or examining coral reefs in the South Pacific. Nash’s book, like most reporting on El Niño, focuses mostly on the disruption and disasters a strong El Niño brings. Few reports have noted the beneficial aspects of a strong El Niño, which include a reduction in Atlantic Basin hurricanes. A good analysis of the benefits of an El Niño is found in Stanley Changnon, “Impacts of the 1997–98 El Niño–generated Weather in the United States,” Bulletin of the American Meteorological Society 80 (September 1999): 1819–1828.
<urn:uuid:43624f4b-7159-476a-9de3-9accf60bcce1>
CC-MAIN-2014-23
http://press.uchicago.edu/books/AMSweather/AMS_05_explorations1.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510276584.58/warc/CC-MAIN-20140728011756-00476-ip-10-146-231-18.ec2.internal.warc.gz
en
0.884355
350
3.453125
3
Degree Granting Department Susan C. McMillan beliefs, education, health care provider, palliative care, symptom management It has been well established that many people will suffer with pain at the end of life, and untreated pain contributes to reduced quality of life. Many barriers contribute to this issue including a lack of knowledge in nurses who care for dying patients. Many nurses in general practice settings do not possess adequate knowledge about basic pain management principles; and the same may be true about hospice nurses despite the assumption that hospice nurses are more adept at pain management. Contributing to this problem may be the attitudes that nurses, including hospice nurses, have regarding pain and its management. This study sought to identify the knowledge levels of hospice nurses. Because attitudes may affect the delivery of effective pain management, the study also sought to determine attitudes of hospice nurses regarding pain and its management. Thirty-five hospice nurses completed two instruments: The Pain Management Principles Assessment Test measured levels of knowledge and the Nurses Pain Management Attitude Survey determined attitudes. Data was analyzed using means, standard deviations, frequencies and percentages. A correlation between knowledge level and attitude was also calculated, along with a correlation between knowledge level and certification status. The overall mean knowledge score for the nurses studied was 21.74 (72.3%), which falls below accepted standards. The mean attitude score found was 82.34, which demonstrates only slightly positive attitudes. These findings support the idea that knowledge and attitude are not synonymous and that a nurse may have a positive attitude about the management of pain, without sufficient knowledge to effectively alleviate pain. It is often said that hospice nursing is a calling, and these are the nurses who are at the forefront of pain management. This study demonstrates that slightly more positive attitudes may indicate that this group of nurses is motivated to gain a better knowledge base. This should motivate hospices and other education institutions to incorporate more specific instruction regarding pain management into their curricula. Despite some common misconceptions pain does not have to be an unavoidable part of life, and with a better knowledge base hospice nurses could more effectively deliver compassionate, expert care. Scholar Commons Citation Miller, Amie Jacqueline, "Hospice Nurses- Attitudes and Knowledge about Pain Management" (2012). Graduate Theses and Dissertations.
<urn:uuid:b0c3be7d-18cf-4e88-847f-084fba949d2d>
CC-MAIN-2017-34
http://scholarcommons.usf.edu/etd/4165/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106865.74/warc/CC-MAIN-20170820170023-20170820190023-00639.warc.gz
en
0.945395
473
2.703125
3
Food For Digestion Bloating can cause discomfort for many women, whether it's associated with menstruation or as a result of something you ate or drank. Bloating, or distension, is when the stomach feels uncomfortably full and tight, and bulges a little. If you suspect your bloating may be associated with an underlying medical condition, consult a health professional immediately. Common causes of bloating - Excess intestinal gas - Food intolerance (e.g. lactose intolerance, gluten intolerance, wheat allergies) - Irritable bowel syndrome - Eating gas-producing foods - Drinking gas-producing drinks (e.g. alcohol and soft drink) - Eating foods very high in salt Foods to avoid/limit If you're hit with a bad case of the bloat, limit your intake of these gas-producing foods to see if it has a positive effect: - Over-processed foods - High-salt foods - Baked beans - Some dairy products (e.g. milk and ice-cream) - Chewing gum Foods to eat Foods with a high water content: These will help prevent constipation and assist your body to function efficiently. Make sure you drink plenty of water as well. Foods high in fibre: These will help avoid constipation, which is a major cause of bloating. Eat plenty of fruit, veggies, nuts and seeds. Dried fruit like prunes will also help digestion. Yoghurt: Natural yoghurt that contains "live cultures" and good bacteria are useful in helping aid digestion. Always check the label and look for a product without added sugars and flavours. Herbal tea: Certain mints like peppermint and spearmint, as well as chamomile and lemongrass, can help relieve abdominal gas and bloating. Pop a few fresh leaves in hot water for a soothing drink, or even include them in your cooking. Ginger: This spice is believed to relieve bloating and digestion, so incorporate a little into your dinner or sip on a ginger tea. Be careful not to overdo it though. Ginger can also be helpful for nausea, vomiting and motion sickness. Bananas: This fruit helps digestion and should assist in getting your bowel functions back to normal. Potassium is believed to counteract the effects of sodium (which can be a cause of bloating), and essentially has a diutetic effect on the body. - Practise mindful eating. - Eat slowly and thoroughly chew each mouthful before reaching for another. - Eat smaller meals more often. - Consult a nutritionist or dietician if you believe you may have food sensitivities, allergies or intolerances. You may need to test out an elimination diet to identify the bloat culprit.
<urn:uuid:05a7c053-97b7-4e54-b1a2-8118fe197e8f>
CC-MAIN-2014-15
http://www.sheknows.com.au/food/articles/959299/how-to-stop-the-bloat
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202548.14/warc/CC-MAIN-20140423032002-00229-ip-10-147-4-33.ec2.internal.warc.gz
en
0.922055
584
2.796875
3
This essay Sickle Cell Disease has a total of 523 words and 3 pages. Sickle Cell Disease The genetic disorder I was told to research was the Sickle Cell Disease. I will explain what mutation causes this disease, the characteristics of it, and what has developed in the area of gene therapy because of it. The Sickle Cell Disease is an inherited disease. The gene for hemogoblin-S (which causes the disease) is the most common inherited blood condition in America; although most people only inherit one copy of the gene for HbS, while the other gene, hemogoblin-A, is normal, and can override HbS, blocking the disease. These people have the HbS trait, but not the disease, therefore leading a normal life. For an offspring to acquire the disease, both parents must have the HbS gene, yet the child only has a 25% chance of having Sickle Cells. You cannot catch the disease, you are born with it and it is present for life. There are many complications and harmful effects as the result of the Sickle Cell Disease. The disease causes hemoglobin in the red blood cells, when it does not receive sufficient oxygen, to form into long, sickle shapes with a sticky, chemical surface. When blood cells are this form, they cannot go through the capillaries, blocking off both blood and oxygen. Fortunately only 20% of all red blood cells become Sickle Cells; the sickle cells have a shorter life span; and most blood cells go through the capillaries before becoming sickle-shaped. The most painful effect known from Sickle Cell Disease are episodes of pain called Sickle Cell Crisis, where the body is in need of oxygen, either from physical activities or a sickle blood cell blocking blood passages that lead to organs. The first day is the worst, where devastating pain goes to the arm, leg, and back, along with the shortness of breath. The other symptoms of Sickle Cells include: strokes, increased infections, early gallstones, yellow discoloring of eyes and skin, low blood cell counts (anemia), and delayed growth. For the cause of the Sickle Cell Disease, there has been many research going on in the area of gene therapy. Labs around the world are trying to fix the basic genetic defect, by placing the correct amino acid in the hemogoblin before or shortly after birth. This method would result in the cure of the root of the problem. Currently researchers are finding a safe way to perform this method. To try to ease the pain caused by Sickle Cell Disease, a substance that can prevent red blood cells from sickling without causing harm to other parts of the body, hydroxyurea was found to reduce the frequency of severe pain, acute chest syndrome and the need for blood transfusions in adult patients with sickle cell disease. Droxia, the prescription form of hydroxyurea, was approved by the FDA in 1998 and is now available for adult patients with sickle cell anemia. Studies will now be conducted to determine the proper dosage for children. The Sickle Cell Disease is a state of suffering, yet it is not as serious as it used to be, where children with the disease was not expected to live through childhood. Now with aggressive treatments, victims’ lives are prolongs and improving its quality; and with the researching completed, a full cure of the disease can be possible. Sickle Cell AnemiaSickle Cell Anemia The sickle cell disease is an inherited blood disorder that affects red blood cells. People with sickle cell have red blood cells that have mostly hemoglobin\'s, Sometimes these red blood cells become sickle-shaped or crescent shaped and have trouble going through small blood vessels. When sickle-shaped cells block small blood vessels, less blood can get to that part of the body. Tissue that does not get a normal blood flow eventually becomes damaged.This is what causes the pr
<urn:uuid:00314ba4-0762-40e3-ab29-2edc463c1d48>
CC-MAIN-2017-34
https://digitaltermpapers.com/essays/sickle-cell-disease
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109525.95/warc/CC-MAIN-20170821191703-20170821211703-00335.warc.gz
en
0.951144
868
3.53125
4
Does The Bible Teach Equality of All Men? Does The Bible provide a basis for the teaching of equality? The answer is an emphatic, "No." The Bible teaches the very opposite. Again and again the Creator made selection among the races of mankind, and with the selection made pronouncement. Even of Noah's three sons, God made selection, and He said, Cursed be Canaan, the son of Ham, a servant of servants shall he be unto his brethren, Genesis 9:24‑27. Then of Shem this was said, Blessed be the Lord God of Shem: and Canaan shall be his servant. Be whose servant? Be the servant of Shem. Certainly Canaan was not chosen as God's servant. Japheth was to be enlarged and dwell in the tents of Shem, and Canaan shall be his servant. Do these pronouncements of God indicate equality? They most assuredly do not. Canaan's offspring is to be a servant people. It was of the line of Shem that Abraham came, Genesis 11:10‑32. Abraham was the man to whom God made great promise's, as we read in Genesis 12:1‑3. And we may rest assured it was not left for the United Nations' program to cancel out and do away with God's declared purposes in mankind. This cry of equality has been heard more and more, and with increasing intensity, since the United Nations came on stage in 1945. Any person who will exercise his or her normal intelligence cannot escape the fact that God created, separated, and made choice among the nations. History provides abundant proof that one race has been used of God above all others. He said, Thy God hath chosen thee to be a special people unto himself, above all people that are upon the face of the earth, Deuteronomy 7:6. If those words do not speak of a definite inequality in the races, then pray tell me what they do mean? When God chooses a people, you may expect that people to be in the vanguard of His unfolding plan for this earth, above and beyond all other races. As we have said, there is just such a people, just such a race‑the Anglo‑Saxon, Celtic, Scandinavian and kindred peoples and nations of western Europe. History is abundant proof of their usefulness in His hands. These were the peoples that founded U. S. A. If this much‑talked equality, so publicized today, has any substance to it, why is it that the Bible makes no mention of it? But on the contrary, beginning with Shem and Abraham, the Bible speaks of a God‑ ordained and selected race, a race which had been the chosen instrument in His hands, and proven so from the facts of history. “Taken, in part, from an article entitled “Does The Bible Teach Equality of All Men?,” by Pastor W.B. Record)
<urn:uuid:7bb37a61-3150-4f53-b7e2-46bf7fa2800f>
CC-MAIN-2017-30
http://israelect.com/reference/WillieMartin/Inter-43%20%5BA%5D.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549448095.6/warc/CC-MAIN-20170728062501-20170728082501-00208.warc.gz
en
0.968541
601
3.0625
3
(Carl J.) Joseph Becker (1841-1910) Becker was born in Pottsville, Pennsylvania. By 1859, he had moved to New York where he went to work as an errand boy for Frank Leslie’s Illustrated Newspaper. Although Becker had no formal training in art, Frank Leslie and his staff encouraged his natural talent, and by 1863, Leslie dispatched Becker to accompany the Union Army to send back drawings of what he observed. In addition to major events including the battles of Gettysburg and Petersburg and President Lincoln’s address at the dedication of the military cemetery at Gettysburg, Becker recorded scenes of daily life in army camps throughout the eastern theater of war as well as civilian events. In all, approximately 88 of his wartime drawings were published in Frank Leslie’s Illustrated Newspaper between 1863 and 1865. After the war, he sailed to Ireland to record the connection of the eastern end of the Trans-Atlantic Cable in 1865. In 1869, he traveled across the West recording the landscape of the Great Plains and the expansion of the railroads. In 81 hours, he journeyed from Omaha to San Francisco on the first cross-Rockies Pullman train, and in San Francisco, he recorded scenes of Chinese immigrant life. Forty of the resulting drawings constituted the series “Across the Continent” published in Leslie’sbetween December 1869 and mid-1870. Becker’s illustrations also appeared in Beyond the Mississippi (Hartford, 1869), which contained drawings from photographs and earlier published prints of scenes from the Mississippi to the Pacific coast by many of the Civil War artists including Edwin Forbes, Alfred Waud, William Waud, Frank Schell, and Thomas Nast. In 1871 Becker’s drawings of Chicago in the wake of the Great Fire raised the circulation of Leslie’s to 470,000, the highest for a single issue of the newspaper. In 1875, he became Manager of Leslie’s art department, a post he held until his retirement in 1900. Becker died in Brooklyn, New York. His original drawings and those of many of his colleagues at Frank Leslie’s constitute the Becker Collection. See works by this artist.
<urn:uuid:37ff45c3-bdc0-4020-a5ed-96f57c9910d2>
CC-MAIN-2020-34
https://beckercollection.bc.edu/joseph-becker
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740838.3/warc/CC-MAIN-20200815094903-20200815124903-00576.warc.gz
en
0.970606
450
2.734375
3
Moon* ♋ Cancer Moon phase on 18 December 2097 Wednesday is Full Moon, 14 days old Moon is in Gemini.Share this page: twitter facebook linkedin Moon rises at sunset and sets at sunrise. It is visible all night and it is high in the sky around midnight. Moon is passing about ∠20° of ♊ Gemini tropical zodiac sector. Lunar disc appears visually 0.5% wider than solar disc. Moon and Sun apparent angular diameters are ∠1960" and ∠1950". The Full Moon this days is the Cold of December 2097. There is high Full Moon ocean tide on this date. Combined Sun and Moon gravitational tidal force working on Earth is strong, because of the Sun-Earth-Moon syzygy alignment. The Moon is 14 days old. Earth's natural satellite is moving through the middle part of current synodic month. This is lunation 1211 of Meeus index or 2164 from Brown series. Length of current 1211 lunation is 29 days, 19 hours and 6 minutes. This is the year's longest synodic month of 2097. It is 16 minutes shorter than next lunation 1212 length. Length of current synodic month is 6 hours and 22 minutes longer than the mean length of synodic month, but it is still 41 minutes shorter, compared to 21st century longest. This New Moon true anomaly is ∠145.6°. At beginning of next synodic month true anomaly will be ∠172.3°. The length of upcoming synodic months will keep increasing since the true anomaly gets closer to the value of New Moon at point of apogee (∠180°). 11 days after point of apogee on 7 December 2097 at 05:05 in ♑ Capricorn. The lunar orbit is getting closer, while the Moon is moving inward the Earth. It will keep this direction for the next day, until it get to the point of next perigee on 19 December 2097 at 17:43 in ♋ Cancer. Moon is 365 647 km (227 203 mi) away from Earth on this date. Moon moves closer next day until perigee, when Earth-Moon distance will reach 357 517 km (222 151 mi). 3 days after its ascending node on 15 December 2097 at 04:28 in ♉ Taurus, the Moon is following the northern part of its orbit for the next 9 days, until it will cross the ecliptic from North to South in descending node on 27 December 2097 at 16:48 in ♎ Libra. 3 days after beginning of current draconic month in ♉ Taurus, the Moon is moving from the beginning to the first part of it. 12 days after previous South standstill on 5 December 2097 at 17:37 in ♐ Sagittarius, when Moon has reached southern declination of ∠-27.873°. Next day the lunar orbit moves northward to face North declination of ∠27.860° in the next northern standstill on 19 December 2097 at 11:51 in ♋ Cancer. The Moon is in Full Moon geocentric opposition with the Sun on this date and this alignment forms Sun-Earth-Moon syzygy.
<urn:uuid:bbb96a66-9923-428e-952c-e89b39560916>
CC-MAIN-2020-05
https://lunaf.com/lunar-calendar/2097/12/18/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694176.67/warc/CC-MAIN-20200127020458-20200127050458-00261.warc.gz
en
0.895468
683
2.984375
3
- vitamin A - retinoids (Retin-A, Differin) - lithium (commonly used to treat manic depression) - chemotherapy drugs - be dark pink or red in color - have a lumpy texture - develop ulcers - have white plaques on the surface - applying lip balm throughout the day, as needed - drinking more water - using a humidifier in the home - avoiding cold weather conditions or wrapping your mouth with a scarf Chapped, or cracked, lips is the term commonly used to describe dry lips. Chapped lips can be caused by a number of factors, including the weather, excessive licking of the lips, and certain medications. Chapped lips is a very common condition that occurs only on occasion for most people. However, some may develop a more severe form of chapped lips called cheilitis. Cheilitis, which can be caused by an infection, is characterized by cracked skin at the corners of the lips. Dry lips are usually reversible with simple treatment and preventive measures. If your lips continue to be severely dry and cracked, consider making an appointment with a dermatologist. Common symptoms of chapped lips include lip: Lips don’t contain oil glands like other parts of the skin. For this reason, the lips are more susceptible to drying out and becoming chapped (cracked). Lack of moisture can make the problem worse, whether it is weather-induced or related to a lack of self-care. Lack of humidity in the air during the winter months is known to cause chapped lips. Frequent sun exposure in the summer can also worsen your condition. Another common cause of chapped lips is habitual licking. Saliva from the tongue can further strip the lips of moisture, causing more dryness. Chapped lips can occur in people of all ages and genders, particularly if they have dry skin. Taking certain medications can also increase your risk of developing chapped lips, including: People who suffer from dehydration and malnutrition are also more likely to have chapped lips than other patients. These are both serious conditions that require immediate medical attention. Severe dryness and cracking that doesn’t improve with self-care measures may be cause to see a dermatologist. Cheilitis is often to blame for severely chapped lips. This is a condition marked by cracked skin at the mouth corners, as well as several cracks on your lips. If you have this condition, your lips may: Cheilitis is most commonly attributed to infections and inflammatory diseases, such as Crohn’s disease. Dental trauma and excessive saliva production may also turn a regular case of chapped lips into cheilitis. According to the American Academy of Dermatology, cheilitis is most common in patients over the age of 59 (American Academy of Dermatology). A dermatologist can determine whether your dry lips are simply chapped or if you have cheilitis. Dehydration and Malnutrition Dry lips can also be caused by dehydration or malnutrition. Dehydration causes symptoms such as lightheadedness, constipation, decreased urine production, dry mouth, and headache. In severe cases, an individual may experience low blood pressure, fever, and/or rapid breathing or a rapid heartbeat. Malnutrition is characterized by many of the same symptoms as dehydration, but can also cause muscle weakness, decaying teeth, a bloated stomach, and bone fragility. Malnutrition can be caused by vitamin deficiencies, so those on limited diets (vegetarians, for example) need to ensure that they are getting enough of the vitamins they need. Alcoholics, in particular, are more susceptible to malnutrition due to vitamin deficiencies because excessive alcohol use can interfere with the vitamin absorption. Older adults are also at higher risk for malnutrition because decreased appetite is common among the elderly. If you suspect that you are dehydrated or malnourished, see your doctor immediately. Chapped lips can usually be treated at home. The first step is to make sure that your lips have ample amounts of moisture. This can be accomplished by: Sun exposure can also cause chapped lips, especially as you age. Apply a lip balm that contains a minimum SPF of 15 before heading outdoors. The balm itself helps to moisturize the lips, while the sunscreen minimizes further drying effects.
<urn:uuid:8b2d9d47-90a7-4ce1-a79c-d2792a343c70>
CC-MAIN-2013-48
http://www.healthline.com/health/chapped-lips
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051588/warc/CC-MAIN-20131204131731-00045-ip-10-33-133-15.ec2.internal.warc.gz
en
0.943204
904
3.1875
3
When pets are healthy, their gums should be a light pink color but if they have white pale gums and tongue it could be a symptom of a major condition. However, if the gums are pale, it is usually a symptom of various types of health issues. Typically, pale gums in dogs and cats is indicative of a lack of oxygen or loss of blood. This can be caused by many different issues including low blood sugar, anemia, flea or tick infestation, intestinal parasites, parvovirus, injuries and autoimmune diseases. How to Recognize Pull up your pet\\\\\\\'s upper lip to expose the gums. Pale gums appear a pale pink or whitish color. Your pet\\\\\\\'s tongue may appear the same color as its gums. The most common cause of pale gums in pets in anemia. It can also be a sign that your pet has lost blood or is bleeding internally. Your veterinarian will take a blood sample and perform a series of blood tests. Your pet could need a blood transfusion. Pale Gums Affects
<urn:uuid:8c23f79f-4f59-4ffc-a877-0e07820d26dc>
CC-MAIN-2020-24
https://www.petpremium.com/pet-health-center/symptoms/pale-gums/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347441088.63/warc/CC-MAIN-20200604125947-20200604155947-00537.warc.gz
en
0.917184
228
2.765625
3
People - Ancient Rome: Balbinus Born Decimus Caelius Calvinus Balbinus , he was Roman Emperor with Pupienus for three months in 238, the Year of the Balbīnus, Decĭmus Caelius in Harpers Dictionary A Roman who was proclaimed emperor by the Senate with Pupienus, on the death of the Gordians, A.D. 237. He was murdered by the soldiery after a year's reign. Balbinus in Roman Biography Bal-bi'nus, [Fr. Balbin, balbaN] (Decimus Caelius,) a Roman senator who, in conjunction with Maximus, was proclaimed emperor in opposition to Maximinus. The praetorian guards, dissatisfied with the new emperors elected by the senate, seized them in their palace, and, having put them to death, proclaimed Gordianus emperor, 238 A. D. See Julius Capitolinus, "Vita Balbini;" Gibbon, "Decline and Fall of the Roman Empire. Balbinus in Wikipedia Decimus Caelius Calvinus Balbinus (c. 165 – 29 July 238) was Roman Emperor with Pupienus for three months in 238, the Year of the Six Emperors. Origins and career -- Not much is known about Balbinus before his elevation to emperor. It has been conjectured that he descended from Publius Coelius Balbinus Vibullius Pius, the consul ordinarius of 136 or 137, and wife Aquilia. If this were true, he was also related to the family of Q. Pompeius Falco, which supplied many politicians of consular rank throughout the 3rd century, and to the 1st-century politician, engineer and author Julius Frontinus, as well as a descendant of a first cousin of Trajan. He was a patrician from birth, and was the son (either by birth or adoption) of ... Caelius Calvinus, who was legate of Cappadocia in 184. According to Herodian he had governed provinces, but the list of seven provinces given in the Historia Augusta, as well as the statement that Balbinus had been both Proconsul of Asia and of Africa, are likely to be mere invention. He had certainly been twice consul; his first consulate is not certainly known but is believed to have been about 203 or in July 211; he was consul for the second time in 213 as colleague of Caracalla, which suggests he enjoyed that According to Edward Gibbon (drawing upon the narratives of Herodian and the Historia Augusta): Balbinus was an admired orator, a poet of distinguished fame, and a wise magistrate, who had exercised with innocence and applause the civil jurisdiction in almost all the interior provinces of the empire. His birth was noble, his fortune affluent, his manners liberal and affable. In him, the love of pleasure was corrected by a sense of dignity, nor had the habits of ease deprived him of a capacity for business. (...) The two colleagues [Pupienus and Balbinus] had both been consul (Balbinus had twice enjoyed that honourable office), both had been named among the twenty lieutenants of the senate; and, since the one was sixty and the other seventy-four years old, they had both attained the full maturity of age and experience. When the Gordians were proclaimed Emperors in Africa, the Senate appointed a committee of twenty men, including Balbinus, to co-ordinate operations against Maximinus Thrax. On the news of the Gordians' defeat, the Senate met in closed session in the Temple of Jupiter and voted Pupienus and Balbinus as co-emperors, though they were soon forced to co-opt the child Gordian III as a colleague. Balbinus was probably in his early seventies: his qualifications for rule are unknown, except presumably that he was a senior senator, rich and well-connected. While Pupienus marched to Ravenna, where he oversaw the campaign against Maximinus, Balbinus remained in Rome, but failed to keep public order. The sources suggest that after Pupienus's victorious return following Maximinus' death, Balbinus suspected Pupienus of wanting to supplant him, and they were soon living in different parts of the Imperial palace, where they were later assassinated by disaffected elements of the The 'sarcophagus of Balbinus' has earned this Emperor a niche in the history of Roman Imperial art. When presumably holding the title of Emperor, Balbinus had a marble sarcophagus made for himself and his wife (whose name is unknown). Discovered in fragments near the Via Appia and restored, this is the only example of a Roman Imperial sarcophagus of this type to have survived. On the lid are reclining figures of Balbinus and his wife, the figure of the Emperor also being a fine portrait of him. Although in accounts of their joint reign Balbinus is emphasized as the civilian as against Pupienus the military man, on the side of the sarcophagus he is portrayed in full military dress. If you notice a broken link or any error PLEASE report it by clicking HERE © 1995-2017 Bible History Online
<urn:uuid:a8f7dc36-f517-4824-939f-fa59866a4652>
CC-MAIN-2017-26
http://www.bible-history.com/links.php?cat=47&sub=4623&cat_name=People+-+Ancient+Rome&subcat_name=Balbinus
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320261.6/warc/CC-MAIN-20170624115542-20170624135542-00063.warc.gz
en
0.967415
1,152
3.015625
3
Running has plenty of positive side effects: It builds strength, enhances mood and quickens the metabolism. But for all the benefits of running, there are also dangers that come with overworking and overstraining muscles, particularly in the calf region. Fortunately, there are ways to reduce and treat calf pain when running — from stretching before and after a jog to drinking plenty of water and wearing the right footwear. What Is Calf Pain? To understand what causes calf pain, it's important to first understand the area where calf pain originates. The calf is composed of two muscles: the gastrocnemius and the soleus. They join at the Achilles tendon, which is connected to the heel bone. When either of these muscles is overstretched or torn, it's referred to as calf strain. Video of the Day There are a few telltale signs that you may be experiencing calf strain. The first is that you might feel a pop, snap or tear in your calf. You may also find that your calf is stiff or weak when you walk or that it's difficult to rise up on your toes. There may also be bruising on your calf for one or two days. Causes of Calf Pain Calf pain occurs when muscles suddenly contract, causing a cramp. There are a few things that may trigger cramping, including dehydration, mineral deficiency or strenuous exercise like running. Overusing the calf muscles during physical activity can lead to a strain or Achilles tendinitis, which occurs when the Achilles tendon becomes inflamed. Read more: How to Treat Sore Calves How to Prevent Sore Calves The good news is that calf pain can be reduced or prevented by taking certain precautions. Stretching before and after a run can strengthen calf muscles and prevent calf tightness while you're exercising. For a thorough stretch, practicing yoga can help target the right muscles for preventing calf strain. It's critical to make sure you don't overexert yourself when exercising by running too far or running up a hill that's too steep. Build up little by little if you're starting something new, like training for a long race. Drinking water helps as well. The Better Health Channel recommends drinking plenty of water before, during and after exercise to prevent cramps. If your calves hurt when running, make sure you're wearing the proper shoes. NHS recommends walking in comfortable shoes when you're healing from a strained calf, in addition to wearing shoes with a thicker or higher heel to lessen the stretch on the calf. Calf Pain Treatment Calf pain can be treated in a number of ways. If you have a cramp, it helps to gently stretch or massage the muscle. If you're experiencing a strain or Achilles tendinitis, you can use RICE treatment: - REST the leg. - ICE the painful part of the leg for 20 minutes with an ice pack or bag of frozen peas. - COMPRESS the painful area with a bandage, unless the pain gets worse, in which case, loosen the bandage. - ELEVATE the lower leg while sitting or lying down. To relieve pain and bring down swelling, you can also take nonsteroidal anti-inflammatory drugs, such as aspirin or ibuprofen, or stretch the calf by doing heel raises. It's best not to return to running until the ankle and knee are functioning well and the calf is strong. Is this an emergency? If you are experiencing serious medical symptoms, please see the National Library of Medicine’s list of signs you need emergency medical attention or call 911.
<urn:uuid:b9c52560-f29b-44c5-a96d-955a790042af>
CC-MAIN-2023-23
https://www.livestrong.com/article/516246-how-to-reduce-calf-pain-when-running/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00327.warc.gz
en
0.940023
738
3.03125
3
- Hunter-gatherers living mostly on land animals: 2:1 to 4:1 - Pacific islanders getting most of their fat from coconut and fish: 1:2 - Inuit and other Pacific coast Americans: 1:4 or less - Dairy-based cultures: 1:1 to 2:1 - Cultures eating fish and grains: 1:2 or less I think there's a simple way to interpret all this. Number one, don't eat vegetable oils high in n-6 fats. They are mostly industrial creations that have never supported human health. Number two, find a source of n-3 fats that can approximately balance your n-6 intake. In practical terms, this means minimizing sources of n-6 and eating modest amounts of n-3 to balance it. Some foods are naturally balanced, such as grass-fed dairy and pastured lamb. Others, like coconut oil, have so little n-6 it doesn't take much n-3 to create a proper balance. Animal sources of n-3 are the best because they provide pre-formed long-chain fats like DHA, which some people have difficulty producing themselves. Flax oil may have some benefits as well. Fish oil and cod liver oil can be a convenient source of n-3; take them in doses of one teaspoon or less. As usual, whole foods are probably better than isolated oils. Weston Price noted that cultures throughout the world went to great lengths to obtain fresh and dried marine foods. Choose shellfish and wild fish that are low on the food chain so they aren't excessively polluted. I don't think adding gobs of fish oil on top of the standard American diet to correct a poor n-6:n-3 ratio is optimal. It may be better than no fish oil, but it's probably not the best approach. I just read a study, hot off the presses, that examines this very issue in young pigs. Pigs are similar to humans in many ways, including aspects of their fat metabolism. They were fed three diets: a "deficient" diet containing some n-6 but very little n-3; a "contemporary" diet containing a lot of n-6 and some n-3; an "evolutionary" diet containing a modest, balanced amount of n-6 and n-3; and a "supplemented" diet, which is the contemporary diet plus DHA and arachidonic acid (AA). Using the evolutionary diet as a benchmark, none of the other diets were able to achieve the same fatty acid profile in the young pigs' brains, blood, liver or heart. They also showed that neurons in culture require DHA for proper development, and excess n-6 interferes with the process. With that said, here are a few graphs of the proportion of n-6 in common foods. These numbers all come from nutrition data. They reflect the percentage n-6 out of the total fat content. First, animal fats: Except salmon oil, these are traditional fats suitable for cooking. Except schmaltz (chicken fat), they are relatively low in n-6. Next, vegetable oils: These range from very low in n-6 to very high. Most of the modern, industrially processed oils are on the right, while most traditional oils are on the left. I don't recommend using anything to the right of olive oil on a regular basis. "HO" sunflower oil is high-oleic, which means it has been bred for a high monounsaturated fat content at the expense of n-6. Here are the meats and eggs: n-3 eggs are from hens fed flax or seaweed, while the other bar refers to conventional eggs. A few of these foods are good sources of n-3. At the top of the list is fish oil, followed by n-3 eggs, grass-fed butter, and the fat of grass-fed ruminants. It is possible to keep a good balance without seafood, it just requires keeping n-6 fats to an absolute minimum. It's also possible to overdo n-3 fats. The traditional Inuit, despite their good overall health, did not clot well. They commonly developed nosebleeds that would last for three days, for example. This is thought to be due to the effect of n-3 on blood clotting. But keep in mind that their n-3 intake was so high it would be difficult to achieve today without drinking wine glasses full of fish oil. Canola/Rapeseed has n-6/n-3 ratio of 2:1 or even better. Why dont you recommend it?. It is useful esp to populations that have poor access to sea food. Fish-oil is ecologically a delicate thing. I have read that fish-eating birds are losing population because they cant get fishes to eat. Thanks Stephan - a fitting climax to your series on omegas 3 and 6. I think the changes I will make will be to stop taking Flax supplementation (links to prostate cancer mentioned on Mark's Daily Apple also influence this) and to stop using tahini as a condiment. Would you agree that tahini is probably to be avoided? This is basically sesaeme oil, right? Pay Now Live Later I am well informed of the benefits of higher omega-3 intake and the potential risks involved in the higher intake of omega-6 fatty acids. Still I would like to point out that many of the potential risks involved in the higher linoileic acid (omega-6) intake do not seem to actualize in real life. Recently this was clearly seen in a study published in July in American Journal of Clinical Nutrition. In the study higher intake of linoleic acid (omega-6) intake was associated with reduced total and cardiovascular mortality. Warensjö E et al. Markers of dietary fat quality and fatty acid desaturation as predictors of total and cardiovascular mortality: a population-based prospective study.Am J Clin Nutr. 2008 Jul;88(1):203-9. Canola oil is high in PUFAs - about 32% - similar to peanut oil. Animal foods usually about 2-16% PUFAs, by calories. Wild caught fish are lean and have less PUFAs than those from farms. A mixed diet of whole animal foods would be a lot lower in PUFAs than a diet of nuts, seeds, and the oils from most plants. Why eat PUFA oils? They usually taste awful, and we don't need any of them. It would be better to eat chicken and turkey with skin to most PUFA oils, IMO. I think the amount of PUFA matters as much as the ratio, or more. I think the modern diet filled with refined sugars and flours does more to cause inflammation than eating a lot of vegetable oils, although I'd avoid all oils with more PUFAs than olive oil (like Stephan suggested). In fact, I use macadamia oil rather than olive oil, because it has only 2% PUFAs and a 6:1 omega-6 ratio or lower, based on what I've read. The study showing benefits from n-6 is probably just seeing the benefit from avoiding trans fat. Trans fats (or some other substance in refined hydrogenated oils) cause obesity in animals and block many enzymes from working properly. However, it might not be as bad as the refined carbs, chemicals, and other things in food that contain trans fat. The Inuits also aged rapidly, based on Vilhjalmur Stefansson's reports. He said Eskimo women were sometimes grandmothers before age 23 and they looked as old at 60 as Americans of his time (not eating PUFA oils) did at 80. I disagree that a high ratio of omega-3 to omega-6 is healthy. I think it's best to keep PUFAs lower and not eat a lot of perishable n-3 oils (like fatty fish). I also feel grain-fed meat is not nearly as big a concern as PUFA oils, nuts, seeds and the like. I wager that somebody eating nothing but whole chicken is going to be healthier than somebody eating nuts and seed oils. An All Meat Diet Provides Excellent Health There is a post over at Mark's Daily Apple about Flaxseed and Mark recommending fish oils. A comment was made that you can get DHA and EPA from algae supplements. Are they as good as fish oils? I don't think the supplements are available everywhere just over the net? Have you heard of them and what are your thoughts? More on the Algae Supplements: 3 capsules per day provides (They state 3 capsules needed daily - 90 caps in a month) In my fish oil supplements: 300mg Omega 3 (1 capsule) = What do you think of the ratios of EPA and DHA. In the fish oil there is more EPA and less DHA. The algae supplements a lot less EPA and a lot more DHA. I can't comment on how much DHA v. EPA is optimal for your body. But recall the mnemonic that the n-3's go in alphabetical order: Your body can (inefficiently) turn ALA into DHA, and DHA into EPA. So my gut feeling is that having more EPA straight up is beneficial so that your body doesn't have to use its inefficient conversion system to make it. I'm curious to any good answer about what ratios are optimal, however. The reason I don't recommend canola oil is complicated. It's fairly high in n-3, which is easily oxidized. So what manufacturers do is hydrogenate it during the refining process to remove some of the n-3 and stabilize it. So refined commercial canola is often hydrogenated and not even very rich in n-3. You can get unrefined canola oil sometimes, but it's not suitable for cooking due to the n-3. Canola oil is also high in polyunsaturated fat in general, which could be a problem if you eat a lot of it. I still use tahini every now and then. You're right that it's mostly sesame oil. I try not to make it a staple, but I do enjoy eating it sometimes. The study you pointed out is epidemiological, so it can't sort out correlation from cause. The only hard evidence comes from intervention trials where they replaced saturated fat with n-6. As far as I'm aware, in most of these trials total mortality went up or remained the same. I posted some lifespan data for the Inuit from Stefansson's "Cancer, Disease of Civilization" a while back. They actually had a fairly good lifespan for HGs (43.5 not incl infant mortality), if we can extrapolate from this one group. Some of them were living past 90. The records are from a Russian mission in Alaska that recorded births and deaths. That said, I generally agree that a very high n-3 intake probably isn't optimal. Hey Bruce, another thing that bothers me a little bit about Stefansson is he had multiple strokes, the first when he was 73. Of course, maybe he wasn't following his own diet advice... I don't know whether algae are a good source of n-3. The long-chain fatty acids in fish originally come from algae I believe. However, on principle I'd go with fish oil unless you're totally against eating fish. Simply because humans seem to be designed to get their most important nutrients from animals rather than plants. Just a small correction of my last comment: algae actually aren't plants; they're unicellular photosynthetic eukaryotes. I am well aware, that the study type can not establish causality. Still the researchers themselves state (in the full study) that the study type reflects well the actual dietary intake of different fatty acids. I do not agree that other studies in general would show opposite results. I just refer to the results of the 20 year follow-up of the Nurses' Health Study where higher intake of polyunsaturated fatty acids was clearly associated with reduced CHD mortality. The omega-6 fatty acids were not separated from the omega-3's but as it is well known that the ratio is poor in the American diets, the results show in practise that higher omega-6 intake was beneficial. Higher polyunsaturate (and particularly omega-6 linoleic acid) intake may slightly increase cancer risk but the benefit in cardiovascular mortality risk reduction is so great that the total mortality effect is still likely to be lower. Oh K, Hu FB, Manson JE, Stampfer MJ, Willett WC. Dietary fat intake and risk of coronary heart disease in women: 20 years of follow-up of the nurses' health study. Am J Epidemiol. 2005 Apr 1;161(7):672-9. So if algae are not technically a plant than they should not be used by vegetarians or vegans. Great post usefully setting out information in an accessible way. I will come back later. I have been away for two days at a lipid conference. A brief thought on the nurses study comment. Thanks Juhana for the post which is thought provoking. I suggest there are to many potentially confounding and related factors to draw any conclusion as to the role of Omega 6 or 3(undifferentiated) (as against related factors such as aspirin hormone intake, mono saturates tied to polyunsaturates eg olive oil 3 etc) in lowering coronary disease risk profiles where associated with higher polyunsaturates intake. I will post more of my thoughts later. It depends on how you feel about eating protists! The Nurses' Health study also can't establish causality. You really can't base your views on epidemiological studies when there are intervention trials around. As Robert said, epi studies are full of confounders (which cannot all be adjusted for, despite the investigators' best efforts). If you look at the totality of the intervention trials, they do not support the hypothesis that n-6 PUFA decreases overall mortality. This makes good sense since a high intake of n-6 is not natural for the human body. We've only been eating a lot of it for 50 years or so. "The Nurses' Health study also can't establish causality." I am well aware of that. But neither can you rely on short term intervention trials only. We need both types of studies to get a full picture. The Lyon Diet Heart Trial was an intervention trial where butter was replaced with rapeseed oil based margarine (non-transfat). Coronary heart disease events were reduced by impressive 70 percent. The trial included some other dietary changes as well but if margarines and PUFAs were as harmful as many low-carbers state, you could not get that kind of impressive results. De Lorgeril M et al. Mediterranean alpha-linolenic acid-rich diet in secondary prevention of coronary heart disease. Lancet. 1994 Jun 11;343(8911):1454-9. It's a fair point about study length. However, I consider epi studies good for formulating hypotheses only. On a number of occasions, conclusions drawn from epi studies have fallen through when tested in interventions. I agree that the Lyon trial was an impressive and interesting result. It would be hard to argue that the result was due to increased n-6 intake however, since the intervention group was eating less n-6 than the control group. It was more likely due to an improved n-6:n-3 ratio from the n-3 in the canola oil. Total PUFA probably went down as well, since n-6 went down. Omega 3 and 6 intake. Omega 3 and 6 are two separate families. Each member of each family has distinct and separate properties, and so different uses in the body. The 18 `mother` Omega 3 and 6 carbons fats linoleic(6)and alpha linolenic (3) acid are plant based. Neither humans nor animals can make them - we both MUST get them from diet. The longer Omega 3 and 6 fats are found in animals humans and simpler living things. Humans animals and simpler things can convert the mother fats to longer fats of the same families. To save doing the conversion ourselves we eat the fats animals have already converted, like DHA and EPA in fish. The mother omega 3 and 6 plant fats are found in low levels in green things, with generally more 3 than 6. They are also found in SEASONAL plant reproductive material in higher quantities generally with varying skews to Omega 6. Nuts and some seeds have very high levels of Omega 6 (see Stephan's graph above). Overall the mother fats would have been available in quite low amounts and around a balance of 1:2 to 2:1 depending on what foods were accessible. The maintenance need for the 18 carbon plant based Omega 6 is likely under 1% of calories. This would suggest the absolute need for the Omega 3 mother fat is similar. BUT our ancestors did not have disturbed digestion, refined foods, significant alcohol, and a host of factors which can block the conversion of the mother fats to the longer fats, all of which complicate any absolute answer as to optimal intake. Long chain Omega 3 and 6 would have come form the marine food chain which is biased to omega 3 by a factor of about 10. A shoredweller could have eaten significant amounts of long chain omega 3 in time of marine plenty. This suggest to me that we need to more or less balance the omega 3 and 6 plant fats but maybe under 6-8 grams a day of Omega 6, and that the limit on marine based long chain Omega 3s (DHA +EPA as a measure) is what you could have reasonable eaten based on a variety of fish, maybe 1-3 combined total grams a day. The amount of long chain 3 required seems to be a function of the intake of Omega 6 and will again depend on digestion etc. Please consult with your doctor before making significant alterations to your diet and more so if on blood thinners asprin etc as Omega 3s can cause blood thinning. Also if on `high` amounts of Omega 3 please advise prior to surgery child birth etc. Those who are pregnant or planning pregnancy should also take advice. Mercury contamination is an issue for some fish - some inland water are polluted - bigger and older fish like tuna carry health warnings as to the amount you should eat - check your government health site. Good quality fish oils should be distilled which removes mercury, but fish come with lots of nutrients, are a complete package and are the recommendation of those that have spent a lifetime researching in the field. Iodine is needed to control metabolism. Zinc is necessary to fat conversion....... Robert Andrew Brown Author Omega Six The Devils Fat. Omega six is the precursor of all the major inflammatory chemicals. Omega six connects to tissue creation and destruction, new life, immune function etc. Of course refined food will contribute to the pressure that lead to the formation of inflammatory chemicals but Omega 6 is the primary precursor and the pathway targeted by modern anti inflammatories. Industrial chicken as per Stephan's graph is grain fed and so contains surprising amounts of Omega 6 and very little 3 - so meat is a good source of Omega 6 but unless grass fed will contain little 3. The order is ALA EPA DHA. The amount of ALA converted to DHA in men can be very small - a fraction of a % in some, due to conversion blockers etc. There are no definitive answers but the body needs both DHA and EPA as they have distinct and important roles. Better for the environment and a concentrated pure source of DHA and or EPA, but do not carry the same range of fats or other nutrients as whole fish. No certain answers for the reasons given above but the American Heart Association recommends a gram a day of EPA plus DHA (500mg of each) and an American mental health organisation recommends 2 grams total a day. Recommendations vary from 200 or 300mg upward. Author; Omega Six The Devils Fat. Juhana, Steve, Robert, Blood sugar is also a confounding problem. In particular, many studies that have indicted saturated fats as bad were conducted in a high glucose environment. Here is a diabetes study that looks at the effect of glucose on fat “toxicity”: Note the change in terminology from lipid hypothesis to "glucolipotoxicity" hypothesis. With regard to the measure of the “best” fats, I would only be interested in the results of a study where carbohydrate intake was controlled. Hi Stephan (and others with knowledge on PUFA) Are you familiar with and do you have an opinion on Ray Peat's writings? He's a biologist who thinks consuming any amount of PUFA -n-6 or n-3- is a bad idea. An interesting argument that runs counter to the current mainstream take on n-3. The first three articles concern this topic. I may go through those articles in detail at some point. At first glance, there are some pretty big holes in the argument though: First, it's almost impossible to avoid PUFA completely. Second, healthy human populations have eaten moderate amounts of PUFA probably since the beginning of time. Granted, not as much n-6 as we're eating today. Third, if long-chain PUFAs are so toxic, why does the human body synthesize them and concentrate them in the brain? Omega 3 and 6 are in general terms unique in common fats in that we and animals cannot make them. They are both central to body function. The key questions is what are the optimal intakes of the plant and longer chain Omega 3 and 6s in humans The brain is about 60% fat dry weight. Of that approximately 25% is DHA (Omega 3) and 25% AA and AD (Omega 6). All animals have a similar ratio. DHA is essential to brain and retinal function. 60% of the retinal fats are DHA. The Oxidation of DHA is likely essential to sight, immune function, cell control, cell death etc... Omega six AA is essential to vascular structure and function, inflammation, tissue creation and destruction, hormone production etc... Does Omega 3 impact on the immune function, without question. Omega 3 helps regulate the immune function. Excess Omega 6 stresses the immune function by over activating it. Omega 3 helps improve immune functions where it is stressed by excess omega 6 eg. in sepsis, SIRS, peritonitis etc, as well as auto immune conditions, oxidative stress related conditions, allergies etc. Could excess Omega 3 in the absence of a balance Omega 6 degrade immune function - YES. Would we need as much long chain Omega 3 if we were consuming levels of Omega 6 close to 1% of energy - probably - NO. Trials that look at PUFAs without considering the individual underlying fats are of little use in saying anything much. The body appears to have developed a range of specific mechanisms to protect against damaging oxidation of DHA, eg protectins and resolvins, hormones with a relationship to DHA like melatonin etc. Dolphins do very well on a very high long chain Omega 3 diet (eg marine food products) which suggests that high intake of Omega 3 per se is not detrimental. It is the oxidisation of LA linoleic acid that seems to create the problems. This could happen in the eicosanoid cascades outside the membranes or as a result of oxidation in the mitochondria. As yet there does not seem to be the same Omega 6 oxidation protection mechanisms for Omega 6 that are found for Omega 3. I suggest it may be the body is not designed to use scarce Omega 6 as fuel, because the body has little experience of Omega 6 being used as fuel. Pregnancy depletes women of Omega 3s to build babies and their brains. In animals brain size reduction in offspring has been observed in later multiple pregnancies where Omega 3 supply was low. High availability of DHA is suggested as an explanation for the advantages of the first born. So complicated but with lots of reading; Should we reduce Omega 6 plant fat intake - YES Do women have a higher need for long chain Omega 3s and 6s to make babies - YES Should we balance the omega 3 and 6 plant fat intake - YES Can we benefit from moderate intake of aquatic products that have a lot times more long chain 3 than 6 and the essential minerals etc that come in fish -YES IS the question of supplies of fish a huge question - YES !!!! Does a ton of farmed carnivorous fish require 4-5 tons of oily fish as feed - from what I read - YES Are there alternative supply options like algae or the distant possibility of long chain yielding crops? Algal production is already under way. They are looking a genetic manipulation of crops to include long chain PUFAs. The implication of making long Omega 3 and 6 available in the terrestrial environment in plant fats are enormous. Author; Omega Six The Devils Fat Thanks for your reply. I would love to read a post on your thoughts on Peat's reasoning. I'm certainly not qualified to speak for him, but I think he addresses each of the points you made in the three articles I mentioned. Thanks for this blog, which is required daily reading for me. I just read his articles more thoroughly. I think he makes a lot of good points, but I disagree with some of it. Many healthy traditional cultures ate a fair amount of PUFA, mostly n-3. The Inuit ate a lot of it, and the Kitavans eat the equivalent of about 1 tsp per day of fish oil (4g). To counter the argument that DHA is an important fat in brain function, he cites some cell culture data that cells can divide indefinitely without the 'essential' fatty acids. What cells do in a dish is a far cry from what is optimal in the human brain. As a matter of fact, cell culture data are virtually irrelevant to the question. He also cites the fact that insects can live without PUFA. Well that's also irrelevant, because they have different biosynthetic pathways than we do. So he is not able to explain why the brain concentrates DHA and other PUFA. Robert makes a good point that mothers shunt n-3 fats to their babies to help build their brains. If they weren't important for development, why would that happen? Thanks for the analysis. I agree that neither cell-culture studies nor insect biology should be used to draw conclusions about what happens in the human body. I notice that he also cites a fair number of studies on rats and other mammals, and even humans receiving intravenous feeding, to support various points (including some about brain health/function). These are, I think, worth noting- though of course the animal studies can not be considered surrogates for human studies. As to the brain's affinity for DHA, is it possible that the brain concentrates as much as it needs during development and then no longer requires more (beyond the very small unavoidable amount in a healthy diet) in adulthood? I've seen Chris Masterjohn's work mentioned here. I haven't dropped the $15 for his special report on PUFA, but the abstract states "In... healthy adults (other than women who are seeking to conceive, pregnant, or lactating), however, the requirement (for EFA) is infinitesimal if it exists at all". I agree that the fact that healthy cultures have eaten given amounts of n-3 on a regular basis is good evidence that those amounts of n-3 are, at the least, benign- in the context of those cultures' lifestyles/total environment. I'm just playing devil's advocate. Perhaps I've been eating too much of the devil's fat recently. I haven't read Chris Masterjohn's PUFA report yet, but I'm sure he backs himself up well. I think there's a difference between how much PUFA is necessary and how much is tolerated. They may be right that we need very little PUFA to avoid deficiency; I haven't looked into that so I can't evaluate it. I do feel comfortable saying that we can be healthy getting the amount of n-3 that one would get from eating fish regularly. So if n-3 is toxic, it's probably only in large amounts. Robert: "Dolphins do very well on a very high long chain Omega 3 diet (eg marine food products) which suggests that high intake of Omega 3 per se is not detrimental." Dolphins also swim in cold water 24 hours a day. How many people do the same? Wild salmon are less than 16% PUFAs by calories. Also, fish is a whole food, unlike taking fish oil, which is usually processed and does not contain protein, water-soluble vitamins, and minerals that a whole fish would contain. "Industrial chicken as per Stephan's graph is grain fed and so contains surprising amounts of Omega 6 and very little 3 - so meat is a good source of Omega 6 but unless grass fed will contain little 3." It's still much lower in PUFAs than most nuts, seeds, and vegetable oil products that are used for cooking. As a percent of calories, it's only 13.5% PUFAs (max). Meanwhile, nuts like almonds are over 20% PUFAs. To put things in perspective, eating a half chicken with skin (460g) would give < 15g of PUFAs, while a cup of whole almonds (143g) would give 17g of PUFAs. Most nuts are even worse. Peter: Ray Peat is not against all foods containing PUFAs. He eats red meat, cheese, milk, shellfish, lean white fish, coconut oil, eggs, etc. He's mainly in favor of a high SFA to PUFA (and MUFA/PUFA) ratio, so they are "diluted" (his words). It is impossible to avoid PUFAs, that is a straw man used by his critics (Mary Enig), but he doesn't say to eliminate PUFAs, only to keep them very low and dilute them with SFAs and MUFAs. He mainly eats red meat, dairy, and coconut fats. amen on flaxseeds. now I don't believe it's fit for human consumption. + it does not smell & taste good to me. i have to find a usage for it. so now i use it on wood (where it belongs). XD Post a Comment
<urn:uuid:5b7c7a18-8080-433b-af12-a8dc046d1f23>
CC-MAIN-2023-14
https://wholehealthsource.blogspot.com/2008/09/pracical-approach-to-omega-fats.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00199.warc.gz
en
0.962085
6,737
2.859375
3
A leading professor of anthropology and sociology at Tel Aviv University (TAU) has bad news for the Middle East in the coming years that involves reduced food production, global warming and political stability. But Israel could be an island of hope, and if the countries pull together and focus on challenges rather than terror and war, the situation could improve. Prof. Dan Rabinowitz of TAU’s Gordon Faculty of Social Science writes in a new research book published by Stanford University Press entitled The Power of Deserts: Climate Change, the Middle East and the Promise of a Post-Oil Era that the region is in for trouble. He is a known advocate of the multi- and interdisciplinary approach of environmental studies and has held various positions in its academic council since the school was established. Shrinking agricultural outputs, he predicts, will force millions to leave rural hinterlands and seek refuge in cities which are ill-equipped and often unwilling to absorb them, he writes. In addition, global warming that harms the environment will continue to promote friction and instability among ethnic groups and trigger conflict in the Middle East. He argues that the region – already hotter and dryer than most parts – could soon see worsening water shortages, decreased agricultural productivity, large-scale displacement and conflict as a result of a deteriorating climate. “The tragic cases of Sudan and Syria,” wrote Rabinowitz, “demonstrated what could happen when shrinking agricultural outputs force millions to leave rural hinterlands and seek refuge in cities which are ill-equipped and often unwilling to absorb them. Global warming could turn such scenarios to a new normal in the Middle East.” In a chapter dedicated to climate inequality, the book demonstrates that wealthier and more technologically advanced countries in the region like Israel, which are responsible for higher per-capita emissions of greenhouse gases, have the means to adapt to the post-normal climate condition and protect themselves from its perils. At the same time, he predicts, poorer neighboring countries whose contributions to the climate crisis has been significantly smaller stand to suffer most. ‘The Power of Deserts’ however offers more than somber warnings. Its latter part in fact raises the surprising, counterintuitive notion that the Middle East could eventually become part of the solution to the climate crisis. Using his deep knowledge of the region and an ability to present scientific data with clarity and poise that has made him a leading Israeli voice on climate change, Rabinowitz makes a sober yet surprisingly optimistic exploration of an opportunity arising from a looming crisis. “The past 70 years, he says, in which oil reigned supreme, helped the oil-rich countries of the Persian Gulf accumulate legendary wealth. But with renewable sources of energy now eclipsing fossil fuels in transport and in electricity production everywhere, the age of oil is coming to an end,” said Rabinowitz. “Add a disconcerting climate prognosis, and the oil rich countries in the Middle East now look at a precarious future. The need to calculate a different pathway going forward has become imperative.” Their best bet, Rabinowitz argues, could be exploiting solar energy. With more than 300 sunny days a year, abundant unproductive land, good capital reserves available for investment and a good track record of integrating new technologies in civil infrastructure, the Gulf states could drastically expand their use of solar energy for their domestic electricity production; invest heavily in renewable technologies and capacities around the world; then, at the right moment, turn their backs on oil and natural gas completely and, using their market power in the energy market ante, carve themselves a leading role in the energy universe of the future. “Rather than resisting the energy transition, which was underway even before Covid-19 and was accelerated since, the Gulf States could switch to the “right” side of history, join the struggle to curb climate change and gain respect in the eyes of many who once looked at them with suspicion and contempt. “Significantly, this transformation on their part does not hinge on an ideological rebirth and the adoption of a ‘green’ outlook. It could transpire as a rare historical junction where self-preservation on the part of some works to the benefit of many others,” he stated. He earned his doctorate in social anthropology from Cambridge University, and is renown in both academic and public circles. He had published dozens of academic articles and his 12 books were printed by highly respected publishers (such as Cambridge University Press, California Berkeley University, Ashgate London and more). He wrote the first comprehensive book in Hebrew about global warming, and a groundbreaking book about the Cross-Israel Highway. Between 1997 and 2000, he served as chairman of the Israeli Anthropological Association. Rabinowitz is also a popular lecturer and was awarded the Rector Award for Excellence in Teaching. In addition to his academic work, he is actively involved in third-sector organizations and maintains extensive contacts with environmental NGOs in Israel and around the world. He was head of TAU’s Porter School of Environmental Studies and chairman of Greenpeace Mediterranean. He received the Pratt Prize for Environmental Journalism (2012) and the Green Globe award for environmental leadership (2016). Rabinowitz has a prominent public profile and media presence, appearing as a frequent guest on television and radio programs and writing hundreds of op-eds in Israeli newspapers. He is also a regular speaker in central conferences addressing environmental issues in Israel. In 2010, he was awarded the Pratt Foundation Award for a unique contribution to the media coverage of environmental issues in Israel.
