text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Electronic payments have become the norm in the business world—but it’s still important that moving money between consumers, businesses, and banks remains safe and efficient. This requires standard regulation. That’s where Nacha comes in: Nacha’s role ensures you can send and receive funds electronically without worrying about security issues or errors while transferring. In this guide, we’ll jump into what Nacha is and how it helps your business in ways you might not even realize.
What is Nacha and how does it work?
Nacha (formerly known as NACHA, or the National Automated Clearing House Association) manages the ACH Network, the electronic funds transfer system used within the United States.
This organization is responsible for the administration, development, and governance of the ACH Network and ACH transactions. Essentially, Nacha is the body behind all safe electronic payments in the U.S.
Nacha is a non-profit association funded by financial institutions using the ACH Network. Although not a federal agency, this organization does work closely with the Federal Reserve, U.S. Treasury, state banking agencies, and various financial institutions in the U.S.
Whether you’re paying employees or purchasing supplies online, using automated clearing house transactions streamlines a good chunk of your business’s financial transactions. The ACH Network links bank accounts in the U.S. and makes payments and electronic money transfers easy and safe. So, instead of having to send checks (which involves more time and changing hands), businesses can send and receive money swiftly, efficiently, and securely.
But why exactly is Nacha important for small businesses? Let’s look at an example of how Nacha impacts business payments.
Where Nacha comes from
Before electronic payments existed, banks moved money via paper checks. Bankers would go to clearing houses at the end of the day to collect checks and make sure all of the money was adequately accounted for.
But quickly, the growing number of checks became challenging to manage, and banks needed to find a more efficient alternative. That’s when several check clearing houses partnered with the federal government to build an automated payment method that banks could use.
This national network of automated clearing houses enabled citizens and businesses to pay for goods and services more efficiently. Since the system’s efficiency increased, transfers then required more control. That's when Nacha was founded: In 1974, Nacha was created to regulate the ACH system.
The difference between Nacha and ACH
ACH is a network and payment system that has revolutionized the payments industry by making fast, secure electronic transfers accessible to everyone. Nacha, on the other hand, is a governing organization that oversees the ACH Network.
Simply put, Nacha creates rules and standards, and the ACH Network operates under them.
(It’s important to know that Nacha does not run the network itself; ACH operators run the network. Through cooperation and innovations, Nacha improves and grows the use of ACH payments.)
Using ACH payments helps your business pay suppliers and employees conveniently and on time. The network lets you know your funds are safely debited and credited to the correct financial institution, but Nacha ensures your funds are safe by providing regulations about how the ACH Network needs to process transactions.
Nacha in action
When making an electronic financial transaction, the originating depository financial institution (ODFI) sends money to the receiving depository financial institution (RDFI). Both of these financial institutions operate within the ACH Network.
Let’s say your business pays employees using direct deposit. Both your business bank account and your employee’s bank accounts use the ACH network, so in order to deposit your employee’s paycheck, you'll need their bank’s name, account number, and routing number.
For the transaction to happen, the ODFI (your bank) initiates the transfer request to the ACH Network, telling it to debit funds and then credit them to the employee’s bank account. The ACH bundles this message with outgoing financial messages from other banks and repackages them based on the recipient banks. Then, the RDFI (your employee’s bank) gets the message to credit the funds to your recipient’s account.
All of this happens within about one business day. And, since it’s digital and automated, the process requires almost zero effort from you or the person receiving the direct deposit. Your business initiates the transaction, and your recipient waits for the funds to deposit.
The process is so easy, which is why many American businesses rely on electronic payments. In 2021, more than 29 billion transactions were made via the ACH network, with a total value of nearly $73 trillion. These transactions included online payments, bill payments, and direct deposits.
All of these payments were secure because they complied with the rules and standards established by Nacha.
The importance of Nacha compliance
The Nacha operating rules control how the ACH Network operates by determining the roles and responsibilities of all parties, ensuring valid transactions for businesses and individuals, preventing fraudulent payments, and providing security with Buyer Protection. But beyond that, Nacha rules are essential to ensuring the ACH payment system serves its purpose as the foundation of electronic payment transfers in the U.S.—and here’s how.
Nacha instills confidence in ACH
Fraudulent payment activities have forced Nacha to develop and implement standards to ensure secure payments. By ensuring funds are transferred safely, Nacha increases customer confidence in ACH payments and facilitates a stable electronic payment network that everyone (i.e., businesses, banks, credit unions, and individuals) is comfortable using.
Nacha reduces exception processing
As Nacha standards apply to all members, it will not accommodate financial institutions seeking exception processing to suit their business model. This makes for a consistent and reliable method that all participating businesses must abide by.
Nacha allows arbitration claims
Nacha’s compliance keeps the ACH Network safe—and if any violations occur, your business can file an arbitration claim to recoup supplier losses or damages. Nacha’s arbitration proceedings are more efficient and affordable than civil lawsuits and litigations.
How Nacha’s rules help your business
While Nacha is an essential organization that prevents fraud and enforces safe money transferring for millions of people and businesses nationwide, Nacha’s control and oversight of electronic payments can specifically help your business in several ways.
- The same rules apply to everyone. Nacha’s primary responsibility is writing, maintaining, and implementing the ACH Network practices. As ACH is used for money transfers by various entities, creating regulations and standards that apply to all participants ensures a level playing field.
- Your business is protected if you’re wronged. Nacha’s regulations enable your business to claim a refund for defective or undelivered goods or services.
- Your business can rely on timely transfers. Electronic transferring is instant, so you can maintain a good relationship between your business, employees, and vendors by trusting your bank to make timely deposits.
- There is less fraud. Fraudulent transactions are difficult to process and easily detected on the ACH network.
Without Nacha, we would operate in a time of paper checks and slow money moving. This is hardly a reliable resource for businesses that must work daily to keep their operations afloat. Thanks to the Nacha operating rules, financial processes can instead be completed within a day—ensuring that nobody’s business is ever slowed down due to a lack of money transference.
Choose an ACH payment system powered by automation
Imagine spending less time on transactions to focus more on your business. Well, the right ACH payment processing solution lets you send and receive funds faster.
BILL provides data integration and automation to help your business manage your payables and receivables processes from one place. Learn more about how ACH payment processing can benefit your business. | <urn:uuid:e770083c-fbaa-414f-bf9c-ca5dacc78238> | CC-MAIN-2023-40 | https://www.bill.com/learning/nacha | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00630.warc.gz | en | 0.933018 | 1,664 | 2.609375 | 3 |
Despite a growing number of health clubs and diet and exercise trends, baby boomers aren't nearly as healthy as their parents were, according to recently published research.
Boomers have more diabetes, higher blood pressure and higher cholesterol than their parents did at the same time in their lives,according to the report in February's issue of JAMA Internal Medicine. The findings are based on data from the National Health and Nutrition Examination Survey, and was funded in part by the National Institutes of Health.
Researchers compared people 46 to 64 between 2007 and 2010 with people in the same age range between 1988 and 1994. The average age of the boomer group was 54.
Seventy-eight million children were born between 1946 and 1964, the "baby boom" generation. Boomers comprise 26 percent of the U.S. population.
Only 13 percent of boomers, compared with 32 percent of the older generation, said their health was "excellent." More than twice as many boomers (7 percent vs. 3 percent) said they used a "walking assist device" such as a cane or a walker. Health problems limit them at work, said 14 percent of boomers, but only 9 percent of their parents reported problems when they were in the same age group.
Boomers were more likely to be obese (39 percent vs. 29 percent) and to suffer from diabetes (16 percent vs. 12 percent), hypertension (43 percent vs. 36 percent), high cholesterol (74 percent vs. 34 percent) and cancer (11 percent vs. 10 percent).
Diabetes and hypertension (high blood pressure) are ailments exacerbated by obesity.
The study is by five researchers from West Virginia University School of Medicine and the Medical University of South Carolina, led by Dana E. King of West Virginia's Department of Family Medicine.