<urn:uuid:ed0f59c9-ea12-4bd5-a10d-66d83d3cb5b3>
CC-MAIN-2023-23
https://www.israel365news.com/343401/tel-aviv-university-expert-as-petroleum-is-being-replaced-gulf-states-should-promote-use-of-renewable-energy/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00730.warc.gz
en
0.957036
1,149
2.734375
3
Lindström, A. and Klaassen, M.R.J. (2003) High basal metabolic rates in shorebirds while in the Arctic: a circumpolar view. The Condor, 105, 420-427. ISSN 0010-5422. |PDF - Published Version| Official URL: http://dx.doi.org/10.1650/7222 The basal metabolic rate (BMR) of Old World long-distance-migrant shorebirds has been found to vary along their migration route. On average, BMR is highest in the Arctic at the start of fall migration, intermediate at temperate latitudes, and lowest on the tropical wintering grounds. As a test of the generality of this pattern, we measured the BMR of one adult and 44 juvenile shorebirds of 10 species (1–18 individuals of each species, body-mass range 19–94 g) during the first part of their southward migration in the Canadian Arctic (68–76°N). The interspecific relationship between BMR and body mass was almost identical to that found for juvenile shorebirds in the Eurasian Arctic (5 species), although only one species appeared in both data sets. We conclude that high BMR of shorebirds in the Arctic is a circumpolar phenomenon. The most likely explanation is that the high BMR reflects physiological adaptations to low ambient temperatures. Whether the BMR of New World shorebirds drops during southward migration remains to be investigated |Institutes:||Nederlands Instituut voor Ecologie (NIOO)| |Deposited On:||24 Nov 2011 01:00| |Last Modified:||30 Oct 2013 16:51| Repository Staff Only: item control page
<urn:uuid:94912036-1415-4fe6-bbb1-36fc02a8165e>
CC-MAIN-2014-15
http://depot.knaw.nl/11357/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521512.15/warc/CC-MAIN-20140416005201-00537-ip-10-147-4-33.ec2.internal.warc.gz
en
0.848838
364
2.671875
3
Understand how twin-gear juicers work, the pros and cons twin gear juicers, and compare popular models. How do Twin-Gear Juicers Work? A twin-gear juicer is also called a triturating juicer. To triturate means to rub, crush, grind or pound into fine particles. In this case, to crush, grind or pound the fresh fruits or vegetables finely to extract the juice, nutrients, enzymes and all. A twin-gear juicer operates on this triturating concept. It has two gears (see picture below) that rotates inward with a very fine hairline gap of about 0.1 mm precision, crushing and grinding produce to extract its juice. This action tears open the produce’s cell membranes and releases its deep-seated nutrients and enzymes. It also breaks up more of the phytochemical from the produce, resulting in a rich-colored juice which is also richer in its nutrients and minerals. Like the single-gear juicer, a twin-gear juicer operates at a very low speed of about 80~160 RPM. At 160 RPM, it doesn’t mean that the rotation is faster than that of the single-gear juicers that operate at 40~80 RPM. It could be about the same, just that the diameter of the gear is smaller, so it seems as if it’s spinning faster to complete the rounds. It’s like a tall person and and a short person walking the same distance from point A to point B. Both are walking the same distance just that the short person takes more steps to reach the destination. This low speed rotation does not disrupt the cellular structure of the fruits and vegetables. It eliminates oxidation to the juices, therefore, preserving the precious enzymes and nutrients that are closest to its natural form. Feeding leafy and soft produce is generally easy with this type of juicers, as they will self-feed as the gears rotate inwards. However, feeding hard produce like a carrot may be a bit challenging for those who have weakness in their arm (as in some arthritic patients). The trick is to cut the produce a little “slimmer” with an angle that goes in first. The twin-gear juicers usually come with many attachments. Different attachments for when juicing fruits and when juicing vegetables. There might be pulp output control knob as in the case of Green Power, etc. and pasta-making nozzles. However, you don’t need to use all of these attachments. Most people buy the twin-gear juicer to benefit from its superior quality juice, not to make pasta. Those who understand the superior juice quality extracted using a twin-gear, understand that they’re getting premium results for the price they pay. The juice yield from a twin-gear is slightly more than that of a single-gear juicer. Chances of oxidation of juices is almost nil and when used properly, foam is almost non-existent. Advantages of a Twin-Gear Juicers - A twin-gear juicer operates very silently compared to a centrifugal juicer. - The low-speed motor eliminates oxidation, therefore, preserving the enzymes. - The method of extraction tears open the produce’s cell membranes and releases its deep-seated nutrients and phytochemicals. - Extracted juice is stable and can be stored in the fridge for up to 36 hours. - The juices produced has very little foam. - You get high quality juices that taste rich and concentrated. - Extracts soft and leafy vegetables including wheatgrass or alfalfa sprouts very well. In fact, it makes green juices actually tastes sweet. You have to try it to believe it! If you intend to juice mostly greens, you may want to consider investing in a twin-gear. - It squeezes every drop of juice from your vegetable and produces very dry pulp. - The extracted juices has almost no foam. Disadvantages of a Twin-Gear Juicers - A twin-gear juicer may not be suitable for a beginner due to its price (costing from $400 up to over $1,000) and its “complexity”. - Feeding chute is generally smaller to prevent fast-feeding. More patience is required when using this type of juicer. - Juicing hard produce may be a bit challenging, requiring a little more effort compared to the single-gear juicer. - Is heavy (approximately 6~12 kg) and may be cumbersome to move around (but is advantageous in that it doesn’t “walk” when in operation). I personally own a twin-gear juicer, the Green Power Kempo and love how it juices wheatgrass so well. I’ve often heard complaints how some people are not able to drink wheatgrass juice due to its “very green taste”. That is due to the extraction method. When I drank my first wheatgrass juice extracted using the Green Power Kempo, it changed my mind totally about green juices “tasting green”. Green juices don’t have to taste green. Twin Gear Juicer Reviews The twin-gear juicer is a new technology and there are not many triturating juicer models in the market. Below are write-ups of the few models, not necessarily recommended by Juicing-for-health.com. The reviews here are for information only. Buy Twin-Gear Juicers now! Types Of Juicers:
<urn:uuid:58be0fab-0bce-4134-a52d-0e7d6f1b4145>
CC-MAIN-2017-43
https://juicing-for-health.com/twin-gear-juicers
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822930.13/warc/CC-MAIN-20171018104813-20171018124813-00464.warc.gz
en
0.938724
1,172
2.609375
3
Scientific & Spiritual Aspects of Sound and Light Sound and light in reality are one. Vibrations up to a certain frequency produce sound and if the frequency is increased several fold it changes into light. This is the understanding of the Creative Life Force which sustains all things; the light is inside of us and within this light is the spirit of man originating from the Creator. Quoting from the Bible, “In the beginning was the Word and the Word was God and the Word was with God” is an example where sound vibration energy is referenced. Examples of references from other religions concerning this physical phenomenon are Shabd, Holy Ghost, Ringing Radiance, Music of the Spheres just to name a few. It is also said in the Bible that if “Thine eye be single, the body would be filled with light”. This can be seen as another example of light vibration being accepted, or understood, as the source of the Creative Life Force. Today, scientists are discovering and proving that all knowledge is based within the understanding of sound and light energy. Sound and light are the same (just as you can’t have a back without a front) and this sound and light generate a vibration or frequency and a pulsation. This pulsation is what we call the Universal Pulse and what we utilize to harmonize the individual’s pulses in Jin Shin Jyutsu. In the understanding of Jin Shin Jyutsu, this frequency is where the numbers and elements originate. This pulsation is the Universal Rhythm and also the personalized pulse of all things. From this comes forth all living and “non-living” things which we recognize as a combination of the five elements, ether, air, fire, water, and earth. As the elements continue to dense down, the different depths, or stages of creation begin to form. This is the understanding of the formless to form, and this is where the term “Depth” as used in Jin Shin Jyutsu gets its meaning (formless to form). In the center of the head is where the Soul (likened to the Sun) resides, and within this center is where the one tone, or sound and light resonate (like the rays of the Sun). From this one tone comes forth the 26 tones or vibrating frequencies for the 26 number locations on the human body. Each number vibrates to a specific sound and resonates with other numbers for this body form. Within mathematical forms are concealed all knowledge and the principles of the universe through which all things evolve. The numbers are specific as to their origin and have powerful meaning which are critical to the understanding of the interconnecting of all things. The location of these numbers on the human body, the energy movement, or flows, within the body, and what it all means, is the study of the Art of Jin Shin Jyutsu. The Indians worshipped the Creator through the Sun and the Earth, while others worship the Lord through infinite Mind. Many truths have to be personally experienced, not just accepted as one would in reading a book, or being instructed by a teacher. There is a presence, or a power, that lives within every human being waiting to be discovered and understood. “There is a light that lights every man that cometh into the world.” We each have our own basic background. Integrating knowledge and beliefs, sorting out the seemingly many different “Truths”, is the struggle of each individual who is in action in this life form. Jin Shin Jyutsu in no way contradicts the basic philosophy of any other spiritual path or belief. If anything, it supports the underlying universal Truth we intuitively all know. These texts are not an attempt to solve the problems of the world, nor do we presume to have all the answers, but rather set before the student a wondrous treasure, an understanding of how the Universal Energy works within the human experience. It is a gift from the Creator to be utilized and shared in humility and awe, with integrity to God and oneself. With Love and Light, Jin Shin Institute Support Team
<urn:uuid:1e446fcd-64ed-413f-91a5-496c8dceeb84>
CC-MAIN-2017-39
https://jinshininstitute.myshopify.com/blogs/jin-shin-blog/173601031-test-post
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689975.36/warc/CC-MAIN-20170924100541-20170924120541-00472.warc.gz
en
0.945097
844
2.859375
3
This is the week that America sets aside as a time of giving thanks. Why is that? Two past presidents of the United States made very specific declarations. The National Thanksgiving Proclamation was the first formal proclamation of Thanksgiving in the United States. President George Washington declared Thursday, November 26, 1789 as a day of public thanksgiving and prayer. And then President Lincoln proclaimed in 1863 during the American Civil War, a national day of “Thanksgiving and Praise to our beneficent Father who dwelleth in the Heavens,” to be celebrated on the last Thursday in November. What a wonderful heritage we enjoy from these important proclamations of honoring our Creator through a spirit of thanksgiving. However much earlier, Paul the Apostle wrote in I Thessalonians we are to…”give thanks in all circumstances.” He knew that giving thanks was a form of joyfulness. That giving thanks actually lifts our spirits and that giving thanks connects us to God. He knew that a spirit of thankfulness is healthy for our minds, our physical health and our emotional health. I believe he also knew that thankfulness and gratitude help us in our relationship with God and others. How so? Someone once said when we lose our thankfulness toward God, we begin to focus on what we feel God has not done and ultimately miss what He is doing. Could that also be true of our earthly relationships? When we stop being thankful for those around us, we could begin to focus on how they have disappointed us or how they frustrate us. A spirit of thankfulness is contagious. What are you thankful for today and how can each of us maintain a spirit of giving thanks in all things as a lifestyle? Let me begin with saying I am thankful for those of you who take the time to read my blog! 2 thoughts on “Celebrating a Week of Thanksgiving” Thanksgiving is a wonderful tradition. It is not ‘celebrated’ in Kenya, but we should always remember to be thankful! LikeLiked by 1 person Yay, true! We are so thankful for you and our Kenyan brothers and sisters!
<urn:uuid:634ed29e-8ab1-4830-8152-9f87efbb5847>
CC-MAIN-2023-23
https://steveprokopchak.com/2018/11/19/celebrating-a-week-of-thanksgiving/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00015.warc.gz
en
0.966989
448
2.59375
3
International Jewish Graveyard Rabbit is happy to introduce new contributor Ellen Shindelman Kowitt. She is the webmaster for the Jewish Genealogical Society of Colorado. A former IAJGS board member and past president of JGS Greater Washington, she lectures and writes about Jewish genealogy. Jews arrived in Colorado with the Gold Rush in 1859. The oldest Jewish burials in Denver were conducted by the pioneer organization, the Hebrew Burial and Prayer Society (later known as the Hebrew Cemetery Association) from 1860 to 1910 and were interred at the Denver Pioneer Cemetery “Old Jewish Section” located east of Cheesman Park on Capitol Hill. In Denver cemeteries, many Jewish burials circa 1899-1954 were of those who travelled to two Colorado Jewish sanitariums for the treatment of tuberculosis. National Jewish Hospital opened in 1899, and catered largely to Jews with a less severe case of tuberculosis who were of German background and more assimilated. The Jewish Consumptives Relief Society (JCRS) served those with advanced stages of the disease and who were recent Russian immigrants. JCRS was a kosher facility with an onsite synagogue, and the patients were often observant. Here are two stones and a donation plaque for Ernest Gluck: The English name reads Ernest Gluck, whose Hebrew name and father's name are Aharon Yeshai ben Menachem Mendl. This stone above, with the same details, begins with a note about the Shoah (Holocaust). This second stone might have been erected by his family, particularly since it mentions erasing the Nazis - unrelated to a Colorado tubercular’s grave - but perhaps representative of stones in that generation commemorating others who died in the Shoah elsewhere. This plaque was apparently constructed by his friends at JCRS. Members of the Jewish Genealogical Society of Colorado assisted the University of Denver Judaic Studies Division with the creation of an online JCRS patient surname index. This project was awarded the IAJGS Malcolm Stern Grant in 2003. Copies of JCRS patient applications (click here to see a sample) can be requested and often include birthplace abroad, landsmanshaften affiliation, names and ages of children, nearest of kin and burial location at Denver cemeteries. Rose Hill Cemetery in Commerce City, Golden Hill Cemetery in Lakewood and Mount Nebo Cemetery in Aurora specifically included tuberculosis patient burials. A significant number were buried by benevolent groups as indigent and in unmarked pauper graves. Regardless of whether a gravestone ever existed or has survived, all Colorado Jewish burial data has been gathered from local sources, indexed, entered into the JewishGen Online Worldwide Burial Registry and can be searched by the name of the deceased, cemetery or location. Gravestone inscriptions have been translated into English from Hebrew, Yiddish and Russian. Following are the four largest Jewish cemeteries in the Denver metro area: Rose Hill Cemetery: Burials 1892-present; includes tuberculosis patients from JCRS. Mount Nebo Cemetery: Burials 1904-present; includes tuberculosis patients from JCRS. Golden Hill Cemetery: Burials 1908-present; includes tuberculosis patients from JCRS. Emanuel at Fairmount Cemetery: Burials 1911-present.
<urn:uuid:00fe7494-dc95-4123-9890-db893ef76c49>
CC-MAIN-2014-15
http://jewishgraveyardrabbit.blogspot.com/2009/01/colorado-tuberculosis-victims-graves.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537271.8/warc/CC-MAIN-20140416005217-00404-ip-10-147-4-33.ec2.internal.warc.gz
en
0.961254
670
2.765625
3
Sperm of donation is common to lesbian couples or couples who are told that they are fertile. The woman is conceived through the donated sperm and eggs and the baby is born the same way babies conceived through natural intercourse are born. Sometimes sperm is donated by one person and ova (egg) by another.In this case, many times couples are the donating people, but they can be two persons who do not have any relationship between them. They are still referred as couples. Persons conceived through donation of sperm and eggs do not know about their biological parents, since no information is taken about them on such children's birth certificates. They know the woman as their mother which they are born to, and her partner or husband as their father. In the countries where pregnancies through donated sperms and eggs is legally allowed, there is no difference between the rights of donor conceived persons and naturally conceived persons. The state recognizes both as equal citizens. Also, since no one knows about the donor, the information about biological parents is not known to the state. Sometimes donor conceived person finds it difficult to adjust socially as a question about their true or biological parents keeps bothering them. This is the reason that often people are not told about the way they were conceived. This can result in their social stigmatization, as the society in general is still not comfortable with such method of pregnancy. It recognises the process as 'immoral' and 'unethical'. Nevertheless, the number of born babies continues to rise. Some surveys has shown that nearly 40,000 live babies were born until the year 2005 and the number is increasing. With improvement of technology, now different methods are used for donation and implantation of eggs. The improvement of social structure in some countries has also helped in promotion of this way of pregnancies.
<urn:uuid:e4beba52-4001-4040-b1dd-946ab4fe4d9a>
CC-MAIN-2020-34
https://www.stepbystep.com/what-is-a-donor-conceived-person-88089/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736972.79/warc/CC-MAIN-20200806151047-20200806181047-00022.warc.gz
en
0.98549
365
2.953125
3
Dictamnus albus [dik-TAM-nus, AL-bus] is an herbaceous perennial, native to warm woodlands of southern Europe, Asia, and northern Africa belonging to the family Rutaceae. The plants come back every year and it is the only species in the Dictamnus genus but has many geographical variants. Dictamnus albus has a few different common names including: - Gas plants - Burning bush The name burning bush and gasplant are derived from the volatile oils the plant produces, which catch fire rapidly in extremely hot weather. This quality leads to comparisons with the burning bush mentioned in the Bible. Dictamnus Albus Care Size & Growth Even though Dictamnus albus is easy to grow, it does take its sweet time. It can take up to 3 to 4 years to flower. However, it is visually interesting, long-lived, and easy to maintain. Under the right growing conditions, plants reach 2’ – 3’ feet high and 1.5’ – 2.5’ feet wide. The gas plant grows upright forming clumps of rigid vertical stems. The foliage is made up of glossy odd-pinnate leaves. They are light green and emit a lemony scent when rubbed or crushed. Flowering and Bloom Time Besides its flammable, volatile oils, gas plants are known for their showy flowers. These flowers might lack the lemony scent the leaves have but are very aesthetically pleasing and why it is considered as an ornamental plant. The flowers have five petals, each along with long projecting stamens. Together, the flowers form a loose pyramidal spike, which is very interesting visually. Each flower is about 1” inch long and blooms in late spring to early summer. Depending on the variety, they can vary in colors, including white, pink, red, and lilac. Light & Temperature Dictamnus albus prefers colder temperatures and grow strong in USDA zones 4 to 9. They do the best in northern climates where the nights are significantly cooler. In very hot temperatures, there is a risk of the volatile oils becoming active and igniting. As for light, Dictamnus albus does not like even partial shade. It needs full sun to grow well. When planting in your garden or as a specimen, choose a sunny location where the sun shines for at least 6 hours every day. Watering and Feeding Dictamnus plants love water and thrive in moist soil and does not tolerate droughts unless it’s fully established. However, you have to be careful about overwatering. When the weather gets very cold, spread the watering schedule to avoid making the soil too soggy. Before watering, check the soil to ensure it is dry before dousing it with a small amount of water. Soil & Transplanting The gasplant doesn’t have specific soil requirements. It thrives in most types of soil and succeeds easily in ordinary garden soil. However, it’s best kept away from heavy and damp soils. Choose a medium, well-drained soil which is fairly fertile and humusy. It’s important to keep the soil moist but preventing it from becoming too soggy. As for transplanting, it is best avoided for this species as it doesn’t like being disturbed. Do it when the Dictamnus is only a seedling, but you have to be extremely delicate with it. Grooming and Maintenance Dictamnus is best left undisturbed as the roots don’t like being tampered with. The only maintenance this plant requires is deadheading, occasional removal of dead leaves, and regular watering. It is fairly low-maintenance and doesn’t need much attention during its lifespan. How to Propagate Gas Plant Dittany is best propagated with seeds. - Seeds are sown in a cold frame soon after they ripen in spring. - It takes the seeds one to six months to germinate properly at 59° degrees Fahrenheit (15° C). - When they are strong and large enough to be handled, prick the seedlings into individual pots. - Let them develop inside a greenhouse during the first winter. - Move them to their permanent positions in late spring or early summer. The plant is also propagated by division in the springtime but requires extra care. - This is important because the plant does not react well to root disturbance. - Gently tease out divisions from the side, avoiding digging the main clump. - Look for divisions that already have formed roots and pot them in a greenhouse for at least a year. Gas Plant Pest or Diseases Dictamnus albus does not have any serious pest and disease problems you need to worry about. - However, the plan does have some toxicity. - The leaves could irritate the skin when touched under the sun. - Contact with the foliage may lead to phytophotodermatitis. - The leaves have a strong bitter and unpalatable taste. - Even though they have a lemon-like scent, the plant is acrid when ingested. - In some cases, the consumption has caused a mild upset stomach. Dictamnus Albus Uses It also looks pretty lined up along borders in gardens and along walls. Besides garden uses, Dictamnus albus is also used to extract various constituents. Around 100 chemical compounds have been isolated from the plant, including phenylpropane, coumarins, flavonoids, alkaloids, and more. The volatile oils in the plant are also used in isoprene.
<urn:uuid:7dc41990-4fe3-4327-b7e5-4a9026cb2f74>
CC-MAIN-2020-34
https://plantcaretoday.com/dictamnus-albus.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738562.5/warc/CC-MAIN-20200809162458-20200809192458-00110.warc.gz
en
0.932132
1,222
3.0625
3
t. 607-334-5841 or 334-9972 In the late nineteenth century, a fungal blight was brought to the United States on a boat from Asia. This fungal blight was deadly to the American Chestnut population. For over a century, researchers have been working on a way to restore the American Chestnut. Researchers with The American Chestnut Research and Restoration Project at ESF, were able developed a blight resistant American Chestnut. See the details of this project on their website and in their video: www.esf.edu/chestnut/ Chenango County 4-H has joined the project by planting American Chestnut “mother trees.” Chenango County 4-H Educator, Richard Turrell, picked up the seeds from Allen Nichols, the president of the New York chapter of The American Chestnut Foundation. The project plans to place blight resistant saplings nearby these mother trees, so that the species will cross pollinate creating genetic diversity and a stronger American Chestnut population. Nine Chenango County 4-H families received germinated American Chestnut seeds and have planted them across Chenango County. The 4-H’ers received directions, soil, containers, and seeds, all they have to do now is start the seeds and plant them outside when they are ready! While ESF is waiting on government approval to plant these blight resistance seedlings, we are facing a future that suddenly could include a healthy American Chestnut population. Find out more about the project with these links:
<urn:uuid:140a6f90-c184-449f-b08c-0ee5bd43fd7b>
CC-MAIN-2020-24
http://ccechenango.org/resources/chenango-county-4-h-joins-the-american-chestnut-restoration
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406785.66/warc/CC-MAIN-20200529214634-20200530004634-00479.warc.gz
en
0.944546
314
3.09375
3
Happy Earth Day 2011 Find a Conversation |Thu, 04-21-2011 - 10:06pm| Will you and your child be doing anything special to celebrate Earth Day? Some facts about Earth Day: What is Earth Day? Earth Day was started in 1970 by a man named John Mc Connell from the United States. It was originally held on the annual celebration of the March Equinox and still is by many people. However, it is generally celebrated on April 22. Earth day is now celebrated worldwide. When is Earth Day and Earth Month? The UN designated April 22 Earthday and April earth month. What is the History of Earth Day? Earth Day is a very special day specifically designed for all of us to think about earth issues . It is not only a special day in the town where we live, but a day that the whole world participates in! Often there are celebrations, events or campaigns that concern us with earth matters. Some towns have Earth Day celebrations, and some people and groups participate in Earth Day projects such as: Planetpals: The World Recycles Project, Funding Factory Recycle exchange program or the
<urn:uuid:70313acc-bf30-4bd2-9a46-b2a340220e34>
CC-MAIN-2014-23
http://www.ivillage.com/forums/pregnancy-parenting/school-learning/elementary-school/coffee-break/happy-earth-day-2011?sort_order=DESC
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510263423.17/warc/CC-MAIN-20140728011743-00334-ip-10-146-231-18.ec2.internal.warc.gz
en
0.95502
239
3.078125
3
Meditation means to think, contemplate, ponder, devise and to become familiar with one’s self. It has the strong implication of training the mind to be familiar with states that are beneficial. Meditation often involves an internal effort to self-regulate the mind towards a specific purpose or as an end in itself. It is a practice that includes techniques designed to promote relaxation, build internal energy and develop compassion, love, patience, generosity and forgiveness. It may be done sitting, or in an active way and prayer beads or other ritual objects are commonly used in order to keep track of or remind the practitioner about some aspect of the training. Meditation is a conscious effort to change how the mind works. The Pali word for meditation is ‘bhavana’ which means ‘to make grow’ or ‘to develop’. The definition of meditation is the exercise of psychological discipline in order to transcend from the automatic, “thinking” mind into a deeper state of relaxation or consciousness. It has been practiced for centuries and varied meditative disciplines include a wide range of spiritual and psycho physical practices that emphasize different goals such as increasing focus, creativity or self-awareness, relaxation and tranquility. Buddhists pursue meditation as part of the path toward Enlightenment and Nirvana and Buddhist meditation techniques have become increasingly popular in the wider world, with many non-Buddhists taking them up for a variety of reasons. Meditation in Sri Lanka meditation is an ancient practice and is quite popular among modern Sri Lankans, too. There are many meditation centers located in various parts of the island and some of the centers are: Luxury sri lanka holidays and Sri Lanka Luxury Holidays from Absolute Lanka Tours. luxury holiday to Sri Lanka. Sri Lanka Luxury Holidays, Luxury Trips and Luxury Tours to Sri Lanka. luxury holiday to Sri Lanka, Luxury Tours to Sri Lanka, Luxury Trips to Sri Lanka. Enjoy the best travel experiences of lifetime, with our luxury holiday packages designed to provide a royal experience to the travelers.
<urn:uuid:8ab7907e-650c-48ba-9922-2f15c7dd4273>
CC-MAIN-2020-16
https://www.absolutelankatours.com/meditation-sri-lanka/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371806302.78/warc/CC-MAIN-20200407214925-20200408005425-00128.warc.gz
en
0.938906
424
2.5625
3
It looks like updated models are showing that anthropogenic climate change will be even more disastrous than previously predicted: Our planet’s climate may be more sensitive to increases in greenhouse gas than we realized, according to a new generation of global climate models being used for the next major assessment from the Intergovernmental Panel on Climate Change (IPCC). The findings—which run counter to a 40-year consensus—are a troubling sign that future warming and related impacts could be even worse than expected. One of the new models, the second version of the Community Earth System Model (CESM2) from the National Center for Atmospheric Research (NCAR), saw a 35% increase in its equilibrium climate sensitivity (ECS), the rise in global temperature one might expect as the atmosphere adjusts to an instantaneous doubling of atmospheric carbon dioxide. Instead of the model’s previous ECS of 4°C (7.2°F), the CESM2 now shows an ECS of 5.3°C (9.5°F). “It is imperative that the community work in a multi-model context to understand how plausible such a high ECS is,” said NCAR’s Andrew Gettelman and coauthors in a paper published last month in Geophysical Research Letters. They added: “What scares us is not that the CESM2 ECS is wrong…but that it might be right.” At least eight of the global-scale models used by IPCC are showing upward trends in climate sensitivity, according to climate researcher Joëlle Gergis, an IPCC lead author and a scientific advisor to Australia’s Climate Council. Gergis wrote about the disconcerting trends in an August column for the Australian website The Monthly. Researchers are now evaluating the models to see whether the higher ECS values are model artifacts or correctly depict a more dire prognosis. I would note that every time that researchers update their models as a result of real world data, the predictions get more and more dire. We are in for a huge world of hurt.
<urn:uuid:35cffd25-86de-4110-859c-45b6b97ec260>
CC-MAIN-2023-40
https://www.panix.com/~msaroff/40years/2019/08/08/we-are-unbelievably-screwed-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00146.warc.gz
en
0.916927
429
2.9375
3
|This article or section lacks a single coherent topic. (April 2013)| Appropriation in art is the use of pre-existing objects or images with little or no transformation applied to them. The use of appropriation has played a significant role in the history of the arts (literary, visual, musical and performing arts). In the visual arts, to appropriate means to properly adopt, borrow, recycle or sample aspects (or the entire form) of human-made visual culture. Notable in this respect are the Readymades of Marcel Duchamp. Inherent in our understanding of appropriation is the concept that the new work recontextualises whatever it borrows to create the new work. In most cases the original 'thing' remains accessible as the original, without change. Appropriation has been defined as "the taking over, into a work of art, of a real object or even an existing work of art." The Tate Gallery traces the practise back to Cubism and Dadaism, but continuing into 1940s Surrealism and 1950s Pop art. It returned to prominence in the 1980s with the Neo-Geo artists. |This section needs additional citations for verification. (October 2013)| In the early twentieth century Pablo Picasso and Georges Braque appropriated objects from a non-art context into their work. In 1912, Picasso pasted a piece of oil cloth onto the canvas. Subsequent compositions, such as Guitar, Newspaper, Glass and Bottle (1913) in which Picasso used newspaper clippings to create forms, became categorized as synthetic cubism. The two artists incorporated aspects of the "real world" into their canvases, opening up discussion of signification and artistic representation. Marcel Duchamp is credited with introducing the concept of the ready-made, in which “industrially produced utilitarian objects…achieve the status of art merely through the process of selection and presentation.” Duchamp explored this notion as early as 1913 when he mounted a stool with a bicycle wheel and again in 1915 when he purchased a snow shovel and humorously inscribed it “in advance of the broken arm, Marcel Duchamp.” In 1917, Duchamp formally submitted a readymade into the Society of Independent Artists exhibition under the pseudonym, R. Mutt. Entitled Fountain, it consisted of a porcelain urinal that was propped atop a pedestal and signed "R. Mutt 1917". The work posed a direct challenge to traditional perceptions of fine art, ownership, originality and plagiarism, and was subsequently rejected by the exhibition committee. Duchamp publicly defended Fountain, claiming “whether Mr.Mutt with his own hands made the fountain or not has no importance. He CHOSE it. He took an ordinary article of life, placed it so that its useful significance disappeared under the new title and point of view-- and created a new thought for that object.” The Dada movement (including Duchamp as an associate) continued with the appropriation of everyday objects. Dada works featured deliberate irrationality and the rejection of the prevailing standards of art. Kurt Schwitters, who produced art at the same time as the Dadaists, shows a similar sense of the bizarre in his "merz" works. He constructed these from found objects, and they took the form of large constructions that later generations would call installations. The Surrealists, coming after the Dada movement, also incorporated the use of 'found objects' such as Méret Oppenheim's Object (Luncheon in Fur) (1936). These objects took on new meaning when combined with other unlikely and unsettling objects. In 1938 Joseph Cornell produced what might be considered the first work of film appropriation in his randomly cut and reconstructed film 'Rose Hobart'. In the 1950s Robert Rauschenberg used what he dubbed "combines", literally combining readymade objects such as tires or beds, painting, silk-screens, collage, and photography. Similarly, Jasper Johns, working at the same time as Rauschenberg, incorporated found objects into his work. The Fluxus art movement also utilised appropriation: its members blended different artistic disciplines including visual art, music, and literature. Throughout the 1960s and 1970s they staged "action" events and produced sculptural works featuring unconventional materials. Along with artists such as Roy Lichtenstein and Claes Oldenburg, Andy Warhol appropriated images from commercial art and popular culture as well as the techniques of these industries. Often called "pop artists", they saw mass popular culture as the main vernacular culture, shared by all irrespective of education. These artists fully engaged with the ephemera produced from this mass-produced culture, embracing expendability and distancing themselves from the evidence of an artist's hand. In 1958 Bruce Conner produced the influential 'A Movie' in which he recombined existing film clips. In 1958 Raphael Montanez Ortiz produced "Cowboy and Indian Film', a seminal appropriation film work. In the late 1970s Dara Birnbaum was working with appropriation to produce feminist works of art. In 1978-79 she produced one of the first video appropriations. 'Technology, Transformation : Wonder Woman' utilised video clips from the Wonder Woman television series. The term appropriation art was in common use in the 1980s with artists such as Sherrie Levine, who addressed the act of appropriating itself as a theme in art. Levine often quotes entire works in her own work, for example photographing photographs of Walker Evans. Challenging ideas of originality, drawing attention to relations between power, gender and creativity, consumerism and commodity value, the social sources and uses of art, Levine plays with the theme of "almost same". Elaine Sturtevant (also known simply as Sturtevant), on the other hand, painted and exhibited perfect replicas of famous works. She replicated Andy Warhol's Flowers in 1965 at the Bianchini Gallery in New York. She trained to reproduce the artist's own technique — to the extent that when Warhol was repeatedly questioned on his technique, he once answered "I don't know. Ask Elaine." During the 1970s and 1980s Richard Prince re-photographed advertisements such as for Marlboro cigarettes or photo-journalism shots. His work takes anonymous and ubiquitous cigarette billboard advertising campaigns, elevates the status and focusses our gaze on the images. Appropriation artists comment on all aspects of culture and society. Joseph Kosuth appropriated images to engage with philosophy and epistemological theory. Other artists working with appropriation during this time with included Jeff Koons, Barbara Kruger, Greg Colson, and Malcolm Morley. In the 1990s artists continued to produce appropriation art, using it as a medium to address theories and social issues, rather than focussing on the works themselves. Damian Loeb used film and cinema to comment on themes of simulacrum and reality. Other high-profile artists working at this time included Christian Marclay, Deborah Kass, Damien Hirst[dubious ] and Genco Gulan. Appropriation art and copyright Despite the long and important history of appropriation, this artistic practice has recently resulted in contentious copyright issues which reflects more restrictive copyright legislation. The U.S. has been particularly litigious in this respect. A number of case-law examples have emerged that investigate the division between transformative works and derivative works. Many countries are following the U.S lead toward more restrictive copyright, which risks making this art practice difficult if not illegal. Andy Warhol faced a series of lawsuits from photographers whose work he appropriated and silk-screened. Patricia Caulfield, one such photographer, had taken a picture of flowers for a photography demonstration for a photography magazine. Warhol had covered the walls of Leo Castelli's New York gallery in 1964 with the silk-screened reproductions of Caulfield's photograph. After seeing a poster of their work in a bookstore, Caulfield claimed ownership of the image and while Warhol was the author of the successful silk screens, he settled out of court, giving Caulfield a royalty for future use of the image as well as two of the paintings. On the other hand, Warhol's famous Campbell's Soup Cans are generally held to be non-infringing, despite being clearly appropriated, because "the public was unlikely to see the painting as sponsored by the soup company or representing a competing product. Paintings and soup cans are not in themselves competing products", according to expert trademark lawyer Jerome Gilson. Jeff Koons has also confronted issues of copyright due to his appropriation work (see Rogers v. Koons). Photographer Art Rogers brought suit against Koons for copyright infringement in 1989. Koons' work, String of Puppies sculpturally reproduced Rogers' black and white photograph that had appeared on an airport greeting card that Koons had bought. Though he claimed fair use and parody in his defense, Koons lost the case, partially due to the tremendous success he had as an artist and the manner in which he was portrayed in the media. The parody argument also failed, as the appeals court drew a distinction between creating a parody of modern society in general and a parody directed at a specific work, finding parody of a specific work, especially of a very obscure one, too weak to justify the fair use of the original. In October 2006, Koons won one for "fair use." For a seven-painting commission for the Deutsche Guggenheim Berlin, Koons drew on part of a photograph taken by Andrea Blanch titled Silk Sandals by Gucci and published in the August 2000 issue of Allure magazine to illustrate an article on metallic makeup. Koons took the image of the legs and diamond sandals from that photo (omitting other background details) and used it in his painting Niagara, which also includes three other pairs of women's legs dangling surreally over a landscape of pies and cakes. In his court filing, Koons' lawyer, John Koegel, said that Niagara is "an entirely new artistic work... that comments on and celebrates society's appetites and indulgences, as reflected in and encouraged by a ubiquitous barrage of advertising and promotional images of food, entertainment, fashion and beauty." In his decision, Judge Louis L. Stanton of U.S. District Court found that Niagara was indeed a "transformative use" of Blanch's photograph. "The painting's use does not 'supersede' or duplicate the objective of the original", the judge wrote, "but uses it as raw material in a novel way to create new information, new aesthetics and new insights. Such use, whether successful or not artistically, is transformative." The detail of Blanch's photograph used by Koons is only marginally copyrightable. Blanch has no rights to the Gucci sandals, "perhaps the most striking element of the photograph", the judge wrote. And without the sandals, only a representation of a women's legs remains—and this was seen as "not sufficiently original to deserve much copyright protection." In 2000, Damien Hirst's sculpture Hymn (which Charles Saatchi had bought for a reported £1m) was exhibited in Ant Noises in the Saatchi Gallery. Hirst was sued for breach of copyright over this sculpture despite the fact that he transformed the subject. The subject was a 'Young Scientist Anatomy Set' belonging to his son Connor, 10,000 of which are sold a year by Hull (Emms) Toy Manufacturer. Hirst created a 20 foot, six ton enlargement of the Science Set figure, radically changing the perception of the object. Hirst paid an undisclosed sum to two charities, Children Nationwide and the Toy Trust in an out-of-court settlement. The charitable donation was less than Emms had hoped for. Hirst sold three more copies of his sculpture for similar amounts to the first. Appropriating a familiar object to make an art work can prevent the artist claiming copyright ownership. Jeff Koons threatened to sue a gallery under copyright, claiming that the gallery infringed his proprietary rights by selling bookends in the shape of balloon dogs. Koons abandoned that claim after the gallery filed a complaint for declaratory relief stating, "As virtually any clown can attest, no one owns the idea of making a balloon dog, and the shape created by twisting a balloon into a dog-like form is part of the public domain." In 2008, photojournalist Patrick Cariou sued artist Richard Prince, Gagosian Gallery and Rizzoli books for copyright infringement. Prince had appropriated 40 of Cariou's photos of Rastafarians from a book, creating a series of paintings known as “Canal Zone”. Prince variously altered the photos, painting objects, oversized hands, naked women and male torsos over the photographs, subsequently selling over $10 million worth of the works. In March 2011, a judge ruled in favor of Cariou, but Prince and Gargosian appealed on a number of points. Three judges for the U.S. Court of Appeals upheld the right to an appeal. Prince’s attorney argued that "Appropriation art is a well-recognized modern and postmodern art form that has challenged the way people think about art, challenged the way people think about objects, images, sounds, culture" On April 24, 2013, the appeals court largely overturned the original decision, deciding that the paintings had sufficiently transformed the original images and were therefore a permitted use. See Cariou v. Prince. Artists using appropriation The following are notable artists known for their use of pre-existing objects or images with little or no transformation applied to them: - Vikky Alexander - System D-128 - Ghada Amer - J. Tobias Anderson - Cory Arcangel - Martin Arnold - John Baldessari - Craig Baldwin - Gordon Bennett - Mike Bidlo - Pierre Bismuth - Georges Braque - Glenn Brown - Reginald Case - James Cauty - Jake and Dinos Chapman - Greg Colson - Felipe Jesus Consalvos - Joseph Cornell - Brian Dettmer - Mark Divo - Eric Doeringer - Marcel Duchamp - Marlene Dumas - Benjamin Edwards - Max Ernst - Shepard Fairey - Hans-Peter Feldman - Joy Garnett - General Idea - Kenneth Goldsmith - Leon Golub - Douglas Gordon - Genco Gulan - Hans Haacke - Marcus Harvey - Damien Hirst - Pierre Huyghe - Jasper Johns - Bill Jones - Deborah Kass - Ai Kijima - Karen Kilimnik - Jeff Koons - Joseph Kosuth - Barbara Kruger - Michael Landy - Matthieu Laurette - Louise Lawler - Lennie Lee - Nikki S. Lee - Sherrie Levine - Roy Lichtenstein - Damian Loeb - Robert Longo - Norm Magnusson - Miltos Manetas - Christian Marclay - John McHale - Aleksandra Mir - Joan Miró - Yasumasa Morimura - Malcolm Morley - Dominique Mulhem - Vik Muniz - Ted Noten - Claes Oldenburg - Meret Oppenheim - People Like Us - Tom Phillips - Pablo Picasso - Bern Porter - Rick Prelinger - Richard Prince - Robert Rauschenberg - Graham Rawle - Gerhard Richter - Thomas Ruff - David Salle - Peter Saville - Rob Scholte - Kurt Schwitters - Cindy Sherman - Cornelia Sollfrank - Nancy Spero - John Stezaker - Elaine Sturtevant - Luke Sullivan - Philip Taaffe - Fatimah Tuggar - Tyler Turkle - Luc Tuymans - Kelley Walker - Andy Warhol - Vivienne Westwood - Cultural appropriation - Appropriation (music) - Art intervention - Found object - Classificatory disputes about art - Conceptual art - Fair use - Scratch Video - Postmodern art - Chilvers, Ian & Glaves-Smith, John eds., Dictionary of Modern and Contemporary Art, Oxford: Oxford University Press, 2009. pp. 27-28 - Wilson, Simon; Lack, Jessica (2008), The Tate Guide to Modern Art Terms, London: Tate Publishing Ltd, pp. 20–21, ISBN 978-1-85437-750-0 - Elger, D. (2006). Dadaism. Koln: Taschen, pp. 80 - Evans, D (ed.).(2009). Appropriation: Documents of contemporary art. London and Cambridge: Whitechapel Gallery and the MIT Press, pp. 40 - Cabanne, P., and Snowdon, P. (1997). Duchamp & Co. Paris: Terrail, pp. 105 - Cabanne, P., and Snowdon, P. (1997). Duchamp & Co. Paris: Terrail, pp. 114 - Plant, S. (1992). The most radical gesture: The Situationist International in a postmodern age. London and New York: Routledge, pp.44 - Hans Ulrich Obrist, "Elaine Sturtevant obituary", The Guardian, Monday 19 May 2014, http://www.theguardian.com/artanddesign/2014/may/19/elaine-sturtevant - Graf, Marcus (October 6, 2013). "Self Portrait? by Genco Gülan". Visual Art Beat. - as quoted in Grant,Daniel, The Business of Being an Artist (New York: Allworth Press, 1996), p. 142 - Whiting, Sam (February 4, 2011). "Jeff Koons' balloon-dog claim ends with a whimper". The San Francisco Chronicle. - Corbett, Rachel; "A Win for Richard Prince in Copyright Case", Artnet Magazine, 2011 - Pollack, Barbara, "Copy Rights", ARTnews LLC, March 22, 2012. - RANDY KENNEDY (April 25, 2013). "Court Rules in Artist’s Favor". The New York Times. Retrieved 2013-04-26. - Brandon Taylor, Collage, Thames & Hudson Ltd, 2006, p. 221 - Margot Lovejoy, Digital Currents: Art in the Electronic Age Routledge 2004 - Michalis Pichler : Statements on Appropriation - Appropriation Art Coalition-Canada - Blanche v. Koons Decision (August 2005) - Koons Wins Landmark Copyright Lawsuit 1/2006 - Koons wins appeal (2006) - Fair Use Network - Creative Commons - Free Culture an international student movement - The New York Institute for the Humanities Comedies of Fair U$e conference (Archive.org) - Open Source Culture: Intellectual Property, Technology, and the Arts, Columbia Digital Media Center lecture series - Public Domain - Sherri Levine Interview - transordinator/edition Remixing conceptual artworks - (es) Juan Martín Prada (2001) La Apropiación Posmoderna: Arte, Práctica apropiacionista y Teoría de la Posmodernidad. Fundamentos. ISBN 978 84 2450 8814.
<urn:uuid:354c33a7-f012-4db0-a798-a1ffba6fa31f>
CC-MAIN-2014-35
http://en.wikipedia.org/wiki/Appropriation_(art)
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00274-ip-10-180-136-8.ec2.internal.warc.gz
en
0.923947
4,071
3.203125
3
More on this later... European Journal of Human Genetics (advance online publication) The scale and nature of Viking settlement in Ireland from Y-chromosome admixture analysis Brian McEvoy et al. The Vikings (or Norse) played a prominent role in Irish history but, despite this, their genetic legacy in Ireland, which may provide insights into the nature and scale of their immigration, is largely unexplored. Irish surnames, some of which are thought to have Norse roots, are paternally inherited in a similar manner to Y-chromosomes. The correspondence of Scandinavian patrilineal ancestry in a cohort of Irish men bearing surnames of putative Norse origin was examined using both slow mutating unique event polymorphisms and relatively rapidly changing short tandem repeat Y-chromosome markers. Irish and Scandinavian admixture proportions were explored for both systems using six different admixture estimators, allowing a parallel investigation of the impact of method and marker type in Y-chromosome admixture analysis. Admixture proportion estimates in the putative Norse surname group were highly consistent and detected little trace of Scandinavian ancestry. In addition, there is scant evidence of Scandinavian Y-chromosome introgression in a general Irish population sample. Although conclusions are largely dependent on the accurate identification of Norse surnames, the findings are consistent with a relatively small number of Norse settlers (and descendents) migrating to Ireland during the Viking period (ca. AD 800–1200) suggesting that Norse colonial settlements might have been largely composed of indigenous Irish. This observation adds to previous genetic studies that point to a flexible Viking settlement approach across North Atlantic Europe.
<urn:uuid:12fe3752-f9ed-4b95-8af0-99c25f01d274>
CC-MAIN-2014-35
http://dienekes.blogspot.com/2006/09/y-chromosomes-reveal-limited-viking.html?m=0
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500800168.29/warc/CC-MAIN-20140820021320-00059-ip-10-180-136-8.ec2.internal.warc.gz
en
0.932765
333
2.71875
3
The 13th Amendment Didn't Abolish Slavery? Historian Pete Daniel explains the thirteenth amendment and why it didn't actually abolish slavery. Problems Playing Video? Major funding for Slavery by Another Name is provided by the National Endowment for the Humanities, W.K. Kellogg Foundation, The Coca-Cola Company and the CPB/PBS Diversity and Innovation Fund. Additional funding is provided by Georgia-Pacific, KeyBank Foundation and Merck; and by the General Mills Foundation; the Omicron Member Boulé of Sigma Pi Phi Fraternity, Minneapolis; and Frances Wilkinson.
<urn:uuid:a5ff777a-bd32-467b-956f-f68419b8ef25>
CC-MAIN-2017-34
http://www.pbs.org/video/slavery-another-name-thirteenth-amendment-didnt-abolish-slavery/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.7/warc/CC-MAIN-20170822221214-20170823001214-00259.warc.gz
en
0.912103
128
2.65625
3
By Roel Nieuwenkamp, Chair of the OECD Working Party on Responsible Business Conduct (@nieuwenkamp_csr) This article was original published on the OECD Insights blog on March 11, 2016. The recent migrant crisis paired with shocking exposes of labour issues in global supply chains has heightened public attention to modern slavery, forced labour and human trafficking. Children working in cobalt mines for the Apple and Samsung supply chains, Syrian refugees working under terrible circumstances for garment supply chains in Turkey, Rohingya refuges working as slaves in the Thai fishing industry and North African migrants working in agriculture in Italy and Spain. The International Labour Organization estimates that 21 million people are victims of forced labour, of which 44% are migrants. In total, forced labor generates an estimated $150 billion in illegal profits every year. A recent ETI survey found 71% of companies suspect the presence of modern slavery in their supply chains. In response, a number of binding regulations regarding modern slavery in supply chains have been introduced. On an international level, the ILO has adopted the Forced Labor Protocol that requires States to take measures regarding forced labor. Domestically, the California Transparency in Supply Chains Act of 2010 is intended to ensure consumers are provided with information about the efforts to prevent and eradicate human trafficking and slavery from their supply chains. President Obama also launched a far reaching executive order to avoid human trafficking in federal contracts and passed a law allowing for stronger enforcement of the Tariff Act of 1930, which aims to block the import of products to the US produced using child labour. Currently two lawsuits related to slave labour in supply chains of Thai shrimp are pending against well-known multinationals in US federal courts. Likewise earlier this year the US Supreme Court declined to hear an appeal for the dismissal of a lawsuit alleging that three large multinational enterprises aided and abetted child slave labor on cocoa plantations in Africa. The recent UK Modern Slavery Act applies to all companies that do any part of their business in the UK if they have annual gross worldwide revenues of £36 million or more each year. These companies have to publish an annual slavery and human trafficking statement. The OECD Guidelines for Multinational Enterprises are referenced in the statutory guidance of the Act, noting that “whilst not specifically focused on modern slavery, they provide principles and standards for responsible business conduct in areas such as employment and industrial relations and human rights which may help organisations when seeking to respond to or prevent modern slavery.’’ The OECD Guidelines are recommendations to companies backed by 46 adhering governments and recommend that companies carry out supply chain due diligence to identify, prevent, mitigate and account for all adverse impacts that they cover, including child labour and forced labour. The OECD has developed more detailed guidance on how these expectations can be responded to in specific sectors. The OECD Due Diligence Guidance for Responsible Supply Chains of Minerals from Conflict-Affected and High-Risk Areas, the global standard on mineral supply chain responsibility, provides a 5 step framework for due diligence to manage risks in the minerals supply chain including forced and child labour in the context of artisanal mining. The FAO and OECD recently jointly developed a Due Diligence Guidance for Responsible Agricultural Supply Chains which also provides due diligence recommendations to manage risks related to forced labour and child labour in high risk agriculture sectors including palm oil and cocoa. Such approaches could be applied in the Thai shrimping industry as well. The OECD is also developing a Due Diligence Guidance on Responsible Garment and Footwear Supply Chains, which provides specific recommendations for addressing risks of forced and child labor. This Guidance will be launched later this year and will be relevant to migrant workers in textiles factories and cotton fields. Although the OECD Guidelines are a non-binding mechanism they are accompanied by a unique grievance mechanism, the National Contact Points (NCPs). NCPs in the 46 countries that adhere to the Guidelines facilitate dialogue and mediation with companies who allegedly do not observe their recommendations. Several issues regarding forced or child labor in supply chains have been brought to the NCP mechanism and some have resulted in successful outcomes. For example, in 2011 complaints were submitted to the NCP mechanism regarding sourcing of cotton from Uzbekistan cultivated using child labour. NCP mediation led to several agreements with companies involved in sourcing the products as well as heightened industry attention to this issue. In a follow up to the NCP processes several years later the European Center for Constitutional and Human Rights (ECCHR) concluded that the submission of the cases had encouraged traders to take steps to pressure the Uzbek government to end forced labour, although company commitment and media attention around the issue diminished over time. Nevertheless the report also noted that the NCP cases triggered investment banks to monitor forced labour issues in Uzbekistan in the context of their investments. Other NCP cases, while not resulting in agreements between the parties have led to statements determining that certain companies were not observing the recommendations of the OECD Guidelines in the context of forced labour impacts, resulting in reputational harm to those enterprises (e.g. see DEVCOT) . Currently the Swiss National Contact Point is overseeing mediation between the Building and Wood Worker’s International (WWI) and FIFA regarding forced labor issues in Qatar. The results will have important implications for global sporting events and for managing risks of forced labour in large scale infrastructure projects. Companies themselves have been proactive in addressing these issues. For example Nestlé, despite currently being subject to a lawsuit related to slave labour in its supply chain, participated in and released a report developed with the non-profit organization Verité which identified labour abuses in its supply chain with regard to Thai-sourced seafood. Within the report the company outlined plans to tackle the problem, and notes that other companies that do business in this sector likely face the same risks. Several MNEs also participate in the Shrimp Sustainable Supply Chain Task Force set up in 2014 by retailers such as Costco. This brings together manufacturers, retailers, governments and CSOs to conduct independent audits on Asian fishing vessels to ensure seafood supply chains are free from illegal and forced labour. The first round of audits is expected to be complete by July 2016. In February this year, H&M asked all of its suppliers to sign an agreement prohibiting the use of cotton from Turkmenistan and Syria, on pain of termination in order to avoid sourcing of cotton from ISIS controlled territories, produced through forced labour. H&M also terminated a sourcing relationship with a Turkish supplier after discovering a Syrian migrant child working in its factory, responding to documented abuses against Syrian refugees in the Turkish textile industry. Labour issues in global supply chains present a serious and pressing problem, therefore it is encouraging to see they are being taken seriously. In addition to regulatory approaches non-binding mechanisms such as the OECD Guidelines, accompanied by the NCP system, and industry initiatives have resulted in important progress and provide alternative models for managing forced labour risks throughout global supply chains. While litigating these issues can be a forceful tactic in bringing companies to account, non-judicial grievance mechanisms can provide a more affordable and more accessible platform for tackling forced labour issues. In the context of modern slavery, all stakeholders must step up their efforts. Governments should promote due diligence in global supply chains among their companies as outlined in the OECD Guidelines and its related industry-specific instruments. Civil society can continue to be instrumental in reporting upon and exposing these issues and furthermore should rely on the NCP platform for reaching resolutions on supply chain issues with MNEs. Finally, as the current migrant crisis will last many years, companies should conduct heightened due diligence to ensure that they are not linked to forced labour throughout their supply chains, particularly in contexts with large migrant populations.
<urn:uuid:8fc02bd6-0ca3-4f63-afd1-7bd57f70cd1d>
CC-MAIN-2017-43
https://friendsoftheoecdguidelines.wordpress.com/2016/03/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187827853.86/warc/CC-MAIN-20171024014937-20171024034937-00614.warc.gz
en
0.9518
1,567
2.796875
3
Ruby on Rails 6: Testing a Rails Application This course will teach you how to utilize the power of Ruby’s integrated testing libraries to locate and resolve errors and bugs with your Ruby-based web apps. What you'll learn Rails testing systems allows developers to thoroughly test web apps for bugs to ensure a quality user experience. In this course, Ruby on Rails 6: Testing a Rails Application, you’ll learn to locate and fix errors and bugs in the Ruby framework. First, you’ll explore how to set up a testing environment and a test database of demo data. Next, you’ll discover how to perform unit tests within Ruby. Finally, you’ll learn how to complete end-to-end tests to mimic user interaction. When you’re finished with this course, you’ll have the skills and knowledge of Ruby testing needed to produce and test quality Ruby apps.
<urn:uuid:42fac00e-ab0d-41a1-95b3-511357f14f48>
CC-MAIN-2023-40
https://www.pluralsight.com/courses/rails-application-testing
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00254.warc.gz
en
0.88414
189
2.59375
3
Monday, September 27, 2010 Information On What is Mesothelioma Mesothelioma is an uncommon form of cancer, usually associated with previous exposure to asbestos. Signs and symptoms of the disease include among other things, shortness of breath and rapid unexpected weight loss as in patients with Mesothelioma, nutrients in the blood stream cannot always be absorbed resulting in malnutrition and weight loss. Aside from Mesothelioma, these people can acquire asbestosis, a non-cancerous chronic lung sickness and other forms of cancer of the lungs, cancer of the larynx and kidney. There are treatments used to keep the patient comfortable, but there is currently no cure for mesothelioma. Erionite fibres were found in biopsies of lungs of the mesothelioma cancer afflicted people. The physicians empanelled by mesothelioma treatment support groups analyze each patient. A legal counseling along with aid from housing, utilities, transportation, accurate medical treatment, pharmaceutical supplies and services should be the prime motto of mesothelioma support. The compensation could be millions of dollars for victims of mesothelioma who have been exposed to asbestos. Because mesothelioma is caused by direct exposure to asbestos or asbestos dust, and nearly 30 million tons of asbestos was used in buildings of every description until the mid 1970's, it has kept Mesothelioma lawyers in high demand, as they pursue Mesothelioma settlements for the victims and their families. Approximately 2,000 to 3,000 new cases of mesothelioma are diagnosed each year in the United States alone. 'What is Mesothelioma', the website contains useful resources on Mesothelioma lawyers and attorneys, as well as causes by asbestos exposure, asbestos removal, asbestos attorneys and lawsuits, and asbestos cancer. Mesothelioma thus becomes a deadly disease when no remedial measures are taken to overcome it and when exposure to asbestos is not controlled. However it would take 10-40 years after the first exposure for the first symptoms of mesothelioma to become noticeable, which made it very difficult to diagnose. It is important to stress that once you start experiencing the symptoms of pericardial mesothelioma (shortness of breath, chest pains, coughing up blood, and palpitations) you should immediately seek specialized help. Mesothelioma can result from very small fibres or dust particles at low exposure levels. Generally, it is believed that sustained exposure to asbestos is more liable to give one mesothelioma. Due to the difficulty of diagnosing mesothelioma in its early stages, many mesothelioma treatments focus on improving the quality of life for patients. There are many variables in evaluating a mesothelioma case, so only the patients doctor can determine the best treatment and possible prognosis on an individual basis. Pericardial mesothelioma sufferers may experience chest pain, shortness of breath, persistent coughing and palpitations. Chemotherapy of mesothelioma is being improved regularly as research labs and pharmaceutical companies are discovering new and more effective drugs. Pleural mesothelioma: A type of lung cancer which attacks the pleura surrounding the lungs, this is the most common type of mesothelioma, affecting approximately two-thirds of all mesothelioma patients. Source: Free Articles
<urn:uuid:1ee4cd7f-284b-4a82-9da2-47ed0155714d>
CC-MAIN-2017-39
http://waliz-relationship.blogspot.com/2010/09/information-on-what-is-mesothelioma.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687447.54/warc/CC-MAIN-20170920194628-20170920214628-00106.warc.gz
en
0.946789
717
2.859375
3
‘Reformation Day’ Nope!’ ‘The Reformation’ is a misnomer if ever there were one, for in fact there was no ‘one’ Reformation any more than there was just one Reformer. ‘The Reformation’, when used by students and the general public, usually refers to the Reformation of Martin Luther which commenced at the end of October in the year of our Lord, 1517. Even then, though, Luther’s intent wasn’t as earth-shattering as later ages took it to be. For Luther, the placement of a series of theses in Latin on the Church Door at Wittenberg Castle was nothing more than an invitation to debate. In other words, Luther didn’t see his act as the commencement of a revolution; he saw it as an academic exercise. ‘The Reformation’ is, then, little more than a label derived from historical hindsight gazing mono-focularly at a series of events over a period of time across a… View original post 541 more words
<urn:uuid:fe9bf7e6-c684-4f8d-bf19-5eb1e92db4f7>
CC-MAIN-2017-30
https://tulsacoc.wordpress.com/2014/11/03/my-annual-reminder-today-is-luthers-reformation-day-not-reformation-day/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426169.17/warc/CC-MAIN-20170726142211-20170726162211-00529.warc.gz
en
0.971803
230
2.640625
3
Harry Goldstein’s assertion (Letters, 7 January) that the Palestinians were “offered [a state] in 1947 and refused, preferring to make war on Israel“, must be challenged. The Palestinians were told that 56% of their existing state of Palestine was to be taken away and made into a Jewish state, even though half of the population of the “Jewish” area was Arab. Since the Jews made it clear they wanted even more than the 56% and would take it by force, the Arab armies, far smaller in number and less well-armed than the Jews, moved up to the border of the Jewish state, in an attempt to protect the remaining territory they had been allocated, and stop Israel taking those areas by force. They failed either to stop the Jewish armies or to prevent them expelling Palestinian Arabs from a land in which they had once formed 90% of the population. – Karl Sabbagh Even by Guardian standards, this is an especially egregious distortion of historical reality. First, contrary to what Sabbagh implies, there was never an “existing state of Palestine”. Further, the suggestion that Jews were the belligerent party in 1947-48 represents a remarkable inversion, as it was the Jews (and not the Arabs) who accepted partition, despite the fact that it gave them only a small portion of the land previously promised to them. (Indeed, 77% of the landmass of the original Mandate for the Jews was excised in 1922 to create a fourth Arab state – today Jordan.) Arab leaders didn’t unleash their armies merely to adjust the borders, but were completely clear that their goal was the total annihilation of the nascent Jewish state. “I personally wish that the Jews do not drive us to this war, as this will be a war of extermination and momentous massacre which will be spoken of like the Tartar massacre or the Crusader wars”. – Azzam Pasha, Secretary-General of the Arab League, October 11, 1947 To Arab leaders in the months before and after partition, a Jewish state of any size was intolerable. Of course, Sabbagh’s historical distortions concerning Israel’s creation aren’t at all surprising when you consider that he wrote a blurb for one of the most antisemitic books to be published in several years. “Gilad Atzmon’s book, The Wandering Who? is as witty and thought-provoking as its title. But it is also an important book, presenting conclusions about Jews, Jewishness and Judaism which some will find shocking but which are essential to an understanding of Jewish identity politics and the role they play on the world stage.” Karl Sabbagh (You can see more about Atzmon’s extreme antisemitism here.) Finally, here’s a video of Sabbagh in a panel discussion about the book ‘The Wandering Who?’ heaping more effusive praise on Atzmon.
<urn:uuid:743a5111-6ae9-440d-b48b-60e841c06fd2>
CC-MAIN-2014-23
http://cifwatch.com/2014/01/12/guardian-publishes-letter-by-gilad-atzmon-ally-karl-sabbagh/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510266597.23/warc/CC-MAIN-20140728011746-00053-ip-10-146-231-18.ec2.internal.warc.gz
en
0.968498
620
2.609375
3
Protect your head – always wear a helmet Never ride a bicycle without a helmet. The National Highway Traffic Safety Administration (NHTSA) and the Consumer Product Safety Commission (CPSC) recommend that cyclists wear a helmet that complies with the CPSC standard. Select a helmet that fits snugly and sits flat on your head. Bicycle helmets can reduce head injuries by 85 percent. Make sure your bicycle is proper working order Before using your bicycle, ensure that all parts are secure and working well. The handlebars should be firmly in place and turn easily. Your wheels must be straight and secure and the brakes MUST be in proper operating condition. If you need to carry things, add a carrier to the back of your bicycle. Always check the brakes before riding. Always ride under control. If your bicycle has hand brakes, apply the rear brake before the front brake. Applying the front brake first can literally flip you over your handle bars. Always keep your brakes properly adjusted. If you cannot stop quickly, adjust your brakes. When adjusting brakes, keep the following in mind: When your hand brake levers are fully applied, they should not touch the handlebars. Each brake pad should wear evenly and never be separated more than one eighth inch from the rim. Ride slowly in wet weather and apply your brakes earlier – it takes more distance to stop. Motorists will have a harder time seeing you in the rain, so ride with extra care in inclement weather. Avoid biking at night If you must ride in the dark: Wear reflective clothing or accents – not just white or florescent – especially on your ankles, wrists, back, and helmet. Ride with reflectors that meet CPSC requirements. If a carrier is added, make sure the rear reflector remains visible. Add the brightest lights you can find to the front and rear of your bicycle. Only ride in areas familiar to you. Brightly lit streets are best. Always assume you are not seen by a driver. Young children should NEVER ride at night. Stay alert. Always keep a lookout for obstacles in your path. Watch out for potholes, cracks, expansion joints, gravel, wet leaves, drainage grates, or anything that could make you fall. Before going around any object, scan ahead and behind to make sure it’s safe to proceed. Always signal your intentions, and then do what you planned. If you are unsure, or lack the skill to handle an especially rough area, pull off to the right side of the road and walk your bicycle around the rough area. Be especially careful in wet weather. Cross all railroad tracks at a 90-degree angle and proceed slowly. Riding with traffic is the RIGHT way. Ride on the right side of the road in a straight, predictable path. Always ride single file in the same direction as other vehicles. Riding against traffic makes it difficult for motorists to see you, which makes it easier for them to accidentally pull across your path or into you. Teach children the rules of the road. Cyclists are responsible for following traffic laws and signals just like motorists. More than 70% of bicycle crashes occur at driveways or intersections. Before you enter any street or intersection look both ways for traffic and walk your bicycle into the street to begin your ride. Bicycle riders must yield to pedestrians. Never wear headphones while riding as they impair your ability to hear traffic. Bicycle Safety – FHWA Safety Florida Bicycle Association Florida Greenways and Trails Guide Hillsborough County Metropolitan Planning Organization League of American Bicyclists – How You Can Ride Better A tool cyclists can use to report, mark and share cycling incidents and trouble spots. Once shared, cyclists can use the information to plan safe routes to ride by avoiding potentially risky routes. The goal is to save cyclists’ lives and make cycling safer for everyone. This site’s value and benefit to the cycling world is dependent upon cyclists taking the time to report their cycling experiences: close calls, collisions, deaths, pot holes, harassment, doorings, etc.
<urn:uuid:0ebefd17-5469-4abe-a717-733149076c6b>
CC-MAIN-2014-23
http://www.tampabaycycle.com/resources/bicycle-safety/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997904391.23/warc/CC-MAIN-20140722025824-00102-ip-10-33-131-23.ec2.internal.warc.gz
en
0.926857
854
3.5625
4
Although much of the world is running on digital technology, we’re still largely dependent on paper. In fact, the world produced up to 411 million metric tons of paper and cardboard in 2016 alone. This may not come as a surprise considering the benefits of using paper notebooks compared to a standard laptop. But sometimes the average notebook isn’t enough for those in engineering and the biomedical fields. Here are a few reasons why your average paper notebook may not be working for you and why engineering notebooks and laboratory notebooks may be the better option. Regular notebooks don’t have the layout you’re looking for One of the tops reasons why regular notebooks may not be working for you is because they don’t have the layout you need. Graph notebooks are more generalized so they can be used by students and workers in many different fields including graphic design and architecture. But because graph notebooks are generalized, you need to draw out separate areas on the page to include information such as the date, project number, and researchers included in the project. That isn’t the case with science notebooks. Science notebooks have a layout specifically designed with engineers, biomedical workers, and other science workers and students in mind. Science notebooks include the grid layout you need, but with the signature block included at the bottom for greater project control. Regular notebooks fall apart easily You remember from High School days when you would put all your notebooks into your bookbag. Over time, your pages of notes would start to pull away from the spiral binding and you’d be left with loose-leaf pages you’d need to put in a folder. As a science student, this can be a major issue. The last thing you want to do is lose important data or get your pages mixed up. You don’t need to worry about that with laboratory notebooks. Laboratory notebooks are designed with a soft black cover and smooth binding to keep everything in place and all your data safely secure. Looking for engineering notebooks and other archival materials? Paper notebooks are great because it’s impossible for data to get deleted and you don’t have to worry about your laptop’s battery dying when you’re trying to access information. However, a standard notebook doesn’t work for everybody. If you’re looking for engineering notebooks, student lab notebooks, or research notebooks that have the layout and format you need for your classes or work, Scientific Notebook Company has what you need. To learn more about our engineering notebooks and other archival materials, contact Scientific Notebook Company today.
<urn:uuid:a44dd21c-e1ca-47ee-84f4-8f9f756e7806>
CC-MAIN-2020-10
https://snco.com/why-arent-regular-spiral-notebooks-working-for-me/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141460.64/warc/CC-MAIN-20200217000519-20200217030519-00340.warc.gz
en
0.941318
534
2.734375
3
Protect Children From the Sun's Harmful UV Rays Written by Dr. Jay Heitsman, Pediatrician Just a few serious sunburns can increase your child's risk of skin cancer later in life. Kids don't have to be at the pool, beach, or on vacation to get too much sun. Their skin needs protection from the sun's harmful ultraviolet (UV) rays whenever they're outdoors. UV rays are strongest and most harmful during midday, so it's best to plan indoor activities then. If this is not possible, seek shade under a tree, an umbrella, or a pop-up tent. Although a long-sleeved shirt and long pants with a tight weave are best, they aren't always practical and be sure to double up on protection by applying sunscreen or keeping your child in the shade when possible. Get a hat. Hats that shade the face, scalp, ears, and neck are easy to use and give great protection. Baseball caps are popular among kids, but they don't protect their ears and neck. If your child chooses a cap, be sure to protect exposed areas with sunscreen. They protect your child's eyes from UV rays, which can lead to cataracts later in life. Look for sunglasses that wrap around and block as close to 100% of both UVA and UVB rays as possible. Use sunscreen with at least SPF 15 and UVA and UVB protection every time your child goes outside. For the best protection, apply sunscreen generously 30 minutes before going outdoors. Don't forget to protect ears, noses, lips, and the tops of feet. Take sunscreen with you to reapply during the day, especially after your child swims or exercises. This applies to waterproof and water-resistant products as well. Follow the directions on the package for using a sunscreen product on babies less than 6 months old. All products do not have the same ingredients; if your or your child's skin reacts badly to one product, try another one or call a doctor. Your baby's best defense against sunburn is avoiding the sun or staying in the shade. Keep in mind, sunscreen is not meant to allow kids to spend more time in the sun than they would otherwise. Try combining sunscreen with other options to prevent UV damage. Unprotected skin can be damaged by the sun's UV rays in as little as 15 minutes. Yet it can take up to 12 hours for skin to show the full effect of sun exposure. So, if your child's skin looks "a little pink" today, it may be burned tomorrow morning. To prevent further burning, get your child out of the sun. There's no other way to say it—tanned skin is damaged skin. Any change in the color of your child's skin after time outside—whether sunburn or suntan—indicates damage from UV rays. Cool and cloudy? Children still need protection. UV rays, not the temperature, do the damage. Clouds do not block UV rays, they filter them—and sometimes only slightly. Dr. Jay Heitsman at the Medical Arts Clinic in Fairfield. To make an appointment call 641-472-4156. Source: Center for Disease Control
<urn:uuid:106b3d47-63e6-4d25-b887-84e41a9acafc>
CC-MAIN-2020-05
https://www.jeffersoncountyhealthcenter.org/about/news/protecting-children-from-sun-by-pediatrician-jay-heitsman
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594101.10/warc/CC-MAIN-20200119010920-20200119034920-00075.warc.gz
en
0.933784
661
3.25
3
Species: Polar bear (Ursus maritimus) Sex: The Detroit Zoo’s Arctic Ring of Life is home to four polar bears, two males and two females, in two different groups, with one male and one female in each group. Nuka and Talini, both age 7, are a breeding pair. Aquila (uh KEE la), 19, and Talini’s mother Bärle (BEAR la), 27, are the other pair. Bärle is one of the bears that was rescued from the Suarez Circus in 2002. Home: Arctic ice sheets in Alaska, Canada, Russia, Greenland, and Norway. At the Detroit Zoo, the bears live in the Arctic Ring of Life, a four-acre environment that includes grassy tundra, a freshwater pool, a “pack ice” area, and a 170,000 gallon salt water pool. The habitat is the largest polar bear exhibit in North America. Visitors traveling through the Polar Passage tunnel can observe polar bears and seals swimming. Average life span in wild: 25-30 years Height: 7-8 feet Weight: 900-1,600 pounds Birth: Females give birth in winter, usually to twins that weigh about a pound each. Cubs live with their mothers for over two years as they learn the skills they will need to survive. Males offer no rearing assistance and may even kill cubs. Protection status: Threatened. Loss of sea ice due to global warming is a major threat. Others are poaching and pollution. Now you know: Polar bears have a thick coat of translucent hollow fur, a layer of fat, and black skin (to absorb sunlight), which all help them to keep warm. Their paws have fur, even on the bottom, and their front paws are slightly webbed, making them strong swimmers. Polar bears, which evolved from brown bears, also have small ears to minimize heat loss, and short claws so they don’t get caught in the ice. “They are really uniquely adapted to living in cold temperatures,” said Betsie Meister, Detroit Zoo assistant curator of mammals. “Everybody loves to come see the polar bears. The Arctic Ring also has seals and Arctic fox.” Pickers: Polar bears can acquire a taste for garbage, which can make them a dangerous nuisance to humans. Zoo information: 248-541-5717, www.detroitzoo.org. — Joe Ballor, Journal Register News Editor’s note: Animals of the Zoo is a weekly series. Last week: Baby chimpanzee. Next week: Red kangaroos and their joeys.
<urn:uuid:6a5f50d9-d0a7-4568-a66c-24228b7ce7e0>
CC-MAIN-2017-30
http://www.macombdaily.com/article/20120628/LIFE01/120629508/size=2%20style=
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436316.91/warc/CC-MAIN-20170728002503-20170728022503-00450.warc.gz
en
0.933614
561
3.109375
3
Before radio was introduced on to ships, on leaving port a sailing ship or vessel had no further communication until it reached its destination. One system available to ships was sending messages by flags when they passed land. Radio was installed on ships mainly for commercial reasons to keep in contact with the owners and merchants for reasons such as, changing the ship’s destination for delivering cargo, picking up alternative or better cargo. This quickly changed with the sinking of vessels, especially the sinking of RMS Titanic. The radio room focus changed from a commercial use, to becoming increasingly about safety of life at sea. Before Titanic hit the iceberg, the radio officers were preoccupied sending out telegrams for wealthy passengers. A nearby ship was told by the radio officers to keep the airwaves clear as they were very busy. On hitting the iceberg, RMS Titanic attempted to communicate with this ship but by then it had unfortunately shut down its radio station and kept off the airwaves. These incidents along with the RMS Lusitania torpedoed by a German U-boat in World War I, brought attention to the importance of the radio room. New rules and regulations around radio rooms, radio officers and the watch system became International Law. The radio officer was normally last off the ship with the captain as they transmitted the SOS until the very last. Huge loss of life was evident among radio officers during World War I and an even greater number during World War II. Radio officer, Arthur Jeffries, lost his life on RMS Leinster, on October 1918, transmitting SOS. Being from the parish of Dun Laoghaire, his memorial is in the church, now the Museum, on the wall on the side of the altar. The Germans were the first to use the Morse code, SOS. At the time there was ongoing disagreement with some countries still using the code C and Q, CQ meaning to listen. Marconi introduced CQD, D for distress. When tragedy struck, radio officers on board Titanic sent out distress signals first using the old Marconi system CQD which had been superseded by SOS. However, they did change to SOS and this may have caused confusion to other stations. In the early 20th century, the British company Marconi, was a dominant competitor in ship communication. As radio communication became mandatory on sea-going vessels, various companies such as Telefunken also competed to supply equipment and radio officers. Visit the Radio Room in the Museum and learn how maritime clocks are essential for safety at sea and how John Harrison’s invention of the marine chronometer from 1735 onwards allowed ships to determine their longitude at sea.
<urn:uuid:9ef41e2e-d174-4d33-896a-46286a31d771>
CC-MAIN-2023-40
https://www.mariner.ie/Exhibition/radio-room/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00768.warc.gz
en
0.978964
548
4.03125
4
The Supreme Court decision of 1857 in Dred Scott v. Sandford added to the controversy. Chief JusticeRoger B. Taney's decision said that slaves were "so far inferior that they had no rights which the white man was bound to respect", and that slaves could be taken to free states and territories. Declaration of Causes for Secession said that the non-slave-holding states were "proclaiming the debasing doctrine of equality of all men, irrespective of race or color", and that the African race "were rightfully held and regarded as an inferior and dependent race".
<urn:uuid:3e183533-8eb0-483d-9542-e3b89f00a88e>
CC-MAIN-2017-39
http://www.civil-war-journeys.org/American%20Civil%20War%20Overview_files/slide0173.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689779.81/warc/CC-MAIN-20170923213057-20170923233057-00178.warc.gz
en
0.962922
128
3.546875
4
11 August 1908 Young revolutionary Khudiram Bose was hanged. On 11 August 1908, one of India’s youngest revolutionary freedom fighters, Khudiram Bose was hanged by the British government. He was only 18 years old. - Born in Midnapore District, Bengal Presidency in 1889, Khudiram Bose was raised by his elder sister after his parents died when he was only 6. - Even as a school student, Khudiram was attracted to the freedom movement. - He was inspired by Aurobindo and Sister Nivedita (Swami Vivekananda’s disciple) when they held public lectures in his district in 1902 and 1903 respectively. The spirit of revolution had been ignited in him. - At the tender age of 16, he had placed bombs near police stations and targeted government officials. - He is reported to have said of the British domination of India, “Can there be a disease worse than slavery?” The Muzaffarpur Bombing - Khudiram Bose, along with Prafulla Chaki decided to murder the Magistrate of Muzaffarpur, Bihar named Kingsford. Kingsford was very unpopular as he was known to pronounce harsh sentences even for mild offences. - Khudiram prepared for the bombing by observing the routine of the Magistrate and noting his court and club timings. - On 30th April, 1908, Khudiram was waiting for Kingsford’s carriage outside the European Club. - On seeing the carriage, he was quick to act and threw the bomb at it. It blew up killing the passengers. - Unfortunately, the carriage was not occupied by Kingsford but by the wife and daughter of a barrister named Pringle Kennedy. - Khudiram and Prafulla Chaki escaped separately. - Khudiram walked on for 25 miles before reaching the Vaini Station (now renamed Khudiram Bose Pusa Station). At a tea stall, he was seen by two constables. News of the bombing had reached everywhere and the police were given a lookout notice for the two bombers. - Khudiram was caught and overpowered by the constables. - Prafulla Chaki, who had also escaped, was trapped by the police. He shot himself before the police could catch him. - Khudiram’s trial began on 21 May 1908. - Even though the defence lawyers tried their best to acquire a lighter sentence for Khudiram, the British judge awarded him death. The lawyers had argued that there were others who could be plotting attacks and also asked the court to consider the defendant’s young age. - The sentence was carried out on 11 August. - The whole of Calcutta erupted in protest against Khudiram’s hanging. - After the boy-martyr’s body was released from jail, the funeral procession was witnessed by thousands who had thronged the streets with flowers and garlands. - The Amrit Bazaar Patrika, a leading newspaper then, carried the headline, ‘Khudiram’s End: Died cheerful and smiling’. - Although he is one of India’s youngest and earliest revolutionary leaders to have sacrificed his life for the cause of freedom, Khudiram Bose is relatively less known to people today. Also on This Day 1956: Lok Sabha passed the States Reorganisation Act. 1961: Dadra & Nagar Haveli given Union Territory status. 2000: Famous Gandhian Usha Mehta passed away. See previous ‘This Day in History’ here. Also read the biographies of:
<urn:uuid:b5079356-fb35-4731-a0b8-6ba2911c1de3>
CC-MAIN-2020-05
https://byjus.com/free-ias-prep/this-day-in-history-aug11/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614880.58/warc/CC-MAIN-20200124011048-20200124040048-00231.warc.gz
en
0.983038
785
2.953125
3
Brigid is the simpler Irish version of the name of the goddess of fire, which may also be spelled Brighid. Other variations include Bridget, the most usual spelling in the U.S., and the French Brigitte. The most famous female saint of Ireland is the fifth century Brigid, who was abbess of Kildare and is the patron saint of scholars. Because of her sanctity, her name did not come into common use in Ireland until the eighteenth century, after which it became wildly popular, eventually used as a generic name for an Irishwoman. According to Irish myth, there were three sister goddesses named Brigid: the goddess of poetry, the goddess of healing, and the goddess of agriculture. The ancient Brigid may not be exactly stylish but it's beautiful and strong, a true Irish classic. Nicknames include Bridie, Bidelia, Biddy, and Breda. In literature (and film), Brigid is the devious character in The Maltese Falcon.