The results surprised Dr. King: "I didn't expect [boomers] to have such a big change in disability and obesity."
Lousy health habits appear to be the chief reason why.
Only 35 percent of boomers, compared to 50 percent of their parents' generation, reported exercising at least 12 times a month. Fifty-two percent of boomers, but only 17 percent of the older group, said they got no exercise at all. Two-thirds of boomers, but just 37 percent of their parents, reported "moderate" drinking.
But although boomer health is worse, they're living longer. In 2008, life expectancy for women was 80.6 years for women, 75.6 years for men, according to the U.S. Centers for Disease Control and Prevention. In 1988, it was 78.3 years for women, 71.4 years for men.
The mortality rate of those age 59 in 2005 was 14 percent lower than for 59-year-olds in 1997, the study found.
This indicates the link between obesity and a risk of early death isn't as great as some have feared, said Andrew Adams, an internal medicine specialist at West Penn Medical Associates and an assistant professor of medicine at Temple University.
"People are living longer sicker," Dr. Adams said. "Boomers are getting fatter, but they don't seem to be dying because of it."
People live longer despite worse health because advances in medicines and medical technology have exceeded, so far, the harm done by poor health habits, Dr. Adams said. But this isn't a good public health outcome, he said. The most alarming finding is the big increase in number of people reporting impaired mobility. Causes include chronic arthritis, stroke, chronic neurological disease and morbid obesity.
"If you need a device to get around, that's a big quality-of-life issue," Dr. Adams said.
Deteriorating boomer health is also a major economic issue. It drives up health care costs and disability payments, diminishes performance at work and forces many to retire early, depriving their employers of their experience and expertise.
The health news isn't all bad. Only 21 percent of boomers are smokers, compared to 28 percent of the older generation. According to the National Cancer Institute, cigarette smoking is associated with a large number of different cancers and other chronic diseases and "unequivocally contains human carcinogens."
Only 2.3 percent of boomers, compared to 3.5 percent of the older generation, suffer from emphysema, a type of chronic obstructive pulmonary disease in which the air sacs in the lungs are gradually destroyed, causing shortness of breath. The principal cause is long-term exposure to airborne irritants, chiefly tobacco smoke.
Only 4 percent of boomers have suffered a heart attack, compared with 5 percent of their parents at the same age.
Too much cholesterol increases a person's risk of developing heart disease. But the big rise in very high levels of cholesterol in the blood (hypercholesterolemia) isn't as alarming as it appears, Dr. Adams said. Prior to 1988, "no one would have looked for high cholesterol" because doctors didn't know then how dangerous it could be, and there was then no cure for it, he said. Too much cholesterol increases a person's risk of developing heart disease. Now that the dangers are better known and can be treated, doctors pay much more attention.
"You find more of what you look for," Dr. Adams said.
The study doesn't explain why boomer health is worse. Most physicians think it's because the generation is more sedentary.
"I don't think [the jump in obesity] is because we're eating more, [but rather] because more of us sit in chairs all day," Dr. Adams said. "Pittsburgh used to be a blue-collar town. It isn't anymore. Our parents were much more active."
In 1960, about half of private-industry jobs in the United States -- jobs such as farming, mining, construction and manufacturing -- involved some kind of physical activity, according to the U.S. Bureau of Labor Statistics. Today, fewer than 20 percent do.
Americans today also are more likely to drive to and from work than to walk or take public transportation.
As a consequence, Americans burn 120 to 140 fewer calories each day than Americans did half a century ago, according to researchers at the Pennington Biomedical Research Center at Louisiana State University in Baton Rouge. That's enough to explain the weight Americans have gained since 1960, the Pennington researchers calculated in a 2011 study.
About two-thirds of Americans are overweight; 35.7 percent are obese, according to the CDC. In 1960, only a third of adults were overweight, just 9.7 percent were obese, according to a study for the U.S. Department of Agriculture.
Adult Americans expend about the same amount of energy in their leisure activities now as they did in 1960, the Pennington researchers found. But as more children eschew playing outside to watch television and play video games, child obesity rates are skyrocketing.
If everybody got the 150 minutes of moderate exercise each week the American Council on Exercise recommends, that would be enough to burn off the extra weight sedentary lifestyles have caused people to pack on, the Pennington researchers estimated. But only about 25 percent of do.
Exercise "needs to have a high priority in your personal life," Dr. King said. "People should just do everything they can to be active and eat healthy. It would make such a dramatic difference."health
Jack Kelly: [email protected] or 412-263-1476. | <urn:uuid:6d606190-8709-42fa-b63f-dc70099f7780> | CC-MAIN-2014-35 | http://www.post-gazette.com/health/2013/03/04/Boomers-live-longer-but-sicker-than-parents/stories/201303040133 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829754.11/warc/CC-MAIN-20140820021349-00345-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.972514 | 1,555 | 2.90625 | 3 |
Vedic Horoscope is very different from Western Horoscope. So all Horoscopes are not alike. Vedic Horoscopes have very powerful unique predictive features. All horoscopes are based on the position of planets in the sky at the time of an event or birth. From thereon, the differences start. We will like the readers to remember three key unique features of Vedic Horoscope in this article.
1. Sidereal Zodiac. Vedic horoscope is based on the sidereal zodiac. Its primary feature is that the signs of the zodiac align to the sky nakshatra (constellations) of the same name. The signs therefore run between dates which are different from the tropical zodiac of western astrology. For example, Sun is in Aries in Vedic astrology from April 14 to May 14 whereas in Western astrology it is in Aries from March 21 to April 20. Subtract the Ayanamsa which is about 24 degrees currently from the Western horoscope planetary positions to obtain Vedic positions in the sky. Ayanamsha increases about one degree every 78 years due to earth’s precession (as per astronomy) to preserve the link between signs and constellations in Vedic Astrology.
2. Nava Graha (Nine Planetary Bodies). Vedic horoscope has nine planetary bodies: the three inner planets, Mercury, Venus and Mars, two outer planets, Jupiter and Saturn, the two Luminaries, Sun and Moon, and two shadow bodies, the two (South and North) Lunar nodes, Rahu and Ketu. While Graha is commonly translated as planets in English, the Navagrahas do not refer to the planets of the solar system. Western Astrology however is based on sun, moon and all the planets of the solar system, thus includes Uranus, Neptune and Pluto. Vedic astrology doesn’t require any information about these outer planets and is complete in itself.
3. Mahadasha/Antardasha System of Timing. One of the most powerful predictive feature of Vedic Astrology comes from the ability to time events precisely based on mahadasha/antardasha and finer dasha systems. There are at least one hundred and eight (Yogini, Kalachakra, Chara, Shoola, Narayan, Ashtottari etc..) dasha systems. The one most widely used and with most accurate predictions is Vimshottari Mahadasa system, which runs for a period of 120 years and is calculated from knowing the nakshatra position of moon at birth. This system of timing is unique to Vedic astrology. While other systems like Transit and Solar return similar to Western astrology are also used, dasa system is amazing in timing events.
Indian astrology is based on Vedic Horoscope and has developed over thousands of years into a scientific body of knowledge with amazing predictions to its credit, which is why most people in India are strong believers in Astrology. We will discuss other key features of Vedic horoscope in a future post. | <urn:uuid:9f268df8-6016-4cfb-a795-2bc91818aa87> | CC-MAIN-2023-23 | https://decisioncare.org/vedic-astrology/vedic-horoscope/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00178.warc.gz | en | 0.936998 | 642 | 2.546875 | 3 |
In the past couple of Chapters, you've learned what it takes to give
the computer the capability to match wits with a human player.
Although AI is very important and has countless uses in games,
it's hard to discount the human factor in multiplayer games. ToChapter,
you learn all about multiplayer games and why they are important
in toChapter's gaming landscape. The theory you learn toChapter forms
the foundation you need in order to implement a multiplayer networked
version of Connect4, NetConnect4, later this week.