<urn:uuid:06f80781-607c-4802-83dc-958f9b6629c9>
CC-MAIN-2017-43
https://nameberry.com/babyname/Brigid
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825900.44/warc/CC-MAIN-20171023111450-20171023131450-00730.warc.gz
en
0.966431
212
2.75
3
The study and science of climate change dates back as far as the late 1800s, but major developments did not occur until the 1950s when scientists discovered that carbon emissions were not immediately absorbed by the ocean. In the later portion of the decade, scientists began to argue that carbon emissions from anthropogenic sources could become a problem in the future and severely impact climate. Climate change science progressed rapidly in the 1970s. It was during this time that scientists used past and new research from the 1950s and 1960s to develop a strong prediction for future global warming due to an increase in atmospheric CO2. Charles Keeling collected carbon samples throughout the later portion of the 1950s and concluded that atmospheric carbon emissions were increasing by establishing the now-famous and recognizable “Keeling Curve.” Throughout the 1970s, more and more scientists began to support the global warming instead of global cooling. A general consensus concluded that more research needed to be conducted in order to put more support behind the concept of global warming or global cooling. Recent cooling trends began to taper off by the early 1980s. In the later portion of the 1980s, Dr. James Hansen, a famous climate scientist, began to make some of the first initial analyses regarding anthropogenic climate change and eventually concluded that global climate was already significantly impacted. In order to address global climate change, the Intergovernmental Panel on Climate Change (IPCC) was established with the mission to collect ongoing climate change research, including model projections. Today the IPCC has an important role in providing collective information to almost all climate change debates, including governmental decisions (Knight, 2008). Although the science behind climate change has been very sound for several decades, U.S. government acknowledgment and action has been laggard. Global warming was acknowledged during the Nixon administration. President Nixon established the Environmental Protection Agency (EPA) in December of 1970. While the creation of the EPA marked an important event in environmental awareness and action, much of the agency’s focus then and now is more so to address air, water, and other pollution issues. Although the EPA does recognize climate change, most of their initiatives are in the form of partnerships and programs as opposed to actual laws. While government response to global warming has been drawn-out over the decades, an important opportunity presented itself to the U.S. and other developed countries in 1998. The Kyoto Protocol created a legally binding international agreement between all ratifying parties. Specifically, the agreed target was an average reduction of 5.2% of greenhouse gas emissions from 1990 levels by 2012. In 2005, the agreements outlined in the Kyoto Protocol became binding. Even though the U.S. signed the Kyoto Protocol ceremoniously, it was never ratified by either the Clinton or Bush administrations (Weart, 2007). The impacts of climate change are being felt all over the world and with the temperature projects for the next decade, there are serious global effects that could follow. With even a few degrees of warming increased evaporation occurs, specifically targeting freshwater sources in areas where supplies are already limited, including coastal towns and agricultural regions. Average temperature increase has also negatively impacted air quality in many major cities. Sea level is also rising due to the expanding of ocean water and the melting of land-based ice. The rise of sea level threatens low-lying coastal cities and ecosystems. Increasing temperature is expected to impact key crops. Warming can alter growing seasons and cause issues in areas where crop production is already limited by heat in the summer. Finally, global warming has impacted weather severity. Periods of droughts and downpours are now more common and are increasing in intensity as well (EPA). As temperatures are projected to keep increasing, consequences are likely to follow. Sea level is predicted to continue rising to dangerous levels in numerous parts of the world. Native species could be easily wiped out from changes in seasons and the introduction and thriving of pests, disease, and invasive species. Whole ecosystems could become obsolete, especially already-fragile prairies and wetlands. Declines in freshwater sources could be extremely detrimental to local and regional economies. Over all, increases in average temperatures are impacting the environment and with the projected temperature rise over the next few decades only predict more issues on a local, regional, and global scale (U.S. Global Change Research Program). Climate Change- Health and Environmental Impacts. (2010 July 16). Retrieved from Knight, M. (2008 March 31). A timeline of climate change science. CNN. United States Global Change Research Program: Global Climate Change (n.d.) Retrieve from http:/www.globalchange.gov/publications/reports/ Weart, S. (2007 January 31). A History of Climate Change Science. Retrieved from
<urn:uuid:93f5e46e-68c2-4f82-89c0-708b4622435d>
CC-MAIN-2017-26
https://bogbit.com/a-look-inside-global-warming-the-history-of-climate-science-and-the-impacts-we-could-face/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00601.warc.gz
en
0.95519
961
3.765625
4
What is yoga? Most of us, when we hear yoga, think of physical postures and movement, exercise if you will. However, asana (physical postures) is one of the eight limbs of yoga. Yoga is a system, a science, a lifestyle. Practice and application of yogic principles lead us to freedom, liberation, and happiness. This is why Yoga and Ayurveda can be a great support to traditional or western therapies. Yoga and Ayurveda are very much steeped in Philosophy and psychology. Yoga and Ayurveda allow us to balance our life physically, mentally, emotionally, and spiritually. The Eight Limbs of Yoga These are the external ethical practices, There are five (ahimsa) non-violence, (Satya) truth, (asteya) not taking from others, (brahmacharya) non-excess, and (aparigraha) non-hoarding. These are like a personal GPS they tell us if we are going in the wrong direction and that we need to make a u-turn. Each one has tools we can practice and use with ourselves and others to help balance and support a happy life. These are internal ethical practices they go a little deeper and are tools we can use every day to cultivate happiness and self-confidence. Five niyamas (saucha) purity, (santosha) contentment, (tapas) self-discipline, (svadhyaya) self-study and (ishvara pranidhana) self-surrender, surrendering to a higher power. Moving inward, this is where we start to really begin to reveal our true nature and observe and change non-serving habits. This is our physical practice, the poses. When you drive to your local studio unroll your mat and practice with the community (sangha). Many poses are beneficial when treating ailments from belly aches to deep-seated trauma. This is the regulation of breath, through many different breathing exercises that calm the nervous system. Working with the prana vayus and breathing exercises help to support healing. Regulation of the breath can cool you down, warm you up, wake you up, help you fall asleep, calm the mind, and everything in between. Sense withdrawal, blocking out the external world. This is where we begin to focus on one single thing while the world is going crazy around us. Like being able to meditate staying calm and focused in the middle of Wegmans on a busy Saturday morning. Detaching from sensory experiences. Concentration, this is where we begin to keep our attention on a single place, breath, mantra, flame, image, etc. The mind can still wander here so we bring is back to that single place This is the meditative state, attention is so focused that outside noise and activity does not interfere with our concentration. The mind becomes clearer and interrupting thoughts and emotions fall away. "The quieter you become, the more you can hear" Baba Ram Dass. Yoga is defined as mastering the roaming tendencies of the mind, Yoga Sutra 1.2. Samadhi is the ultimate goal, the final frontier, this is where we are so completely focused that our own sense of individuality vanishes (yeah, sit with that for a while). Non-attachment (vairagya) Mental - Emotional Afflictions Emotions or instincts that rise when our buttons are pushed, causing negative reactions are kleshas; all kleshas are fear-based. Kleshas cause us to suffer by producing negative thoughts and emotions. Three practices that can weaken these afflictions over time are (Tapas) self-discipline, practices causing positive change, (svadhyaya) self-study, self-observation, (Ishvara pranidhana) self-surrender, and humility with faith. As long as we are in the grip of the kleshas, we will inevitably experience one or more of the nine obsticals: disease, mental inertia, doubt, carelessness, sloth, inability to withdraw from sense cravings [addiction], clinging to misunderstanding, inability to reach samadhi, inability to retain samadhi. The Five Kleshas Avidya - lack of awareness (ignorance). Avidya shows up in many areas of our life, relationships, our "stories", our prejudices, our desires, and fears. Avydia is when we mistake the impermanent for the permanent, impure for the pure, sorrow for happiness, and the not-self for the true self. Asmita - Distorted sense of self (egoism). "I AM"ness, having a distorted image of ourselves that does not match reality. It causes us to believe that our being is limited by things like our name, occupation, likes, and dislikes. Raga - Clinging to past pleasure (attachment) When we have a pleasurable experience it is natural to want (desire) that experience again. You have formed an attachment to that experience. If the desire cannot be fulfilled, causing us pain or discomfort, then raga has manifested in us. This suffering (duhka) is happening because we are attached to a previously experienced pleasure. Ever go to your favorite restaurant and order your favorite meal only to find they changed the recipe. Dvesa - Clinging to past suffering (aversion). When we experience pain or discomfort from an experience, we often avoid that situation, so it doesn't happen again. You walk into a bar/restaurant, and you see your ex (it didn't end well, for you.....); you do everything in your power to avoid that person, most likely leaving and never getting your favorite meal (they changed the recipe back). Abhinivesa - Fear of death (loss). We naturally don't like change, especially when we don't know what's next. We experience pain and suffering when we realize that we lack the ability to control life. You are on a rough flight; chances are you are scared, freaking out, and suffering but really what can you do? At that point, you have no control over your fate. Avidya is fear born of ignorance, and Asmita is the fear the ego has of losing decision-making power or things it has become attached to. Raga erupts when we are afraid we will not experience a certain pleasure again, dvesha manifests from being afraid we will endure a painful event again. Abhinivesa is the deepest fear of death. By understanding and working with the kleshas in our own lives, we can begin to understand our habit patterns and use the tools we have from our yoga practice to change them. We can end the cycle of "I always do that" "Why is every relationship like this?", "The world is against me", Nobody understands me"....... Prana is the energy that coordinates our senses, our vital life force, prana provides the means to make the body move and the mind think. Prana divides itself into five prana vayus, these five vayus govern different areas of the body and different physical and subtle activities. When working harmoniously, they promote proper health and vitality of the body and mind, allowing us to live life with meaning and purpose. Prana Vayu (little p) Is situated in the head at the eyebrow center. It is forward momentum, governs intake, and inspiration. The flow of prana is inward and upward. Its energy pervades in the chest region, this is the fundamental energy that directs and feeds the other four vayus. It is situated in the pelvic floor its energy pervades the lower abdomen and governs elimination. Movement is downward and outward. Nourishes the organs of digestion, reproduction and elimination. It is situated in the heart and lungs it flows throughout the entire body, it governs circulation on all levels. This vayu moves from the center of the body out to the periphery and around. It is situated in the throat and has a circular flow around the neck and head. It governs growth, speech, expression, and upward movement. This vayu promotes mental clarity. It is situated in the abdomen, the energy is centered in the navel. It governs assimilation (physical and mental), discernment, and consolidation. It moves from the periphery of the body to the center. Prana moves through the body via Nadis (channels, streams) every human has seventy-two thousand Nadis. There are seven sites in the body where all seventy-two thousand nadis intersect, those seven sites create a wheel of energy that make up the seven Chakras. Chakras don't "open" or "close" per se, the nadis (channels) get blocked not allowing the energy to flow through which creates an imbalance at that site. This chakra governs safety, survival, grounding, and the right to live. Family, community, instinct are the key players here. Lack of trust, being overly dependent, and indecisive are signs of a blockage in this chakra. This chakra governs emotions, creativity, and sexuality. Relationships, sensuality, movement, and flow are key players. Diminished sensuality, no motivation, and no connection to the world are signs of blockage in this chakra. This chakra governs will, social self, and power. Transformation, self-esteem, and determination are the key players here. Lack of energy, insomnia, and eating disorders. A weakness here will hinder the development of all other chakras. This chakra governs compassion, love, and integration. Healing, nurturing, devotion, and forgiveness are key players here. Loneliness, inappropriate behavior, and a hard time sharing thought and feelings are signs of blockage in this chakra. This chakra governs personal truth and expression. Speaking one's truth, authenticity, harmony, and integration are key players here. Hard time expressing oneself, difficulty finding the right words, fear of asserting, or maintaining controversial opinions are signs of blockage in this chakra. This chakra governs perception and intuition. Wisdom, imagination, self-realization, concentration, and focus are key players here. Lack of concentration, ADD, diminished clear thought and insight are signs of blockage in this chakra. This chakra governs transcendence, wisdom, and universality. Clarity, purity, simplicity, and spirituality are key players here. No such thing as a blocked chakra here but a weakly developed crown can lead to feelings of being trapped in the material world and having a sense of emptiness. Feeling that something is missing. The Yoga Sutras of Patanjali The Yoga Sutras are made up of 196 sutras compiled by Patanjali before 400 CE. The sutras fell into obscurity for almost 700 years between the 12th and 19th centuries and came back in the 19th century. The sutras are a guideline for your yoga practice, and how to practice. And by practice we don't mean nailing the perfect handstand; you won't find that information here. The first sutra (1.1) Now the teaching of yoga - Atha yoga anushasanam. Sutra 1.2 Yoga is mastering the roaming tendencies of the mind - Yogas-citta-vrtti-nirodhah. Sutra 1.33 cultivating attitudes of friendliness toward the happy, compassion for the unhappy, delight in the virtuous, and indifference toward the unvirtuous, the mind retains its undisturbed calmness - maitri karuna muditopeksanam sukha duhkha punyapunya visayanam bhavanatas citta prasadanam. Samadhi Pada One Samadhi is the blissful state where the yogi is absorbed into the one. Techniques the yogi must learn to dive into the depths of the mind are outlined here. Sadhana Pada Two Sadhana means practice or discipline here Patanjali outlines two forms of yoga; Kriya (action yoga) and Ashtanga (eightfold path) Vibhuti Pada Three Vibhuti is translated as power or manifestation. Yogi superpowers (if you will) are acquired by the practice of yoga. The temptation of these powers should be avoided, and the attention should be fixed only on liberation. Kaivalya Pada Four Kaivalya means isolation but is used in the sutras it means liberation and is used interchangeably with Moksha, which is the goal of yoga; liberation. This pada describes the process of liberation and the reality of the transcendental ego. The Bhagavad Gita The song of God The Bhagavad Gita is part of the Indian epic The Mahabhrata book six. The Gita introduces us to karma yoga, jnana yoga, bhakti yoga, and transcendental knowledge. It is the book that teaches us non-attachment. The Gita is comprised of eighteen chapters and is a well-known Hindu text, and is a dialogue between the Pandava prince Arjuna and his guide and charioteer Krishna. Arjuna is fighting on the side of dharma against Adharma (good vs. evil) but becomes despondent when he sees his enemies are cousins, uncles, teachers, and friends. In the first chapter the opposing armies stand poised for battle, Arjuna in the middle of the battlefield sees relatives, teachers, and friends and is overcome by grief, his mind becomes cluttered and he gives up his will to fight. For the rest of the chapters, Krishna reminds Arjuna of his "duty" (his dharma) and teaches him the ways of non-attachment. We are all Arjuna to some extent, Our minds get clouded, and we create stories as to why we should or why we shouldn't do something. Not being able to treat situations with equanimity; your neighbor committed a crime and you think "he should be put away forever" but a family member or friend committed the same exact crime and you think "they should be let off, they didn't mean it". you are attached to your family member or friend and don't want to lose them, the crimes are the same the only difference is attachment. Ch 2 vs. 48 Equanimity of the mind is yoga. Do everything centered in that equanimity. Renouncing all attachments, you'll enjoy an undisturbed mind in success or failure The Gita is where some may begin to squirm but don't. In verses where Krishna is saying things like" see me wherever you look", and "worship me" he is speaking as the mouthpiece of the divine (God, or whatever your belief system/religion calls the all-pervading divine energy). He is not saying worship me, Krishna, he is saying worship the divine, again whatever that means to you. This is an excellent book to just pick up and begin reading whatever page it opened to. Jack Hawley wrote a great book "The Bhagavad Gita, a Walkthrough for Westerners". This is a great place to start if you are new to Indian texts, the Gita and yoga.
<urn:uuid:3cd6895e-fb66-458e-9326-b365074fe0cd>
CC-MAIN-2023-40
https://www.satyayogawny.net/what-is-yoga
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00159.warc.gz
en
0.938832
3,324
2.59375
3
The Brandt Proposals: A Report Card TECHNOLOGY AND CORPORATIONS The Brandt Commission was concerned about the impact of technology and corporations in developing nations. The Brandt Reports called for international codes of conduct for the sharing of technology, a program for the transfer and development of appropriate technologies at a reasonable cost, global safeguards against restrictive business practices, and a new framework for the activities of multinational corporations. Not only is technology an important element for growth in developing countries, said Brandt, "it can even be argued that their principal weakness is the lack of access to technology, or command of it" (N-S, 194). Many developing nations have hoped to 'leapfrog' industrialization, jumping straight from agrarian societies into the technological age, while others caution against a quick fix. Although technology is clearly a key factor in the future of the world economy, it is not connecting with the unmet needs and aspirations of half the world's people. Developing nations hold vast opportunities for solar energy, fiber optics, telecommunications, and telecom service trade – as well as microcredit loans for the production and distribution of locally-based products through the Internet – but immense obstacles stand in the way. As the Brandt Commission noted twenty years ago: "Almost all advanced technology originates in industrial countries and most of it continues to be developed by them. The North accounts for about 96 percent of the world's spending on research and development. The scientists and engineers, the advanced institutions of education and research, the modern plants, the consumer demand and the finance are all found mainly in the richest countries" (N-S, 194). In 2000, the developing world still lags far behind in every key technological measure: tractors, telephones, electricity consumption, patents, royalties, technological exports, research and development, scientists, and engineers. With the personal computer and communications revolution of the 1980s and 90s, the uneven diffusion of information and communications technology has also multiplied. In 2000, Africa had 734 million people, but just 14 million telephone lines. Developed nations, with 15% of the world's population, had 88% of all Internet use. Hardware is just part of the digital divide. Even if poor nations had advanced telecommunications systems, there is still the problem of illiteracy and lack of basic technical skills. Besides the gap between the world's information rich and information poor, there is also a growing divide between the interests of multinational corporations and developing nations. As the Brandt Commission noted in 1980, "The investors in the corporations have been worried by nationalizations and contract disputes, and want protection and predictable conditions for their investment; while many developing countries have reservations about the character and good faith of the corporations" (N-S, 189). - Following twenty years of robust corporate growth and lackluster development in poor nations, the situation remains polarized. International corporations continue to locate in nations where wages, taxes, and trade, financial and environmental restrictions are the lowest. There is virtually no regulation of corporate practices, which are often at odds with the developmental objectives and national interests of poor countries. In addition, there is no international agreement on foreign direct investment which could allow developing nations to participate in decisions on: • Corporate disclosure of information • Ethical behavior • Restrictive business practices • Labor standards • Tax policies • Fiscal incentives • Repatriation of profits, royalties and dividends Developing nations lack bargaining capacity and broad access to international development finance. Earnings from exports, which could be used to import new technology and boost productivity, are used instead to service debt. Along with increased financial aid and debt relief, developing nations need assistance in joining the information revolution. The Brandt Commission's call for a comprehensive program to transfer technology to poor nations at a reasonable cost is more crucial than ever. The advantages of digital technology and instant information flows – market standardization and predictability, bureaucratic transparency and openness, democratic stability and protection – might be good influences in developing countries eventually, promoting vibrant productive infrastructure, but technology by itself cannot build that supporting environment. For the foreseeable future, technological products and technological information in developing nations are best used as an underpinning for programs that enhance people's capacities and stimulate productive growth. Once basic needs are met, appropriate technology becomes a vital part of the process of development. Access to information and communication may then result in increased knowledge, economic opportunity, and political participation. Only local development, coupled with technology, can provide the conditions of self-sufficiency and security necessary to raise incomes and create effective demand. Without that demand, developing nations cannot expect to buy the greatly needed solar panels, fiber optic lines, telephones, and computers now available on the market, and developed nations cannot expect to sell them. Back to top... Previous | Table of Contents | Next
<urn:uuid:80222fe6-0c45-4765-8032-c9fcde1cfd55>
CC-MAIN-2017-26
http://brandt21forum.info/Report_Technology_print.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00081.warc.gz
en
0.933677
989
2.953125
3
Strawberries are their sweetest when fully ripened on the plants. For most varieties this means leaving the berries on the plant for a day or two after they are fully colored. The only way to know for sure is a taste test. Harvesting Your Strawberries Strawberries bruise easily. Be gentle when pulling them from the plants. Snap the stem directly above the berry rather than pulling on the berry itself. Keep harvested berries in a cool, shady location. Strawberry plants don't live forever, but some renovation will keep them vigorous for 5 years. After the final harvest, mow the strawberry plants to a height of 2-3 inches, taking care not to damage the crowns. Feed with 5 lb.. of a balanced (10-10-10) fertilizer per 100 linear feet of row. Till the area between the rows, mulch and all. Narrow the width of the mat rows to 18 inches by removing one side of the row and leaving the younger plants. Thin the remaining plants in the rows to 6-9 inches apart. Renovating the June Bearing Strawberry Bed When yield seems to be falling off or the plants begin declining in vigor, start with new plants in a new area. Verticillium Wilt, Botrytis (Fruit Rot) and Red Stele (Root Rot): Choose resistant varieties and rotate crops. Tarnished Plant Bug: Feeding by the tarnished plant bug will result in disfigured, nubby berries Birds: Birds will inevitably get some of your berries. Plant more than you'll need and cover the area with close bird netting. As with all plants, new, improved varieties are introduced every year. Call your local Cooperative Extension service for strawberry varieties grown and recommended for your specific area. Below are some popular varieties complied from Cooperative Extension recommendations, that should be available locally or through catalogs. Recommended Strawberry Varieties Seascape: Bred in California, seascape is performing well across the country. Large, good quality fruits are produced throughout the season. Selva: Selva is popular in California and Florida, where it produces extremely large berries. Has shown some success in the midwest, but not hardy enough for the northeast. - Tribute and Tristar: The standards for day neutral strawberries. Extremely popular in the northeast and cooler climates. Very disease resistant and vigorous with good runner production. Tribute has larger fruit and Tristar wins for flavor. Fort Laramie: An older variety with good quality fruit that really does everbear. Runner production is good only if the early blossoms are removed. - Quinault: A quick producer, 4-5 weeks, with good quality fruit. Virtually no runners are produced, making it a good choice for pots. June bearing varieties are even more numerous and may be more to your liking.
<urn:uuid:146029b2-6e92-4d99-a20e-947b30d09a53>
CC-MAIN-2014-15
http://gardening.about.com/od/fruitsberriesnuts/a/Strawberries_2.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537308.32/warc/CC-MAIN-20140416005217-00542-ip-10-147-4-33.ec2.internal.warc.gz
en
0.921216
598
2.59375
3
I am self-studying Euclidean Geometry. One problem with studying alone is that when you’re stuck, you’re stuck. I can’t get past the following problem: “To describe an equilateral triangle having given the distances of a point from each of its vertices.” I know that the vertices must be on concentric circles with the given point as center. [Note: this is a problem on Euclid – Book I material and so nothing is known about the circle other than its definition]. It’s not obvious to me how one should proceed. So I looked at the special case in which the given distances were all equal to one another. Then the problem becomes one of constructing an equilateral triangle whose vertices are all on a given circle. This I was able to do. But when I considered the case when only two of the distances were equal, I got nowhere. I would almost have it, if only I could prove some little statement or other… But no, it was always just out of reach. I feel like Tantalus in Tartarus. Any help would be most appreciated.
<urn:uuid:7fef4ab0-b590-4063-8922-8a8d05727884>
CC-MAIN-2014-35
http://math.stackexchange.com/questions/167240/construct-an-equilateral-triangle-w-vertices-at-given-distances-from-a-point/167293
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835822.36/warc/CC-MAIN-20140820021355-00015-ip-10-180-136-8.ec2.internal.warc.gz
en
0.973662
239
2.6875
3
Popular in many curries and now even lattes, people are turning to turmeric for not only its robust taste and vivid color, but also potential effects on health issues. Some people think that turmeric might help them with joint pain. But what does the science say about it? A study published in the Journal of Medicinal Food reviewed randomized clinical trials of turmeric extracts and curcumin for treating arthritis symptoms. It noted that turmeric has a long history of safe use as food and it has long been used as in anti-inflammatory treatment in traditional Chinese and Ayurvedic medicine. The study found that 8–12 weeks of standardized turmeric extracts (typically 1000 mg/day of curcumin) treatment can reduce arthritis symptoms (mainly pain and inflammation-related symptoms) and result in similar improvements of the symptoms as ibuprofen and diclofenac sodium. While there was not enough data to provide a definitive recommendation for the use of curcumin as an arthritis treatment in this study, it concluded that it could be used as a dietary adjunct to conventional therapy. Want to give turmeric a try? The science says it might help, but it is always important to speak with a medical professional for a personalized recommendation. © 2019 Silver Disobedience Inc.
<urn:uuid:34f22a04-ca31-42ce-8f85-ecc14bd4d973>
CC-MAIN-2023-50
https://silverdisobedience.rocks/what-does-the-science-say-about-turmeric-and-joint-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00438.warc.gz
en
0.965919
267
2.671875
3
Laminotomy Spine Surgery at World Class Hospitals in India Laminotomy is a surgical procedure that helps to decompress the spinal cord or the spinal nerves that emerge from the vertebral column. It is done with aim of removing any structure that narrows the spinal canal and free the entrapped nerves. In this procedure a small incision is made in the lamina as opposed to laminectomy where the entire lamina is removed. as a result laminotomy procedure decompresses the spinal cord without compromising with the spinal stability. Objective of the Procedure: Any space occupying structure within the spinal canal like herniated or bulging disc, thickened ligament, osteophytes (bone spurs), facet joint thickening can compress the spinal cord resulting in symptoms such as pain, numbness, tingling and weakness of the hand or legs. In extreme cases loss of bowel and bladder control is also observed. Laminotomy aims at making an incision in the lamina, to remove a small part of it, creating room for the spinal cord within the canal. This relieves the compression and thus the symptoms disappear. Through the hole in the lamina, the thickened ligament or disc fragment which may be compressing the cord and nerves are also removed. What is Our Minimally Invasive Laminotomy Procedure? Our minimally invasive laminotomy procedure is designed to relieve a compressed nerve in the back of the spinal cord. Your spine consists of several vertebra stacked on top of each other, with cushiony discs in between each vertebra to let the spine move freely. The back of each vertebra has a small bone, called the lamina. The lamina come together to form the back wall of your spinal canal — the area in which your spinal cord runs. Some spine conditions cause the lamina to compress one of the nerves in the spinal cord, usually creating both a localized and shooting pain in the leg or arm. The main spine condition that causes this problem is spinal stenosis, which is the narrowing of the spinal canal. Our minimally invasive laminotomy procedure uses advanced technology to remove the portion of the lamina that is engaging the nerve and causing pain. Common Spine Conditions Treated by Our Laminotomy Procedure Nerve compression in the spinal canal can be caused by several spine conditions. A comprehensive review of each patient’s most recent MRI and health records help our Spine Care Consultants determine the cause of your pain and the best course of action for your treatment. The most common causes of nerve compression in the spinal canal include: - Bone spurs - Pinched nerve - Spinal stenosis - Herniated disc - Bulging disc - Arthritis of the spine Post Operative Recovery and Rehabilitation Patients may sometimes require one or two stitches and after a few hours of monitoring, are allowed to leave (accompanied by a companion) on the same day of surgery. The Physical therapist gives guidelines on the various techniques of walking, sitting and lifting to avoid any strain on the back for the first few weeks. The therapist also explains a set of exercises for the back to increase strength and endurance which are to be performed gradually as the incision pain subsides. Best Hospitals in India for Laminotomy Spine Surgery How To get Started ? Get a Free Expert Opinion from Top Laminotomy Spine Specialists in India ? Your case would be reviewed by best Specialists in India and an Expert Opinion with Treatment cost Estimate shall be sent to you with in 2 working days.
<urn:uuid:00a12c83-b449-468c-a061-e54f38ae5d7c>
CC-MAIN-2020-05
https://bestindiahospitals.com/spine-surgery-india/laminotomy-spine-surgery/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601040.47/warc/CC-MAIN-20200120224950-20200121013950-00408.warc.gz
en
0.923446
737
2.9375
3
Together, the extensive facilities of Rutgers University and Brooklyn Botanic Garden compose a world-class resource for researchers, undergraduate and graduate students, professional land managers, landscape designers, and the public. The headquarters of the Center for Urban Restoration Ecology is at Cook College, the School of Agriculture, Marine & Environmental Sciences of Rutgers University. The campus includes Helyar Woods, the Rutgers Display Gardens, and the college research farm. The Hutcheson Memorial Forest adjacent to the New Brunswick campus is one of the few virgin forest stands left in the eastern U.S. and the site of many ongoing ecological studies. The University’s constellation of field stations fosters research and teaching initiatives covering marine, salt marsh, pineland, old-field, and forest habitats. In the field stations and laboratory facilities of the 56 faculty members of the Graduate Program of Ecology & Evolution, researchers and students are engaged in studies of plant, animal, and microbial ecology. The Chrysler Herbarium of Rutgers houses the official plant collection of the State of New Jersey and specializes in plants of this region. Approximately 120,000 sheets catalog the more than 3,000 plant species of New Jersey, detailing their distribution, variation, and historic range. The Rutgers University libraries rank among the nation’s top research libraries and include more than 3 million volumes and a variety of electronic indexes and abstracts, as well as full-text electronic journals. Brooklyn Botanic Garden Brooklyn Botanic Garden’s living collections include over 7,000 taxa and over 10,000 individual specimens. The herbarium includes about 250,000 specimens of preserved plants. The collection is worldwide in scope, with major collections of plants of the greater New York area and of cultivated plants. In addition to a number of important historic collections, it contains over 1,200 type specimens. The original collection was formed by uniting the herbaria of the Brooklyn Lycaeum, the Brooklyn Institute of Arts and Sciences, and the Long Island Historical Society. The research lab is set up for studies in anatomy, cytology, and morphology. Recently, a modern molecular lab was added, including a new DNA sequencer. Educational facilities also include classrooms and three greenhouses. The research library has over 56,000 books and 3,700 serial titles, including current subscriptions to 355 journals. The collection encompasses the botanical and horticultural sciences, systematics, floristics, and landscape architecture and design.
<urn:uuid:58c49021-6533-4454-8f45-a5d29753ee31>
CC-MAIN-2020-05
http://www.i-cure.org/index.php/2016/07/23/facilities/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250624328.55/warc/CC-MAIN-20200124161014-20200124190014-00215.warc.gz
en
0.919509
503
2.53125
3
Narcotics – Summary Narcotics (Painkillers) are often prescribed initially by a doctor to treat pain a patient might be experiencing. If you or a loved one is abusing the use of a narcotic, it can have long lasting health effects. Help4Addiction can help you overcome this addiction and stop the dependency you may feel. What are Narcotics? Narcotics are painkillers usually prescribed for an injury or after an operation. If you are relying on the narcotic to give you feelings of well-being as well as pain relief then you could be suffering from an addiction. Lots of people can use painkillers without becoming addicted. If you feel you are relying on a narcotic to help change your general feelings then you could have an addiction you need to overcome. What are the symptoms and side affects of Narcotics Addiction? - Lack of feelings of pain - Shallow breathing How is Narcotics Addiction Treated? Treating the underlying cause of the addiction can help people to overcome the dependency they feel on the drug. Therefore therapy alongside a drug substitute can be given to the user.
<urn:uuid:bfb0e327-1f1a-45f3-9176-734df6e17452>
CC-MAIN-2017-30
http://www.help4addiction.co.uk/drugs/narcotics-addiction/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424884.51/warc/CC-MAIN-20170724142232-20170724162232-00522.warc.gz
en
0.911167
230
2.546875
3
Why is the Wet Tropics of Queensland a World Heritage site? The Wet Tropics rainforests contain an almost complete record of the major stages in the evolution of plant life on earth. Many species within the World Heritage area originated when Australia was still part of Gondwana. Why is the Daintree Rainforest a World Heritage Site? Unesco recognises it as an “extremely important” site of rich and unique biodiversity, with over 3,000 plant species, 107 mammals, 368 bird and 113 reptile species. The area is also the largest tract of land in Australia that has continuously persisted as a rainforest. Why are the Wet Tropics important? The Wet Tropics has the oldest continuously surviving tropical rainforests on Earth. They are a living museum of how land plants have evolved since the break up of Gondwana 40 million years ago – from ancient ferns, conifers and cycads to the more highly evolved flowering plants. How was the Wet Tropics of Queensland formed? From about seven million years ago, vast amounts of lava flowed from a number of shield volcanoes over the Atherton Tableland and other parts of the Wet Tropics landscape. The lava cooled to form a dense layer of basalt. Why is the Great Barrier Reef a World Heritage Site? The Great Barrier Reef is one of the natural wonders of the world and was inscribed on the World Heritage List in 1981 for its unique natural attributes and enormous scientific and environmental importance. What are World Heritage values? Under the EPBC Act, world heritage values of a property are the natural heritage and cultural heritage contained in the property. Cultural heritage and natural heritage of Outstanding Universal Value are defined in Articles 1 and 2 of the World Heritage Convention. What is special about the Daintree Rainforest? The Daintree is incredibly bio-diverse, with a large amount of Australia’s wildlife species being found in the rainforest. Another reason why the Daintree Rainforest is so special is because it has an unbelievably complex eco system, unlike any other rainforest In the world, making it a totally unique place. Where does the tropics start in Queensland? Queensland’s wet tropics region is a mountainous chain on the east coast from north of Cooktown to the Paluma Range west of Townsville. Most of the rest, north of Townsville’s latitude, is dry tropics. How old is the Wet Tropics of Queensland? The Aboriginal Rainforest People of the Wet Tropics of Queensland have lived continuously in the rainforest environment for at least 5000 years, and this is the only place in Australia where Aboriginal people have permanently inhabited a tropical rainforest environment. How does the Great Barrier Reef meet the UNESCO criteria? The Great Barrier Reef meets all 4 World Heritage natural criteria: natural phenomena and exceptional natural beauty; representing major stages of Earth’s history; significant ongoing ecological and biological processes; and contain the most important and significant habitats for conservation of biodiversity. Is Great Barrier Reef protected by UNESCO? Environmental activists slam UNESCO decision not to classify the Barrier Reef as an endangered World Heritage Site. Australia on Friday avoided having the Great Barrier Reef listed as an endangered world heritage site by UNESCO, despite extensive climate change-spurred damage to the ecosystem’s corals. What makes a site a Unesco World Heritage? As stated before, in order to be deemed a World Heritage site, the location must be of Outstanding Universal Value, demonstrating international significance; it must “transcend national boundaries and be of common importance for present and future generations of all humanity” (Operational Guidelines 2012).
<urn:uuid:1adcc272-13f8-4c56-af60-8870dfb632a9>
CC-MAIN-2023-23
https://www.resurrectionofgavinstonemovie.com/why-is-the-wet-tropics-of-queensland-a-world-heritage-site/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00291.warc.gz
en
0.897695
763
3.625
4
Veni grant for research on maternal postnatal anxiety During her PhD project, Marion van den Heuvel (Cognitive Neuropsychology, Tilburg University) conducted research into the influence of maternal anxiety on the child during pregnancy. She studied the effects of maternal anxiety on the baby. At that time, she saw more and more studies on the mother's brain during pregnancy, indicating that the mother's brain changes after having a first child. Marion got interested in this and wondered how the brain develops in the case of anxious mothers. The idea arose not only to look at the mother's or the child's brain separately but to study them together. For this idea, Marion received a Veni grant from NWO (the Dutch Research Council) in 2019. The research is now in full swing, with some adjustments due to the corona measures. Unfamiliarity with postnatal anxiety Compared to postnatal depression, there is still sparse literature on postnatal anxiety. However, the impact of postnatal anxiety appears to be significant for both mother and child. Mothers who are anxious during pregnancy are often also anxious after childbirth. The mother’s anxiety can cause a disturbed relationship with the child. From other studies, Marion knows that children often take over fear from the mother. “When children are young, this can manifest itself in various complaints such as poor sleep, abdominal pain, or crying. These are often signs that children are not happy and healthy.” As children get older, the consequences can also be more serious. Marion says that depression, anxiety, drugs use, or deviant behavior, for example, can occur later in life. Understanding the daily lives of anxious mothers Because so little is known about what postnatal anxiety looks like and about the interaction between anxious mothers and children, Marion knew she had to use new methods to gain insight. She opted for experience sampling questionnaires to see how behavior is related to feelings (of anxiety). The mothers receive a pop-up on their smartphones several times a day for a week to register their behaviors, thoughts, and feelings of anxiety. She does this in two different groups: a group of anxious women and a control group. She works with two groups to compare what is normal and what is not. Many mothers check if their baby sleeps well, but non-anxious mothers are not driven by fear and are reassured after checking. Anxious mothers remain anxious, even after checking, and they continue to check, which does not reduce their anxiety. The mothers who participate in the experience-sampling questionnaire come from the Brabant Study (Dutch only), from which data on the pregnancy and birth are already known. Prior to the study, Marion makes a home visit to all mothers to explain the research and to conduct a psychiatric interview. Synchronization of the brains Marion is interested whether mother and baby are literally on the same wavelength. In the second phase of the research, she will measure in the lab to what extent the brains of mother and baby produce brain waves in the same way, in other words whether the brain shows synchronization. She does this both in the group of anxious mothers as in the control group. Marion would like to know to what extent synchronization between mother and baby differs between the two groups. She is still uncertain about the results, but does have an idea. “A lot of research has already been done into synchronization. More synchronization is often associated with effects that are more positive. For example, research has been done on the learning process of babies. If there was more synchronization between mother and baby, the baby will have learned more. With normal interaction, you see that the baby also initiates synchronization from time to time, e.g., when the baby makes sounds or seeks eye contact. In the case of an anxious mother, I expect it to come mainly from the mother, in other words that the mother takes over completely. The baby has less chance to indicate when (s)he wants contact and when contact is over.” What behavior do anxious women show and what are their experiences? In what ways are they restricted in their daily lives? To get an answer to this, Marion works with focus groups of mothers. The first meetings, before the corona outbreak, gave many new insights about the behavior and feelings of anxious mothers. Marion uses these insights to draw up the experience-sampling questionnaire. It also became clear how serious the problem is. “For example, some women do not dare to get into the car with their babies, or they do not hand over their babies to others, sometimes not even to their own partners.” Marion explains that the focus groups were very emotional. “After the focus groups, I am even more motivated to work on this topic. The issues are even more intense than I thought. I already thought that these women were under-treated and that they didn’t know what they are suffering from and what they could do about it – and that was confirmed. Much stronger than I already thought.” Postnatal anxiety or postnatal depression? Much is already known about postnatal depression. Maternity nurses have been trained to recognize postnatal depression and information leaflets are available, for example. However, there is a big difference with postnatal anxiety. Marion: “The literature I found showed that mothers who are anxious show completely different behaviors from mothers who are depressed. Mothers who are depressed often give very little response to the baby. They are a bit tired and a bit numb in their expressions. Well-known is the way of communicating with babies in which you talk in very high voice, called ‘motherese’ or ‘child-directed language.’ The tone is higher, slower, and with more emphasis. Research has been done that shows that depressed women do this a bit less. Women who are very anxious, on the other hand, do this in an exaggerated manner. It is more difficult to pick up the signals of anxiety because, if you look at these mothers from distance, you see very involved and enthusiastic mothers. Only when you look closely, you see that the mother’s behavior is not quite in line with the baby. For example, when the baby is tired and overexcited and the mother is still very enthusiastic, if a mother constantly checks on the baby, finds it difficult to tolerate when the baby is not happy for a moment and cries. Only then you will see that something is not quite right.” Precisely because these women seem so involved and enthusiastic, it is important to measure behavior in everyday life, at that moments when things are difficult. There is also comorbidity because many women with depression also show anxiety, and many women with anxiety also show depression. “I really want to look at the women who either have only anxiety, or for whom the anxiety is in the foreground.” The purpose of the project Postnatal anxiety is often underdiagnosed, not diagnosed, or misdiagnosed as postnatal depression. Therefore, women often do not get the right help. Marion would like to develop an app, checklist, or online self-test to give women insight into what is normal and what is not. “It would be great if women were more likely to tell the midwife or at the clinic that they suffer from postnatal anxiety. Most anxious women who participated in the focus groups indicated that they did not get any help at all and that they missed it very much. Only when they saw our ad of the study did they thought: that’s what I had!” The birth of BABI When the questionnaire is done, the project team celebrates its birth with birth announcement cards and the questionnaire is given a name, the “BABI”, which stands for ‘Baby related Anxiety and Behavior Inventory’. In addition, the team works “open source” by making the questionnaire available for everyone, but also by publishing all the steps of the study in an article. “The intention is to share everything because Experience Sampling as a research method is still very novel. We will show how we approached it step by step.” Interest in babies and children It is not surprising that Marion puts the welfare of babies and mothers at the center of her research. Already in primary school, she liked to help preschoolers. She supervised holiday work for youngsters, volunteered at the children’s helpline, and in her Bachelor’s and Master’s thesis, children also took a central stage. “In terms of research, I am particularly interested in early development, because there is a lot of plasticity. Babies really suck everything up. The brain grows very fast, so a lot can go wrong. Babies are very vulnerable and very resilient at the same time, which I find interesting. I also like working with parents because most of them really want to do it all very well. Especially with parents and their first child, I like to see the change. I have also been interested in the bond between mother or father and the baby for a long time.” The project team The project team consists of Marion van den Heuvel (assistant professor, Cognitive Neuropsychology, Tilburg University), Myrthe Boekhorst (data manager/post-doctoral researcher, Medical and Clinical Psychology, Tilburg University), Jessica Vergeer (junior researcher, Cognitive Neuropsychology, Tilburg University) and Irene den Boer (project assistant and student Tilburg University). The project team is still looking to expand. Are you a statistician with interest in the analysis of intensive longitudinal data and would you like to participate in this interesting project as a collaborator? Please contact Marion or let TESC know, and we will be happy to put you in contact. Do you want to know more about research by Marion van den Heuvel? Take a look at her website.
<urn:uuid:811b105e-2251-4c60-a952-c646f324cb43>
CC-MAIN-2023-23
https://experiencesampling.nl/nieuws/veni-grant-maternal-postnatal-anxiety/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00117.warc.gz
en
0.971292
2,042
2.921875
3
Democracy / BUYING IT Mass protests are inevitably noisy and cacophonous affairs, as different voices raise issues in different ways. But through the cacophony of the Seattle protests, certain strong and historically resonant themes emerge. For the protesters the inscrutable officials of the WTO with their extraordinary powers are usurpers of democratic rights. The charge strikes to the heart, and could well continue to galvanize protests around the globe. Elites have always understood the threat of democracy. Writing in the wake of the passage of the Third Reform Bill which extended the franchise in nineteenth-century England, the historian JA Froude explained the dangers: 'It is one man, one vote. And as the poor and the ignorant are the majority, I think it is perfectly certain... that those who have the power will use it to bring about what they consider to be a more equitable distribution of the good things of this world.' In the US democratic arrangements were the price paid for popular support in a successful colonial war against the mother country. Colonial élites were impatient with the commercial constraints imposed by ties with Britain. They raised the rallying cry of democracy to recruit an army of farmers, artisans and the urban poor. 'Faith ran high,' says Gary Wills, 'that a better world than any that had ever been known could be built where authority was distrusted and held in constant scrutiny.' When the war ended, these men were still fired up by the idea of democracy, and still armed. Under such conditions, the basic features of electoral representation were conceded early. But they were hedged in - at first by limitations on the franchise such as property or racial or literacy or gender qualifications, and later by procedural obstructions, such as onerous voter-registration systems and bans on threatening forms of political speech and association. Nineteenth-century electoral representative arrangements were quickly corrupted by clientelist relations which traded votes for personal favors - then, in the twentieth century, as radical protests by farmers and workers began to penetrate the political parties, by the steadily growing influence on electoral campaigns of big money and mass propaganda techniques. There is a vast literature exploring the mysteries of American exceptionalism, of its failure to develop a labor party and its late and limited welfare-state programs. Maybe the simplest explanation is that democratic rights were in fact sharply limited. But perhaps the largest inhibition on popular influence through democratic institutions in the US was the vigour of laissez-faire ideology - the doctrine that the economic relationships of capitalism are the product of 'nature' rather than a result of human design. As nature is governed by inviolable laws, so too, it is argued, are economic activities governed by market laws. Such natural laws brook no interference by government. The penalty for inhibiting the market processes that generate wealth is the risk of economic disaster. The economic grievances that fired popular aspirations for democracy were seen as beyond the reach of the democratic majorities that influenced government. Why was laissez faire so exceptionally vigorous in the US? As elsewhere, the economy was in fact closely dependent on government policies which established the framework of currency, tariff, contract, labor and property law. Government deployed the military forces that were used to break strikes at home and protect imperial interests abroad. Government also subsidized the infrastructure of transportation and communication without which a modern economy could not exist. However, the reality of the state's role in the economy remained obscure, in part as a result of the organization of government itself. Important economic policies were embedded in the constitution, or were the province of a national government which until the twentieth century was largely remote from popular politics. When property and labor rights were disputed, decisions were relegated to courts whose judges were not exposed to electoral scrutiny and who justified their opinions as the mystical but seemingly indisputable requirements of constitutional and common law. Or critical economic policies were delegated to inscrutable and unelected bureaucracies, such as the Federal Reserve Bank. Meanwhile, there was a realm in which a kind of democracy seemed to flourish, largely in local government, where popular enthusiasms surged in fierce political contests over the distribution of patronage and ethnic honors, or over the management of the schools and garbage collection. In other words, the distinctive organization of American government did indeed create realms in which politics flourished, and those realms seemed to operate apart from the economy. The ideological separation of economy and polity began to break down in the twentieth century. Government intervention to aid a burgeoning industrial economy became ever more transparent. This rapid economic growth produced new hardships spurring waves of protest by farmers and workers. The contrived insulation of the economy from democratic politics weakened. Political rights became an instrument for popular influence on economic issues. New policies were inaugurated in the pre-World War One US to break up the trusts and to regulate the railroads. The Great Depression of the 1930s sparked another surge of protest, with the national government belatedly granting unions some legal rights. The 1930s also saw the inauguration of the basic programs of a limited welfare state in the US. Then, three decades later, the protests of the 1960s led by the civil-rights movement forced the expansion of these regulatory and economic-security programs. These victories were also limited and in some cases were won only to be lost, at least until the next surge of protest. But even partial victories represented elements of a new compact won through the flawed American democracy, setting at least some limits on business power. There are no permanent victories in politics. In the early 1970s American corporations, goaded on by the pressures exerted on their profits by international competition and rising commodity prices, mobilized to take back much of what had been won. They launched a concerted mobilization against unions, and job security and other workplace protections were rolled back. Wages fell. But US business wanted more than they could win in the workplace alone. They wanted a reversal of the social compact, a rollback of business regulation, of welfare-state spending and of taxes. To win such policies they also needed to roll back the influence of ordinary people over government. They needed to roll back democracy. Corporate America mobilized for politics by turning to the tried and true of US political history. Big money poured into the parties, especially but not only the Republican Party. Media techniques of persuasion and manipulation turned campaigns into frenzied advertising spectacles. Political duplicity in legislating business giveaways reached new heights. This much is obvious - as is the invasion of US-style of money-and-media elections spreading to Europe, particularly to Britain. Less obvious is the revival of the doctrine of laissez faire, this time conceived as natural laws enveloping the planet. National governments whose policies violated these new 'natural' laws would be punished by floods of imports that undercut domestic producers, or by currency markets, or by investors circling the globe in search of cheaper labor or better tax deals. There is no room for democracy in this new ideology because democracy is exercised as influence over national governments. If governments are helpless in global markets, then so too are democratic publics. No wonder there is a collapse of popular political morale in the US. There is a startling rise in the number of citizens who tell survey-takers of their cynicism and disaffection with government and politics. No wonder the turn in US politics is towards 'family values' and to candidates who are said to exemplify strength and personal morality. The politics of institutional reform is forced into the shadows in favor of a fundamentalist politics of personal moral rejuvenation. There is of course some short-term truth in this neo-liberal doctrine. What it ignores is that national governments have themselves created the framework of currency, trade and tax policies in which global markets are flourishing, as well as the supra-national organizations which promote and enforce these policies. A politics dominated by business has created the institutions which make business domination seem inevitable. Almost inevitable. The spreading protests against the WTO, the IMF, the World Bank, suggest the veil of doctrine is lifting. The protesters make familiar demands for democratic scrutiny and public accountability. Also familiar, they see their antagonists as the international corporations, the new men of property. But something is new as well - the protests are squarely aimed at institutions constructed precisely to evade democratic accountability.