The appeal of multiplayer games isn't hard to figure out. Considering
how much people enjoy playing games together that don't involve
computers, it really was only a matter of time before the appeal
of single-player computer games carried over to supporting multiple
players. With access to the Internet rapidly extending beyond
the circle of techies and computer enthusiasts, the time has come
for multiplayer gaming to mature. Java has the potential to lead
the way in many regards because of its cross-platform nature and
built-in support for networking and tight security.
There are some obstacles, however, when it comes to implementing
multiplayer games in Java (or any other language, for that matter).
Network games bring with them their own unique set of problems
and challenges that must be dealt with at the design level. ToChapter's
lesson exposes many of these problems and discusses various techniques
for solving them. By the end of toChapter, you'll be ready to move
on to the specifics of network programming in Java.
The following topics are covered in toChapter's lesson:
If you've been fortunate enough to play a multiplayer network
game with your friends, you already know how much fun it can be.
In many ways, outwitting a real live person is much more fun than
competing against a computer player. The reality of going head-to-head
with another person can change the whole perspective of a game.
I have yet to see a single-player game that evokes the same level
of emotion and excitement as is generated from the human factor
in multiplayer games.
Arguably one of the most popular multiplayer (and single player,
for that matter) games to come along in the past few years is
DOOM. DOOM provides a 3D world with previously unheard-of realism
and nonstop action. Add to this the ability to share the 3D world
with other real people, and it's not hard to see why this game
is so compelling.
Even though most of the successful multiplayer games to date,
like DOOM, have pitted human players against each other, they
don't necessarily have to. The benefits of human interaction in
a multiplayer game are just as significant if the human players
are working together. I know from experience how fun it can be
working together with another person to reach a common goal. One
of my favorite games is Super Contra III for the Super Nintendo
console game system. This game enables two human players to play
together against the computer. In fact, you can get much further
in the game with two people cooperating in multiplayer mode than
with one player on her own in a single-player game. This approach
rewards the players for their cooperation, and in doing so adds
another whole dimension to the appeal of the game.
I know that the Super Nintendo game system is quickly on its way to becoming outdated. Although I'm not an overly nostalgic person, I find that there are many games on older game systems that are still very fun to play, even in their old age.
Although the discussion thus far has been limited mostly to games
involving multiple human players, there is no reason why you can't
have a mixture of human and computer players in a multiplayer
game. Consider a Poker game, for example. The participants in
the game could be any mixture of human and computer players. The
ability to have different combinations of players puts an interesting
twist on the AI in the game. Moreover, it would be interesting
to see how the human players respond to the other players, knowing
that some of them are real and some aren't. A few games out there
have taken this approach. The computer version of one of my favorite
board games, Risk, takes this approach by filling in for missing
human players with computer players.
There are endless possibilities for multiplayer games involving
both cooperation and competition among human players. Regardless
of the scenario, when real people are involved, a certain synthesis
of ideas takes place that just isn't possible with computer players.
It's then up to game designers like you and me to chart the course
and dream up new ways for people to interact with each other through
So far, the discussion of multiplayer games has avoided the issue
of where the multiple players are physically located. You've probably
assumed that I've been referring to multiple players connected
over a network, but that doesn't necessarily have to be the case.
Because of the relative difficulty in implementing network games,
many multiplayer games have relied on two or more players sitting
in front of the same computer. In light of recent advances in
network standardization and programming libraries, however, this
approach of having multiple players using the same machine is
losing its appeal rather quickly. It still works pretty well for
many console game systems, because they are specifically designed
to support two or more players with one set of hardware, but I
wouldn't expect to see very many new computer games using this
The point is that you simply must implement a network interface
for multiplayer computer games, even if you provide a non-networked
multiplayer option. When it comes to Java games, this point is
even more important, because Web users will expect to be able
to play against other players on the Web.
To better understand the relationship between network versus non-network
multiplayer games, check out Figure 17.1 and Figure 17.2.
In Figure 17.1, a two-player game is implemented on a single machine;
in this situation, the players use different keys on the keyboard.
Of course, if you figured out how to get two mice working on one
machine, that probably would work too! Although this setup certainly
works in the confines of your own home, it doesn't help you much
when you want to play with a friend who lives halfway across the
world. The bright side is that the design for a game like this
wouldn't really be any more difficult than a single-player design;
you just process two sets of keyboard inputs rather than one.
Nevertheless, all the input still is generated on the same machine
and with the same timing. The key point is that although there
are two players with two different sets of input, only one instance
of the game is running.
Now consider the problems associated with this non-network approach:
You're requiring two players to squeeze together next to each
other and share the keyboard. Furthermore, this setup wouldn't
work for games in which each player needs to see information that
should be hidden from the other player, such as your hand in Poker
(or any multiplayer card game, for that matter).
The configuration in Figure 17.2 shows a two-player game implemented
through some type of network connection between the two machines.
There are two computers and therefore two separate instances of
the game. Although two instances of the game are running, they
effectively operate as one. Notice that there is some form of
communication between the two computers across the network connection.
This is the communication you must implement to keep the two games
operating in conjunction. Fortunately, as you'll learn tomorrow,
Java provides a lot of the functionality of establishing and maintaining
a network communication channel between players.
Multiplayer games that can run together on different machines
also are known as network games, which means that the games
are capable of enabling multiple players to connect with each
other and play interactively over an external connection between
their respective machines. In the case of network Java games,
the external network connection is handled through the Internet.
Network games are multiplayer games that can run together
on multiple machines.
Even though the ultimate communication medium for network Java
games is the Internet, you have to contend with the fact that
different game players will access the Internet in different ways.
Actually, there are really only two Internet connection scenarios:
dedicated and dial-up. A dedicated Internet connection involves
a computer being directly connected to the Internet via a direct,
high-speed line such as a T1 connection. Actually, slower dedicated
lines are available, such as 28,800 baud, but they aren't as popular
as their faster counterparts.
A dial-up Internet connection, on the other hand, consists of
a computer dialing into an Internet network and establishing a
modem connection to the Internet. Technically speaking, a modem
connection is certainly physical, but for our purposes, we'll
refer to modem connections as modem networks, and networks
involving physical network hardware connections as physicalnetworks.
The primary difference between modem networking and physical networking
is the bandwidth of communication. Bandwidth refers to
how much data can be transferred in a certain amount of time.
Most people accessing the Web have already realized that a 28,800
baud modem is a necessity. The absolute minimum modem speed for
Web surfing these Chapters is 14,400 baud, but 28,800 baud might as
well be the standard, because modems are coming down in price
Bandwidth refers to the amount of data that can be transferred
over a network connection in a certain amount of time.
The modem-speed issue is important because the bandwidth can greatly
affect the performance of network games. The degree to which the
bandwidth affects the game performance, however, is determined
by your particular communication strategy. For example, you might
be able to figure out a way to send very little data and get by
with lower communication speeds. As in all software designs, there
are trade-offs, and bandwidth is the big one you must weigh when
assessing the communication requirements for your game. This is
one aspect of the game design you must be particularly careful
about, because the amount of data transferred between games can
have a dramatic effect on performance.
As far as managing the details of programming network games in
Java, it doesn't matter whether a network is a physical or a modem
network. Well, it doesn't matter at least from a protocol and
interface perspective. It does matter when you start looking at
the performance requirements of a network game. If you haven't
guessed already, physical networks are much faster and more reliable
than modem networks. Unfortunately, although physical networks
provide greater speed and better reliability that helps make multiplayer
game design much easier, you can't rely on game players using
them. The reality is that few game players have the luxury of
a physical Internet connection to play games on. Most physical
networks are in the confines of a corporate environment, where
game playing generally is frowned upon.
Most game players have available to them only the limited transmission
speeds of a modem connection. Therefore, game developers are left
programming network games to this lowest common denominator of
transmission speed. You simply have to live with the fact that
most multiplayer games will be played over modems, so it's your
job to design those games accordingly.
Before you get into the design strategies for network games, it's
important to understand the fundamental types of network games.
The communication design can be affected dramatically by the way
the game play progresses, which is determined by the type of game.
I've defined two types of network games: turn-based and event-based.
Most games should easily fall into one of these two categories.
Turn-based games are games in which each action in the
game is based on a player's turn.
The Connect4 game you developed yesterChapter is a turn-based game
because you are allowed to make a move only when it is your turn.
Sure, you are free to think about your move during the other player's
turn, but in the context of the game you can take action only
during your turn. Most turn-based games are board games or card
games, or simple games played on paper such as Tic-Tac-Toe. I
can't think of any action games that would be considered turn-based.
That would kind of take the action out of it! Nevertheless, turn-based
games are very popular and well-suited for networking.
Knowing that turn-based games revolve around whose turn it is,
the network communication design is greatly simplified. This is
because only one player can interact with the game at a time.
Even though multiple players are technically playing the game,
only one player is allowed to make a move at a time. The other
players must wait their turn before they can do anything. In this
way, the game can be designed so that all the players are in a
wait state until it becomes their turn. The flow of the game in
turn-based games ends up being circular, as in a game of cards.
The turn moves around the group of players one by one. Figure
17.3 shows the play flow of a turn-based game involving five players.
As you can see from the play flow, the game allows each player
to take a turn; after each turn, the game processes the turn and
allows the next player to take a turn. The play flow occurs this
way regardless of the number of players. In a two-player game
such as Connect4, the turns just move back and forth between the
Event-based games are games that are dictated by input
events that can occur at any time.
Event-based games are much more open-ended than turn-based games.
In an event-based game, any player can interact with the game
at any time, resulting in an input event. The flow of the game
is dictated by the input events rather than turns. As a matter
of fact, there is no concept of "turn" in an event-based
game. Event-based games include basically all games that don't
revolve around turns; examples range from first-person shoot-em-ups
such as Duke Nukem 3D to strategy simulators such as CivNet. In
the network modes of both these games, any of the players can
act independently of any of the other players, generating anywhere
from nothing to a massive flood of events.
If you haven't suspected, the communication design for event-based
games is much more complex and difficult to implement than that
for turn-based games. More importantly, event-based game communication
typically requires a much wider bandwidth, because more information
is usually being transmitted. It's probably safe to say that each
different event-based game you create will have a unique solution.
This is because there are so many trade-offs to be made in regard
to determining the best way to design the network communication
logic. In a game such as Duke Nukem 3D, think about how many things
are going on, and even more important, notice how quickly things
are happening. Any change in the game from one player's perspective
must be communicated to all the other players in some form. Figure
17.4 shows the play flow of an event-based game involving five
Notice from the play flow that the game never "allows"
the players to do anything, as in turn-based games. The game just
sits back and waits for the players to generate input events.
Players can generate these events as often or as seldom as they
want, fully independent of the other players. This is what enables
you to patiently wait behind a corner while another player runs
by haphazardly at full speed. Some people never learn!
Now that you know which type of network games you are dealing
with, let's look at some of the common problems you will encounter
in a network game design. The overriding concern to be dealt with
in designing network games is maintaining synchronization. Synchronization
refers to how multiple game instances running on different machines
maintain the same game state information. Remember that each player
is running a separate instance of the game, but the overall goal
is to make each of these different instances function logically
as one instance. All the internal data structures modeling the
state of the game should match exactly on each player's system.
Synchronization refers to how multiple instances of a game
maintain the same state information.
You can best understand this concept by looking at an example
of what can happen when synchronization is lost. Suppose that
two players, Heath and Keith, are playing a network adventure
game similar to one of the games in the classic Ultima series.
As they are walking along together, they run across a monster.
Heath is a little more assertive and starts fighting the monster.
Keith is low on life points and decides to just sit in the shade
and watch. When Heath finishes off the monster, Keith somehow
must be notified-and not just as a matter of convenience; any
change in the game that potentially can affect other players must
be communicated to them.
Another common problem in regard to synchronization involves using
random values in games. It is fairly common for games to place
some objects randomly when a game starts, such as treasure or
even monsters. Sometimes games use random events just to make
things vary a little from game to game. In network games this
creates big problems unless each game instance uses the same random
values as all the other instances. It would totally blow the synchronization
for each game to have things going on randomly with respect to
each instance. The point here is that many seemingly insignificant
things, such as generating random numbers, can cause major headaches
in a network game environment.
Now that you understand the problems, let's move on to some solutions.
There are many different approaches to designing network game
communications, and all of them must somehow address the problem
of keeping each player's instance of the game synchronized with
all others. You're going to focus on two basic types of network
game synchronization strategies: state synchronization and input
State synchronization is a communication method by which
each game instance communicates the current state of itself to
the other instances.
The state synchronization method is very robust because there
is no chance for information loss; everything regarding the current
state of the game is sent to the other instances. In a two-player
space battle game, for example, the position and speed of all
the planets, asteroids, ships, and bullets would be sent as the
current state of the game. Figure 17.5 shows a diagram of the
information transfer for state synchronization in a two-player
Sounds good so far. But what about a more complex game such as
a role-playing adventure game with entire virtual worlds that
the players constantly are interacting with? Sending the state
of the entire game starts looking a little more difficult because
of the vast amounts of information required to model the game
state. And don't forget about the bandwidth limitation you learned
about earlier, which keeps you from being able to send loads of
information between games. Knowing this, it's easy to see that
state synchronization is a fairly messy network communication
solution. Although state synchronization is functionally a very
solid network solution, technically it's just not always feasible.
Input synchronization is a communication method in which
each game communicates the input events of its player to the other
Using input synchronization, each time a player generates input
events, such as moving the mouse or pressing keys, the game broadcasts
these events to the other games. Using the space battle game example
from before, instead of sending the state of all the objects,
the game just sends the mouse and keyboard input events generated
by the player. Each game then handles each remote (virtual) input
from the other games in a similar manner as it handles its own
local player's input. Figure 17.6 shows a diagram of the information
transfer for input synchronization in a two-player network game.
There has to be a catch, right? Of course there's a catch; there's
always a catch! Input synchronization works fine as long as all
the changes in the game are dictated solely by the inputs of the
players. Practically speaking, this rarely is the case. There
are usually random effects in a game such as placement of background
objects. These random effects wreak havoc on games relying on
input synchronization because they aren't reflected by the player
input and therefore are never communicated between games.
If you happen to have a game in which the entire play flow is
dictated by the inputs of the players, input synchronization is
for you. Otherwise, you'll have to come up with another solution.
Can you think of any games that are dictated entirely by
the user inputs? Give up? It ends up that most turn-based games
are driven completely by the inputs of the users. So you usually
can implement network support for turn-based games by using input
Now that I've painted a pretty bleak picture of network game design,
I'll let you in on a practical reality in network game design:
You usually will have to use some combination of the two methods
mentioned. This hybrid solution would include elements of both
state and input synchronization. Using the space battle game example
again, you could send the user inputs back and forth using input
synchronization, and then use state synchronization to send random
events such as initial meteor positions. You still don't necessarily
need to transmit the entire state of the game, just the aspects
of the game state that can't be figured out by each instance on
its own. In other words, random events need to be transmitted
to each game instance.
If you run across a gaming scenario that doesn't fit well with
any of these approaches, you might figure out a communication
technique of your own to add to or replace one of these. As I
said earlier toChapter, network gaming is a unique area of programming
that leaves room for very few general techniques. You usually
have to come up with hybrid solutions that draw on what you've
learned combined with new ideas you dream up along the way.
Now that you understand the important aspects of handling communications
between network game instances, let's shift gears a little and
take a look at an area of theoretical research that impacts multiplayer
games. An area of increasingly popular academic research, called
game theory, can be used to shed light on how people interact
with each other in a multiplayer computer game scenario. Applications
of this information could breathe fresh insight into the design
of multiplayer games. Game theory won't help you with synchronization
problems, but it might help you figure out more creative approaches
to the game strategy itself.