<urn:uuid:77cb94c5-180a-4ed3-b937-eafb13179aae>
CC-MAIN-2017-43
https://newint.org/features/2000/06/05/dollar/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823168.74/warc/CC-MAIN-20171018233539-20171019013539-00345.warc.gz
en
0.97126
1,684
2.546875
3
The study involved 50 men who had undergone surgery or radiation but quickly experienced increases in prostate-specific antigen or PSA, a biomarker that indicates the presence of cancer. UCLA researchers measured "doubling time," how long it takes for PSA levels to double, a signal that the cancer is progressing, said Dr. Allan Pantuck, an associate professor of urology, a Jonsson Cancer Center researcher and lead author of the study. Doubling time is crucial in prostate cancer, Pantuck said, because patients who have short doubling times are more likely to die from their cancer. The average doubling time is about 15 months. In the UCLA study, Pantuck and his team observed increases in doubling times from 15 months to 54 months, an almost four-fold increase. "That's a big increase. I was surprised when I saw such an improvement in PSA numbers," Pantuck said. "In older men 65 to 70 who have been treated for prostate cancer, we can give them pomegranate juice and it may be possible for them to outlive their risk of dying from their cancer. We're hoping we may be able to prevent or delay the need for other therapies usually used in this population such as hormone treatment or chemotherapy, both of which bring with them harmful side effects." The study appears in the July 1 issue of Clinical Cancer Research, the peer-reviewed journal of the American Association of Cancer Research. "This is not a cure, but we may be able to change the way prostate cancer grows," Pantuck said. "We don't know yet the specific factors behind this response - that's our next step in this research. We want to find out what cell signaling pathways might be affected, what is happening to keep PSA levels stable."
<urn:uuid:3836f96d-9bb6-431c-93ea-5f9014a08ac1>
CC-MAIN-2014-35
http://news.bio-medicine.org/biology-news-3/Pomegranate-juice-helps-keep-PSA-levels-stable-in-men-with-prostate-cancer-6104-1/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823598.56/warc/CC-MAIN-20140820021343-00447-ip-10-180-136-8.ec2.internal.warc.gz
en
0.96967
361
2.671875
3
Found an animal, plant, or fossil that you’d like to identify? Write down a description or make a sketch in your notebook, and bring it to the natural history centre. We’ll do our best to help you identify it. Get help from our identification guides or email us a description and photograph of your item for feedback from an expert. You can also check out these Nature Identification Resources: Vancouver Island Frogs ID Guide Vancouver Island Snake ID Guide Vancouver Island Salamander ID Guide. Ethnobotanical Plant Identification Quiz: Complete this quiz while taking a walk through the Nature History Centre’s plant garden. View more Young Natural Activities. Pictured Above: Spotless Ladybug on Lavender. Photo by Rachelle Chinnery
<urn:uuid:095dab66-3678-484f-ac72-ced8735d316b>
CC-MAIN-2020-29
https://hornbynaturalhistory.com/take-part/identify-nature/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886121.45/warc/CC-MAIN-20200704104352-20200704134352-00124.warc.gz
en
0.778908
162
3.0625
3
25x18. Tapa dura. 696 páginas. Ilustrado en color con uniformes y equipo. When Napoleon returned to Paris after exile on the Island of Elba, he appealed to the European heads of state to be allowed to rule France in peace. His appeal was rejected and the Emperor of the French knew he would have to fight to keep his throne. In just eight weeks, Napoleon assembled 128,000 soldiers in the French Army of the North and on 15 June moved into Belgium (then a part of the kingdom of the Netherlands). Before the large Russian and Austrian armies could invade France, Napoleon hoped to defeat two coalition armies, an Anglo-Dutch-Belgian-German force under the Duke of Wellington, and a Prussian army led by Prince von Blücher. He nearly succeeded. Paul Dawson’s examination of the troops who fought at Ligny, Quatre-Bras and Waterloo, is based on thousands of pages of French archival documents and translations. With hundreds of photographs of original artefacts, supplemented with scores of lavish colour illustrations, and dozens of paintings by the renowned military artist Keith Rocco, Napoleon’s Waterloo Army is the most comprehensive, and extensive, study ever made of the French field army of 1815, and its uniforms, arms and equipment.
<urn:uuid:d4da3960-86b0-412f-ac49-5ca887fd9055>
CC-MAIN-2020-34
https://libreriaalmena.com/epages/f2c787be-7ad4-49ec-9af0-263ed2e4f807.sf/es_ES/?ObjectPath=/Shops/f2c787be-7ad4-49ec-9af0-263ed2e4f807/Products/napwatarmy
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738609.73/warc/CC-MAIN-20200810042140-20200810072140-00083.warc.gz
en
0.946508
274
2.75
3
Virtual Histories Project – Shetland Museum and Archives The Virtual Histories Project is a collaboration between four museums (Eyemouth Museum, Shetland Museum, Taigh Chearsabhagh and Timespan) and the University of St Andrews School of Computer Science, The School of History and the SCAPE Trust. Using archaeological survey data and PointCloud scan data, we are creating an accurate 3D reconstruction of Fethaland fishing station in order to give a better understanding of the history of this site and present data in a fun interactive way. This site of the fishing station is being lost to coastal erosion, and the model is a way of preserving this part of our history, before it is lost to the sea. Fethaland Fishing Station Fethaland lies within two bays at the northern tip of Northmavine and is the farthest north point of Shetland mainland. Fethaland, has a long history of human settlement, spanning from prehistoric times right up until the twentieth century, when the fishing station, established during the 15th and 16th centuries, became redundant. This haaf (deep-sea) fishing station was at one time the busiest in Shetland, with around 60 boats operating from here. The season was short: from June until August. The workers were accommodated in lodges. These huts were drystone with roofs of wood and turf that were removed at the end of each season to protect them from damage by winter storms. The fish were split open and dried on the pebble beach before being exported to market. From the 17th century herring was also brought ashore and salted.
<urn:uuid:37414579-6f7c-41d9-93cb-6977d714567c>
CC-MAIN-2017-47
https://blogs.cs.st-andrews.ac.uk/openvirtualworlds/reconstructions/fethaland-fishing-station-1890/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809392.94/warc/CC-MAIN-20171125032456-20171125052456-00356.warc.gz
en
0.969086
343
3.03125
3
Mycobacterium avium complex ||This article's remainder may require cleanup to meet Wikipedia's quality standards. The specific problem is: relies on a single source and is too technical. (September 2013)| Mycobacterium avium complex (MAC) include ubiquitous atypical bacteria found in the environment which can infect patients with HIV and low CD4 cell count (below 100/microliter); mode of infection is usually inhalation or ingestion. MAC causes disseminated disease in up to 40% of patients with human immunodeficiency virus (HIV) in the United States, producing fever, sweats, weight loss, and anemia. Disseminated MAC characteristically affects patients with advanced HIV disease and peripheral CD4+ T-lymphocyte counts less than 100 cells/uL. Effective prevention and therapy of MAC has the potential to contribute substantially to improved quality of life and duration of survival for HIV-infected persons. Disseminated MAC is most readily diagnosed by one positive blood culture. Blood cultures should be performed in patients with symptoms, signs, or laboratory abnormalities compatible with mycobacterium infection. Blood cultures are not routinely recommended for asymptomatic persons, even for those who have CD4+ T-lymphocyte counts less than 100 cells/uL. Patients with HIV infection and less than 100 CD4+ T-lymphocytes/uL should be administered prophylaxis against MAC. Prophylaxis should be continued for the patient's lifetime unless multiple drug therapy for MAC becomes necessary because of the development of MAC disease. Clinicians must weigh the potential benefits of MAC prophylaxis against the potential for toxicities and drug interactions, the cost, the potential to produce resistance in a community with a high rate of tuberculosis, and the possibility that the addition of another drug to the medical regimen may adversely affect patients' compliance with treatment. Because of these concerns, therefore, in some situations rifabutin prophylaxis should not be administered. Before prophylaxis is administered, patients should be assessed to ensure that they do not have active disease due to MAC, M. tuberculosis, or any other mycobacterial species. This assessment may include a chest radiograph and tuberculin skin test. Rifabutin, 300 mg by mouth daily, is recommended for the patient's lifetime unless disseminated MAC develops, which would then require multiple drug therapy. Although other drugs, such as azithromycin and clarithromycin, have laboratory and clinical activity against MAC, none has been shown in a prospective, controlled trial to be effective and safe for prophylaxis. Thus, in the absence of data, no other regimen can be recommended at this time.The 300-mg dose of rifabutin has been well tolerated. Adverse effects included neutropenia, thrombocytopenia, rash, and gastrointestinal disturbances. Although studies have not yet identified an optimal regimen or confirmed that any therapeutic regimen produces sustained clinical benefit for patients with disseminated MAC, the Task Force concluded that the available information indicated the need for treatment of disseminated MAC. The Public Health Service therefore recommends that regimens be based on the following principles: - Treatment regimens outside a clinical trial should include at least two agents. - Every regimen should contain either azithromycin or clarithromycin; many experts prefer ethambutol as a second drug. Many clinicians have added one or more of the following as second, third, or fourth agents: clofazimine, rifabutin, rifampin, ciprofloxacin, and in some situations amikacin. Isoniazid and pyrazinamide are not effective for the therapy of MAC. - Therapy should continue for the lifetime of the patient if clinical and microbiologic improvement is observed. Clinical manifestations of disseminated MAC—such as fever, weight loss, and night sweats—should be monitored several times during the initial weeks of therapy. Microbiologic response, as assessed by blood culture every 4 weeks during initial therapy, can also be helpful in interpreting the efficacy of a therapeutic regimen.Most patients who ultimately respond show substantial clinical improvement in the first 4–6 weeks of therapy. Elimination of the organisms from blood cultures may take somewhat longer, often requiring 4–12 weeks. HIV-infected children less than 12 years of age also develop disseminated MAC. Some age adjustment is necessary when clinicians interpret CD4+ T-lymphocyte counts in children less than 2 years of age. Diagnosis, therapy, and prophylaxis should follow recommendations similar to those for adolescents and adults. This article incorporates public domain material from the Centers for Disease Control and Prevention document "Recommendations on Prophylaxis and Therapy for Disseminated Mycobacterium avium Complex for Adults and Adolescents Infected with Human Immunodeficiency Virus". - LOIS WHITE (7 July 2004). FOUNDATIONS OF NURSING. Cengage Learning. pp. 1298–. ISBN 978-1-4018-2692-5. Retrieved 5 November 2010. - "Disease Listing, Mycobacterium avium Complex, Tech Info | CDC Bacterial, Mycotic Diseases". Retrieved 2010-11-04. - Peter Irving; David Rampton; Fergus Shanahan (21 July 2006). Clinical dilemmas in inflammatory bowel disease. Wiley-Blackwell. pp. 36–. ISBN 978-1-4051-3377-7. Retrieved 5 November 2010. - Horsburgh CR. Mycobacterium avium complex infection in theacquired immunodeficiency syndrome. N Engl J Med 1991;324:1332-8. - Chaisson RE, Moore RD, Richman DD, Keruly J, Creagh T, the Zidovudine Epidemiology Study Group. Incidence and natural history of Mycobacterium avium complex infection in patients with advanced HIV disease treated with zidovudine. Am Rev Respir Dis 1992;146:285-9. - Havlik JA, Horsburgh CR, Metchock B, Williams P, Fann SA, Thompson SE. Disseminated Mycobacterium avium complex infection: clinical identification and epidemiologic trends. J Infect Dis 1992;165:577-80.
<urn:uuid:9698f0f5-3582-4a9d-a686-20f61d6c62ac>
CC-MAIN-2014-35
http://en.wikipedia.org/wiki/Mycobacterium_avium_complex
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500821666.77/warc/CC-MAIN-20140820021341-00301-ip-10-180-136-8.ec2.internal.warc.gz
en
0.876152
1,339
2.90625
3
How to Write a Psych Research Paper Table of Contents There comes a time in every young (and not-so-young) psychology student’s life when the inevitable emerges to challenge them, to stress them, and to encroach upon their precious Xbox time. Not even art majors can escape their nefarious reach. So a student involved in a writing- and research-intensive program like psychology may as well resign themselves to the one thing that will scoot the process along as painlessly as possible — actually understanding how to put one together. It takes a bit of getting used to, admittedly. But the following guide provides some information to help alleviate some of the pain. Choosing a Topic The best topics are neither too broad to properly explore nor too narrow to prevent the writer from finding enough supporting information. “A five- to 10-page paper on Freud is simply not possible because his work is so far-reaching that the student winds up writing a poor imitation of the summary chapter in the textbook,” says Dr. Steven LoBello, a psychology professor at Auburn University at Montgomery. “A good topic is considerably narrowed and focused.” For instance, instead of focusing on the entirety of Sigmund Freud’s life, LoBello suggests students would be better served examining how one of Freud’s teachings is applied today. Pick something relevant to the class as well. For example, no matter how intelligent, cogent, and compelling a paper on Victorian psychology’s penchant for misogyny might read, it would not fit into a course covering neurology. Professors use research papers to gauge how well their students grasp the material. Failing to address their prompts could lead to a compromised grade. Elizabeth Morris, who recently completed a master’s degree in counseling at St. Edward’s University, describes an ideal topic as “something that can be researched and have measurable results, [like] researching the correlation between children who play video games and acts of violence vs. stating that video games cause violence.” “In a paper, you aren’t out to prove anything, but it is meant to share what has already been studied and the results of that study,” she says. Students must also practice some degree of flexibility should one topic prove difficult to support. “Knowing what’s viable ahead of time can be tricky,” LoBello says. “One might have to be prepared to abandon a topic if the literature base is inadequate or the topic is just too advanced for the student’s level of preparation.” Consider a few different topics to ensure at least one yields enough information and lends itself to a credible thesis. This is the most integral component of a research paper. Thesis statements exist as the nerve center from which all major points diverge and sustain themselves. Weak theses lead to meager papers. Strong theses lead to confident, intelligent papers. All theses must be expressed in concise and straightforward language. Muddying the major themes and ideas with unclear writing will make professors dismiss anything being said. Everything branches out from the statement, so an obfuscated thesis throws off a paper’s cohesion. “A viable thesis is something that has enough support to make the statement, but also will provide room for further research,” says Morris. As an example, Morris says that something like “When parents spoil their children, they become narcissists” isn’t an adequate foundation for a psychology paper because it “stat[es] something very broad and general as fact.” However, refining and narrowing the very same idea into “Permissive parenting styles may lead to the increase of narcissistic personality disorder” lends itself to a far stronger paper. This is because the more focused statement has “plenty of research to back it up” and isn’t stated as fact. Theses should ask solid, supportable questions. The rest of the paper answers them in greater detail using professional publications. A solid thesis deserves solid research to back it up. Otherwise, readers will not believe the major ideas being pushed. Research is, unsurprisingly, the most intensive step in the paper process. It requires an overwhelming amount of reading and analysis to ensure the highest quality arguments. Fortunately, learning how to be savvy with sources saves time and bolsters the final grade. “If you are writing an actual academic paper, you need to use actual academic resources,” says Morris. “When you are finding articles, make sure they are up to date … and you can find multiple articles that state very similar findings. If you can only find one article written in 1992, your research is not very reliable.” She recommends only citing research published within the last five years to present the most accurate arguments possible. Professors largely want up-to-date, peer-reviewed sources from professional journals. Nearly every college library subscribes to the most reliable industry journals (such as Journal of Cognitive Neuroscience, Psychological Methods, Psychological Review, and Health Psychology), either in print, digital copies, or through a massive database such as JSTOR or the psychology-centric PsychINFO. Librarians can provide the necessary login information as well as arrange interlibrary loans should the school not carry a required resource. There’s also the fantastically helpful Google Scholar. Searching for the right book might seem like an intimidating task, but keyword searches using the library’s catalogue save time when the works of a specific author — say, Philip Zimbardo or Carl Jung — aren’t enough. They will call up reads relevant to the query. Go find them on the shelf and immediately turn to the index. Find the pages with the information and skim over it to see if the book provides reliable enough insight to fold into a paper. When discussing the details of a specific diagnosis, psychology students must source the latest version of the Diagnostic and Statistical Manual of Mental Disorders (DSM), published by the American Psychological Association (APA). It is the definitive guide to identifying and treating mental health conditions in the United States. The fifth edition comes out in May 2013. Any interviews included in a research paper must be conducted with respected industry experts — no Robert Gerard Eardley or similarly disgraced source whose license was lifted for unethical practices. Expert sources certainly punch up papers and provide more in-depth insight, but you shouldn’t rely on them too much to support a thesis; interviews have obviously not undergone the same peer-review process used to vet journal articles. When it comes to online resources, Morris heavily discourages Wikipedia. Its open editing structure makes vandalizing content and disseminating misinformation supremely easy. But that doesn’t mean all internet-based reads should be dismissed as unreliable. Generally, URLs ending with .edu or .gov will host updated, peer-reviewed information suitable for a research paper. The National Institute of Mental Health (NIMH) and Center for Disease Control (CDC) are both legitimate and excellent reference points for psychology students. Domains ending in .org should be approached with caution, as not every organization necessarily shares correct information and updated studies. The APA is the best example of a trustworthy .org. If one particular group seems alright, but still raises a few questions, ask a professor whether the industry considers their research valid. Primary, Secondary, and Tertiary Regardless of the medium, all sources fall into one of three categories: primary, secondary, and tertiary. The strongest papers analyze and support their theses largely using primary resources, supplemented by secondary when necessary. - Primary sources present original ideas and research. The DSM would be an example of a primary source, as it is the America psychology industry’s standard when diagnosing mental health issues. - Secondary sources analyze or build upon primary sources. Because the DSM qualifies as a primary source, an article critiquing the diagnostic criteria using previous scientific studies would be considered secondary. - Tertiary sources summarize or list primary and secondary sources; bibliographies, textbooks, and encyclopedias all count. Continuing the DSM example, a works-cited page by a fellow student including the work would be a tertiary source relevant to psychology research papers. Juggling so many resources appears intimidating at first, but papers become more manageable once students pare down what works best for their ultimate goals. “I think that deciding which information to keep and which to discard becomes quite easy if you have a properly delineated topic, one that is sufficiently focused such that the source either relates or it doesn’t,” says LoBello. “If it’s borderline, you hang onto it until you organize the information enough to know if it fits or not. If it doesn’t fit, it goes.” Regardless of whether a professor requires a basic outline, psychology students should still invest the time in writing one. “It is an organizational step that students skip, thinking it saves time or is unnecessary,” LoBello says. “I think (that’s) unwise, like going off into some unknown place without a map. The outline is designed to guide the writer.” LoBello cautions that outlines shouldn’t be too elaborate, either. “At that point, the danger is that you are not really doing an outline, but writing a poorly organized paper,” he warns. “I think it’s a good idea to get your sources, read them, take notes, think of an organizational structure, and then create an outline. I think a one-page outline ought to be enough to construct a five- to 10-page paper.” Outline style tends to vary by professor, and the APA does not have formal guidelines for outlines, either. Rasmussen College’s library recommends writing them out using Times New Roman, 12-point type size, double-spaced lines, and one-inch margins. Purdue OWL has excellent sample outlines students can view for inspiration. All psychology papers need to be written using the APA style of formatting. Fortunately, an official rundown of everything it entails is available online. First drafts might be on the rough side, but they should still reflect cogent arguments and an understanding of the source material. Some professors may ask for works cited, bibliography, or other writing alongside the first draft as well. According to Morris, a standard psychology research paper should follow APA format and include a title page, abstract, introduction, methods, results, conclusion, and references. “In the first draft, it should be pretty well organized and references should be set,” she says. “A student should be able to accept critiques and make corrections,” says Morris. LoBello looks for correct grammar, spelling, and punctuation when grading first drafts. Even though they are not meant to be considered as polished as final drafts, professors still want to see that their students comprehend their chosen topic from multiple angles. “When doing research on a particular idea, one should always research opposing arguments and alternatives,” says Morris. For example, Morris says, if you’re discussing the negative effects of anti-depressants on pregnant women, you should also outline alternative treatments. Morris also wants students to remember that research papers should strive for objectivity. ” A lot of students will see psych papers as a chance to argue for something they believe in, but if you are going to do that you need to make sure you know the opposing ideas or alternative solutions.” LoBello outlines a few handy questions to ponder when penning the first draft of a psychology research paper. “The quality of expression is important — is the writing well done? Are words chosen and combined in an effective way? The content — does this paper do what it says it aims to do or does it go in several directions at once? Do I even understand what I’m reading? Is it organized?” The Final Draft Always consider professors’ notes on a first draft. They will point out spelling and grammar errors, as well as weak arguments, irrelevancies, and any other factor that does not feed back into the thesis. Some might even recommend further resources to explore. “In a final draft, I would like to see as many problems that I have identified in the rough draft corrected. I am not happy to see problems that I took the time to correct once before. Spelling and punctuation errors are especially annoying at this point,” says LoBello. He adds, “A rough draft may not conform to format specifications and may even lack some elements, like an abstract or a complete reference list. But these aspects of form must be present in the final paper. The final paper must look good as well as read well.” For further assistance, schedule an appointment with your campus writing center. Staffers there are trained to spot spelling and grammar issues, and they can often offer new perspectives on an argument’s cohesion. Trusted classmates, friends, and family members might also be conscripted to express their opinions on what works and what needs changing. Another common strategy is to print out a paper and read it out loud. This helps catch any errors with sentence structure and coherence. Properly managing time is also essential when transitioning between first draft and final — especially if a professor requests additional research. “Plan ahead, organize when you are going to do the different parts of the paper, and take breaks in between,” Morris says. “A well-written and thorough paper with substantial research cannot be done overnight, no matter how much coffee may be brewing.” Your work may never see publication or a readership beyond your teacher, but you should treat it as if peer reviewers with Psychological Review will sit down and pore over everything tomorrow. Writing with professionalism as a student leads to writing with professionalism throughout your career begins. The Last-Minute Checklist Before turning in your final copy, check over the following points to ensure the best possible grade: - Strong thesis: Pick a thesis that answers questions through current, reliable research and lends itself to further inquiry. Remember, not too broad, but not too narrow. Avoid making definitive statements out of theories. - Citations: Make sure all sources receive proper credit. Forgetting to do so could lead to accusations of plagiarism — and with tools like Turnitin at their disposal, professors catch improper citations quickly and reliably. Quotes need to be quoted. Previous research needs to be attributed to the researchers. Make sure readers know which theorists concocted which theories. - Proper formatting: Always write using the most updated APA formatting techniques.. - Clear arguments: Carefully dissect each major point for coherence. Enlist others, be they friends or writing center staffers, to share their opinions regarding whether or not the research provided genuinely supports the thesis. Make changes accordingly. - Spelling and grammar: Poor spelling and grammar obfuscate even the most brilliant, groundbreaking points. Don’t just rely on Word’s checks, either; they don’t always catch mistakes, and they sometimes they see errors in perfectly valid writing. Hand a paper over to others for a new perspective or try reading out loud to catch any problems. - Follow directions: If a professor gives notes on the first draft, implement them for the final. Respect page length, style requirements, and the inclusion of any additional writing — such as an outline, a detailed methodology, or an abstract — they require. Morris stresses that students should invest their time in subjects they find interesting. “Have fun with it; find articles that you will be interested in reading,” she says. “Many of them are very long and tedious, and can be hard to translate. You have to be able to understand the research you are reporting, and this is best done when you actually enjoy reading the research.” Research papers will always be inescapable, in school and in professional psychology careers. They might seem intimidating at first, especially to students relatively new to the process. But the process gets easier over time; nobody inherently knows how to conduct research and clearly analyze and convey ideas, after all. Always stay open to suggestions and input from professors and industry pros. This allows those ever-important communication skills to grow and flourish. Keep LoBello’s simple words in mind while working hard to meet that deadline: “Writing ability is timeless. It is an art.”
<urn:uuid:78d369df-0be6-4235-824c-23f5e54f867e>
CC-MAIN-2013-48
http://www.onlinepsychologydegree.net/2013/04/30/how-to-write-a-psych-research-paper/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164027110/warc/CC-MAIN-20131204133347-00026-ip-10-33-133-15.ec2.internal.warc.gz
en
0.935707
3,450
2.890625
3
New School Year Tip: Create a no sarcasm zone Posted by lizmanvell Worth reposting as you get ready to start a new school year… Witty humor or caustic mockery? Good-natured ribbing or anger with a smile? Sarcasm. Widely used and widely misunderstood. Some people defend it while others condemn it. Is the line between sarcasm and innocent humor really that fine? Not if you look at what makes sarcasm unique. We know it when we hear it. Read these statements first with sarcasm and then as if you honestly mean them. - (Student says she’ll bring the book in tomorrow.) Right, that’s going to happen! - (Teacher was talking to a student.) It’s going to be a great year with you in my class. - (There are papers scattered under a desk.) I love the way you always put your papers away so neatly. - (Student couldn’t answer a question.) Keep this up and you’ll be a big success when you grow up. - (Class has been doing poorly on tests.) I’m sure everyone is going to study hard tonight. - (Student has a disciplinary note to give his parents.) I know you’ll have your parents sign that letter like you always do. - (Teacher is looking at a messy paper.) Thank you. Your essay is so neat and legible. - (Teacher is frustrated with the noise level.) I’m so glad I get to start each day with all of you. I must have a guardian angel. Hear the difference? That core of insincerity and meanness? The little dig? Sarcasm is saying the opposite of what we mean; there is an intentional contradiction between the literal meaning of the words and the social and emotional intent. It is a putdown couched in humor meant to embarrass or hurt, motivated by negative emotions – frustration, disgust, disdain, futility, anger, even hate – communicated through the context, the words chosen, and the inflection used. Why is sarcasm one of the deadly sins of relationships? Because it comes out of left field like a stomach punch, with enough of a grain of truth to breed insecurity. It puts us off-balance, even adults, and is particularly hurtful when aimed at children who expect adults to speak the truth. Sarcasm is verbal aggression with a smile, a sideways way to express criticism, which is actually more hurtful than the honest criticism it replaces. It is intentionally dishonest and kids need honesty to feel secure. It damages relationships instead of strengthening them. Power differential + sarcasm = bullying + not funny Teacher-to-student bullying, the same as student-on-student bullying, but with more emphasis on the power differential, is defined as “a pattern of conduct, rooted in a power differential, that threatens, harms, humiliates, induces fear, or causes students substantial emotional distress.” The lack of understanding of the difference between humor and sarcasm and the venting it provides, and the false belief that it produces results, perpetuate the use of sarcasm for classroom management, student reprimands, and motivation. Yet, fear of embarrassment or ridicule is not a healthy motivator. Younger children and those with learning disabilities or Asperger’s syndrome will just be confused. With older students, sarcasm might get a laugh from the other children and short-term compliance from the target. But at what cost? A child’s feelings of self-worth, sense of security, trust in adults, and ability to concentrate and learn? A backlash of resentment and retaliation towards the teacher? Modeling the very disrespectful, unkind behavior that we complain about? Good-natured humor, unlike sarcasm, is not mean or targeted at a specific person or group. It is a shared enjoyment of a comical or ironic situation, cleverness, or wordplay, motivated by our basic need to have fun. Laughing together helps us connect with each other and strengthens our bond. It is healthy, even necessary, especially in classrooms where students are our captive audience. How do we create a no sarcasm zone? We know it when we hear it, so we can do something about sarcasm if we: - Evaluate and change our own behavior. - Make sure we are honest and kind, with pure motives. - Teach and model better ways of being. - Treat students and their families with genuine compassion and respect. Albuquerque City Schools offers this advice. Replace the old way…Teacher communicating with sarcasm: “My, my, my. Aren’t you a smart class. It looks like by age 12 you’ve all finally learned to find your seat and sit down after the bell. And to think it only took you half of the morning to do it. I don’t know if there is another class in the entire school as smart or quick as you guys.” With a new way…Teacher communicating honestly without sarcasm: “One of the expectations of this class is to be seated and ready to go to work when the bell rings. I appreciate those of you who were quietly seated when the bell rang today.” Exactly. Straightforward, helpful communication, with no victims. Posted on August 6, 2013, in Bullying and Harassment, Ideas to try, Perspectives and tagged building trust, bullying, compassion, empathy, feelings, malice, Motivation, new school year, positive school climate, Relationships, respect, victims, violence continuum. Bookmark the permalink. 1 Comment.
<urn:uuid:ea4c4e91-72db-45b3-939d-26925d5a9c0f>
CC-MAIN-2017-43
https://schoolclimate.com/2013/08/06/back-to-school-tip-create-a-no-sarcasm-zone/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822116.0/warc/CC-MAIN-20171017144041-20171017164041-00402.warc.gz
en
0.939541
1,194
2.75
3
Birds are also known as Ave’s or avian dinosaurs is a group of endothermic vertebrates that comes with feathers, toothless beaked jaws, the laying of hard-shelled eggs, a high metabolic rate, a four-chambered heart, and a strong yet lightweight skeleton. As of now, 10,000 types of birds has been identified in the world. There are few unique birds that come with long tails, Here is the list of the top 10 birds with long tail, Birds With Long Tail The scissor-tailed flycatcher is a type of kingbird that belongs to the flycatcher family. The bird species is native to North and South America. It thrives in savannas with scattered trees, fields, pastures, areas near the towns, golf courses and scrublands. The scissor-tailed flycatcher is one of the birds with long tails that can grow upto 8.7 to 14.6 inches in length and 1.3 to 2 ounces of weight. Talking about the appearance, they have a grey head and back along with white throat and salmon-pink flanks. Male bird species has a much longer tail than females and juvenile birds. The varage lifespan of the bird species is 10 to 15 years in the wild. Also Read: Top 10 Beautiful Black And White Birds In The World Image Source: Texas Eagle 2.Lady Amherst’s pheasant Lady Amherst’s pheasant is a gamebird that belongs to the Phasianidae family. Male species is very colourful and comes with long black and white tail along with a greenish back, red and yellow rump. The small and cute birds can grow upto 3 to 4 ft long and weighs approximately 1.5 to 2 pounds. The avarage lifespan of Lady Amherst’s pheasant is 6 to 10 years in the wild and up to 15 years under captivity. They are mostly seen in the regions of southwestern China and northern Burma in forested areas and bamboo thickets. It loves to feed on seeds, berries, and roots. Lady Amherst’s pheasant is named after Sarah Countess Amherst, wife of Sir William Pitt Amherst, Governor of Bengal. Also read: 10 Amazing Water Birds In The World Australian continent has only two species of Lyrebird known as Albert’s Lyrebird and the Superb Lyrebird. The bird species also features on the Australian 10c coin and the superb lyrebird is an expert mimic who is capable of copy both natural and mechanical sounds. The name of superb lyrebird comes from its tail that looks like a lyre which is an ancient Greek musical instrument and hence listed as one of the birds with a long tail. The species can grow upto 80-100 cm tall including the tail. It loves to feed on seeds, insects, spiders, worms, frogs, and smaller invertebrates. The superb lyrebird is distributed in southeastern Australia and southern Tasmania. It thrives in regions of moist forests and woodlands. Also Read: Top 10 Beautiful Orange And Black Birds Image Source: David Cook Turquoise-browed motmot belongs to the motmot family. It is mostly seen in Central America, from southeast Mexico to Costa Rica. The bird species appear in turquoise, green and orange colour in the wild and prefers edges of forests and scrubland. It loves to thrive in the tropical forests of Central America that come with a strong beak. It is also known by the name of Torogoz in El Salvador and Guardabarranco in Nicaragua. Also, the Turquoise-browed motmot is the national bird of these two countries. The signature beak comes with two bare feathers ending in tufts. Image Source: Wikimedia One of the beautiful types of yellow birds, Golden Pheasant is a colourful bird that has a long tail barred in light and dark brown. Talking about the appearance, the upper back is green with wings that are dark brown and their rump is golden. The male species can grow upto 43 to 44 inches while the females are shorter than can grow upto 26 inches, however, two-third of the total length is their long and beautiful tail. The total wingspan of the species is around 70 cm or about 27.5 inches. The bird species can fly but they cannot go for long flights because of long tails and short wings. The avarage lifespan is 5 or 6 years in the wild and 15 years to 20 years in captivity. The resplendent quetzal is a beautiful bird known for its green body and redbreast. It has a colourful plumage and quetzal feathers can shine in colors such as green, cobalt, lime, yellow and even ultramarine, howvever, that totally depends on the light. The male species has a helmet-like crest and the bill is yellow in colour in mature males and black in females. Resplendent quetzal distribution can be seen from Chiapas, Mexico to western Panama. It can grow upto 36 to 40 cm in length and the avarage lifespan of the bird species in wild is 3 to 10 yrs. Resplendent quetzal also thrives in vegetated ravines, open areas with scattered trees and pastures. Red-billed Streamertail Hummingbirds can only be seen in the Caribbean island of Jamaica and mostly seen along the coast and in the mountains. It is also known as the Doctorbirds, God Birds, Scissors Tails, Longtail Hummingbirds or Western Streamertails and closely related to the Black-billed Streamertails a subspecies. It can grow upto 3.25 to 3.5 inches in length and the long tail comes with another 6 to 7 inches. This is the longest tail of all hummingbirds and hence listed with the birds with a long tail. It generally feeds on nectar taken from a variety of brightly coloured, scented small flowers of trees, herbs, shrubs and epiphytes. Image Source: Wikimedia Indian Peafowl is a species of birds called pheasants. The male’s species are known as peacocks, howvever, the females are known as peahens and together they are known as peafowl. It is among the largest of all birds that fly where the beautiful feathers are also cover the tails of a peacock. Indian Peafowl is native to the countries of India and Sri Lanka in South Asia. The family of peafowl is known as “bevvy” and the group of peafowl is called “party”.The beautiful and colourful tail is only a feature of the male species. The avarage lifespan of Indian Peafowl is 20 years both in the wild and in captivity. Image Source: Wikimedia The Long-tailed widowbird is also known as “Sakabula” is a bird species that belongs to the family Ploceidae. It is mostly seen in Angola, Botswana, the DRCongo, Kenya, Lesotho, South Africa, Swaziland, and Zambia. The medium-sized bird species can easily identify with the help of their long tail that is approximately 20 inches long. The bird was first described by the French polymath Georges-Louis Leclerc, Comte de Buffon in 1779 in his Histoire Naturelle des Oiseaux from a bird collected in the Cape of Good Hope region of South Africa. It feeds on seeds, supplemented occasionally by arthropods. Image Source: Wikimedia 10.Ribbon tailed astrapia The Ribbon tailed astrapia also known as Shaw Mayer’s astrapia is a species of bird-of-paradise. It is distributed in the regions of Papua New Guinea. Ribbon-tailed astrapia is the most recent species of bird-of-paradise and it endangered because it is mainly hunted for plumes and listed as Threatened on the IUCN Red List of Threatened Species. Ribbon tailed astrapia was discovered by the great naturalist and New Guinea explorer Fred Shaw Mayer in 1938. The medium-sized bird species can grow upto 32 cm long without a tail and the length of long-tail is approximately 1 metre and therefore popular as one of the birds with a long tail. Image Source: Francesco Veronesi These are the 10 birds with long tail. Kindly share and do post your comments.
<urn:uuid:cf25d93f-3bf5-4515-8e4c-c15412efddbd>
CC-MAIN-2023-14
https://utahpulse.com/birds-with-long-tail/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00457.warc.gz
en
0.953146
1,860
3.21875
3
The Global Environment Facility (GEF) is a partnership for international cooperation, bringing 184 countries, international institutions, civil society organizations, and the private sector together to address global environmental issues. Since 1991, the GEF has provided $21.5 billion in grants and leveraged $117 billion in cofinancing for 5,000 projects in more than 170 developing countries. For 27 years, developed and developing countries alike have provided these funds to support activities related to biodiversity, climate change, international waters, land degradation, and chemicals and waste in the context of development projects and programs. WWF and the GEF have a rich history of partnership and mutual support. At the first United Nations Earth Summit in Rio in 1992, WWF was an active participant in the international negotiations to establish the GEF. We have since been a ceaseless supporter of its policies and operations, participating in the design or execution of more than 100 GEF programs and projects. GEF Agency Accreditation A milestone in this partnership was reached in November 2013, when the GEF Council welcomed WWF as a GEF Project Agency. This status gives WWF the ability to work directly with the GEF’s member countries to design and implement GEF programs and projects on their behalf, with full accreditation regarding GEF policies, rules, and procedures. WWF-US serves as the GEF agency within the international WWF Network. The GEF exerts significant influence for positive change by investing in new ideas, bringing together influential partners, and taking solutions to scale across the globe. As a GEF Project Agency, WWF can leverage this influence—in conjunction with our own global network of expertise and partnerships—to protect some of the most vulnerable species, places, and communities on Earth.
<urn:uuid:ba20351d-77e7-4668-8692-2015ae3a611f>
CC-MAIN-2023-23
https://www.worldwildlife.org/topics/wwf-gef
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00446.warc.gz
en
0.935501
355
2.53125
3
Celebrating the Heroes of the Nation Maldives Promotion House – An important day in the history of Maldives, today the National Day, is observed to celebrate the victory of Muhammad Thakurufaanu over the Portuguese in year 1573 AD. According to the Islamic calendar, the National Day of Maldives falls on the 1st of Rabee ul Awwal, the third month. The story of Muhammad Thakurufaanu is a story of bravery and freedom from the colonial rule of ancient Portuguese. In 1558, the Portuguese attacked Maldivian Sultan and established their own rule. Muhammad Thakurufaanu was the son of island chief Husain of Utheemu in Thiladhummathi Atoll and Lady Amina Dio of Ihavandhoo. After the invasion, it is reported that the Portuguese rule was harsh and cruel in a period which is describe as ‘‘a time when intolerable enormities were committed by the invading infidels, a time when the sea grew red with Maldivian blood, a time when people were sunk in despair.’’ To bring an end to this, Muhammad Thakurufaanu, left the Maldives with his brothers Ali and Hasan to Maliku off the coast of India in the Laccadive Archipelago. The three Utheemu brothers built the ship Kalhuoffummi, the sailing boat used in his endeavour to free the country of the occupation by the Portuguese. The sails of the ship were made on the island of Maroshi, Shaviyani Atoll. This island is historic and still has the tree that grew from the raw wooden post of the tree used to make the sail of Kalhuoffummi. It is also the largest tree of its kind in the country, and probably the oldest as well. The three brothers landed on a different island every night, fought the Portuguese, and set sail into the ocean before daybreak. They reached the capital island Malé on the night before the day fixed by the Portuguese garrison of Andiri Andiri for the forcible conversion of the inhabitants to Christianity, on the penalty of death for non-compliance. The Utheemu brothers along with other Maldivians who were determined to die for their country and faith attacked the Portuguese garrison and gained independence for the country from its invaders. According to history, their leader was killed by a musket shot from Muhammad Thakurufaanu himself. It is said that Mohamed Thakurufaanu received a lot of help from the renowned Maroshi Raaveribe (toddy tapper) in his fight for national independence. It was his job to mend and maintain the sail of the Kalhuoffummi every time it docked at Maroshi, which was an important port during the fight. The Maldivians assigned Muhammad Thakurufaanu as their Sultan, no longer recognizing the sovereignty of the Portuguese kings or their appointed regents. The chronicles report him to have ruled wisely, being just and considerate, protecting the poor, and even solicitous for the people’s interests. He was the first Maldivian king to form the unified military body. Muhammed Thakurufaanu died a natural death on August 26th, 1585 AD. Every year the first day of Rabi’ al-awwal is celebrated as the Maldives National Day or Gaumee Dhuvas in remembrance of Mohamed Thakurufaanu’s defeat of the Portuguese. We at Maldives Promotion House wish Maldivians and foreigners in Maldives alike, a very happy Maldives National Day. Have fun and enjoy.
<urn:uuid:8ee372fa-e6f8-49b2-acb9-86cce238ad79>
CC-MAIN-2020-34
https://maldives.net.mv/4607/maldives-national-day-for-the-heroes-of-a-nation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738816.7/warc/CC-MAIN-20200811150134-20200811180134-00573.warc.gz
en
0.961507
771
2.59375
3
Home > Family Poultry Training Course Written by David Farrell, the Family Poultry Training Course helps families and communities achieve sustainable, small-scale poultry production. The Scavenging Chickens Training Handbook caters to backyard / village production (and may be useful for school-based poultry keeping). We thank the ATSE Crawford Fund for providing financial assistance to improve and upgrade the three manuals to make them suitable for Poultry Hub. We are grateful to UniQuest (The University of Queensland) who provided financial support in the early stages of producing these manuals. These manuals were written and produced by David Farrell with the technical assistance of Rider Perez-Maldonado and Bronwyn Powell, and illustrated by Shona Reed and Susan Powell. The conversion into an online format on Poultry Hub was overseen by the Poultry CRC. This unique presentation shows the fundamental structure and anatomy of the chicken Now released in the App Store. Developed by the Poultry CRC. Have fun while learning about what makes a good egg. Download for free in Australia These lists contain organisations and individuals associated with the Australian poultry industry eChook keeps people informed of the Poultry Cooperative Research Centre’s activities.
<urn:uuid:023b9fca-d9f7-4af9-9bff-4c716538fbe0>
CC-MAIN-2014-23
http://www.poultryhub.org/family-poultry-training-course/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261958.8/warc/CC-MAIN-20140728011741-00472-ip-10-146-231-18.ec2.internal.warc.gz
en
0.900628
246
2.59375
3
Whether you write for college, business, or simply as a therapeutic activity to boost your mental well-being, you must be aware of different forms of writing and their peculiarities. In other words, you should be aware of the difference between academic writing and general writing. Take a look at our comprehensive list of the major distinctions between academic writing and general writing to ensure that you never confuse the two and produce stellar content each time! Characteristics of Academic Writing The purpose of academic writing is to demonstrate your ability to think critically about a subject at hand and to present your ideas logically. This means going beyond simply reiterating what you’ve read; if all you do is repeat other people’s arguments, you’ll never become a skilled academic writer. Because academic writing is intended for a scholarly audience, it is essential to brush up on your writing skills and provide error-free content. The best strategy is to use a pro essay service that can help you boost your academic writing skills in no time by providing expert help from industry professionals. While some grammatical mistakes are fine when writing an astrology blog for your close friend’s circle, such errors are not acceptable in academic writing. Some of the other essential aspects of academic writing are: - Academic writing should concentrate on a specific academic subject and refer to already-existing academic papers covering the same topic; - It should stem from thorough academic research; - Its goal is to provide reliable proof to the readers; - It should be structured in a formal manner; - It should include ample citations – usually in APA, MLA, or Chicago format. Academic writing includes research papers, book reports, dissertations, essays, journal articles, and more. Characteristics of General Writing General writing is any form of writing that is not intended for an academic audience. It could be a letter to your colleague, a novel, or a promotional blog post. Even though solid writing skills are essential for both academic and general writing, the latter is more welcoming of creativity, eccentricity, and errors. While academic writing allows you to portray the best of your systematic thought and ability to form arguments, general writing can help you develop your unique writing style and connect with your readers emotionally. Here are some of the most important features of general writing: - General writing can be formal or informal; you have complete control over the length, tone, and style of your writing. Even slang is OK if it properly conveys your argument. - Its purpose is to inform, entertain, or persuade the readers. - You don’t need to include citations and references. Despite the differences, both general writing and academic writing require well-developed writing skills to effectively communicate with the audience. Even though you have more flexibility in general writing to develop your style, it is critical to always improve your writing skills in order to provide compelling content. Poor style and bad grammar will irritate an academic audience just as much as anyone else. So, whether you’re writing an academic paper for your midterm or a sci-fi novel, set aside many hours a day for skyrocketing your writing skills by constant reading, writing, and consulting with professionals! Barbara Fielder is a journalist and blogger. Her expertise ranges from political journalism to creative writing to how-to blogs. Barbara is equally well-versed in a variety of academic writing formats. In her spare time, she loves to write instructional blog posts to help others boost their writing skills as well as use writing for self-therapy.
<urn:uuid:c7b98feb-95df-44fa-b14b-0dc474727ecb>
CC-MAIN-2023-14
https://www.meidilight.com/the-difference-between-academic-writing-and-general-writing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00769.warc.gz
en
0.943267
739
3.265625
3
Warning: This page or section contains speculation that may not be accurate. The Moon (in Greek: σελήνη Selene, in Latin: Luna) is Earth's only natural satellite and is also Haley Galaxy's homeworld. The moon is made of "Chwiss" (cheddar and Swiss cheese) and has a bouncy surface. Before Haley's discovery, according Bea's book about the moon, it was thought that the moon had sparkly little critters inhabiting its surface. It is believed that the Moon's inhabitants are technologically advanced and are likely years ahead from what Lalaloopsy Land currently has. One proof was Haley's first arrival to Earth before Dot could even reach the Moon herself. - Main article: Sky Gate No known explorer has ever visited and explored the lunar surface. Dot Starlight was supposed to be the first outsider to visit the moon, but her mission was postponed when her rocket's engine was destroyed by Crumbs' mouse. Her course was to a take straightforward path to the moon which takes 30 minutes to travel. To date, the moon remains unexplored by Earth's inhabitants. It has an unnamed native language which the only known speaker is Haley herself. Dot could barely understand and can speak little of it.
<urn:uuid:58a59bd4-4b59-4844-b6ed-beb9d0fe8f3c>
CC-MAIN-2017-34
http://lalaloopsyland.wikia.com/wiki/Moon
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105195.16/warc/CC-MAIN-20170818233221-20170819013221-00439.warc.gz
en
0.976393
265
3.109375
3
We Oklahomans know heart attack signs about as well as our peers. What we don’t do so well is call 911. A recent issue of the Centers for Disease Control and Prevention’s Morbidity and Mortality Weekly Report compared how much 71,994 residents of 14 states knew about heart attack symptoms and whether they knew to call 911. Overall, awareness of all five warning signs was 31 percent. Eighty-six percent of respondents reported they would first call 911 if someone were having a heart attack. Among Oklahomans, only 81 percent would do so. In 2005 approximately 920,000 people had heart attacks; approximately 157,000 were fatal. Fewer people would die from heart attacks if they sought medical care more quickly. “Although emergency care and medical therapies for acute events have improved, studies have shown that the time from symptom onset to treatment overall has not decreased,” according to the report. I’m guessing that awareness of heart attack is lacking, and people’s first reaction is to call a loved one or drive the victim to the hospital. Maybe loved ones don’t recognize what’s happening or downplay the seriousness of it. Or maybe people in some parts of the state have to wait for an ambulance to respond, making driving the heart attack victim to the hospital more of an option. Jeff Raymond, Medical Writer
<urn:uuid:fdb671dd-f061-4fb3-af00-7e5f88fcb52c>
CC-MAIN-2013-20
http://blog.newsok.com/health/category/cdc/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383218/warc/CC-MAIN-20130516092623-00005-ip-10-60-113-184.ec2.internal.warc.gz
en
0.963615
289
2.703125
3
Congress discovers a bill with bipartisan support that the president will sign A measure to modestly reduce incarceration looks likely to become law | WASHINGTON, DC TOUGH, ANTI-CRIME rhetoric has been part of Donald Trump’s public persona for decades. Well before he ran for office, in 1989, he took out full-page ads in New York papers that said, “Muggers and murderers…should be forced to suffer, and when they kill, they should be executed for their crimes.” He announced his candidacy by inveighing against Mexicans “bringing crime”, then courted support from rank-and-file police officers. His first attorney-general, Jeff Sessions, was a hoary drug warrior who reversed Justice Department efforts to help police departments reform and to send fewer people to prison. William Barr, Mr Sessions’s prospective replacement, has similar views. In 1994 he chaired a commission in Virginia that recommended longer imprisonment and the abolition of parole. But Mr Trump has also been receptive to personal arguments against harsh criminal-justice policies. At the urging of Kim Kardashian, a fellow reality-television star, he commuted the life sentence of Alice Marie Johnson, a 63-year-old woman imprisoned for money laundering and drug trafficking. And at the urging of his son-in-law and adviser, Jared Kushner, he has become an unlikely champion of the First Step Act, a criminal-justice bill with bipartisan support. Reversing an earlier decision, Mitch McConnell, the Senate majority leader, said he would bring it up for a vote before the end of 2018. Despite gripes from some on the right who deem it too soft on criminals, and some on the left who feel it does not go far enough, its passage looks likely. That’s right: a bipartisan bill will probably make it through Congress and then be signed by the president. The First Step Act is a sentencing-reform bill that repeals some of the harsher federal laws passed in the 1980s and 1990s. In 2010 Congress passed the Fair Sentencing Act, which among other things reduced the sentencing disparity between convictions for crack and powdered cocaine. The First Step Act would make that measure retroactive, allowing nearly 3,000 offenders imprisoned for crack-cocaine offences to petition judges for early release. It would also reduce the mandatory-minimum sentence for serious drug felonies from 20 to 15 years, and for conviction on a third drug-trafficking or violent felony from life to 25 years. Judges would have more discretion to sentence people with minor previous convictions to less than the mandatory minimum (at present they can exercise that discretion only for non-violent drug offenders with no criminal history). According to an estimate from the Congressional Budget Office, more than 2,000 people a year would be affected by that “safety valve” expansion. Prisoners would no longer be sent to facilities more than 500 miles from their homes, and pregnant prisoners would no longer be shackled. The bill allows some prisoners, though not those convicted of most violent crimes, to earn time off their sentences by participating in rehabilitative programmes, and it expands federal funding for job-training and educational programming in prisons. More elderly and terminally ill prisoners would be eligible for compassionate release. And all prisoners would be able to reduce their time in prison by up to 54 days per year of their sentence for good behaviour. The Brennan Centre, a think-tank and advocacy group, estimates the bill would result in the release around 5,000 prisoners and shorten sentences for roughly 100,000 more. Though welcome, this would only nibble at the prison population. Roughly 2.2m people are imprisoned in America. Less than 10% of them are in federal prisons, and federal prisoners are the only ones affected by the First Step Act’s reforms (see chart). Still, Inimai Chettiar of the Brennan Centre calls the bill “a good compromise”—the resigned view held by many advocates of criminal-justice reform. Given the rhetoric of Mr Trump and policies set by Messrs Sessions and Barr, it is probably as much as anyone could hope for from this administration. It may also encourage Democrats, particularly those eyeing a presidential run, to argue for bolder reforms. Even this modest change has its critics. Jonathan Thompson, executive director of the National Sheriffs’ Association, calls the bill “a giant social experiment,” and argues for “rational prison reform that doesn’t just let people out hoping they won’t recidivate.” Tom Cotton, a Republican senator from Arkansas who has previously said that America has “an under-incarceration problem,” blasted the First Step Act for allowing “early release for many categories of serious, violent criminals”. Yet while carjackers and bank robbers would indeed be eligible for sentence reduction by completing job-training and educational programmes, Mr Cotton is conflating “early release” with “early transfer to pre-release custody”. The federal prison system does not just wash its hands of violent criminals who manage to chip away at their sentences; they are instead sent to halfway houses, home confinement with ankle-monitoring and other types of supervised, conditional release. The bill’s opponents may find themselves shouting into the wind. A version of the First Step Act passed the Republican-controlled House in May by 360 votes to 59, and may have as many as 75 supporters in the Senate. That will displease Mr Cotton, as it will leave a bitter taste in the mouths of reform advocates who wanted more. But that is the nature of compromise. This article appeared in the United States section of the print edition under the headline "A first step"
<urn:uuid:b2c70353-41ec-45c9-bd53-73784ec0242a>
CC-MAIN-2023-14
https://www.economist.com/united-states/2018/12/15/congress-discovers-a-bill-with-bipartisan-support-that-the-president-will-sign
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00686.warc.gz
en
0.965075
1,190
2.625
3
In the world of natural remedies, bilberry stands out as a potent and versatile berry. Known for its vibrant color and unique flavor, bilberry is not just a tasty addition to your diet—it’s a nutritional powerhouse with many health benefits. What is Bilberry? Bilberry (Vaccinium myrtillus) is a small, blue-black berry native to Europe, Asia, and North America. It is closely related to blueberries and shares a similar appearance, although bilberries tend to be smaller and darker. Traditionally used in herbal medicine for its various health benefits, bilberries are rich in vitamins, minerals and potent antioxidants. Nutritional Profile of Bilberry Bilberries are packed with essential nutrients that contribute to overall health and well-being including: - Antioxidants: Bilberries are exceptionally high in anthocyanins, a group of antioxidants responsible for their deep purple color. These compounds protect cells from oxidative stress and inflammation, key factors in immune function. - Vitamins and Minerals: Bilberries contain vitamin C, a well-known immune booster, as well as vitamin K, essential for blood clotting and bone health. They also provide small amounts of essential minerals like manganese and potassium. - Fiber: High in dietary fiber, bilberries support your digestive system and help keep your blood sugar levels stable. - Flavonoids: Beyond anthocyanins, bilberries are rich in other flavonoids with anti-inflammatory and immune-boosting properties. Incorporating Bilberry into Your Diet Bilberries can be enjoyed in various forms, including fresh, frozen, or as a supplement. Consider these ideas to incorporate bilberry into your diet: - Smoothies: Add fresh or frozen bilberries to your morning smoothie for a burst of flavor and immune-boosting nutrients. - Oatmeal or Yogurt Topping: Sprinkle bilberries on your morning oats or yogurt for a colorful and nutritious start to the day. - Bilberry Tea: Brew dried bilberries to create a flavorful, antioxidant-rich tea. Bilberry is a true nutritional gem that offers a range of health benefits, including its remarkable ability to fortify the immune system. Packed with antioxidants, vitamins and anti-inflammatory compounds, bilberry can be a valuable addition to your diet. Visit your local health food store and ask about bilberry or search online to see if you can find some of these products from a trusted online retailer. Consider incorporating bilberry into your routine and empower your body’s natural defense mechanisms for a healthier, more resilient you. You are unique and so is your body! Before starting any new health routine, always be sure to talk with your doctor to make sure it is right for your needs.
<urn:uuid:5c605aae-e468-4d85-a11c-8aa67a108d53>
CC-MAIN-2023-50
https://baer-fit.com/boost-your-immune-system-with-bilberry/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00739.warc.gz
en
0.905805
576
2.953125
3
August 16, 2019 Hidden Ancient History Originally published May 5, 2010 image by Jocelyn Sérot, France Is this a corner of the Moon you overlook? Have you specifically observed any of these craters? I thought not. The north eastern limb is an area lacking in remarkable craters, has only the smallest patch of mare lava, and generally looks tired. There are no detected basins right here to provide interesting rilles and wrinkle ridges. Its not as highly cratered as the farside so at some point the really old craters were erased. About the only way to erase things is a large impact, so perhaps Spei does mark the location of an ancient |basin, gone except for crustal weaknesses that later allowed a little magma to reach the surface. This area was apparently much more interesting 3-4 billion years ago. We came too late for the best view. Apr 29, 2010 around 0:15 UT. Mewlon 210 at prime focus, Astronomik red filter, DMK 31AF03, 9 images assembled, 250/1000 images stacked for each. Processing Avistack + Registax. Rükl plate 16 Jocelyn's updated lunar website Yesterday's LPOD: Not Much Red Tomorrow's LPOD: Flows of a Different Kind
<urn:uuid:abf1d9c3-82ab-40cf-8422-062fb6d15703>
CC-MAIN-2020-34
https://www2.lpod.org/index.php?title=August_16,_2019&oldid=44597
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736902.24/warc/CC-MAIN-20200806091418-20200806121418-00367.warc.gz
en
0.934789
274
2.78125
3
Pets and Your Child’s Allergies Not too long ago, expectant parents were often advised to give away their family pets before a baby arrived, especially if there was a family history of severe allergies or asthma. The prevailing theory was that being around pets at a young age increased a child’s risk of developing allergies and asthma. Given that almost 70% of US households have at least one pet (translating into more than 100 million pets) and that people tend to form strong attachments to their pets, this was often an upsetting and difficult task—but one that seemed necessary. Recent research, however, makes it clear that the controversy surrounding this approach is far from over. A study published in the Journal of the American Medical Association looked at the relationship of exposure to dogs and cats in the first year of life, and the allergy development six or seven years of age. The study’s findings were not what you might expect. In the study, 474 children were followed from birth to age six or seven. The babies involved were healthy, full-term infants. When the children were six or seven, they were tested by both a blood test and a skin prick test for the presence of allergic antibodies. Researchers found that children who were exposed to two or more dogs or cats in the first year of life were less likely to have allergies. The study’s authors suggest that bacteria carried by the pet may be responsible for suppressing the immune system’s response. Endotoxins produced by the bacteria shift the child’s developing immune system away from the pattern of response that favors the development of an allergy. Studies published in 2002 in the Lancet and the American Journal of Respiratory and Critical Care Medicine also had similar results, finding that early cat exposure was related to a reduction in allergy development. Unfortunately, some of nearly a dozen similar studies have not fully confirmed these findings, and scientists remain uncertain which children might be benefited (or harmed) by early exposure to animals. To date, none of the studies on this important topic adequately controls for differences in the degree of animal exposure or for genetic factors that we know strongly influence the development of allergies (such as whether one or both parents are allergic). The evidence that pet ownership reduces allergy is both interesting and suggestive, but pending larger and better scientific studies, it should still be regarded as preliminary. As two British lung experts lamented, “Results . . . are such that almost any view . . . could be supported by evidence from the literature.” Until we have more solid evidence, parents should make decisions about pet ownership without expecting that human newborns will derive health benefits from their furry friends. If Your Child Already Has an Allergy Although several studies have found that being around pets might help prevent young children from developing allergies, it cannot help a child who already has an allergy to cats, dogs, or other pets. If your child has already developed an allergy to your pet, it is a good idea to keep your child away from the pet. If you do have a pet in your home and an allergic child, the American Academy of Allergy, Asthma, and Immunology offers the following tips to help minimize contact with pets and their allergens: - Avoid hugging and kissing pets if you are allergic. - Keep pets out of the bedroom. - Do not have direct contact with litter boxes if you are allergic. - Do not place litter boxes in areas with air filtration intake vents. - Wash hands after touching a pet. - Consider covering upholstered furniture where a pet sleeps or rests with plastic covers - Wash your pets on a weekly basis. There are pet shampoo products available that can neutralize or inactivate allergens present on the skin of cats or dogs. - Have someone who is not allergic brush the pet regularly and do brushing outside the home. - Ask your veterinarian about a balanced diet for your pet. A healthy diet may help minimize your pet’s hair loss, leading to reduced pet dander indoors. - Use an indoor air, electrostatic, or HEPA air cleaner to filter pet dander from the air. - Use a micro-filter or double bag in your vacuum to help reduce pet allergens in the carpet. - Talk to your doctor about the possibility of allergy shots for your child. While pets might offer some protection against allergies, they also pose risks to children. Bites and scratches from pets may prove serious or even fatal. Pets carry many pathogenic organisms which may be dangerous for children (or adults). Among these are beta streptococci (strep), methacillin- resistant staphylococci, and Clostridium dificile. Each of these organisms can be passed from pets to children and can cause serious illness. Dogs and cats must be examined for parasites on a regular basis and treated to avoid risks to children. Dog tapeworms are especially serious. Other dog-derived worms may be associated with asthma in children. American Academy of Allergy, Asthma, and Immunology (AAAAI) National Institute of Allergy and Infectious Disease About Kids Health Allergy Asthma Information Association Allergy statistics. National Institute of Allergy and Infectious Disease website. Available at: http://www.niaid.nih.gov/factsheets/allergystat.htm. Accessed December 7, 2003. Cooper PJ. Toxocara canis infection: an important and neglected environmental risk factor for asthma? Clin Exp Allergy. 2008 Jan 30 Ferguson BJ. New horizons in the management of allergy. Otolaryngologic Clinics of North America. 2003;36(5):771. Ownby DR. Exposure to dogs and cats in the first year of life and risk of allergic sensitization at 6 to 7 years of age. JAMA. 2002;288(8):963-972. Pets and allergies: minimizing the reaction. American Academy of Allergy, Asthma, and Immunology website. Available at: http://www.aaaai.org/patients/seniorsandasthma/pets_allergies.stm. Accessed 12/17/2005. Steele MT, Ma OJ, Nakase J, Moran GJ, Mower WR, Ong S, Krishnadasan A, Talan DA; EMERGEncy ID NET Study Group. Epidemiology of animal exposures presenting to emergency departments. Acad Emerg Med. 2007 May;14(5):398-403. Last reviewed March 2008 by Lawrence Frisch, MD, MPH Please be aware that this information is provided to supplement the care provided by your physician. It is neither intended nor implied to be a substitute for professional medical advice. CALL YOUR HEALTHCARE PROVIDER IMMEDIATELY IF YOU THINK YOU MAY HAVE A MEDICAL EMERGENCY. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with any questions you may have regarding a medical condition. Copyright © 2011 EBSCO Publishing All rights reserved.
<urn:uuid:af8f2dac-d679-431b-986a-7ffee3f469f7>
CC-MAIN-2014-10
http://www.beliefnet.com/healthandhealing/getcontent.aspx?cid=%0D%0A%09%09%09%09%09%0947212
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654285/warc/CC-MAIN-20140305060734-00078-ip-10-183-142-35.ec2.internal.warc.gz
en
0.933112
1,471
2.625
3
It is of historical interest that the Egyptians, Greeks and Romans recognized asthma, and that it represented as much of a problem in their time as it does at present. Salter's explanation in 1864 of this age-old problem was that asthma was essentially, with perhaps the exception of a single class of cases, exclusively a nervous disease. In 1878 J. R. Berkart stated that "asthma was a symptom of chronic bronchitis and emphysema, as well as one of those that are present in various cardiac affections." He compiled a textbook, which appeared in 1911, in which he made the statement that "asthma is a symptom of fibrinous bronchitis and is caused by a micro-organism." F. H. Bosworth, as a rhinologist, looked on asthma as a vasomotor rhinitis, depending on three prerequisites: first, a neurotic temperament, according to the teachings of Salter; second, pathologic conditions in the mucosa of the nasal
<urn:uuid:dcbcb3c7-47d8-4c74-8d70-f4acb4815560>
CC-MAIN-2014-15
http://jama.jamanetwork.com/article.aspx?articleid=250149
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521512.15/warc/CC-MAIN-20140416005201-00223-ip-10-147-4-33.ec2.internal.warc.gz
en
0.985221
212
3
3
Beat the Heat Quick Tips for Responding to Excessive Heat Events Read complete Excessive Heat Events (EHE) Guidebook on the U.S. Environmental Protection Agency website. Below is a snapshot of the guidebook in brief. - Use air conditioners or spend time in air-conditioned locations such as malls and libraries. - Use portable electric fans to exhaust hot air from rooms or draw in cooler air. - Take a cool bath or shower. - Minimize direct exposure to the sun. - Stay hydrated - regularly drink water or other nonalcoholic fluids. - Eat light, cool, easy-to-digest foods such as fruit or salads. - Wear loose fitting, light-colored clothes. - Check on older, sick, or frail people who may need help responding to the heat. - Know the symptoms of excessive heat exposure and the appropriate responses. - Direct the flow of portable electric fans toward yourself when room temperature is hotter than 90 degree Fahrenheit. - Leave children and pets alone in cars for any amount of time. - Drink alcohol to try to stay cool. - Eat heavy, hot, or hard-to-digest foods. - Wear heavy, dark clothing. Use of Portable Electric Fans During Excessive Heat Events The widespread availability and ease of using portable electric fans draw many people to use them for personal cooling during an EHE. Portable electric fans can, however, increase the circulation of hot air, which increases thermal stress and health risks during EHE conditions. As a result, portable electric fans need to be used with caution and under specific circumstances during an EHE. Here is a list of Do’s and Don’ts for their use: - Use a portable electric fan in or next to an open window so heat can exhaust to the outside (box fans are best). - Use a portable electric fan to bring in cooler air from the outside. - Plug your portable electric fan directly into a wall outlet. If you need an extension cord, check that it is UL (Underwriter Laboratories) approved in the United States or CSA (Canadian Standards Approved) approved in Canada. - Use a portable electric fan in a closed room without windows or doors open to the outside. - Believe that portable electric fans cool air. They don’t. They just move the air around and keep you cool by helping to evaporate your sweat. - Use a portable electric fan to blow extremely hot air on yourself. This can accelerate the risk of heat exhaustion. - Use a fan as a substitute for spending time in an air-conditioned facility during an EHE. - If you are afraid to open your window to use a portable electric fan, choose other ways to keep cool (e.g., cool showers, spend time in an air-conditioned location).
<urn:uuid:a23202d4-090b-4827-a94d-8dd6bde71bd3>
CC-MAIN-2020-16
https://www.liberty-township.com/359/Beat-the-Heat
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500426.22/warc/CC-MAIN-20200331084941-20200331114941-00154.warc.gz
en
0.888964
593
2.984375
3
By Emily Hale High school. Hallways filled with a mass of people. A lot them we don’t know, but pretend to; hearing whispered words between people; multitudes of secrets and rumors. We think that these things will never have an effect on the person that we’re talking about, that they’ll never get back to them, but the problem is, is that they do. Every day, walking down the hallways, if you just happen to listen as you walk past others, chances are you will hear someone talking about someone else. It’s practically an epidemic. Not many people realize this, but gossiping is a form of bullying. Bullying is defined as “unwanted, aggressive behavior among school aged children that involves a real or perceived power imbalance”. There are many forms of bullying, such as teasing, threats, gossip, exclusion or discrimination, or calling names. Walled Lake Central is a zero tolerance school, meaning that bullying will not be tolerated in any circumstances. In the student code of conduct, it is stated, “The Board of Education prohibits the bullying of any District student at school, regardless of the motive of the perpetrator.” We’re all guilty of doing this in one form or another, whether by accident, or on purpose, but unfortunately many people don’t care about the effect that it has. People need to be more aware of their actions, along with the consequences and effects on those that are the victims of what people say. We don’t like to think about the reality of things. It’s nicer to think that no one gets bullied and everyone is happy, but there are people constantly going through these types of problems. Over 64% of kids don’t report being bullied, and one out four kids do. Kids who are bullied are more at risk for academic problems, substance abuse, and violent behavior during school or later on adult life. Even if you’re not the one bullying someone else, there’s always a possibility that you can help someone else. More often than not, people keep their heads down and don’t say anything, believing that someone else will help them, but that help never comes. More often than not, helping someone can make a positive difference in the situation. So instead of just watching someone say something to a kid in your class, instead of saying something in the moment because you’re angry, instead of making fun of someone behind their back, you’re better off keeping it to yourself. It may save you trouble later on when they find out, and it will make you feel better knowing that you’re the bigger person. It’s all about maturity in how we handle situations, high school is the transition to adulthood, and if we continue to act like this, many of us are in for a reality check,. Things like that won’t cut it in the real world, and unfortunately several of us need to learn to grow up. Things are only going to get better if we try to make them better, because the world doesn’t work like how we thought when we grew up with Disney movies.
<urn:uuid:8958b678-d35c-4eb0-9784-46048e779c54>
CC-MAIN-2023-14
https://wlcnews.com/2016/10/16/stop-gossip-and-be-a-part-of-the-solution-to-the-problem-of-bullying/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00175.warc.gz
en
0.966724
669
3.109375
3
Joseph Ignatius Breen October 14, 1888 |Died||December 5, 1965 (aged 77)| Los Angeles, California, U.S. |Resting place||Holy Cross Cemetery, Culver City| |Education||Gesu Parish School| Roman Catholic High School |Alma mater||Saint Joseph's College| |Occupation(s)||Film censor, journalist| Joseph Ignatius Breen (October 14, 1888 – December 5, 1965) was an American film censor with the Motion Picture Producers and Distributors of America who applied the Hays Code to film production. Breen was the youngest of three sons born to Mary and Hugh A. Breen in Philadelphia. His father had emigrated from Ireland and met his mother Mary in New Jersey. Breen was raised in a strict Roman Catholic home and attended Gesu Parish School until the eighth grade. He then attended Boys Catholic High School. He attended Saint Joseph's College but dropped out after two years, after which he worked as a newspaper reporter for fourteen years in Philadelphia, Washington, D.C., and Chicago. After working as a reporter, Breen worked for the United States Foreign Service for four years, serving in Kingston, Jamaica, and in Toronto, Canada. In 1926, he served as the publicity director for the 28th International Eucharistic Congress in Chicago. Breen was a journalist and an "influential layperson" in the Catholic community. Breen worked for Will H. Hays as a "troubleshooter" as early as 1931. In 1933, the Roman Catholic National Legion of Decency was founded, and began to rate films independently, putting pressure on the industry. In 1933 and 1934 the Legion along with a number of Protestant and women's groups launched plans to boycott films that they deemed immoral. The Motion Picture Producers and Distributors of America (MPPDA) had, up until then, enforced the motion picture industry's own self-censorship standards, albeit not very seriously. Hays, who had been in charge of enforcing this voluntary code since 1927, worried that the NLD's efforts could weaken his own power and that of his office, and hurt industry profits. Hays appointed the "tough Irish Catholic" Breen to head the Production Code Administration (PCA), a newly created department of the MPPDA, created to administer the Motion Picture Production Code. Unlike previous attempts at self-censorship, PCA decisions became binding — no film could be exhibited in an American theater without a stamp of approval from the PCA. Any producer attempting to do so faced a fine of $25,000. After ten years of unsuccessful voluntary codes and expanding local censorship boards, the studio approved and agreed to enforce the codes, and the nationwide production code was enforced starting on July 1, 1934. Liberty Magazine wrote in 1936 that Breen's appointment gave him "more influence in standardizing world thinking than Mussolini, Hitler, or Stalin." Breen, having written anti-Semitic letters in the early 1930s including phrases like "Ninety-five percent of these folks are Jews of an Eastern European lineage. They are, probably, the scum of the scum of the earth", has helped place him in the spotlight of historians' assessments of the controversy surrounding Hollywood's degree of collaboration with the Nazis throughout the 1930's. After 1934, he was "publicly and forthrightly anti-antisemitic." He occasionally collaborated with Georg Gyssling, the Nazi representative in Hollywood. William Dudley Pelley, founder of the anti-Semitic organization the Silver Legion of America, believed that Jews controlled the movie industry, which he thought to be the "most effective propaganda medium in America", during the 1930s. Hence he applauded the fact that Breen had assumed the power to censor Hollywood. Breen, who also expressed anti-Semitic views, was deeply worried that Jewish filmmakers would try to use Nazi mistreatment of Jews during the 1930s as a vehicle for propaganda. He was concerned that Germans would be offended by harsh depiction of Nazis. He specifically warned Hollywood producers to avoid the topic altogether, saying that "[t]here is a strong pro-German and anti-Semitic feeling in this country ... and while those who are likely to approve of an anti-Hitler picture may think well of such an enterprise, they should keep in mind that millions of Americans might think otherwise." Breen claimed that plans to make such pictures were being coordinated through the Hollywood Anti-Nazi League, which he claimed was "conducted and financed almost entirely by Jews". Breen pressured Metro-Goldwyn-Mayer to drop plans to film Sinclair Lewis's best-selling anti-fascist novel, It Can't Happen Here after insisting on 60 edits with more to follow. He also asked MGM in 1938 to change the villain from Nazis in the adaptation of an anti-Nazi novel Three Comrades in order to "get away from the suggestion that we are dealing with Nazi violence or terrorism." Breen did not issue a statement against anti-semitism until July 1939, which said, in part, "In my judgement there is nothing more important for us Catholics to do at the present moment than to use our energies in stemming the tide of racial bigotry and hostility." This followed statements in late 1938 by Pope Pius XI denouncing anti-Semitism, stating that "it is not possible for Christians to take part in anti-Semitism" as well as the newly formed Committee of Catholics to Fight Anti-Semitism. The two authors of the Hays Code, Martin J. Quigley and the Rev. Daniel Lord, SJ, promoted the cause. Quigley asked Breen to help gather statements of support from Catholics in the Hollywood film industry. Breen resigned from the PCA in April 1941, attributing his departure to "overwork and the need of a long rest." He briefly put in a stint as the general manager of RKO Pictures, but returned to the PCA in 1942. By the mid-1950s, Breen's power over Hollywood was diminishing. For instance, Samuel Goldwyn publicly insisted that the production code be revised. Around the same time, Howard Hughes, owner of RKO, released The French Line, featuring revealing images of actress Jane Russell in a bathing suit, despite the fact that Breen had refused to approve the picture for release. In 1951, Breen's office refused to approve Otto Preminger's film The Moon Is Blue because of objections to the dialogue. United Artists backed Preminger in his decision to release the movie without Breen's approval. In 1954, the same year he retired, in responding to these events in an interview with Aline Mosby, Breen claimed that "after the events of the past 10 months — The French Line, The Moon is Blue and Goldwyn — the code is more entrenched than ever before. Those events brought tremendous support from groups all over the country." Breen retired from the PCA and was replaced by Geoffrey Shurlock. On his retirement he was presented with an honorary Academy Award for "his conscientious, open-minded and dignified management of the Motion Picture Production Code". Breen married Mary Dervin in February 1914, with whom he had six children, three boys and three girls. Their son Joseph Breen, Jr. was a writer and director. One of their other children, Thomas, whose right leg was amputated due to a combat injury on Guam during World War II, was cast in a feature role in Jean Renoir's 1950 film The River, playing a wounded war veteran. Renoir was not aware at the time that Thomas was Joseph Breen's son. After his retirement, Breen moved to Phoenix, Arizona, with his wife Mary. He suffered from poor health in his later years and eventually lost the use of his legs. He died at the age of 77 on December 5, 1965, at the Brentwood Convalescent Home in Los Angeles and was buried at Holy Cross Cemetery, Culver City. After Breen's death, Variety magazine wrote that Breen was "one of the most influential figures in American culture" and that "more than any single individual, he shaped the moral stature of the American motion picture." The trade magazine went on to say that Breen enforced the PCA code "with a potent mix of missionary zeal and administrative tenacity." In the 2004 film The Aviator, Breen was portrayed by Edward Herrmann.
<urn:uuid:7489418f-688b-49dc-a832-eaf835c74f5e>
CC-MAIN-2023-23
https://db0nus869y26v.cloudfront.net/en/Joseph_Breen
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00716.warc.gz
en
0.968909
1,886
2.5625
3
Imagine that you could identify and quantify every molecule within a cell (Figure 11.1) in a single assay. You could use this ability to better understand almost any aspect of biology. For example, by comparing the molecular profiles of plants that differed in their resistance to drought, you might discover which combination of genes or proteins makes a crop drought tolerant. Although it is not currently possible to study literally every molecule in a cell in a single experiment, recent advances in molecular biology have made it possible to study many genes (or their products) in parallel. Figure 11.1: An artist’s depiction of part of an E.coli cell, showing many different types of molecules in their typical abundance. mRNA appears as white lines associated with purple ribosomes, while DNA and proteins such as histones are yellow. (Goodsell, Scripps-EDU) Dr. Todd Nickle and Isabelle Barrette-Ng (Mount Royal University) The content on this page is licensed under CC SA 3.0 licensing guidelines.
<urn:uuid:9e7ccd9d-d648-455a-9539-8f425e7b212e>
CC-MAIN-2017-43
https://bio.libretexts.org/TextMaps/Map%3A_Online_Open_Genetics_(Nickle_and_Barrette-Ng)/11%3A_Genomics_and_Systems_Biology
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00314.warc.gz
en
0.947663
212
3.484375
3
By Anthony Richardson | – This summer’s bushfires were not just devastating events in themselves. More broadly, they highlighted the immense vulnerability of the systems which make our contemporary lives possible. The fires cut road access, which meant towns ran out of fuel and fell low on food. Power to towns was cut and mobile phone services stopped working. So too did the ATMs and EFTPOS services the economy needs to keep running. In a modern, wealthy nation such as Australia, how could this happen? In answering this question, it’s helpful to adopt “systems thinking”. This approach views problems as part of an overall system, where each part relates to each other. In other words, we need to look at the big picture. Through a systems lens Systems are everywhere, from the coral ecosystem of the Great Barrier Reef to the vast technology networks of global financial markets. In a human sense, social systems range from the small, such as a family, to large organisations or the national or global population. The systems I mentioned just now are “complex” systems. This means they are connected to other systems in many ways. It also means a change in one part of the system, such as a bushfire in a landscape, can set off unpredicted changes in connected systems – be they political, technological, economic or social. All complex systems have three things in common: they need a constant supply of energy to maintain their functioning they are interconnected across a range of scales, from the personal and local to the global and beyond they are fragile when they have no “redundancy”, or Plan B. The case of East Gippsland To better understand a complex system collapse, let’s examine what happened in Victoria’s East Gippsland region, particularly the coastal town of Mallacoota, during the recent fires. This case demonstrates how one trigger (in this case, a bushfire) may start a cascade of events, but the intrinsic fragility of the system enables total collapse. Transport-wise, neither East Gippsland nor Mallacoota itself are physically well connected. Fires cut both the only transport connection to East Gippsland, the Princes Highway, and the lone road out of Mallacoota. Smoke haze prevented air transport. This meant the only way out was by sea, in the form of intervention by the Australian Navy. Second, there were no reserves of food, fuel, water, medical supplies or communications at hand when the fires had passed. Supplies ran so low there were reports of a looming “humanitarian crisis”. These shortages are no surprise. In Australia, as in most developed countries, food and fuel distribution systems run on a “just in time” model. This approach, originally developed by Japanese car manufacturer Toyota, involves organising supply networks so materials are ordered and received when they are needed. Such systems remove the need to store excess goods in warehouses, and are undoubtedly efficient. But they are also extremely fragile because there is no redundancy in the system – no Plan B. Implications for Australia Australia as a whole is, in many ways, just as fragile as Mallacoota. We import 90% of our oil – a figure expected to rise to 100% by 2030. Much of that fuel passes through the Straits of Hormuz and then through the Indonesian archipelago. We have few alternative routes. Nor do we maintain sufficient back-up reserves of fuel. Australia is the only International Energy Agency (IEA) member that does not meet the obligation to keep 90 days of fuel supplies in reserve. As East Gippsland and Mallacoota have shown, many other connected systems, such as food distribution networks, are critically dependent on this fragile fuel supply. A close shave If Iran had responded by disrupting the flow of oil through the Strait of Hormuz, throwing global oil supply into turmoil, Australia may have faced nationwide fuel shortages at the height of the bushfire crisis. Late last year Australia reportedly had 18 days of petrol, 22 days of diesel and 23 days of jet fuel in reserve. A global fuel crisis was avoided only due to restraint by both the US and Iran. Australia might not be so lucky next time. The need for reserves Our communities, especially in bushfire-prone areas, need more redundancy to make them resilient to disasters. This might mean towns storing water, non-perishable food, blankets, medical supplies, a generator, a satellite phone and possibly fuel, in protected locations. The implications of the bushfire crisis are clear. At a national and individual level, we must improve the resilience of the systems that make our daily life possible. Bonus Video added by Informed Comment:
<urn:uuid:e574ecd9-59d9-4ae4-b8a2-45122bf55d5b>
CC-MAIN-2023-40
https://www.juancole.com/2020/02/emergency-australias-wildfires.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00738.warc.gz
en
0.954121
1,012
2.921875
3
Botanical Name: Cedrus atlantica (Glauca Group) Common Name: Blue Atlas Cedar Locations: CNE, CSE, KN - Spring Spring - Summer Summer - Autumn Autumn - Winter Winter - Leaf Leaf - Bark Bark - Flower - Female Flower - Female - Flower - Male Flower - Male - Fruit - Immature Fruit - Immature - Fruit Fruit Notable Feature: The needles of those in the Glauca Group are noticeably blue especially when seen against a background of snow. Habit: Loosely pyramidal when young with long spreading branches, these large, evergreen conifers, which are 40 feet to over 100 feet tall and up to 45 feet wide, become more flat-topped with age. Flower: Monoecious -- male and female flowers appear in separate, cone-like structures on the same tree in spring. In autumn the males send clouds of yellow pollen up to the females in higher parts of the tree. Fruit: The female cones (2 to 4” long and 2” wide) sit upright on the higher branches, are thick and purplish, and ripen in the fall after two years. Foliage: Tufted clusters of bluish green to silvery blue needles (to 1” long) curve upward. Interesting Fact: These large trees, native to the Atlas Mountains in North Africa, are often grown as bonsai.
<urn:uuid:2b7219f1-f74b-4f06-909d-9a1b0ef7f787>
CC-MAIN-2017-43
http://kcarboretum.org/10-tree-list/30-cedrus-atlantica-glauca
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826049.46/warc/CC-MAIN-20171023130351-20171023150351-00879.warc.gz
en
0.86924
310
3.046875
3
Nothing reveals the miraculous wonders of creation like the birth of a new born baby… The process is nothing short of a miracle…That a woman can grow a whole other human being inside her and then bring that life into the world and it is then able to exist independently...amazing isn't it? There is an awesome sense of surrealism at the thought that we were created in the image and likeness of The Creator of the world, the one who designed the egg fertilization process all the way through to the birthing process, DNA, nervous system and all! When we really think about it, it’s really outstanding, intelligently designed by a very imaginative Creator. Likeness denotes nature, the nature of the Creator is to be creative and design. If we were made in His image, then there must be on some level within all of us, the desire / inclination and ability to create. Now at this point you may be thinking, ‘I’m not creative! I can’t draw or write or sing or act… I don’t have a creative bone in my body!’ The term creativity generally refers to a richness of ideas and originality of thinking. It is defined as the ability to produce something new through imaginative thought, whether it is a new solution to a problem, a new method or device, or a new artistic object or form; essentially a new way of seeing (my addition in bold &/or italics). [http://www.answers.com/topic/creativity]. This is a more traditional view; that those inclined towards or with whom there is a natural talent or ability, they are the creative ones. Those who are more logical / mathematical / scientific are not. This way of thinking is flawed because there is a lack of understanding of what creativity is and therefore this school of thought is incredibly limited. Creative thinking is looking at problems or situations from a fresh perspective that suggests unorthodox solutions. Creative thinking can be stimulated both by a freewheeling (unstructured) process such as brainstorming, and by a step by step (structured) process such as lateral thinking. [http://www.businessdictionary.com/definition/creative-thinking.html] Creativity can also be defined as the tendency to generate or recognise ideas, alternatives, or possibilities that may be useful in solving problems, communicating with others, and entertaining ourselves and others. (Human Motivation, 3rd ed., by Robert E. Franken page 396). There is a revolution going on called ‘Design thinking’ (Out of the box). This is the evidence of the fact that you do not need to be an artist to be creative. Every technological advancement, new management system, spreadsheet design, gardening project or game designed to entertain a child…No matter how seeming insignificant your idea, your quick fix or your resolution for a problem in the home, at work, with a friend…It is your inherent creative nature that allows you to sub-consciously ‘think outside the box’ and find solutions to the issues of life; that is creative! Our way of seeing is key to our creative development or indeed the reason for our stunted growth (created limitation) as people. There are three reasons why people are motivated to be creative; 1. A need for novel, varied, and complex stimulation; 2.A need to communicate ideas and values and 3. A need to solve the problems we see around us (Human Motivation, 3rd ed., by R. E. Franken page 396). Our curious nature as people makes us ask questions, seek solutions for problems and create new things. Those who are highly creative express it naturally everyday through the traditionally recognised channels however the majority of us never even realise that we are utilising our creative nature in juggling and maneuvering through everyday life… often like mavericks!