Game theory is a branch of mathematical analysis devoted
to the study of decision making in conflict situations.
Such a situation exists when two or more decision makers, or players,
with differing objectives act on the same system or share the
same resources. Game theory provides a mathematical process for
selecting an optimum strategy in the face of an opponent who has
a strategy of his own. This mathematical process borders on issues
related to both multiplayer computer game design and strategic
In game theory, the following assumptions are usually made:
Each player has available to her two or more well-specified
choices or sequences of choices called plays.
Every possible combination of plays available to the players
leads to a well-defined end-state (win, loss, or draw) that terminates
A specified payoff for each player is associated with each
Each decision maker has perfect knowledge of the game and
of his opposition; that is, he knows in full detail the rules
of the game as well as the payoffs for all other players.
All decision makers are rational; that is, each player, given
two alternatives, will select the one that yields the greater
Although general in scope and not originally directed at computer
games, game theory touches on many of the same concerns that are
raised when strategies for multiplayer computer games are being
designed. Two players in a network multiplayer game often go through
much of the same thought pattern as people engaged in a verbal
conflict. Game theory applies equally well to both scenarios.
Because of its general nature, game theory has seen wide application
in areas such as economics, international trade, labor, public
policy, natural resources, and development. Individuals making
use of game theory in their professions have included philosophers,
political scientists, arms-control negotiators, and evolutionary
You can use game theory in your own multiplayer game designs to
help determine how reactions between players impact the game.
Game theory is also useful in determining computer player strategies
based on the possible range of responses by a human player. It's
all a matter of breaking a game down into a sequence of decisions
that can be compared to other decisions and what reactions they
provoke from other players.
One particular example that shows how game theory raises strategic
questions applicable to multiplayer computer games is the Prisoners'
Dilemma. The Prisoners' Dilemma is a game that has been, and continues
to be, studied by people in various disciplines, ranging from
biology to sociology and public policy. Among its interesting
characteristics is that it is a "non-zero-sum" game,
meaning that the best strategy for a given player is often one
that increases the payoff to one's partner as well. It has also
been shown that there is no single best strategy; maximizing one's
own payoff depends on the strategy adopted by one's partner.
The game works like this: Imagine two criminals arrested under
the suspicion of having committed a crime together. The police
don't have enough evidence to convict them, so they are isolated
from each other and separately offered a deal: The one who offers
evidence against the other will be freed. If neither of them accepts
the offer, they are effectively cooperating against the police,
and both get only a small punishment because of lack of proof.
Hence, they both gain. If, however, one of them betrays the other
by confessing to the police, he is freed; the one who remained
silent receives the full punishment because he did not help the
police and because the police now have evidence against him provided
by the other prisoner. If both betray each other, they both will
be punished, but less severely than if either had refused to talk.
The dilemma resides in the fact that each prisoner has a choice
between only two options, but neither can make a good decision
without knowing what the other one does.
The Prisoners' Dilemma raises some interesting questions regarding
strategies involving multiple players competing for a common goal.
To try your wits at the Prisoners' Dilemma, check out the online
version at http://serendip.brynmawr.edu/~ann/pd.asp.
Figure 17.7 shows what the Web site looks like with the interactive
You should now have some idea about the general theory behind
designing games for multiple players. I know that toChapter's lesson
didn't really present a rosy image of multiplayer game design,
and for good reason; designing games for multiple players over
a network is a difficult task that involves a lot of planning
and creative design. On the other hand, the capability of supporting
multiple human players can make any game orders of magnitude more
fun. And with the Internet looming as the ultimate network for
playing multiplayer games, it's only a matter of time before network
gaming becomes the norm.
Fortunately, the Java language and class libraries provide many
features to ease the pain in creating multiplayer games with network
support. The task is not necessarily easy, but it's often easier
than prior approaches at building Internet games. In tomorrow's
lesson, you'll learn exactly what support Java provides for network
If multiplayer Internet games are so cool, why are there still so few of them?
One of the main reasons there aren't many network games with full Internet support is that only recently has Internet usage started extending to the general game community. Another reason is that it has been
difficult at best to implement Internet communications in games. However, with the advent of Java and various third-party C and C++ libraries, along with a growing acceptance of the Internet among gamers, you should start seeing most new network games
sporting Internet support.
Is bandwidth always a concern when you're designing network games?
It depends, but more often yes. The only time bandwidth isn't an issue in network games is when a very small amount of information is being transferred between instances. An example of this type of game would be
a network Connect4 game, in which the only information transferred would be the column of the move.
Does synchronization get more difficult to maintain when there are more players?
Usually not because the amount of synchronization information being sent is the same, regardless of how many players there are.
The Workshop section provides questions and exercises to help
you get a better feel for the material you learned toChapter. Try
to answer the questions and at least think about the exercises
before moving on to tomorrow's lesson. You'll find the answers
to the questions in appendix A, "Quiz Answers." | <urn:uuid:ef3a006f-64ec-47a4-a1cc-1ce90db6aac8> | CC-MAIN-2017-30 | http://www.softlookup.com/tutorial/games/ch17.asp | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424876.76/warc/CC-MAIN-20170724122255-20170724142255-00330.warc.gz | en | 0.953143 | 6,238 | 2.96875 | 3 |
14 Sai no Koi: The Manga Manual to Puberty
14 Sai no Koi, known to fans as 14 Love, centers around two fourteen year old friends Tanaka Kanata and Yoshikawa Kazuki as they progress through their adolescent lives. The manga initially is a cute, slice of life manga about two middle school students who develop feelings for each other, but it quickly becomes much more than that. Through its commentary and self-aware characters, the manga dissects the physical and emotionally effects of puberty on the story’s innocent cast, documenting the sometimes exciting and sometimes scary aspects of growing up. Through notebook pages seen at the beginning of some chapters, the characters compile a list of the steps involved in puberty that affect them. A part of the notebook reads: “In the textbooks written by adults, you won’t find the questions a 14 year-old has.” 14 Love takes these questions and show how they affect its characters, by analyzing the various parts of puberty and showing how a variety of characters overcome their new problems and situations.
1. Start of Self-Consciousness
14 Love breaks down the development of self-consciousness into two steps, the first being “when you start worrying about how other people see you.” Children are usually unaware of the thoughts of the other people. They simply wish to satisfy themselves and the immediate group around them, not thinking about the thoughts of others. However, during adolescence when they are forced to interact with the collective whole of society, insecurities begin to surface. The character who develops the most insecurities is Kazuki, who is somewhat shy and timid under his mature façade. When he is having difficulty in his math class before finals, he does not ask his friends for help because he is embarrassed about his situation. He does not want anyone, especially his girlfriend Kanata, to think he is dumb and beseeches someone to help him in secret. The anxiety that comes from thinking of others’ judgments begins to sprout during the formative adolescent years of young people’s lives.
Another instance of Kazuki’s self-consciousness is derived from the physical effects of puberty. He is very uneasy and critical about his outward appearance. While practicing for the choir competition, he is constantly worried about his Adam’s apple which has just begun to form. Multiple times he thinks, “Does everyone’s Adam’s apple move so much? Do other guys worry about their Adam’s apple?” He is self-conscious about his singing because he does not want everyone to stare at him. He also holds off wearing his winter uniform for a while, even though the weather starts to get cold. His old uniform is too small, since he grew out of it during the summer, and would rather freeze in class than have other’s mock him for his clothing. These insecurities are put to rest by Kanata, who is always there to reassure him and help him through his slumps. Still, these instances show how vulnerable adolescents are during this stage in their lives.