<urn:uuid:939885ad-9224-4964-9a3e-3f458f6ae221>
CC-MAIN-2017-43
http://ethos-photographic.blogspot.com/2010_03_17_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823839.40/warc/CC-MAIN-20171020063725-20171020083725-00365.warc.gz
en
0.951737
796
2.5625
3
The Web borrows familiar concepts from physical media (the notion of a "page," for example) and overlays them on top of a networked infrastructure (the Internet) and digital presentation medium (the browser software). This is a convenient abstraction, but when social or legal concepts and frameworks relating documents, publishing and speech are applied to the Web, the analogies often do not suffice. Publishing a page on the Web is fundamentally different from printing and distributing a page in a magazine or book. Telecommunication is often subject to governance: legislation, legal opinion, regulation, convention and contract -- ways in which society looks to enforce norms, for example, around copyright, censorship, privacy and other areas. But there is often a mismatch between governance intended to apply to the Web (usually based on the analogy with physical media) and the technology and architecture used to create it. This document is intended to inform future social and legal discussions of the Web by clarifying the ways in which the Web's technical facilities operate to store, publish and retrieve information, and by providing definitions for terminology as used within the Web's technical community. This document also describes the technical and operational impact that does or could result from legal constraints on publishing, linking and transformation on the Web. One particular mismatch between the Web and physical media is the way in which publication can happen without any judgment or review by Web subsystems based on actions of end-users, either by web intermediaries such as proxies, archives, search engines, or by content transformation services. Such sub-systems cannot exercise judgment, even if required to by governance. This document also discusses possible technical mechanisms for indicating desired constraints on the use of material that is published on the web, including its indexing, embedding and transformation, which might aid in accomplishing the goals of intended governance effectively. This is an Editor's Draft which the TAG intends to become a Working Draft on the Recommendation track at W3C. The act of viewing a web page is a complex interaction between a user's browser and any number of web servers. Unlike reading a book, viewing a web page involves copying the data held on the servers onto the user's computer. Logic encoded within the page may cause more copying to take place — of images, videos and other files, perhaps from other servers, that are displayed or otherwise used within the original page — often without the user's explicit knowledge or consent. For an end user, it is usually impossible to tell whether a given image or video displayed within a page originates from the server the page comes from or from some other location. Proxy servers and services that combine and repackage data from other sources may also retain copies of this material. These intermediary services may transform, translate or rewrite some of the material that passes through them, to enhance the user's experience of the web page. Still other services on the web, such as search engines and archives, make copies of content as a matter of course. This is in part to facilitate the indexing necessary to their operation, and in part to enable presentation of search results, to provide value to their users and to the original authors of the web page. Licenses that describe how material may be copied and altered by others tend not to distinguish between a proxy compressing a web page to make it load faster and someone editing and republishing the page on their own website. To illustrate, the Creative Commons Attribution-NoDerivs defines the terms (emphasis added): - means a work based upon the Work, or upon the Work and other pre-existing works, such as a translation, adaptation, derivative work, arrangement of music or other alterations of a literary or artistic work, or phonogram or performance and includes cinematographic adaptations or any other form in which the Work may be recast, transformed, or adapted including in any form recognizably derived from the original, except that a work that constitutes a Collection will not be considered an Adaptation for the purpose of this License. For the avoidance of doubt, where the Work is a musical work, performance or phonogram, the synchronization of the Work in timed-relation with a moving image ("synching") will be considered an Adaptation for the purpose of this License. - means to make available to the public the original and copies of the Work through sale or other transfer of ownership. - means to make copies of the Work by any means including without limitation by sound or visual recordings and the right of fixation and reproducing fixations of the Work, including storage of a protected performance or phonogram in digital form or other electronic medium. Consider the following questions: Terms and Conditions statements on websites also list acceptable and unacceptable behaviour on a site, with any browsing on the site implicitly indicating acceptance of the terms. These generally do not take into account the behaviour of proxies. For instance, one standard set of terms and conditions includes: You must not: (a) republish material from this website (including republication on another website); (b) sell, rent or sub-license material from the website; (c) show any material from the website in public; (d) reproduce, duplicate, copy or otherwise exploit material on our website for a commercial purpose; (e) edit or otherwise modify any material on the website; or (f) redistribute material from this website except for content specifically and expressly made available for redistribution (such as our newsletter) It is not possible to view material on the web without it being downloaded onto your computer, so forbidding downloading except for caching purposes essentially means that people cannot view the page. In addition, many proxies automatically transform the documents that pass through them, for example to compress them so that they take up less bandwidth for mobile consumption or to introduce adverts into pages that are accessed through "free" WiFi. Limits placed on the use of a website often include limitations on automatic indexing of the website, without exceptions for the search engines that make the website discoverable or the archives that ensure its longevity. For example, the same set of terms and conditions as described above includes: You must not conduct any systematic or automated data collection activities (including without limitation scraping, data mining, data extraction and data harvesting) on or in relation to our website without our express written consent. Search engines rely on systematic data collection from websites in order to provide their users with accurate search results, and archives similarly in order to retain websites for posterity. So, these terms and conditions, if adhered to, effectively render any website that uses them undiscoverable. But automated agents — spiders and robots — that gather information from the web are unable to read these terms; the only things they understand are the technical signals that a website provides about what is permitted. As another example, the terms and conditions for gsig.com include: Use of Materials: Upon your agreement to the Terms, GSI grants you the right to view the site and to download materials from this site for your personal, non-commercial use. You are not authorized to use the materials for any other purpose. If you do download or otherwise reproduce the materials from this Site, you must reproduce all of GSI’s proprietary markings, such as copyright and trademark notices, in the same form and manner as the original. You may not use any “deep-link”, “page-scrape”, “robot”, “spider” or any other automatic device, program, algorithm or methodology or any similar or equivalent manual process to access, acquire, copy or monitor any portion of the Site or any of its content, or in any way reproduce or circumvent the navigational structure or presentation of the Site. However, the site does not use the primary technical method of actually controlling what spiders or robots access on the site, namely a Many sites have a linking policy that limits what links can be made to the site from other sites; that these policies are directly accessible through searches for "all links should point to" illustrates that these conditions are not backed up through technical mechanisms that would prevent such links from being made. For example, the website at quotec.co.uk has a linking policy that includes: Links pointing to this website should not be misleading. Appropriate link text should be always be used. From time to time we may update the URL structure of our website, and unless we agree in writing otherwise, all links should point to http://www.quotec.co.uk. You must not use our logo to link to this website (or otherwise) without our express written permission. You must not link to this website using any inline linking technique. You must not frame the content of this website or use any similar technology in relation to the content of this website. Legislation that governs the possession and distribution of unlawful material (such as child pornography, information that is under copyright or material that is legally suppressed through a gag order) often needs to exempt certain types of services, such as caching or hosting, as it would be impractical for the people running those services to police all the material that passes through their servers. An example of legislation that does this in the UK is the Coroners and Justice Act 2009 Schedule 13; from the Explanatory Notes (emphasis added): Paragraphs 3 to 5 of [Schedule 13] provide exemptions for internet service providers from the offence of possession of prohibited images of children in limited circumstances, such as where they are acting as mere conduits for such material or are storing it as caches or hosts. Examples of the kind of legal questions that have arisen are: There are many other examples on the Wikipedia page on Copyright aspects of hyperlinking and framing. This document does not aim to address whether particular activities on the web are illegal or legal; this is outside the scope of the TAG. Instead, it aims to: This section summarises the terminology that is used within this paper. More details about each of the terms is given in the rest of the document. The concept of publishing on the web has evolved as the web's ecosystem has enlarged and diversified, and as the capabilities of browsers and the web standards that they implement have developed. There is no single definition of what publishing on the web means. Instead there are a number of activities that could be viewed as publication or distribution in a legal sense, or something else. This section describes each of these activities and how they work. The basic form of publication on the web is hosting. A server hosts a file if it stores the file on disk or generates the file from data that it stores, and that file did not (to the server's knowledge) originate elsewhere on the web. The presence of data on a server does not necessarily mean that the organisation that owns and maintains the server has an awareness of the presence of the data or its content. Many websites are hosted on shared hardware that is owned by a service provider that stores and serves data at the direction of controlling individuals and organisations which determine the data they provide on the site. Because of this, multiple servers may host the same file at different URIs. For example, an artist could upload the same image to multiple servers, which then store the image and serve it to others. There are many different types of service provider. Some may exercise practically no control over the software and data that they host, merely providing a base platform on which code can run. Others may focus on particular types of content, such as images (eg Flickr), videos (e.g. YouTube) or messages (e.g. Twitter). Also, there may be many service providers involved in the publication of a particular file on the web: some providing hardware, others providing different kinds of publishing support. Some service providers automatically perform transformations on material that they host, as a service, such as converting to alternative formats, clipping or resizing, or marking up text. When they sign up to a service, controllers explicitly or implicitly enter into an agreement with the service provider that grants them a license to perform transformations on the material which they upload. Transformation of Unlawful Material Service providers that host particular types of material often employ automatic filters to prevent the publication of unlawful material, but it is impossible for a service provider to detect and filter out everything that might be unlawful. To add to the complexity of this area, it is possible for each of the following to be in different jurisdictions: and be controlled by different laws and conventions. Some servers provide access to files that are hosted elsewhere on the web: on an origin server that holds the original version of the file. These files might be stored on the server and provided again at a later time, in which case for the purposes of this document it is termed a caching server, or might simply pass through the server in response to a request, in which case for the purposes of this document it is termed a relaying server. It is usually impossible to tell whether a server is providing a stored response or has made a new request to an origin server and is serving the results of that request. Servers commonly store the results of some requests and not others, acting as a caching server some of the time and as a relaying server the rest. In both cases, the file the caching or relaying server provides may be different from the original file that was accessed from the origin server. For example: Caching and relaying servers are extremely useful on the web. There are four main types of caching and relaying servers discussed here: proxies, archives, search engines and reusers. The distinctions between them are summarised in the table below. |purpose||increase network performance||maintain historical record||locate relevant information||better understand information| |refreshing||based on HTTP headers||never||variable||based on HTTP headers| |retrieval||on demand||proactive||proactive||usually on demand| |URI use||usually uses same URI||uses new URI||uses new URI||uses new URI| Controlling Proxy Behaviour Proxies should comply with instructions from origin servers that describe whether pages may be copied and transformed, but will only be able to comply with those that are machine-readable. Proxies come in four general flavors: The use of a forward proxy, gateway or transforming proxy may be configured either on an individual machine or transparently for a particular network. Users may have no idea that their requests are channelled through a given proxy, or they may have configured their set-up to use the proxy. Reverse proxies appear to be normal servers to users: it is impossible for a user to tell that their request is actually passed on to a completely different origin server, or where that server is. This is intentional as the origin server in this case is a private one. To improve performance, some proxies, particularly CDNs, may pre-fetch resources that a page includes, since these resources are likely to be requested by the browser soon after the page is viewed. In other words, although generally the contents of a proxy's cache will be determined by the requests that users of that proxy have made, the proxy might also in some cases contain content that no one has ever requested. Archives aim to catalog and provide access to some portion of web content to provide an on-going historical record. They use crawlers to fetch pages and other resources from the portion of the web that they cover, and store them on their own servers, along with some metadata about the pages, particularly when they were retrieved. They then may provide access to the stored copies of the resources at particular historical dates, enabling people to see how pages used to appear. Controlling Archive Behaviour Archives should comply with instructions from origin servers that describe whether pages may be copied and transformed, but will only be able to comply with those that are machine-readable. Archives are usually run by institutions that have a legal mandate and responsibility to keep this historical record, such as a legal deposit. Although their primary purpose is long term record-keeping, they often make this material available online as well. They might restrict access to the data for a period of time after it is collected, for security or privacy reasons, and may respond to legally-backed removal requests. Users might use archives for research, but also to access information that has otherwise been removed from the Web. When they are made available to the public, archived pages are usually distinguishable by end users from the original page using banners placed within the page or having the original page appear within a frame. The links (both to other pages and to embedded resources such as images) are usually rewritten so that when the user interacts with the page, they are taken to the version of the linked resource at the same point in time. "Dark archives" do not make their content available to the public. Search engines aim to catalog and provide access to as many web pages as they can, so that they can direct users to appropriate information in response to a search. They use crawlers to fetch pages and other resources from the web, analyse them and store them on their own servers to support further analysis. Controlling Search Engine Behaviour Search engines should comply with instructions from origin servers that describe whether pages may be copied and transformed, but will only be able to comply with those that are machine-readable. Search engines are most interested in indexing resources and providing links to them rather than in the content of the resource itself. They might not copy the page itself, but they always store metadata about the page, derived from the information in the page itself and other information on the web, such as what other pages link to it. Search engines play an important role in the web in enabling people to find information, including that which would otherwise be lost or is temporarily unavailable. When a user views a stored page from a search engine, it is usually obvious both that the search engine is involved (from the URI of the page and from banners or framing), that the content originally came from somewhere else, and where it came from. The links within the page are not usually rewritten. Data reuse is becoming more prevalent as web servers act as services to others. A server that is a reuser fetches information from one or more origin servers and either provides an alternative URI for the same page or adds value to it by reformatting it or combining it with other data. Good examples are the BBC Wildlife Finder, which incorporates information from Wikipedia, Animal Diversity Web and other sources or triplr.org, which converts RDF data from one format to another as a service. Reusers should comply with instructions from origin servers that describe whether pages may be copied and transformed. Attributing Reused Material Reusers should indicate the sources of the information on pages, for both humans and computers. Reusers that do not change the information from the origin server may be used to simplify access to the origin server (by mapping simple URLs to a more complex query) or to provide a route around gateways or the same-origin policy (as servers are not limited in where they access resources from). Since reused information is, by design, seamlessly integrated into a page that is served from the reuser, people viewing that page will not generally be aware that the information originates from elsewhere. The URIs used for the pages will be those of the reuser, for example. Licenses on the material may require attribution; even when it doesn't, it is good practice for reusers to indicate where the material originates. An alias is a URI that points the browser to another URI on an origin server. A server can automatically redirect a browser (using a HTTP 3XX status code and a Location header). Web pages from a server can do the same thing using a <meta> element with an http-equiv attribute set to Refresh; this technique is often used with a slight delay to indicate to the user that they are being redirected to another page. Aliases do not involve any of the information from the origin server passing or being stored by the redirecting server, but the redirecting server will be able to record when a particular URI is requested. Although it is preferable to only have one URI for a particular resource, redirections are a useful mechanism for managing change on the web. They are used within websites when the structure of the website changes, or between websites when a new website is created that supersedes the first, or to archived information when a host no longer wants to provide access to a file itself. Redirections are also used to provide other services. Link shorteners provide a short URI for a resource that is then redirected to the original URI, and are useful in locations where space is limited such as in print or on Twitter. Depending on their implementation, link-tracking services can use a similar technique to enable servers to analyse which links are followed from their site: the link tracker records the request and redirects the user to the true target page. When aliasing is used to provide a shorter alternative URI to a resource, best practice is to use a domain which is associated with the domain of the destination URI. This allows the end user to know more about where the link will send them and will potentially enhance the longevity of these aliases. Examples are nytim.es and bbc.in. When aliasing is used, users may not be aware about the eventual target of a link, or the involvement of an aliasing server, both of which are important. Shortened links, for example, hide the target location behind a URI that often has no visible relationship to the eventual destination of the page. Some implementations of link tracking do not change the original destination of the link (such that the status bar on a browser shows the eventual target of the page) but instead use the onclick event to direct the user to the aliasing server. Following a redirection, browsers change the address bar to the new location, but this is often the only indication, and the user may miss it and be unaware of the redirection. A web page written in HTML may include other resources, such as images, video, scripts, stylesheets, data and other HTML. The HTML in a web page refers to these external resources in markup, for example, an <img> element uses the src attribute to reference an image which should be shown within the page. Material that is included within a web page may appear to be a hosted copy to the user of a website, but in fact may be hosted completely separately, outside the control of the owner of the web page. Includers should comply with computer and human-readable instructions from origin servers that describe whether and how resources may be included within a page. Those who include third-party resources within their web pages should indicate the sources of the information on such page for both humans and computers. HTML supports several different mechanisms for including other resources in a page. These are listed in , but they all work in basically the same way. Typically, when a user navigates to a web page, the browser automatically fetches all the included resources into its local cache and executes them or displays them within the page. Inclusion is different from hosting, copying or disseminating a file because the information is never stored on, nor passes through, the server that hosts the web page doing the including. As such, although the included resources are an essential component of the page to make it appear and function as a whole, the server of the web page does not have control over their content which may change without the server's knowledge. Users may not be aware that included resources are used within a page at all. When included resources are embedded within the page such that they are visible to a user, it may not be clear that an image or video is from a third-party website rather than the website that they are visiting unless this is explicitly indicated within the content of the page. A resource that is included into a popular page causes a large number of requests to the server on which the file is published, which can be burdensome to the third-party who hosts the file. Publishers who intend their files to be reused in this way therefore typically have terms and conditions that apply to the reuse of those files and may have to put in place technical barriers to restrict it. As with normal links, included resources may or may not have the same origin as the page that includes them. Resources such as images and scripts that are included within the web page may be from any site. However, browsers implement a same-origin policy which generally means that third-party resources cannot be fetched and processed by scripts running on the page, for example through XMLHttpRequests [[XMLHTTPREQUEST]] (though typically these scripts can write markup into the page which includes such resources). When scripts or HTML are included into web pages, the included resource may itself include other resources (which may include still more and so on). The author of the original web page has control over which resources it includes, but does not have control over which resources those included resources go on to include. The publishers of included resources may change the content of those resources at any time, possibly without warning. This has been used in cases where websites included third-party images without permission, to substitute the image with something distasteful or to redirect to a link that performed an action on the user's behalf; see Preventing MySpace Hotlinking. Some of the resources that are included within a page may be invisible to the user. An example is a hidden image that is used for tracking purposes: each time a user navigates to the page, the hidden image is requested; the server uses the information from the request of the image to build a picture of the visitors to the site. This facility can be used for malicious purposes. An <img> element can point to any URI (not just an image) and causes a GET request on that resource. If a website has been constructed such that GET requests cause an action to be carried out (such as logging out of a website), a page that includes this "image" will cause the action to take place. Linking is a fundamental notion for the web. HTML pages use <a> elements to insert links to other pages on the web, with the href attribute holding the URI for the linked page. Some of the links will be to be pages from the same origin; others will be cross-origin links to pages on third-party's sites that hold related information. Websites that seek to control how other websites link to them should use the technical mechanisms available to them rather than seek to restrict linking through terms and conditions. A user can usually tell where a link is going to take them prior to selecting it through the browser UI (e.g. by "mousing over" it) or after the link is selected through the status bar in the browser, although some links are overridden by onclick event handling that takes them to a different location. Some websites, such as Wikipedia, use icons to indicate when a link is a cross-origin link and when it will take a user to a page on the same server. The use of interstitial pages or dialog boxes which warn the user they are about to leave the site in question can obscure the eventual destination of the link, as discussed in . If the link is a cross-origin link (or even in some cases where it is an internal link), the publisher of the origin page will have no control over the content or access policies of the linked page. These are the responsibility of the publisher of that page; the TAG Finding on "Deep Linking" in the World Wide Web [DEEPLINKING] describes the ways in which publishers can control access to their pages and the fundamental principle that addressing (linking to) a page is distinct from accessing it. Traditionally, a user must take a specific action in order to navigate to the linked page, such as by clicking on the link or selecting it with a keystroke or a voice command. In these cases, the linked page cannot be accessed without the user's knowledge and consent (though they may not know where they will eventually end up). There are three practices used by some sites that obscure whether a link is followed by the user. prefetchlink relation in a link. For example, a page might indicate that the first result in a list of search results should be fetched before the user actually navigates the link. The description above about how information is published on the web highlights how hard it can be for end users (both human and machine) to be aware of the original source of content on the web, and the ways in which it may have been changed en route to them. It also shows that the controllers of content need to be clear about how that content can be used elsewhere, both through human-readable prose and by the technical barriers that they put up that limit access. Third parties that use that content, whether proxies, reusers or linkers, should also follow some best practices in transformation, reuse and links to information. Once material is put on the public web (that is, on the internet and unprotected by authentication barriers), it is impossible to completely limit how that material is used through technical means — HTTP headers can be faked, metadata can be ignored. However, there are a number of standard techniques that controllers can use to indicate how they intend their material to be used, which intermediate servers should pay attention to. Publishers can control access to resources that are unprotected by authentication through HTTP, by refusing or redirecting connections to particular resources based on: RefererHTTP header; this is useful for preventing linking to particular resources from outside a website, or preventing the inclusion of a resource in another website User-AgentHTTP header; this is particularly useful for preventing access from crawlers As well as the techniques above, which can be used to control any access to pages, it's also possible to provide additional control over the inclusion of resources in a third-party's web pages. In the case of HTML pages, publishers can include a script that checks whether the document is the top document in the window, to prevent it from being embedded within a frame. The Cross-Origin Resource Sharing Working Draft [[CORS]] defines a set of HTTP headers that can be used to give the publisher of the third-party resource greater control over access to their resources. These are usually used to open up cross-origin access to resources that publishers want to be reused, such as JSON or XML data exposed by APIs, by indicating to the browser that the resource can be fetched by a cross-origin script. Embed-Only-From-Origin HTTP header is also currently under discussion by the Web Applications Working Group and described within the Cross-Origin Resource Embedding Restrictions Editor's Draft [CORER]. This would enable publishers to control which origins are able to embed the resources they publish into their pages. Publishers should ensure actions are not taken on behalf of their users in response to an HTTP GET on a URI, as otherwise sites are open to security breaches through inclusions, as described in . It is also good practice to check the Referer header in these cases to prevent actions being taken as the result of the submission of forms within other website's web pages, unless that functionality is desired. There are a number of HTTP headers [[HTTP11]] that enable content providers to indicate whether a proxy should cache a given page and for how long it should keep the copy. These are described in detail within Section 13: Caching in HTTP. For example, a server can use the HTTP header Cache-Control: no-store to indicate that a particular resource should not be cached by a proxy server. Publishers of websites can also indicate which pages should not be fetched or indexed by any search engine or archive through robots.txt [ROBOTS] and the robots <meta> element [META]. They can indicate other characteristics of web pages, such as how frequently they might change and their importance on the website, through sitemaps [SITEMAPS]. More sophisticated publishers may use the Automated Content Access Protocol (ACAP) extensions [ACAP] to attempt to indicate access policies. Publishers can also use the rel="canonical" link relationship to indicate a canonical URI for a page which should be used by search engines and other reusers to reference a given page. Cache-Control: no-transform HTTP header indicates that a proxy server must not change the original content, nor the headers: For example, an proxy server must not convert a TIFF served with Cache-Control: no-transform into a JPG, nor should it rewrite links within an HTML page. One reason that people linking to websites use misleading links is when the original URLs are too long to incorporate into space-limited documents, such as short-form posts or in printed media. Although it's possible to use third-party link shortening services, origin websites can also set up link shorteners for their own content, and then use the rel="shortlink" link relationship to point from the original page to the short link for that page. Websites indicate a license that describes how the information within the website can be reused by others. Just as with HTTP headers, robots.txt and sitemaps, there can be no technical guarantees that crawlers will honor license information within a site. However, to give well behaved crawlers a chance of identifying the license under which a page is published, websites should: cc:licenseto indicate the license of included resources, such as images or videos This section describes the techniques that you should use when operating a website that incorporates material from other sources, whether caching, transforming or simply linking. As described in and , there are a number of HTTP headers and other conventions that indicate how an origin server intends other servers to treat the resources that they publish. Servers that cache or transform data from origin servers should obey these headers, which exist to ensure that the end user receives current information in the intended form. Proxies must use the Via HTTP header when they handle requests to origin servers, to indicate their involvement in the response to the user's original request. Proxies which perform transformations on a document must include a Warning: 214 Transformation applied HTTP header in the response. These and other recommendations for proxies which perform transformations are included in the Guidelines for Web Content Transformation Proxies 1.0. Many licenses require the reusers of information to provide attribution to the original source of the material. This attribution must be human-readable, so that users of your website understand where the material came from, and may also be computer-readable, which enables automated tools to track the use of material on the web. The wording and positioning of attribution is usually dictated by the license under which the material is made available. For example, the license for the free icons available from Axialis Software includes: If you use the icons in your website, you must add the following link on each page containing the icons (at the bottom of the page for example):Icons by Axialis Team The HTML code for this link is:<a href="http://www.axialis.com/free/icons">Icons</a> by <a href="http://www.axialis.com">Axialis Team</a> If there is no explicit guidance about the location of attribution, it is recommended to include attribution to material from a third party as close to the use of that material as possible. Methods to make the attribution machine-readable include: citeattribute on the <blockquote>element, where a portion of a page is quoted within your own site dc:sourceproperty with microformats, microdata or RDFa to indicate the source of a portion of the page (identified through an An example of clear attribution of material from another site is that of the BBC Wildlife Finder; the following screenshot shows the attribution within the page on the Pygmy Three-toed Sloth. There are a number of practices around linking to a third-party site that can help users and automated agents to understand the relationship between your website and the third parties. These include: rel="nofollow"for links where the link is not meant to imply approval; these will not be used by search engines when determining the relevance for a page rel="external"for links to third-party web pages; this can be used as the basis of styling, such as an image that indicates the user will be taken to a separate site There are a number of techniques that can be used to track which links are followed from a website. Methods that rewrite the links within a web page to point to an interstitial ("you are leaving this website") page or through a script can mislead the user and any automated agents about the target of the link. It is better to use a script to capture onclick or other events and redirect the user at that point. In conclusion, publishing on the Web is different from print publishing. This document has enumerated some of these differences, especially those relevant to licencing and copyright issues. Many thanks to Rigo Wenning and Wendy Seltzer for their reviews and comments on earlier versions of this draft, and to Robin Berjon for ReSpec.js.
<urn:uuid:c929fcdc-0ba1-49d5-a5e6-8945c63adedd>
CC-MAIN-2013-20
http://www.w3.org/2001/tag/doc/publishingAndLinkingOnTheWeb-2012-07-16
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705955434/warc/CC-MAIN-20130516120555-00061-ip-10-60-113-184.ec2.internal.warc.gz
en
0.924461
7,727
2.8125
3
By Linda Herridge NASA's John F. Kennedy Space Center If you plant it, will it grow—in microgravity on the International Space Station? Expedition 39 crew members soon will find out using a plant growth system called “Veggie” that was developed by Orbital Technologies Corp. (ORBITEC) in Madison, Wisconsin, and tested at NASA's Kennedy Space Center in Florida. The first fresh food production system, along with the Veg-01 experiment, were delivered to the space station on the SpaceX-3 mission from Cape Canaveral in April and transferred to the Columbus module for storage until it was time for in-orbit activation. Expedition 39 flight engineers and NASA astronauts Steve Swanson and Rick Mastracchio installed Veggie in the Columbus module May 7 in an Expedite the Processing of Experiments to the Space Station (EXPRESS) rack. Wearing sunglasses, Swanson activated the red, blue and green LED lights inside Veggie on May 8. A root mat and six plant "pillows," each containing 'Outredgeous' red romaine lettuce seeds, were inserted into the chamber. The pillows received about 100 milliliters of water each to initiate plant growth. The clear, pleated bellows surrounding Veggie were expanded and attached to the top of the unit. Inside each plant pillow is a growth media that includes controlled release fertilizer and a type of calcined clay used on baseball fields. This clay increases aeration and helps the growth of plants. Dr. Gioia Massa is the NASA science team lead for Veggie. She sees Veggie and Veg-01 representing the initial steps toward the development of bioregenerative food production systems for the space station and long-duration exploration missions. "The farther and longer humans go away from Earth, the greater the need to be able to grow plants for food, atmosphere recycling and psychological benefits," Massa said. "I think that plant systems will become important components of any long-duration exploration scenario." About 24 hours after Veggie was activated on the space station, back on Earth, "pseudo-naut" researchers activated identical plant pillows in the Veggie control chamber in the International Space Station Environmental Simulator laboratory at Kennedy's Space Station Processing Facility. Researchers will monitor the plant growth and perform the same procedures as Swanson is doing on the space station. "My hopes are that Veggie will eventually enable the crew to regularly grow and consume fresh vegetables," Massa said. One of the plant experiment's goals is to verify the Veggie hardware is working correctly. Another goal is to establish that the space lettuce is safe to eat. On the space station, the Veg-01 plants will grow for 28 days. Photographs will be taken weekly, and water will be added periodically. The pillow wicks were opened to help the seedlings emerge. As the plants grow, the pillows will be thinned to one plant per pillow, and microbial samples will be taken to check for any microorganisms that may be growing on the plants. At the end of the cycle, the plants will be carefully harvested, frozen and stored for return on the SpaceX-4 mission later this year. Veggie will remain on the station permanently and could become a research platform for other top-growing plant experiments. ORBITEC developed Veggie through a Small Business Innovative Research Program. NASA and ORBITEC engineers and collaborators at Kennedy worked to get the unit's hardware flight-certified for use on the space station. "Veggie could be used as a modular plant chamber for a variety of plants that grow up rather than in the ground," said Gerard Newsham, the Veggie payload support specialist with Jacobs Technology on the Test and Operations Support Contract. "This is just the beginning." Another set of six plant pillows, containing 'Profusion' Zinnia seeds could be activated in Veggie for the Expedition crew to grow and enjoy as they wait for word that the red romaine lettuce is safe to eat. If the lettuce is safe to eat, Massa said an additional set of plant pillows containing the romaine lettuce seeds will be activated in Veggie. "I hope that the astronauts on the space station eventually will use the equipment to 'experiment' with their own seeds or projects," said Nicole Dufour, who coordinated and led the testing of the flight hardware at Kennedy and wrote the crew procedures for the astronauts to use on space station. "Veggie is designed for crew interaction and to enjoy the plants as they are growing." Dufour said she hopes Veggie serves as a regular facility the crew uses to grow food crops. Dufour is an engineer in the Flight Mechanisms and Flight Crew Systems Branch of the Engineering and Technology Directorate. Brian Onate, former Veggie project manager, helped shepherd the plant growth system from initiating the build of the flight units in 2012 to just a couple of months before its delivery to the space station. "I hope to see Veggie's success as the first step in food production that will allow astronauts on the space station to enjoy fresh food and gain knowledge as we explore beyond low-Earth orbit," Onate said.
<urn:uuid:e42d66ee-2762-4910-b2b2-a19263f327f4>
CC-MAIN-2014-35
http://www.nasa.gov/content/veggie-plant-growth-system-activated-on-international-space-station/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924131.19/warc/CC-MAIN-20140901014524-00097-ip-10-180-136-8.ec2.internal.warc.gz
en
0.947698
1,063
3.59375
4
Leptospira spp. Infection Edited October 14, 2015 Leptospirosis is a bacterial disease affecting a variety of domestic and wild animals and humans worldwide that has been reported in over 150 mammalian species. It is considered an emerging infectious disease in humans and in dogs. Subclinically infected wild and domestic animals serve as reservoir hosts and are a potential source of infection for incidental hosts and humans (Greene et al., 2006; Adler and de la Pena Moctezuma, 2010; Sykes et al., 2011). Reports of leptospirosis in cats are rare, but cats shedding Leptospira spp. and serving as a source of infection have recently gained attention. Leptospira spp. antibodies are commonly present in the feline population, and Leptospira spp. shedding by cats with outdoor exposure has been demonstrated (Rodriguez et al., 2012; Fenimore et al., 2012). Cats mostly acquire the infection from captured rodents. The role of healthy carrier cats as source of contamination as well as the role of leptospires as a pathogen in cats might have been underestimated. Leptospires are mobile, thin, filamentous bacteria belonging to Spirochetes that appear as fine spirals with hook-shaped ends (Fig. 1; Adler and de la Pena Moctezuma, 2010). Leptospires can remain infectious for several months under optimal environmental conditions, at temperatures around 25 °C, moisture, and a neutral soil pH (Greene at al., 2006). There are over 250 pathogenic serovars based on differences in the carbohydrate component of the bacterial lipopolysaccharide. Different serovars are adapted to different wild or domestic animal reservoir hosts. Serovars are further grouped into antigenically related serogroups. Immunity to leptospires is serogroup-specific. Leptospirosis in dogs and humans is caused primarily by serogroup Leptospira interrogans and Leptospira kirschneri. Several serovars of both serogroups also have been reported to cause infections in cats (Greene et al., 2006; Sykes et al., 2011). In dogs, serovars icterohaemorrhagiae and canicola were responsible for most cases of canine leptospirosis before 1960. Since the widespread use of a bivalent serovar-specific vaccine against canicola and icterohaemorrhagiae, there has been an apparent shift to other serovars that are now more commonly identified in dogs suffering from leptospirosis (Greene et al., 2006). Recently, new vaccines for dogs have reached the market in the USA and several European countries, which contain not only canicola and icterohaemorrhagiae, but also grippotyphosa, and in some vaccines additionally bratislava or pomona. Leptospires cause infections in many animal species. Subclinically infected wild and domestic animals serve as reservoir hosts and are a potential source of infection for incidental hosts, including humans. In the incidental hosts, severe clinical signs can develop. Incidental hosts also shed the organism, although generally only for a short period (Greene et al., 2006). Leptospires are transmitted by direct or indirect contact; direct transmission between hosts in close contact occurs through urine, venereal routes, placental transfer, bites, or ingestion of infected tissues as the organism penetrates mucosa or broken skin. Infected animals shed leptospires mainly through urine. Indirect transmission is more frequent in dogs and occurs through exposure to contaminated environment, e. g., soil, food, or bedding (Greene et al., 2006). Water contact is most important in dogs and humans, and habitats with stagnant or slow-moving warm water favour survival of the organism. Leptospires in contaminated water invade the host through skin wounds but also through intact mucous membranes. In cats, this type of transmission is less likely, due to their natural aversion to water. Cats rather get infected by feeding on animals harbouring leptospires. Rodents are the natural reservoir for many serovars, and prey-predator transmission between cats and rodents is likely (Shophet, 1979). Cats may also be exposed to urine of cohabitating dogs. Spirochetes have been shown to survive in insects and other invertebrates, but their role as vectors is unknown (Greene et al., 2006). Antibody prevalence in cats ranges from 0 to 35%. Infections with several serovars have been identified in cats, including icterohaemorrhagiae, canicola, grippotyphosa, pomona, hardjo, autumnalis, and ballum (Rodriguez et al., 2012; Agunloye and Nash, 1996; Dickeson and Love, 1993; Mylonakis et al., 2005; Larsson et al., 1984; Batza and Weiss, 1987; Markovich et al., 2012). Prevalence of different serovars and preference of reservoir hosts differ significantly between geographical regions. Most studies based on antibody detection have used micro-agglutination tests (MAT). Cross-reactions between serovars occur, and therefore serovar prevalence studies are sometimes difficult to interpret. No correlation was found between antibodies, sex and breed. However, an association with age has been reported, with old cats being more likely to possess antibodies (Rodriguez et al., 2012; Mylonakis et al., 2005; Larsson et al., 1984). Antibodies are more common in outdoor cats, those living in urban areas, and known hunters (Rodriguez et al., 2012). Recent studies have looked into shedding of Leptospira spp. in the urine of cats (Rodriguez et al., 2012; Fenimore et al., 2012). Using a quantitative real-time PCR, leptospiruria was studied in shelter cats in Colorado, and 10 out of 85 stray or feral shelter cats with previous outdoor exposure were found shedding pathogenic leptospires in the urine. This is comparable to that occurring in healthy dogs, and outdoor cats might be a reservoir or incidental hosts in the transmission of leptospires (Fenimore et al., 2012). Urinary shedding and the role of cats as a source of infection have been underestimated in the past. Some serovars may be shed by cats without detectable antibodies (Shophet, 1979). Wild felids can be infected with Leptospira spp. as well; in captive healthy felids in Brazil antibodies were found in 2/57 healthy felids (Ullman et al., 2012) The pathogenesis of feline leptospirosis is not well known but likely similar to that in dogs and humans. In them it occurs via direct contact with a host or its urine, or indirectly via contaminated soil or water (e. g., recreational activities, drinking, or bathing). After penetration through mucous membranes, abraded or scratched skin, leptospires multiply rapidly upon entering the blood vascular space as early as one day after infection. They invade the kidneys, liver, spleen, CNS, eyes, and genital tract amongst others, and damage these organs by replicating and causing inflammation. Initial replication mainly causes damage to the kidneys and liver. The extent of damage is variable and depends on virulence of the organism and host susceptibility. The immune response clears the leptospires from most organs except from the kidneys, where the agent can persist. In dogs, shedding may continue for weeks to months (Green et al., 2006; Sykes et al., 2011). In dogs, infection with leptospires results in illness of varying severity, depending on infecting strain, geographical location, and host immune response. Some dogs display no or only mild signs of disease, whereas others develop severe illness or even death, often as a result of renal injury. In general, signs of hepatic and renal dysfunction and of coagulation defects are predominant in dogs with leptospirosis. In addition, dogs with leptospirosis can show signs of uveitis, pulmonary haemorrhage, abortion, or acute febrile illness (Green et al., 2006; Sykes et al., 2011). Presence of antibodies as well as experimental infections have shown that cats can be infected with leptospires, but the infection is usually mild or even clinically inapparent (Agunloye and Nash, 1990; Dickeson and Love, 1993; André-Fontaine, 2006). Also, there was no significant difference in antibody prevalence between sick and healthy cats (Bryson and Ellis, 1976). Experimental infections resulted in leptospiraemia, leptospiruria and mild clinical signs with histologic evidence of renal and hepatic inflammation. In a cat with ascites, enlarged liver, and impaired hepatic function, but without icterus, antibodies against L. hardjo could be detected (Agunloye and Nash, 1990). Leptospires have been isolated from thoracic fluid, aqueous humour, and kidneys of a cat, which at necropsy had widespread haemorrhages and straw-coloured fluid in the thoracic and peritoneal cavities (Bryson and Ellis, 1976). The most common clinical manifestation seems to be an interstitial nephritis, as reported in experimentally and naturally infected cats (Fessler and Morter, 1964; Hemsley, 1956; Rees, 1964; Arbour et al., 2012). A relationship between polyuria/polydipsia and the presence of antibodies against Leptospira spp was reported (André-Fontaine, 2006; Luciani 2004). A case series of three cats with leptospirosis had renal failure without liver involvement (Arbour et al., 2012). In persons and animals, immunity to leptospires is serogroup-specific, with no cross-protection between different serogroups. Recovery from infection depends upon the production of specific antibodies. As these increase, the organism is cleared from most tissues, except from the kidneys. Renal colonization occurs in most infected animals, and the organism usually persists in tubular epithelial cells causing shedding for months to years after clinical recovery. Prognosis is highly dependent on the conservation of renal function (Greene et al., 2006). Direct detection of the organism is difficult, and antibody testing using MAT is mostly used for the diagnosis. Direct detection of the leptospires Direct identification of the organisms can be achieved by several techniques including visualization in fresh urine by dark-field microscopy or in tissue sections or on air-dried smears by light microscopy, culturing of the organism, or detection of DNA by PCR. All direct methods, however, are only reliable in case of a positive result, and a negative result never excludes presence of the infectious agent due to the fact that leptospires are only shed intermittently and sometimes in low numbers (Greene et al., 2006). Direct identification of viable leptospires by dark field microscopy is not recommended. A more reliable method is antibody staining (by immunofluorescence or immunoperoxidase), which can be used to identify leptospiral agents in body fluids and imprints of liver or kidneys (Fig. 2), if appropriate samples are available (Greene et al., 2006). Leptospires can be cultured from blood, urine, and CSF, but they grow very slowly. Cultures may take weeks to months before becoming positive, and reliable results can only be expected when the animal had not been pretreated with antibiotics. Thus, in most cases culturing is no useful option in practice. PCR methods have been developed to detect leptospiral DNA in body fluids, like blood, CSF, aqueous humour, and urine (Merien et al., 1995; Bal et al., 1994; Harkin et al., 2003a, b). In humans, PCR was shown to be more reliable in early diagnosis than antibody testing or culture (Brown et al., 1995). PCR to identify the organisms in urine, where it reaches high concentrations, has been experimentally shown to be sensitive and specific, and allows a diagnosis at an early stage of infection. But also PCR is only useful in untreated animals. Non-viable Leptospira spp. will also be detected, as well as subclinical carriers and non-pathogenic serovars. Sensitivity and specificity of available PCR tests for the diagnosis in dogs have not been fully assessed (Greene et al., 2006). PCR was used in a few studies to detect Leptospira spp. shedding in cats (Rodriguez et al., 2012; Fenimore et al., 2012). Antibodies can be detected using the MAT or an ELISA, the former being the most common diagnostic method in dogs and humans, and also in cats (Rodriguez et al., 2012; Agunloye and Nash, 1990; Dickeson and Love, 1993; Mylonakis et al., 2005; Larsson et al., 1984; Batza and Weiss, 1987; Markovich et al., 2012). However, MAT is not serovar-specific (Greene et al., 2006; Sykes et al., 2011), and cross-reactions make identification of the infecting serovar difficult. Variations of results between laboratories and differences in humoral immune responses may make correct interpretation of antibody tests even more difficult. Different serogroup antigens are included in the assay, and false-negative results will occur when the infecting serogroup is not included. In dogs, antibody titres of 800 against non-vaccine serovars, or a fourfold increase of the titre are considered presumptive of leptospirosis with compatible clinical signs (Greene et al., 2006). Diagnosis of the infection by antibody detection in cats might be easier because there is no vaccine in cats. Treatment of dogs consists of supportive therapy and antibiotics, and the same should be done in cats. Supportive treatment depends on the severity of clinical signs and the presence of renal or hepatic dysfunction and other complicating factors. Treatment of acute renal failure is the most crucial aspect in dogs and the same is likely true for cats. Acute renal failure with anuria commonly requires renal replacement therapy with haemodialysis that is life saving for many animals with severe anuric leptospirosis. Thus, animals should be referred early to facilities with haemodialysis. Haemodialysis is indicated in animals with inadequate urine output that are developing volume overload, hyperkalaemia, or signs of uraemia that are not responsive to medical management (Sykes et al., 2011). The extent of renal damage after treatment determines the overall prognosis. Antimicrobial therapy usually consists of two stages. The first stage is aimed to immediately inhibit multiplication of the organism and rapidly reduce fatal complications of infection such as hepatic and renal failure. Penicillin and its derivatives are the antibiotics of choice for terminating Leptospira spp. replication. Initially, ampicillin (20 mg/kg q 8 h IV) or amoxicillin, if available for IV use (20 mg/kg q 12 h IV), should be given parenterally to the vomiting, uremic, or hepatically compromised animal. These drugs prevent shedding and transmission of the organism within 24 hours of initiation of therapy. They are neither able to clear the infection from the kidneys nor to prevent a carrier state with chronic shedding. In the second stage other drugs should be administered to address the carrier state. Doxycycline (5 mg/kg q 12 h PO for 3 weeks) is the drug of choice, and treatment should start as soon as the clinical condition allows oral application. Intravenous application can cause shock and vomiting, and subcutaneous injection leads to development of abscesses in cats. Doxycycline can also cause liver toxicity. Thus, it should only be started after the animal stops vomiting and liver enzymes are in the reference range. In cats, use of doxycycline suspension is preferred over tablets or capsules due to the risk of oesophageal strictures. In animals without or only mild clinical signs, doxycycline can be used for both initial and elimination therapy (Greene et al., 2006). In healthy cats shedding leptospires, treatment with doxycycline should be initiated to control the carrier state. No vaccine is available for cats. To prevent cats from getting infected, they should be prevented from feeding on (potentially infected) rodents and stay away from stagnant water. Cats that are kept indoors have a very low risk to get infected. Adler B, de la Pena Moctezuma A. Leptospira and leptospirosis. Vet Microbiol 2010; 140: 287-296. Agunloye CA, Nash AS. Investigation of possible leptospiral infection in cats in Scotland. J Small Anim Pract 1996; 37: 126-129. Andre-Fontaine G. Canine leptospirosis–do we have a problem? Vet Microbiol 2006; 117: 19-24. Arbour J, Blais MC, Carioto L, Sylvestre D. Clinical leptospirosis in three cats (2001-2009). J Am Anim Hosp Assoc 2012; 48: 256-260. Bal AE, Gravekamp C, Hartskeerl RA, De Meza-Brewster J, Korver H, Terpstra WJ. Detection of leptospires in urine by PCR for early diagnosis of leptospirosis. J Clin Microbiol 1994; 32: 1894-1898. Batza HJ, Weiss R. Occurence of Leptospira antibodies in cat serum samples. Kleintierpraxis 1987; 32: 171-172. Brown PD, Gravekamp C, Carrington DG, van de Kemp H, Hartskeerl RA, Edwards CN, et al. Evaluation of the polymerase chain reaction for early diagnosis of leptospirosis. J Med Microbiol 1995; 43: 110-114. Bryson DG, Ellis WA. Leptospirosis in a British domestic cat. J Small Anim Pract 1976; 17: 459-465. Dickeson D, Love DN. A serological survey of dogs, cats and horses in south-eastern Australia for leptospiral antibodies. Aust Vet J 1993; 70: 389-390. Fenimore A, Carter K, Lunn K. Detection of leptospiruria in shelter cats in Colorado. Proceedings of the 30th Annual Congress of the American College of Veterinary Internal Medicine (ACVIM); 2012 May 30th, 2012 – June 2nd, 2012; New Orleans, USA. Fessler JF, Morter RL. Experimental Feline Leptospirosis. Cornell Vet 1964; 54: 176-190. Greene CE, Sykes JE, Brown CA, Hartmann K. Leptospirosis. In: Greene CE (ed). In Infectious Diseases of the Dog and Cat. 3rd ed. Philadelphia: WB Saunders, 2006, pp 402-417. Harkin KR, Roshto YM, Sullivan JT, Purvis TJ, Chengappa MM. Comparison of polymerase chain reaction assay, bacteriologic culture, and serologic testing in assessment of prevalence of urinary shedding of leptospires in dogs. J Am Vet Med Assoc 2003b; 222: 1230-1233. Harkin KR, Roshto YM, Sullivan JT. Clinical application of a polymerase chain reaction assay for diagnosis of leptospirosis in dogs. J Am Vet Med Assoc 2003a; 222: 1224-1229. Hemsley LA. Leptospira canicola and chronic nephritis in cats. Vet Rec 1956; 68: 300-301. Larsson CE, Santa Rosa CA, Hagiwara MK, Paim GV, Guerra JL. Prevalence of feline leptospirosis: serologic survey and attempts of isolation and demonstration of the agent. Int J Zoonoses 1984; 11: 161-169. Luciani O. Receptivité et sensibilité du chat aux leptospires. Thesis École Nationale Vétérinaire de Nantes, France; 2004. Markovich JE, Ross L, McCobb E. The prevalence of leptospiral antibodies in free roaming cats in Worcester County, Massachusetts. J Vet Intern Med 2012; 26: 688-689. Mason RW, King SJ, McLachlan NM. Suspected leptospirosis in two cats. Aust Vet J 1972; 48: 622-623. Merien F, Baranton G, Perolat P. Comparison of polymerase chain reaction with microagglutination test and culture for diagnosis of leptospirosis. J Infect Dis 1995; 172: 281-285. Mylonakis ME, Bourtzi-Hatzopoulou E, Koutinas AF, Petridou E, Saridomichelakis MN, Leontides L, et al. Leptospiral seroepidemiology in a feline hospital population in Greece. Vet Rec 2005; 156: 615-616. Rees HG. Leptospirosis in a cat. N Z Vet J 1964; 12: 64. Rodriguez J, Blais M, Lapointe C, Carioto L, Harel J. Feline leptospirosis: a serologic and urinary PCR survey in healthy cats and in cats with kidney disease. Proceedings of the 30th Annual Congress of the American College of Veterinary Internal Medicine (ACVIM); 2012 May 30th, 2012 – June 2nd, 2012; New Orleans, USA. Shophet R. A serological survey of leptospirosis in cats. N Z Vet J 1979; 27: 236, 245-236. Sykes JE, Hartmann K, Lunn KF, Moore GE, Stoddard RA, Goldstein RE. 2010 ACVIM small animal consensus statement on leptospirosis: diagnosis, epidemiology, treatment, and prevention. J Vet Intern Med 2011; 25: 1-13. Ullmann LS, Hoffmann JL, de Moraes W, Cubas ZS, dos Santos LC, da Silva RC, Moreira N, Guimaraes AM, Camossi LG, Langoni H, Biondo AW. 2012. Serologic survey for Leptospira spp. in captive neotropical felids in Foz do Iguaçu, Paraná, Brazil. J Zoo Wildl Med. 2012 Jun;43(2):223-8.