The second stage of the start of self-consciousness is the rebellious stage: “When one starts taking a rebellious standing against his environment after gaining self-consciousness.” 14 Love makes this point clear by expressing this trait in all of the major characters. Kishi Aoi, a quiet girl who does not involve herself much with the class, takes all her inner aggression and uses it to rebel on the home front. She is constantly angry at her older sister who continuously mocks her and always refuses to do what she asks at first. Although she ultimately enjoys her sister’s company, Aoi puts on a rebellious front to show that she is not a little girl anymore and does not need her sister to tell her what to do. In contrast, Nagai Tatsumi, another disassociated boy in class, takes his rebellious nature and lets it out at school. He yells at his disgusting teachers, proclaiming he does not need them telling him what to do and that he is fine on his own. Both these examples show that, in one way or another, young adults want some autonomy in their lives. They want to make their own choices; even if they make mistakes, at least they can say they acted on their own will. This desire spurs from the acknowledgement of their self-consciousness and ability to exist as a solitary unit.
Even mild-tempered Kanata and Kazuki, who usually function in their personal microcosm, rebel and fight their own status quo; they argue and break their tradition of meeting in the science room between classes for several days, feeling that they do not understand each other anymore and let their new self-consciousness put their relationship at risk. In this moment, they yearn for an individualism they do not think have but later make up, realizing that they can only take off their mature masks and be themselves when they are with each other. The somewhat rebellious nature all the characters have is a natural progression from gaining their self-consciousness; they become tempted to test the limits of their newfound individuality. It shows through the disobedient Aoi, the angry Nagai, and the innocent romance between Kanata and Kazuki; a desire to break free naturally occurs when finding oneself. The manga expresses this wonderfully by using the different situations of the characters to show that this step is universal.
2. Interest in the Other Gender
“Along the sexual maturity of the body, the interest in the other gender increases.” This aspect of puberty is the most prominent in the manga due to 14 Love’s shoujo, romantic nature. The relationship between Kazuki and Kanata highlights this beautifully, showing the subtle but relevant physical changes that happen during development that make other’s more mature. When hiding from their classmates in the science room, Kazuki pins Kanata up against the wall so no one will see them. Kanata is immediately embarrassed: “We used to have the same strength…but this is the first time you pushed against me and I couldn’t push back.” Kazuki also notices Kanata’s developing chest and slender shoulders for the first time: “When did she become like this?” For a while after that, the childhood friends are embarrassed in front of each other, not knowing what to do about this developing attraction. Kanata, to Kazuki’s dismay, notices his Adam’s apple and realizes that they are growing up. They eventually dispel the awkwardness between them and start to embrace their mutual attraction, sharing small kisses and touches in the corner of the science room. The budding of this adolescent love is sweet and convincingly portrayed by the author, who is able to naturally bring the characters to the same understanding. The two begin to understand each other together and their attraction leads to a fragile love that many experience in their youth.
Another instance of heterosexual attraction in 14 Love is Nagai’s forbidden desire for his music teacher Hinohara-sensei. The attraction begins as totally physical, but it soon starts to encompass many other aspects. Hinohara-sensei holds Nagai after class for special lessons because he has a talent she feels like it would be a waste not to harness. This feeling of acceptance and praise flatters Nagai, a student who purposely separates himself from others and has few friends. Hinohara-sensei also teases and, in a way, challenges Nagai mentally, allowing the attraction to advance to an intellectual level. This relationship is one of the only intimate and special things Nagai has in his life and he grows protective of it, threatening Kazuki when he discovers the relationship and running during the sports festival even though he is injured in order to get a kiss from Hinohara. Nagai interprets an attack on his secret relationship as an attack on his pride and he works hard to defend both of them. Although still fickle and immature, he puts so much effort into this at first playful attraction that even Hinohara begins to fall for him. Nagai’s budding relationship shows that someone cannot help who they are attracted to and how delicate and emotionally draining first-time relationships can be, especially during such a formative time in a person’s life.
Aoi’s development differs from the others entirely. One day, she trips in the hallway and falls in love with the large, strong hand that helps her up, realizing too late that the person she has fallen in love with is Kanata, another girl. At first, she is confused and angry with her feelings. “Why couldn’t you be a man?!” she thinks constantly when interacting with Kanata. She begins to avoid Kanata, hoping that her feelings will pass if she puts space between them. However, her interest in Kanata only grows and, as time passes, she comes to terms with her situation. She acknowledges the fact that she is attracted to Kanata and goes out of her way to ruin Kazuki’s chances with the hope of dating Kanata herself. In this sense, although she is not attracted to the other gender, Aoi experiences the emotional awkwardness and anxiety that comes with first love to the same degree as the other characters in the manga. Aoi is one of the strongest characters in the manga; she is able to overcome a stifling situation and accept herself, which is one of the biggest challenges during puberty.
3. Isolation and Independence
In many ways, this step in puberty is the most prominent in the manga, since every character craves for isolation and a strand of independence. However, to them, it is also the most frightening. As a comment in this section of the notebook, they write: “Don’t make it sound like an illness for 14 year-olds. There isn’t even any medicine to heal it.” Desiring independence is a side effect of all the other stages, searching for isolation to rid one’s self of the judgments of other and time alone in order to understand the new feelings their new bodies are giving them. Also, since all the characters go through this step as well, it can be implied that the need for isolation and independence are universal characteristics of puberty.
14 Love defines this aspect of puberty as follows: “when one starts taking a rebellious standing against his environment after gaining self-consciousness.” Nagai and Aoi are the most prominent example of youths searching for isolation, since they purposely separate themselves from the rest of the class. Nagai simply feels like school isn’t worth his time and aloofly goes through his daily life, wishing that he could decide what he wants to do with himself; this is a general example of a young person searching for independence and wanting to make their own choices. Aoi’s situation is slightly different. She isolates herself because she likes to write and, after realizing her feelings from Kanata, removes herself from most situations so that her secret won’t be discovered. Although it is eventually discovered by Kazuki, who then tries to involve her in class activities, she still tries to make an effort to be on her own and watch Kanata from afar. Both Nagai and Aoi publicly isolate themselves from their peers in order to avoid them and acknowledge themselves as separate entities outside of the class. They wish to be individuals rather than members of the group, although Kazuki and Kanata always try to include them, and use this as their way of declaring their independence.
Kanata and Kazuki are popular members of the class with many friends, yet they still cannot shake off the desire for independence and strive for isolation. Their secret meetings in the science room is their form of isolation; whether it is between classes, after school, or even during class when they need someone to talk to, they will leave any situation to meet each other in the science room. These are the moments where they can truly be themselves without outside pressures and use this isolation to develop their own independence. To these two students, they only feel independent inside their microcosm so they yearn for isolation constantly for self-satisfaction. This allows them to deal with their problems, make their own decisions without outside judgement, and continue the development of their relationship. Although they are in no way, shape or form isolated from society, Kanata and Kazuki seek isolation on a personal level. Teens do not have to go to extremes like Nagai and Aoi; Kanata and Kazuki show that teenagers can all seek isolation and independence in different ways.
14 Love shows how puberty affects a variety of characters and how they ultimately all follow the same patterns. The manga, which at face value is a very entertaining, beautifully drawn manga, takes its story a step further by making it meaningful to its desired audience. The shoujo genre, targeted at middle and high school students, are teens who are going through the same changes and have the same insecurities as these characters. Like other coming of age manga such as Hourou Musuko, Nana, Kare Kano and Sakamichi no Apollon, 14 Love does an amazing job of naturally allowing the characters to progress in their lives, making the manga feel less like a guide and more like a story. Above all, Kazuki and Kanata’s innocent relationship beautifully shines above all the other themes which helps 14 Love be one of the most enjoyable learning experience for young adults. It greatly hilights the problems the Japanese youth may have in their middle school days. Other adolescents in other cultures may have slightly different problems, due to Japan’s conservative society, but this manga aims to teach to those everywhere and therefore uses universal themes to stress the importance of coming of age. With the manga incomplete, it will be great to see what else these characters go through in the beginning of their adolescent lives and how, through their medium, they can help their young readers figure out their own lives.
What do you think? Leave a comment. | <urn:uuid:87d1df0f-7b8a-45ab-873f-f525a33c4c26> | CC-MAIN-2020-10 | https://the-artifice.com/14-sai-no-koi-manga-puberty/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145897.19/warc/CC-MAIN-20200224040929-20200224070929-00422.warc.gz | en | 0.97533 | 2,897 | 2.828125 | 3 |
The final versions were released to the public in early January, and were lauded by most trustworthy sources for nutrition information as a balanced, evidence-based, and actionable approach to steering Americans to better eating habits (with a few small caveats). But what exactly are these guidelines? How are they made, what do they say, and who are they to tell you how to eat, anyway?
What are the Dietary Guidelines?
The federal government has been doling out dietary advice since at least the 1960s - but it wasn't until 1990 (#90sbabies, holler) it was mandated by law that every five years, the U.S. Department of Agriculture (USDA) and Health and Human Services (DHHS) put their collective bureaucratic heads together and, after a long hard look at the most recent scientific data, make some recommendations about how to eat. The Dietary Guidelines for Americans (or DGAs for short) is a compilation of everything we currently know about nutrition - what to eat (and how much of it) in order to promote optimal health and well-being and prevent disease.
What are the main takeaways?
One of the biggest changes you'll see this year and in future iterations of the DGAs is that, in light of the fact that everyone has different needs and follows different patterns of eating, the new guidelines have officially done away with recommended servings of artificially categorized food groups. Rather, the guidelines focus on promoting certain foods to be eaten more or less, according to one's individual calorie needs. (If you're wondering how to get a good estimate of your own calorie needs, I recommend this online calculator).
Here's what the guidelines say we should be getting more of, and some personal commentary from yours truly:
Unlike stock photography lighting practices, it turns out not much has changed since the '90s in terms of what the U.S. government says we should be eating more of.
- All types of fruits and vegetables with all different colors of the rainbow. If it grows from the ground (and you can buy it in the produce section of a supermarket), eat more of it.
- Michael Pollan and I don't agree on everything when it comes to nutrition. But he's certainly on the money when he says that it's best to base your diet around the foods you get from the outside perimeter of a grocery store.
- Fat-free or low-fat dairy, such as skim or 1% milk, yogurt (the less added sugar, the better), low-fat cheese, or vegan options such as almond milk that have been fortified with vitamins and minerals.
- Though I am not a vegan, I personally love unsweetened vanilla almond milk. It's only 30 calories per cup, has a light, clean taste, and is great for baking - or shamelessly chugging straight from the carton.
- Plain, 0% Greek yogurt is also a staple in my daily diet. Most brands are around 130 calories per cup with upwards of 24g of high-quality protein. I dress mine up with sugar-free maple syrup, fresh fruit, and lots and lots of cinnamon.
- High-protein foods, including seafood, lean meats and poultry, eggs, beans, peas, nuts, and soy products.
- Protein plays a role in countless vital bodily processes, including healing damaged tissue, keeping your immune system humming, and forming the hormones and enzymes you need to function at your best.
- Tempeh, beans, nuts, and egg whites form the basis of my protein-rich foods as a vegetarian. Contrary to popular belief, you can easily meet your protein needs without the consumption of meat. Just this summer, as I was preparing for my first bodybuilding competition, I met my daily goal of 150+ grams of protein per day with these foods, Greek yogurt, and no more than 1.5 scoops of protein powder or protein bars per day.
- Fiber-rich whole grain products, such as whole-grain pasta and breads.
- Whole-grain products retain more of the grain's naturally occurring nutrients, including fiber, which most Americans needs to get more of. The guidelines recommend that at least half of your carb-rich foods, such as breads, rice, cereal, and pasta, come from sources with a whole grain label.
Here are the foods the guidelines recommend limiting:
Salted caramel vodka cupcakes: for when you feel like throwing caution to the wind.
- Added sugars - limit to 10% of your daily calories, or around 50 grams total per day.
- Sugar, by itself, isn't evil - or toxic. It's naturally found in plenty of healthful foods, such as fruit, and even the occasional indulgent sweet treat can play a part in a balanced, healthy lifestyle. However, added sugars may contribute to weight gain because they add lots of extra, non-nourishing calories to food and also make that food much easier to overeat (after all, when's the last time you blacked out and overdid it on a bag of celery?). To keep added sugars in check take some sage advice from Nia Shanks: splurge on the sugary foods you truly love, and ditch the ones you can live without. Remember: it's perfectly okay to pass on the store-bought Safeway cake at your workplace's monthly birthday party, especially when you've got your eye on that delicious dark chocolate torte from the tapas place down the street this weekend instead.
- In fact, the guidelines' 10% figure doesn't actually come from the absolute amount of sugar that's "bad" for you. Instead, it's based on the idea that 50 grams (or 200 calories' worth) of sugar is the maximum amount you can fit into an average 2,000-calorie diet while still having enough room for all the other, more nutritious foods you need to meet get your fill of vitamins and minerals. Theoretically, if you need more than 2,000 calories to maintain a healthy weight (if you're, say, an endurance athlete or just a world-class fidgeter) you can probably fit a tad more sugar into your diet to fuel your daily activities with no health consequences. On this note, remember to match your fiber intake to your calorie consumption - at least 14 grams for every 1,000 calories.
- Remember your estimated daily calorie needs from the calculator linked earlier? Take that number and divide it by ten. Then, divide again by four. The resulting number is a good rule of thumb for your daily sugar intake.
- Extra sugars and calories can be hiding in foods that are branded as "healthy," such as canned fruits, granola bars, and sweetened yogurt. Try passing on the syrupy canned fruit cocktail, which adds empty calories, in favor of whole fruits or frozen fruit pieces.
- Saturated fats - limit to 10% of your daily calories, or around 22 grams total per day.
- The question of whether saturated fats (such as those found in butter and cream) cause more heart disease and death than unsaturated fats (found in plant and nut oils) is a subject rife with controversy in the world of nutrition science. Each time a study showing that saturated fats have no adverse health effects is published, several disgruntled scientists pop up to point out the study's flaws, and vice versa. In fact, the 2015-2020 DGAs dedicated an entire working group to looking at the studies on saturated fat in particular.
- Like the 10% figure on sugar intake, the DGA's advice on saturated fat should be relative to your overall calorie intake - not one number that's the same for everyone. If you need more than 2,000 calories to fuel your body, you can stand to eat more than 22 grams per day.
- To find your daily saturated fat intake, take your estimated calorie needs, divide by ten, and then again by 9. Shoot for around that number of saturated fat grams per day.
- We may not know for years about the true effect of saturated fat intake on health and longevity. For now, I'll choose to follow these guidelines, which echo the 2013 American Heart Association/American College of Cardiology guidelines advising a limitation on saturated fats for optimal heart health.
- Sodium - limit to 2,300mg per day (the amount in one teaspoon of table salt)
- This recommendation will be another one to watch in 2020. Similar to saturated fat, there is plenty of controversy currently stirring in the medical research field about just how much sodium is bad for you. Though the overall weight of the evidence may shift over the coming years, it's probably your best bet to find small ways to reduce your daily sodium intake - such as buying low-sodium broths, soups, and sauces - and generally being aware of how much sodium is in the foods you most often eat.
- Salt is a great way to make vegetables and other more "boring" foods much more tasty. If it's between reducing your salt intake and not getting your veggies in, go with the veggies every time. But there are other ways to dress up your vegetables, too - using plenty of different spices and seasonings adds flavor to your plate without the extra salt. As someone who struggles to moderate her own salt intake, I've personally found that adding balsamic vinegar to my soups and baked veggies makes them delicious!
- Alcohol - limit to one drink per day for women and two drinks per day for men.
- The current evidence on alcohol suggests that it's better for your health to drink some, but much worse to drink too much. Distilled liquors, such as vodka and gin, may even carry the same health benefits as beer and wine, meaning there might be something about the alcohol itself, and not whatever's used to make it, that could lead to better health. Most researchers still aren't sure why this is, but when it comes to the occasional glass of wine (or - who am I kidding? - vodka Sugar-Free RedBull) I won't ask too many questions.