<urn:uuid:a8ca7a8a-098c-42fc-b9bd-fe00bd1e90c2>
CC-MAIN-2017-43
http://www.abcdcatsvets.org/leptospira-spp-infection/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187821088.8/warc/CC-MAIN-20171017110249-20171017130249-00158.warc.gz
en
0.890426
4,816
3.625
4
The study of open clusters has a classic feel to it since the subject predates anyone alive today. Despite the age of this topic, I show via an ADS search that its relevance and importance in astronomy has grown faster in the last few decades than astronomy in general. This is surely due to both technical reasons and the interconnection of the field of stellar evolution to many branches of astronomy. In this review, I outline what we know today about open clusters and what they have taught us about a range of topics from stellar evolution to Galactic structure to stellar disk dissipation timescales. I argue that the most important astrophysics we have learned from open clusters is stellar evolution and that its most important product has been reasonably precise stellar ages. I discuss where open cluster research is likely to go in the next few years, as well as in the era of 20m telescopes, SIM, and GAIA. Age will continue to be of wide relevance in astronomy, from cosmology to planet formation timescales, and with distance errors soon no longer a problem, improved ages will be critically important to many of the most fascinating astrophysical questions. ASP Conference Series: Resolved Stellar Populations Number of Pages Grant or Award Name NASA grant NAG5- 13070, NSF grant AST-0307315 Scholarly Commons Citation von Hippel, T. (2005). Galactic Open Clusters. , (). Retrieved from https://commons.erau.edu/publication/1173
<urn:uuid:4a5065d4-203b-4d81-816a-bd7de9831be8>
CC-MAIN-2023-40
https://commons.erau.edu/publication/1173/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00436.warc.gz
en
0.905577
354
2.71875
3
Sponsors: USF Institute for Systematic Botany Sponsors: The New York Flora Association Sponsors: Butler University Friesner Herbarium Plant species are searchable by scientific and common name, including synonyms; known presence within a county; nomenclature citation information; availability of a herbarium specimen image; and listing as threatened/endangered, native, endemic, invasive, wetland and other characteristics. Search results can be presented as a spreadsheet-style list of plant species or as a gallery of plant images along with summary information for the purpose of comparison. Search results may be sorted or filtered by selected characteristics, then used to create a printer-friendly checklist for use in the field. Users can browse for a plant species by selecting a family, genus, common name, or county. Information is made available at the family, genus and species taxonomic classification levels, including distribution map and source information, synonymy, citations, and plant photographs. Each taxa web page is linked directly to herbarium specimen data and information, including targeted links to specific species pages on external websites such as USDA Plants and NatureServe. Administrative users have access to a secure web-based editor to manage online content including customized pages about the project, herbarium or institute, external links, and news and announcements.
<urn:uuid:0d714344-f522-42e2-950d-f1996a55a47c>
CC-MAIN-2017-30
http://plantatlas.usf.edu/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424884.51/warc/CC-MAIN-20170724142232-20170724162232-00124.warc.gz
en
0.841946
281
2.75
3
For A Better Bone Health The human skeleton is a unique organ which performs both a functional and a reservoir role, storing necessary minerals while allowing the organism to move, sustain, and defend itself. Strong bones provide stability and enable our movement. They shield our brains, heart, and other body tissues from harm. Our bone marrow also retains minerals like calcium and phosphorus, that effectively protect our bones healthy and transfer them back to the body when required, that is exactly why vitamins for bones are mostly consisting of such nutritional elements. One of the common problems, especially among older ages, is Osteoporosis, which leads bones to weaken and fragile that any minor stressors like leaning or sneezing can result in a crack. Much osteoporosis-related damage occurs within the spine, elbow, or hips. Our skeleton is constantly being renewed - newer bone is produced and older bone is decomposed. While you're youthful, your body creates new growing faster than it degrades old bone, so your bone density grows. This decreases after the early twenties, and most people achieve their maximum bone density in the early thirties. Bone mass gets lost quicker than it is formed as people grow older. What leads to osteoporosis? - Primary osteoporosis relates to bone turnover due to aging that causes loss of bone density. It might be also determined by race and family medical history). - Secondary osteoporosis is bone losses incurred by a persistent medical disease or medicine which affects bone resorption or increases the risk of breakage. These variables may also raise the fracture risk. The question now is, what can we do to lower the percentage of having bone health problems? There are a good number of things we can do to strengthen our bones and skeleton, some are: - Increasing your calcium, vitamin D, and other minerals and vitamins that help in the process of bone-building. Whether that means by eating food that is rich with these elements, or consuming vitamins for bones. - Start an osteoporosis preventative workout that includes strength-training and weight-loss activities. - Talk to your doctor about osteoporosis and ask for suitable vitamins for bones. - Eat foods that are full of vitamin D, calcium & Zinc, such as: milk, green vegetables, and fish. Alongside with consuming vitamins for bones. - Consume vitamins for bones that boost their health. How does the bone marrow develop? Throughout childhood and teenage years, bone marrow is supplied towards the skeleton quicker than old bone is destroyed. Bones can develop in mass and change in position because of this process; bones grow bigger, stronger, and thicker. Meaning that giving your children appropriate amounts of vitamins for bones can help maintain healthy growth for the skeleton as a whole. In bones, most of the cell functions involve removing and replacing cells simultaneously, a process known as remodeling. This remodeling cycle begins at birth continues our whole lives, and then becomes complete by the age a person's bone health’s density hits its maximum. What are the most beneficial elements to look for in vitamins for bones? - Calcium vitamins for bones that include vitamin D are vital for increasing bone mass and lowering the risk of osteoporosis. - Vitamin A is essential for the development of strong bone health. It affects the bone-building cells, as well as the bone-breaking cells. - Vitamin C vitamins for bones consisting of vitamin C are essential in maintaining strong bones and tissues. Moreover, it helps forming the protein collagen. - Zinc seems to have the ability to stimulate bone repair. It simultaneously reduces bone degradation and aids in the development of new bone. Zinc also decreases inflammation, which can harm bone. - Potassium can counteract chemical stress and minimize calcium release through bone, resulting in increased density of bone minerals. At any age, you should take care of your bone marrow and never overlook exercising out, eating healthily, and taking vitamins for bones to assist you have strong ones.
<urn:uuid:59cf0558-99ba-426c-918c-328cc2117fa2>
CC-MAIN-2023-14
https://www.sporter.com/en-ae/vitamins/bone-joint/bone-health/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00179.warc.gz
en
0.930759
827
3.640625
4
- I. Introduction to Emergency Ascents - II. Understanding the Importance of Emergency Ascents - III. Common Scenarios that Require Emergency Ascents - IV. Key Techniques for Performing Emergency Ascents - V. Equipment and Gear for Emergency Ascents - VI. Safety Precautions and Considerations for Emergency Ascents - VII. Frequently Asked Questions about Emergency Ascents - 1. What is an emergency ascent? - 2. What are some common reasons for emergency ascents? - 3. How should I prepare for an emergency ascent? - 4. What should I do if I run out of air during a dive? - 5. How can I prevent equipment malfunctions? - 6. What should I do if I become entangled underwater? - 7. How can I stay safe during adverse weather conditions? - 8. What should I do if I encounter dangerous marine life? - 9. How can I minimize the risk of needing an emergency ascent? - 10. What should I do after an emergency ascent? - VIII. Best Emergency Ascents Techniques for [specific activity] I. Introduction to Emergency Ascents When it comes to scuba diving, safety should always be the top priority. However, sometimes unexpected situations can arise underwater, requiring divers to perform emergency ascents. In this section, we will explore the basics of emergency ascents and the importance of being prepared for such situations. Emergency ascents are rapid ascents to the surface that are performed when divers encounter dangerous or life-threatening situations underwater. These situations can include equipment malfunctions, running out of air, or encountering marine life that poses a threat. It is crucial for divers to have a clear understanding of the proper techniques and procedures for emergency ascents. This includes knowing how to control buoyancy, equalize pressure, and ascend safely while monitoring ascent rates to prevent decompression sickness. One of the most important aspects of emergency ascents is maintaining calm and clear thinking. Panic can be a diver’s worst enemy in these situations, as it can lead to poor decision-making and potentially dangerous actions. Divers should always remember to breathe slowly and deeply, focusing on maintaining control throughout the ascent. Additionally, it is essential for divers to have the necessary equipment for emergency ascents. This includes a reliable buoyancy control device (BCD), a functioning regulator, and a backup air supply such as a pony bottle or an alternate air source from a buddy. Regular equipment maintenance and checks are crucial to ensure that everything is in proper working order. II. Understanding the Importance of Emergency Ascents As a seasoned diver with a deep passion for exploration, I have come to understand the critical importance of emergency ascents in ensuring diver safety. When things go wrong underwater, a swift and controlled ascent can mean the difference between life and death. In this section, I will delve into the reasons why emergency ascents are crucial and the key factors to consider when executing them. The Risks of Delayed Ascents Delayed ascents can have severe consequences for divers. The deeper we descend, the higher the pressure exerted on our bodies. This pressure causes nitrogen to dissolve into our tissues, forming tiny bubbles. If we ascend too quickly, these bubbles can expand rapidly, leading to decompression sickness, commonly known as “the bends.” Decompression sickness can manifest in various ways, including joint pain, dizziness, difficulty breathing, and even paralysis. In severe cases, it can be fatal. By understanding the risks associated with delayed ascents, divers can appreciate the importance of taking immediate action when faced with an emergency situation. Factors to Consider in Emergency Ascents Executing an emergency ascent requires careful consideration of several factors to ensure the safety of the diver. Here are some key elements to keep in mind: - Buddy System: Diving with a buddy is essential, as they can provide assistance and support during an emergency ascent. Communication and coordination are vital in these situations. - Depth and Time: The depth at which the emergency occurs and the duration of the dive play a crucial role in determining the ascent rate. As a general rule, the ascent should not exceed a rate of 9 meters (30 feet) per minute. - Equalization: Proper equalization techniques are essential during an ascent to prevent barotrauma, which can cause ear and sinus injuries. Divers must continuously equalize their ears and sinuses as they rise to the surface. - Monitoring Air Supply: Keeping track of the remaining air supply is vital during an emergency ascent. Divers should always have enough air to complete a safe ascent and perform any necessary decompression stops. Training and Preparedness Proper training and preparedness are fundamental in ensuring that divers can execute emergency ascents confidently and effectively. By undergoing comprehensive dive training courses, divers gain the necessary knowledge and skills to handle emergency situations. Additionally, carrying essential safety equipment, such as a surface marker buoy (SMB) and a signaling device, can greatly aid in alerting others to the diver’s emergency situation. These tools can help rescuers locate and assist the diver during the ascent. III. Common Scenarios that Require Emergency Ascents As an experienced diver, I have encountered various situations that have required emergency ascents. These scenarios can be challenging and potentially dangerous if not handled properly. In this section, I will share some common scenarios that may necessitate an emergency ascent and provide insights on how to handle them effectively. 1. Equipment Malfunction One of the most common reasons for an emergency ascent is equipment malfunction. Whether it’s a failed regulator, a leaking tank, or a broken dive computer, equipment failures can quickly turn a routine dive into a potentially life-threatening situation. It is crucial to stay calm and act swiftly in such scenarios. If you experience an equipment malfunction underwater, the first step is to signal your dive buddy and begin ascending slowly. Make sure to exhale continuously to prevent lung overexpansion injuries. As you ascend, keep an eye on your dive buddy and maintain visual contact throughout the ascent. Once at the surface, perform a controlled buoyant ascent and signal for assistance if needed. 2. Running Out of Air Running out of air is every diver’s worst nightmare. It can happen due to poor air management, unexpected exertion, or equipment failure. When faced with this situation, it is essential to remain calm and take immediate action. If you find yourself running out of air during a dive, signal your dive buddy and begin ascending slowly while sharing air if possible. If sharing air is not an option, make sure to perform a controlled ascent and make a safety stop if you have enough air remaining. Once at the surface, inflate your buoyancy control device (BCD) and signal for assistance if necessary. 3. Rapid Onset of Decompression Sickness Decompression sickness, also known as “the bends,” can occur when a diver ascends too quickly or fails to follow proper decompression procedures. The symptoms can range from mild joint pain to severe neurological impairment. In cases of rapid onset of decompression sickness, immediate action is crucial. If you or your dive buddy experience symptoms of decompression sickness during a dive, it is essential to ascend slowly and safely. Make sure to inform your dive buddy and signal for assistance if needed. Once at the surface, administer 100% oxygen if available and seek immediate medical attention. Remember, early treatment is key to minimizing the long-term effects of decompression sickness. 4. Entanglement or Entrapment Getting entangled in fishing lines, ropes, or other underwater debris can be a terrifying experience. It can restrict your movement and potentially lead to panic or injury. In such situations, it is crucial to remain calm and take systematic steps to free yourself. If you find yourself entangled or trapped underwater, the first step is to signal your dive buddy for assistance. Avoid making sudden movements that could worsen the entanglement. Assess the situation and try to free yourself using appropriate tools or techniques. If unable to free yourself, signal for assistance and wait for your dive buddy or a nearby diver to help you. Once free, perform a controlled ascent and ensure you are in a safe position before continuing the dive or returning to the surface. 5. Loss of Visibility Loss of visibility can occur due to factors such as strong currents, silt, or poor weather conditions. It can disorient even the most experienced divers and make navigation challenging. When faced with limited visibility, it is crucial to prioritize safety and take necessary precautions. If you encounter a sudden loss of visibility during a dive, signal your dive buddy and maintain physical contact if possible. Use your dive light or other signaling devices to communicate and stay together. If the visibility does not improve, consider aborting the dive and ascending slowly while maintaining contact with your buddy. Once at the surface, perform a controlled buoyant ascent and ensure everyone in the group is accounted for. IV. Key Techniques for Performing Emergency Ascents When it comes to diving, safety should always be the top priority. However, even the most experienced divers may find themselves in situations where emergency ascents become necessary. Knowing the key techniques for performing emergency ascents can mean the difference between a successful escape and a potential disaster. In this section, we will explore some essential techniques that every diver should be familiar with. 1. Controlled Buoyant Ascent The controlled buoyant ascent is a technique that allows divers to ascend safely and gradually to the surface while maintaining control of their buoyancy. This technique is particularly useful in situations where a rapid ascent is not possible or advisable, such as when diving with a decompression obligation or when ascending from a deep dive. To perform a controlled buoyant ascent, divers should start by establishing neutral buoyancy at their current depth. They should then slowly release air from their buoyancy compensator device (BCD) while monitoring their ascent rate using a dive computer or depth gauge. By releasing air in small increments, divers can ensure a controlled and controlled ascent, minimizing the risk of decompression sickness. 2. Controlled Emergency Swimming Ascent In some emergency situations, divers may need to perform a controlled emergency swimming ascent. This technique is typically used when a rapid ascent is necessary to reach the surface quickly, such as in the case of an out-of-air emergency or when dealing with a dangerous underwater situation. To perform a controlled emergency swimming ascent, divers should first signal their dive buddy or team members about the emergency. They should then establish a streamlined body position and begin swimming towards the surface at a controlled pace. It is important to avoid holding the breath during the ascent to prevent lung overexpansion injuries. Divers should also remember to exhale continuously to release any trapped air and maintain a controlled ascent rate. 3. Controlled Free-Ascent The controlled free-ascent technique is used when divers need to ascend quickly to the surface while maintaining control of their buoyancy. This technique is commonly employed in emergency situations where time is of the essence, such as when dealing with an entanglement or when facing a dangerous underwater hazard. To perform a controlled free-ascent, divers should first signal their dive buddy or team members about the emergency. They should then assume a streamlined position and kick vigorously towards the surface while continuously exhaling. It is crucial to maintain control of the ascent rate and avoid rapid changes in depth to prevent barotrauma or decompression sickness. 4. Controlled Buoyant Ascent with Safety Stop A safety stop is a crucial part of any dive, allowing the body to off-gas and reduce the risk of decompression sickness. In emergency situations, divers may still need to perform a controlled buoyant ascent with a safety stop to ensure their safety. To perform a controlled buoyant ascent with a safety stop, divers should follow the same steps as a regular controlled buoyant ascent. However, when reaching the safety stop depth, usually around 5 meters (15 feet), divers should hold their position for the recommended time, typically three minutes. During this time, divers can monitor their surroundings and check for any signs of distress or equipment malfunction before continuing the ascent to the surface. 5. Buddy Assistance Ascent In some emergency situations, divers may require assistance from their dive buddy or team members to perform a safe ascent. This technique is particularly useful when dealing with an injured or incapacitated diver who cannot ascend independently. To perform a buddy assistance ascent, the assisting diver should first establish positive buoyancy and secure the injured diver’s equipment. They should then maintain physical contact with the injured diver throughout the ascent, ensuring a controlled and safe ascent rate. Communication and coordination between the assisting diver and the injured diver are crucial to ensure a successful ascent. Remember, these techniques are meant to be used in emergency situations only and should be practiced regularly in controlled environments. Proper training, experience, and adherence to diving protocols are essential for performing emergency ascents safely. By being prepared and knowledgeable about these key techniques, divers can enhance their safety and minimize the risks associated with emergency situations. V. Equipment and Gear for Emergency Ascents When it comes to emergency ascents during diving, having the right equipment and gear is crucial for a safe and successful outcome. As an experienced diver, I have encountered various situations where having the appropriate gear made all the difference. In this section, I will share my insights and recommendations on the essential equipment and gear needed for emergency ascents. 1. Buoyancy Control Device (BCD) A BCD is a vital piece of equipment that allows divers to control their buoyancy underwater. During emergency ascents, maintaining proper buoyancy is essential to prevent rapid ascent or descent, which can lead to decompression sickness or lung overexpansion injuries. It is crucial to choose a BCD that fits well and provides easy inflation and deflation options. Additionally, opt for a BCD with integrated weight pockets to ensure quick and efficient ditching of weights during an emergency ascent. This feature can significantly reduce the risk of entanglement and facilitate a smoother ascent. The regulator is another critical piece of equipment that allows divers to breathe underwater. In emergency ascent situations, having a reliable and properly functioning regulator is of utmost importance. Regular maintenance and servicing of the regulator are essential to ensure optimal performance. Consider investing in a regulator with a balanced design, which provides consistent airflow regardless of the depth or tank pressure. This feature can be particularly beneficial during emergency ascents when the diver may experience varying depths and pressures. 3. Dive Computer A dive computer is a valuable tool that provides real-time information on depth, bottom time, ascent rate, and decompression limits. During emergency ascents, having a dive computer can help divers monitor their ascent rate and ensure they stay within safe limits. Choose a dive computer that offers clear and easy-to-read displays, audible alarms, and user-friendly interfaces. Some advanced dive computers even have built-in emergency ascent features, such as rapid ascent warnings and safety stop reminders. 4. Surface Marker Buoy (SMB) An SMB is an essential piece of safety equipment that divers should carry during every dive, including emergency ascents. This inflatable buoy is deployed on the surface to signal the boat or other divers that a diver is ascending and needs assistance. Invest in a high-visibility SMB that is easily inflatable and can be securely attached to a line or reel. This will ensure that the SMB is easily visible to others, even in rough surface conditions. 5. Emergency Oxygen Kit An emergency oxygen kit is a crucial component of any diver’s safety equipment, especially during emergency ascents. In case of decompression sickness or lung overexpansion injuries, administering oxygen can significantly improve the diver’s condition while awaiting professional medical assistance. Choose a portable and lightweight emergency oxygen kit that includes a demand valve, mask, and oxygen cylinder. Familiarize yourself with the proper usage and administration of oxygen to ensure its effectiveness during emergencies. 6. Cutting Tool A cutting tool is an essential safety item that divers should always have readily accessible during emergency ascents. In situations where entanglement or entrapment occurs, a cutting tool can be a lifesaver. Consider carrying a dive knife or shears that are specifically designed for underwater use. Ensure that the cutting tool is easily accessible and securely attached to your BCD or harness for quick and efficient deployment. VI. Safety Precautions and Considerations for Emergency Ascents When it comes to diving, safety should always be the top priority. In the unfortunate event that something goes wrong during a dive, emergency ascents may be necessary. These emergency ascents require careful planning and execution to ensure the safety of the divers involved. In this section, we will explore the safety precautions and considerations that should be taken into account when performing emergency ascents. 1. Assessing the Situation Before initiating an emergency ascent, it is crucial to assess the situation and determine the appropriate course of action. This assessment should include evaluating the diver’s physical condition, the severity of the problem, and the available resources. It is important to remain calm and focused during this assessment to make informed decisions. As an experienced diver, I have encountered various emergency situations throughout my career. One particular incident stands out in my memory. While exploring a deep reef, my dive buddy experienced a malfunction with their dive computer, causing a rapid ascent. In this situation, we quickly assessed the problem and decided to perform an emergency ascent to avoid any potential risks. 2. Communication and Buddy System Effective communication is essential during emergency ascents. It is crucial to establish clear signals and protocols with your dive buddy before the dive. This ensures that both divers are on the same page and can respond promptly in case of an emergency. Maintaining visual contact and using hand signals can help relay important information underwater. During the incident I mentioned earlier, clear communication between my dive buddy and me played a vital role in our successful emergency ascent. We had established a buddy system and practiced various emergency scenarios beforehand, which allowed us to act swiftly and efficiently. 3. Controlled Ascent During an emergency ascent, it is important to maintain control and ascend at a safe rate. Ascending too quickly can lead to decompression sickness or other complications. The recommended ascent rate is around 9 meters (30 feet) per minute. However, in certain situations, a faster ascent may be necessary to ensure the diver’s safety. When performing an emergency ascent, it is crucial to monitor your ascent rate and make adjustments accordingly. Keep in mind that factors such as depth, time spent underwater, and the diver’s physical condition can affect the ascent rate. It is always better to err on the side of caution and ascend at a slightly slower rate if unsure. 4. Equalizing and Monitoring Equalizing your ears is an important aspect of ascending safely. As you ascend, the pressure on your ears changes, and failure to equalize can result in discomfort or even injury. To equalize, pinch your nose and gently blow while swallowing. This helps equalize the pressure in your middle ear with the surrounding environment. Throughout the emergency ascent, it is crucial to continuously monitor your depth and ascent rate. This can be done using a dive computer or a depth gauge. Monitoring these factors allows you to make any necessary adjustments and ensures a controlled ascent. 5. Post-Ascent Procedures Once you have successfully performed an emergency ascent, it is important to follow post-ascent procedures. This includes conducting a safety stop at around 3-5 meters (10-15 feet) for a few minutes to off-gas any residual nitrogen. It is also advisable to seek medical attention, even if you feel fine, to rule out any potential complications. Reflecting on my own experiences, I cannot stress enough the importance of debriefing and learning from every emergency ascent. Analyzing the incident, identifying any mistakes or areas for improvement, and discussing them with your dive buddy or instructor can help prevent similar situations in the future. VII. Frequently Asked Questions about Emergency Ascents 1. What is an emergency ascent? An emergency ascent is a rapid ascent to the surface of the water in response to a dangerous situation or equipment failure while scuba diving. It is a last resort measure to ensure the diver’s safety when other options have been exhausted. 2. What are some common reasons for emergency ascents? There are several reasons why a diver may need to perform an emergency ascent. These include running out of air, equipment malfunction, entanglement, rapid onset of adverse weather conditions, or encountering dangerous marine life. 3. How should I prepare for an emergency ascent? Preparation is key to handling emergency situations effectively. Before every dive, ensure that your equipment is in good working condition, including your regulator, buoyancy control device, and dive computer. Familiarize yourself with emergency procedures and practice them regularly. 4. What should I do if I run out of air during a dive? If you run out of air during a dive, it is essential to remain calm and signal your buddy or dive group. They may be able to share their air with you using an alternate air source. If this is not possible, begin a controlled emergency ascent while exhaling continuously to prevent lung overexpansion injuries. 5. How can I prevent equipment malfunctions? Regular equipment maintenance and servicing are crucial to prevent equipment malfunctions. Follow the manufacturer’s guidelines for care and maintenance, and have your equipment inspected by a certified technician at regular intervals. Additionally, always perform pre-dive checks to ensure everything is functioning correctly before entering the water. 6. What should I do if I become entangled underwater? If you become entangled underwater, it is important to remain calm and avoid making any sudden movements that could worsen the situation. Assess the entanglement and try to free yourself using the appropriate tools or techniques. If unable to do so, signal your buddy for assistance and work together to resolve the issue. 7. How can I stay safe during adverse weather conditions? When diving in adverse weather conditions, it is crucial to closely monitor the weather forecast before the dive and during the dive. If conditions deteriorate rapidly, consider aborting the dive and making a controlled emergency ascent. Always prioritize your safety and the safety of your dive group. 8. What should I do if I encounter dangerous marine life? If you encounter dangerous marine life during a dive, it is important to remain calm and avoid any sudden or aggressive movements. Slowly back away from the animal while maintaining eye contact. If the animal becomes aggressive or poses an immediate threat, make a controlled emergency ascent while following proper ascent rates. 9. How can I minimize the risk of needing an emergency ascent? While it is impossible to eliminate all risks associated with scuba diving, there are steps you can take to minimize the likelihood of needing an emergency ascent. These include proper dive planning, maintaining good physical fitness, continuously improving your diving skills, and staying within your training and experience limits. 10. What should I do after an emergency ascent? After an emergency ascent, it is important to seek immediate medical attention, even if you feel fine. The rapid ascent may have caused decompression sickness or other injuries that may not be immediately apparent. Contact a hyperbaric chamber or diving medical specialist for evaluation and treatment. Remember, emergency ascents should only be performed as a last resort when all other options have been exhausted. Proper training, preparation, and adherence to safe diving practices are essential to minimize the risk of needing an emergency ascent. VIII. Best Emergency Ascents Techniques for [specific activity] 1. Petzl Grigri+ As an experienced diver, I understand the importance of having reliable and efficient equipment. One product that has consistently stood out to me is the Petzl Grigri+. This innovative device has revolutionized the way divers approach their ascents, providing enhanced safety and peace of mind. The Petzl Grigri+ is a belay device specifically designed for climbers and divers. It features an assisted braking system that provides additional support during ascents, making it an ideal choice for emergency situations. The device is made from durable materials, ensuring longevity and reliability even in the harshest conditions. Why People Prefer the Petzl Grigri+ There are several reasons why divers and climbers prefer the Petzl Grigri+. Firstly, its assisted braking system offers an added layer of safety, allowing for controlled descents and ascents. This feature is particularly beneficial in emergency situations, where quick and precise movements are crucial. Additionally, the Petzl Grigri+ is known for its user-friendly design. The device is easy to operate, making it suitable for divers of all skill levels. Its intuitive interface allows for seamless transitions between different modes, ensuring a smooth and efficient ascent. The Petzl Grigri+ is packed with features that enhance its functionality and usability. One notable feature is the anti-panic handle, which provides a comfortable grip and prevents accidental releases. This feature is especially valuable in high-pressure situations, where maintaining control is essential. Furthermore, the device has an auto-locking feature that engages in the event of a sudden force or shock. This ensures that the rope remains securely locked, minimizing the risk of accidents or injuries. The Petzl Grigri+ also has a versatile compatibility, allowing it to be used with a wide range of rope diameters. In addition to its core features, the Petzl Grigri+ offers several additional benefits. The device has a built-in safety gate that prevents accidental openings, providing an extra layer of protection. It also has a durable construction, making it resistant to wear and tear. Another noteworthy feature is the Petzl Grigri+’s compatibility with both single and double ropes. This versatility allows divers to adapt to different situations and preferences, making it a versatile and practical choice. Warranty & Service Petzl is known for its commitment to customer satisfaction and product quality. The Petzl Grigri+ comes with a comprehensive warranty that covers any manufacturing defects or malfunctions. Additionally, Petzl offers exceptional customer service, ensuring that any concerns or issues are promptly addressed. Pros and Cons |The assisted braking system provides enhanced safety||May be considered expensive compared to other belay devices| |User-friendly design suitable for divers of all skill levels||Requires proper training and understanding of its features| |Anti-panic handle prevents accidental releases||May not be suitable for all types of climbing or diving activities| |Auto-locking feature ensures secure rope locking||Requires regular maintenance to ensure optimal performance| |Compatible with a wide range of rope diameters||May have a learning curve for first-time users| 2. Black Diamond ATC Guide The Black Diamond ATC Guide is a versatile belay device that has become a favorite among climbers and outdoor enthusiasts. With its innovative design and reliable performance, it offers a range of features that benefit both beginners and experienced climbers alike. The Black Diamond ATC Guide is a lightweight and compact belay device that is designed to provide smooth rope control and easy handling. It is made from durable aluminum, making it strong and long-lasting. The device features two friction modes – the “Guide” mode and the “Standard” mode, allowing for easy belaying and rappelling. Why People Prefer This Product There are several reasons why people prefer the Black Diamond ATC Guide. Firstly, its versatility makes it suitable for a wide range of climbing activities, including single-pitch climbing, multi-pitch climbing, and alpine climbing. This means that climbers can rely on this device for all their belaying and rappelling needs. Secondly, the Black Diamond ATC Guide offers excellent rope control, ensuring a smooth and controlled descent. This is particularly important in situations where climbers need to lower their partners or control the rope during rappelling. The device’s friction modes allow for easy adjustments, giving climbers the confidence they need to focus on their climbing. The Black Diamond ATC Guide is packed with features that enhance its performance and usability. One notable feature is the high-friction mode, which provides extra stopping power when catching falls or lowering heavy loads. This feature is especially useful for climbers who are belaying a heavier partner or dealing with dynamic movements. Another feature is the smooth rope feed, which ensures a seamless belaying experience. The device’s design allows for easy rope handling, reducing the risk of rope jams and tangles. This is crucial for climbers, as it allows them to focus on their climbing without worrying about the device’s performance. In addition to its primary functions, the Black Diamond ATC Guide also offers some additional features that climbers will appreciate. One such feature is the built-in carabiner loop, which allows climbers to attach the device directly to their harness. This eliminates the need for an extra carabiner, making the setup more streamlined and efficient. Furthermore, the device is compatible with a wide range of rope diameters, ranging from 7.7mm to 11mm. This means that climbers can use the Black Diamond ATC Guide with different ropes, providing them with flexibility and convenience. Warranty & Service Black Diamond is known for its commitment to quality and customer satisfaction. The Black Diamond ATC Guide comes with a limited manufacturer’s warranty, ensuring that customers are protected against any defects in materials or workmanship. In case of any issues, customers can rely on Black Diamond’s excellent customer service for assistance and support. |The Black Diamond ATC Guide is versatile and suitable for various climbing activities.||The device may be slightly heavier compared to other belay devices on the market.| |It offers excellent rope control and smooth handling.||The price of the Black Diamond ATC Guide may be higher compared to other belay devices.| |The device has a durable construction and is built to last.||Some users may find the learning curve slightly steep when transitioning between friction modes.| |The Black Diamond ATC Guide is compatible with a wide range of rope diameters.| 3. Mammut Smart 2.0 When it comes to safety equipment for diving, the Mammut Smart 2.0 is a top choice for both beginners and experienced divers. This innovative device offers a range of features that enhance the overall diving experience and provide peace of mind in emergency situations. The Mammut Smart 2.0 is a compact and lightweight device that functions as a belay device for climbers and a descent control device for divers. It is designed to provide smooth and controlled rope handling, making it easy to manage during ascents and descents. The device is made from high-quality materials that ensure durability and reliability, even in challenging diving conditions. Why People Prefer the Mammut Smart 2.0 Divers prefer the Mammut Smart 2.0 for several reasons. Firstly, its intuitive design makes it easy to use, even for beginners. The device features a simple and straightforward operation, allowing divers to focus on their dive without any distractions. Additionally, the Mammut Smart 2.0 offers excellent rope control, ensuring a safe and controlled descent. Furthermore, the device’s compact size and lightweight construction make it highly portable. Divers can easily carry it in their gear bag without adding unnecessary weight. This is especially beneficial for divers who frequently travel or participate in multiple dives in a single day. The Mammut Smart 2.0 boasts several impressive features that enhance its functionality and safety. One notable feature is the assisted braking system, which provides additional security during descents. This system automatically catches the rope in the event of a fall, preventing uncontrolled descents and potential accidents. Another noteworthy feature is the high braking performance, which allows for smooth and controlled rope handling. This feature is particularly useful during emergency ascents, as it enables divers to ascend quickly and safely. The Mammut Smart 2.0 also has a low impact force, reducing the strain on the diver’s body during sudden stops or falls. In addition to its primary functions, the Mammut Smart 2.0 offers some additional features that further enhance its value. One such feature is the integrated carabiner, which allows for easy attachment to the diver’s harness or gear. This eliminates the need for additional equipment and streamlines the diving process. Furthermore, the device has a compact and ergonomic design, ensuring a comfortable grip during use. The Mammut Smart 2.0 also has a durable construction that can withstand the rigors of diving, making it a reliable companion for any underwater adventure. Warranty & Service Mammut is known for its commitment to customer satisfaction, and the Mammut Smart 2.0 is no exception. The device comes with a comprehensive warranty that covers any manufacturing defects or malfunctions. Additionally, Mammut offers excellent customer service, ensuring that any issues or concerns are promptly addressed. |The assisted braking system provides added safety during descents.||The device may be more expensive compared to other belay devices on the market.| |Intuitive design and easy operation make it suitable for divers of all skill levels.||The carabiner may be too small for divers with larger hands.| |Compact and lightweight construction allows for easy portability.||Some divers may find the device’s grip less comfortable compared to other models.| 4. Edelrid Mega Jul When it comes to emergency ascents during diving expeditions, having the right equipment can make all the difference. One such essential tool is the Edelrid Mega Jul, a versatile and reliable device that has gained popularity among divers worldwide. In this section, we will delve into the features, benefits, and reasons why divers prefer the Edelrid Mega Jul. The Edelrid Mega Jul is a belay device specifically designed for climbers but has found its way into the diving community due to its exceptional functionality. Made from high-quality stainless steel, it is built to withstand the harsh underwater conditions. The device is lightweight, compact, and easy to handle, making it a favorite among divers of all skill levels. Why People Prefer the Edelrid Mega Jul One of the main reasons divers prefer the Edelrid Mega Jul is its versatility. It can be used for both single and double ropes, allowing divers to adapt to different situations effortlessly. The device’s intuitive design and smooth operation make it user-friendly, even for those new to emergency ascents. Furthermore, the Edelrid Mega Jul offers excellent control and braking power, giving divers a sense of security during emergency situations. Its innovative design allows for precise control of the rope’s speed, ensuring a safe and controlled ascent. This feature is particularly crucial when dealing with strong currents or challenging underwater conditions. The Edelrid Mega Jul is packed with features that enhance its performance and reliability. One notable feature is the assisted braking function, which provides an added layer of safety during emergency ascents. The device automatically locks when the rope is pulled sharply or if the user loses control, preventing accidental falls or slips. Additionally, the Edelrid Mega Jul has a high braking performance, allowing divers to easily control the rope’s speed and descent. The device’s geometry and shape contribute to its exceptional braking power, ensuring a smooth and controlled ascent in any situation. Aside from its primary function as a belay device, the Edelrid Mega Jul also offers additional features that divers find beneficial. One such feature is its compact size, making it easy to carry and store in a diving bag or pocket. This portability is particularly useful during diving expeditions where space is limited. The Edelrid Mega Jul also comes with a durable stainless steel construction, ensuring its longevity and resistance to corrosion. This feature is essential for divers who frequently encounter saltwater environments, as it guarantees the device’s durability and reliability over time. Warranty & Service Edelrid is known for its commitment to quality and customer satisfaction. The Edelrid Mega Jul comes with a warranty that covers any manufacturing defects or malfunctions. In the unlikely event that the device encounters any issues, Edelrid provides excellent customer service and support to ensure a quick resolution. Pros and Cons |1. Versatile and suitable for both single and double ropes.||1. May require some practice to master its operation.| |2. Excellent control and braking power for safe ascents.||2. Slightly higher price compared to other belay devices.| |3. Assisted braking function for added safety.||3. Limited color options available.| |4. Compact and portable for easy storage and transport.||4. Not suitable for extremely heavy loads.| |5. Durable stainless steel construction for longevity.||5. May not be suitable for beginners without proper training.| 5. Trango Vergo The Trango Vergo is a cutting-edge climbing device that has revolutionized the way climbers approach their sport. Designed with the needs of climbers in mind, the Vergo offers a range of features that make it a top choice for both beginners and experienced climbers alike. The Trango Vergo is a belay device that provides a smooth and controlled descent for climbers. It is made from high-quality materials that ensure durability and reliability, even in the most challenging climbing conditions. The device is lightweight and compact, making it easy to carry and use on any climbing adventure. Why People Prefer the Trango Vergo There are several reasons why climbers prefer the Trango Vergo over other belay devices on the market. Firstly, the Vergo offers an innovative design that allows for easy and efficient belaying. Its unique shape and ergonomic handle provide a comfortable grip, reducing hand fatigue during long climbs. Additionally, the Vergo features an auto-locking mechanism that ensures the rope is locked in place, providing added safety for climbers. This feature gives climbers peace of mind, knowing that they are securely anchored while climbing or descending. The Trango Vergo boasts a range of features that set it apart from other belay devices. One notable feature is the assisted braking system, which provides a smooth and controlled descent, even with heavier climbers. This feature is especially beneficial for beginners who may struggle with controlling the rope during descents. Furthermore, the Vergo has a unique camming mechanism that allows for easy rope management. The device automatically adjusts to the rope’s diameter, providing a secure grip without the need for manual adjustments. This feature makes the Vergo versatile, as it can accommodate a wide range of rope sizes. In addition to its primary functions, the Trango Vergo offers several additional features that enhance the climbing experience. The device has a built-in carabiner hole, allowing climbers to attach it directly to their harness for easy access. This eliminates the need for additional gear and streamlines the climbing process. The Vergo also has a built-in release lever that allows for quick and easy rope release. This feature is particularly useful in emergency situations or when climbers need to quickly adjust their position on the wall. Warranty & Service Trango stands behind the quality and performance of the Vergo by offering a comprehensive warranty and excellent customer service. The device comes with a limited lifetime warranty, ensuring that climbers are protected against any manufacturing defects or faults. Trango’s customer service team is readily available to assist with any inquiries or concerns, providing climbers with peace of mind. |The assisted braking system provides a smooth and controlled descent.||The device may be more expensive compared to other belay devices on the market.| |The unique camming mechanism accommodates a wide range of rope sizes.||Some climbers may find the device’s unique shape and handle design less comfortable compared to traditional belay devices.| |The built-in carabiner hole allows for easy attachment to the harness.||Beginners may require some practice to become familiar with the device’s auto-locking mechanism.| |The built-in release lever enables quick and easy rope release.||Some climbers may prefer a belay device with more customization options.| The Trango Vergo is a game-changer in the climbing world, offering climbers a reliable and efficient belay device that enhances safety and performance. With its innovative design, range of features, and excellent warranty and customer service, the Vergo is a top choice for climbers of all skill levels. Adam Smith is an accomplished individual with a deep passion for diving and exploration. Born and raised in the coastal town of Portville, he developed a strong connection to the ocean from an early age. Adam’s educational background reflects his dedication to his craft, having obtained a Bachelor’s degree in Marine Biology from the prestigious Oceanic University of Coral Bay. His studies focused on marine ecosystems and conservation, allowing him to gain valuable insights into the underwater world. With years of experience as a professional diver, Adam has explored numerous dive sites across the globe, documenting his adventures through captivating writing that brings the beauty of the ocean to life.
<urn:uuid:37028b62-fc55-43a5-8d23-bc4d684ef0ee>
CC-MAIN-2023-50
https://jeanne-ii.com/emergency-ascents/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00592.warc.gz
en
0.927148
8,517
2.671875
3
Clam gardens are a sophisticated form of shellfish management designed to ensure a reliable food source for the large populations of First Nations and Native Americans that inhabited the Northwest Coast. Prior to European contact, First Nations’ and Native American towns and villages dotted every stretch of habitable coastline. Many areas were more heavily populated than today, with people living in settlements of a few hundred to potentially thousands of people. Clams would have provided a reliable, easy to harvest protein and vitamin-rich food that could have been eaten fresh at any time of year or dried for later consumption. In addition, people valued clams as a trade item and for their use in community events and gatherings. Today, clams and clam harvesting remain important economically, culturally, socially and ceremonially for Indigenous Peoples on the Northwest Coast, and feature prominently in origin stories, rituals and songs. As shared with us by Gitla, the Heiltsuk have a popular non-ceremonial dance for the girls called the Clam Dance. The girls represent supernatural clams who come to life to make fun of real clam diggers who can’t find them. The famous sculpture “The Raven and the First Men” by Haida artist Bill Reid represents the deep connection between clams and coastal peoples. A wonderful quote by Anne Cross who documented the creation of Reid’s masterpiece (link to PDF) describes a foundational relationship between clams and the first Haida people: According to Haida legend, the Raven found himself alone one day on Rose Spit beach, on Haida Gwaii. Suddenly, he saw an extraordinary clamshell at his feet, and protruding from it were a number of small creatures. The Raven coaxed them to leave the shell to join him in his wonderful world. Some were hesitant at first, but eventually, overcome by curiosity, they emerged from the partly open clamshell to become the first Haida.
<urn:uuid:b022eb00-4f5b-4c98-b556-52726e33c34e>
CC-MAIN-2020-10
https://clamgarden.com/clamgardens/cultural-importance/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143373.18/warc/CC-MAIN-20200217205657-20200217235657-00360.warc.gz
en
0.972376
391
3.625
4
The outstanding 5-star article brought to us courtesy repsychl.co.uk. It is a commonly held belief that low self-esteem triggers violent behaviour, the origin of which is unknown. Baumeister, Bushman and Campbell (2000) conducted a study investigating this view; the following article attempts to summarise the ideas stated in their paper, entitled ‘Self-esteem, narcissism, and aggression: Does violence result from low self-esteem or from threatened egotism?’. People with low self-esteem are generally portrayed as risk averse, easily influenced and deficient in self-confidence. These characteristics are incongruous with aggression – even likely to dampen or inhibit it – given that hostile behaviours are intrinsically risky. Low self-esteem is correspondent to a lack of confidence in achievement, whereas aggression is typically executed with an expectation of overpowering another person. Most pertinently, those harbouring low self-esteem are doubtful in their self-identity, whereas aggression is likely carried out to uphold high self-regard. Baumeister et al. point out, “Violent men seem to have a strong… View original post 562 more words
<urn:uuid:fcfa4747-10a5-4006-b35a-be4e26c5538c>
CC-MAIN-2017-47
https://marshall326.com/2017/09/02/do-violent-people-have-low-self-esteem/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806939.98/warc/CC-MAIN-20171123195711-20171123215711-00652.warc.gz
en
0.94408
248
2.765625
3
As a child I loved doing arts and crafts and still do today! As a parent I loved doing them with my own children! Crafts have hidden benefits that many don’t realize, not only in creating them, but also in teaching others how to create them. This lesson helps students break down their ideas into easy to understand steps using Snapguide technology to help them convey directions and visuals to create a flower! - Provide students the “Think, Pair, Share” form (TPT Freebie) and the following prompt: Children benefit from doing crafts. Agree or Disagree and Why? (Answer in the first column of the form.) - Next, have students turn to their shoulder neighbor and share responses. Each student writes in the center column what their neighbor had to say. - Finally, together, combine responses in a way that makes sense and complete the third column. - Share new responses as a group. - Phones, Tablets or Digital Cameras - Variety of Craft Supplies - Discuss that crafts and children definitely go together to help benefit children but a few guidelines have to be considered along the way. - Students will complete the web activity using the provided links in the assignment to find out what the benefits and guidelines are. - Once students know the benefits, guidelines and how to write instructions. they will complete the Children’s Craft Project where they will become editors, creating a step-by-step layout for a magazine on how to create a flower craft for young children. - Students will use Snapguide to assist them in this process.Here is a tutorial I have them view before creating their own. - In order for students to do this they must decide what kind of flower to make and create it themselves, using the step-by-step process so they have a prototype when finished that will turned in with their project. I have a huge box of craft materials left over from other projects or just stuff I pick up inexpensively at thrift stores or yard sales. Students can also bring items in from home to use. - Notes: I did this project in the spring, but if you teach this in the fall, create pumpkins or scarecrows. If it’s in the winter, create a snowman. - This lesson is not as easy as it may appear! Students really had to think about breaking down the steps to simplify them for children in an easy to understand process, some had trouble with this. They also had to apply problem solving skills because their flower ideas didn’t always work or turn out as they intended and then they had to figure out how to fix the problem - Here’s a sample - Crafts and Children Lesson (PDF) - Think Pair Share Form (TPT Freebie) - Children’s Craft Project Guide Sheet (PDF) - Flower Crafting Steps-Directions Planning (PDF) - How To Rubric (TPT Freebie) 2 comments for “Children & Crafts: Creating Flower Crafts with Snapguide”
<urn:uuid:65a65d7c-d385-4eba-af84-9947b1f13ca8>
CC-MAIN-2023-23
https://www.familyconsumersciences.com/2016/05/children-crafts-creating-flower-crafts-with-snapguide/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00606.warc.gz
en
0.950812
649
3.65625
4