- Remember that the definition of "one drink" depends on the type of alcohol you're drinking. A bottle (12oz) of beer, a glass (5oz, or about 2/3 full) of wine, and a 1.5oz shot of liquor all count as "one drink."
What's New This Year?
The things I found most exciting about the new DGAs were their focus on following the scientific evidence on hot-button topics like artificial sweeteners, cholesterol, and caffeine.
- Artificial sweeteners are a-okay. The new 2015-2020 DGAs finally gave more than lip service to an array of products that can have a real impact on healthy weight management for Americans. Decades of repeated studies on sweetener consumption have shown that consuming these low-calorie sweeteners in moderation poses no health threat, either short- or long-term. In fact, several large studies suggest that swapping out sugary drinks and snacks for those made with artificial sweeteners can help you lose weight and keep it off without giving up all the foods you love.
- Cholesterol is out of jail. For decades, the DGAs have recommended an upper-limit on cholesterol intake. However, all of the recent evidence shows that the cholesterol on your plate (from eggs, fatty meat and dairy) does not contribute to blood cholesterol. Rather, a host of more important factors are at play: physical activity, family health history, body weight, and saturated and trans fat intake chief among them. Current data suggest that most Americans eat all that much cholesterol anyway. So enjoy that egg sandwich (but remember - watch the sat fats).
- Enjoy caffeinated beverages in smart moderation. Caffeine was another hot topic in this year's guidelines - in fact, the mere mention of "caffeine" shot up from 0 in 2010 to 205 in the 2015 edition. The guidelines restate the evidence on caffeine consumption, which shows that up to 400mg of caffeine per day has no ill effects. In fact, coffee - where Americans get approximately 80% of their caffeine buzz - may even impart some health benefits.
- 400mg of caffeine can take many forms. It may come in any of these forms (all data from Caffeine Informer):
- Three 8oz cups of brewed coffee
- Five 1.5oz shots of espresso
- Three-and-a-half medium-sized (12oz) cans of RedBull
- Almost 6 (5.8) cans of PepsiMax
- Nine-and-a-half 8oz cups of brewed black tea
- 16 8oz cups of brewed green tea
Stray Points about the New Guidelines and Their Application
- There's a reason these guidelines are required to be updated every five years. What we know, and what we think we know, in the field of nutrition is constantly changing. However, there are a few solid standbys, as seen in the list of "dos" from the latest guidelines, that haven't changed for many years and will be your best bet for finding healthful eating habits you can stick with for life.
- Nutrition science is complicated and messy. A recent article summed up this point quite eloquently: just because owning a dog is associated with eating egg rolls, this doesn't mean eating egg rolls causes canine ownership (or vice versa!) The ways in which we gather data about nutrition, such as asking someone to recall everything they ate for a week, doesn't always give us a perfectly accurate snapshot of true eating habits. It's important to take a critical eye whenever you read a study that claims a certain food is the silver bullet to any and all ailments. On the other hand, we've come a long way in studying the effects of food on the body, and the more well-designed studies that all point to the same idea pile up, the more confident we can be that we're getting closer and closer to the truth.
- Some things never change. The most important take-home points made in the 2015-2020 guidelines are simply echoes of general pillars of good nutrition that have been known and well-accepted for years. If you can find a way to meet your needs for fruits and vegetables, base your carbohydrates around less-refined, whole-grain sources, save your sugary splurges for the foods you truly love, and find ways to cut down on saturated fat (such as choosing lean meats and/or plants for your protein sources) you are well on your way to establishing a diet that will not only do your body good, but one that helps you be the happiest and most whole person you can be.
- True nutritional health stands at the precipice of physical, social, and emotional well-being. I think Amber Rodgers of Go Kaleo says it best with the way she describes her "Food Foundation":
This diagram makes clear that even if you ate every morsel of every meal completely by the book based on the latest dietary guidelines (which, as explained above, can be based upon constantly-shifting science) it wouldn't be a one-way ticket to making you feel good about what you're eating - which is the only real way to create lasting, lifelong healthy eating habits. Establishing a balanced, loving relationship with food and finding ways to eat that support your values and lets you participate in shared culture(s) with others is just as important to creating an overall sense of physical, emotional and social health. Making sure each of these pillars is strong will help you make and keep a healthy diet not just now, but for life. | <urn:uuid:34ee0315-42af-4838-b3d4-a74732fc1dca> | CC-MAIN-2017-34 | http://stealthwell.blogspot.com/2016/01/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105334.20/warc/CC-MAIN-20170819085604-20170819105604-00236.warc.gz | en | 0.957261 | 3,213 | 3.109375 | 3 |
Every year, your family probably faces its share of colds, sore throats, and viruses. When you bring your child to the doctor for these illnesses, do you automatically expect a prescription for antibiotics?
Many parents do. And they're surprised, maybe even angry, if they leave the doctor's office empty-handed — after all, what parent doesn't want their kid to get well as quickly as possible? But your doctor could be doing you and your child a favor by not reaching for the prescription pad.
How Antibiotics Work
Antibiotics, first used in the 1940s, are certainly one of the great advances in medicine. But overprescribing them has resulted in the development of bacteria that don't respond to antibiotics that may have worked in the past. Plus, kids who take antibiotics when they aren't necessary run the risk of adverse reactions, such as stomach upset and diarrhea.
To understand how antibiotics work, it helps to know about the two major types of germs that can make people sick: bacteria and viruses. Although certain bacteria and viruses cause diseases with similar symptoms, the ways these two organisms multiply and spread illness are different:
- Bacteria are living organisms existing as single cells. Bacteria are everywhere and most don't cause any harm, and in some cases may be beneficial. Lactobacillus, for example, lives in the intestine and help digest food. But some bacteria are harmful and can cause illness by invading the human body, multiplying, and interfering with normal bodily processes. Antibiotics are effective against bacteria because they work to kill these living organisms by stopping their growth and reproduction.
- Viruses, on the other hand, are not alive and cannot exist on their own — they are particles containing genetic material wrapped in a protein coat. Viruses "live," grow, and reproduce only after they've invaded other living cells. Some viruses may be fought off by the body's immune system before they cause illness, but others (colds, for example) must simply run their course. Viruses do not respond to antibiotics at all.
Why It's Harmful to Overuse Them
Taking antibiotics for colds and other viral illnesses not only won't work, but also has a dangerous side effect: over time, this practice helps create bacteria that have become more of a challenge to kill. Frequent and inappropriate use of antibiotics selects for strains of bacteria that can resist treatment. This is called bacterial resistance. These resistant bacteria require higher doses of medicine or stronger antibiotics to treat. Doctors have even found bacteria that are resistant to some of the most powerful antibiotics available today.
Antibiotic resistance is a widespread problem, and one that the U.S. Centers for Disease Control and Prevention calls "one of the world's most pressing public health problems." Bacteria that were once highly responsive to antibiotics have become increasingly resistant. Among those that are becoming harder to treat are pneumococcal infections (which cause pneumonia, ear infections, sinus infections, and meningitis), skin infections, and tuberculosis.
Taking Antibiotics Safely
So what should you do when your child gets sick? To minimize the risk of bacterial resistance, keep these tips in mind:
- Treat only bacterial infections. Seek advice and ask questions. Letting milder illnesses (especially those thought to be caused by viruses) run their course to avoid the development of drug-resistant germs may be a good idea — but it's still best to leave what constitutes a "mild illness" up to your doctor. Even if the symptoms don't worsen but linger, take your child to the doctor. At the office, ask questions about whether your child's illness is bacterial or viral, and discuss the risks and benefits of antibiotics. If it's a virus, don't pressure your doctor to prescribe antibiotics, but ask about ways to treat symptoms.
- Use antibiotics as prescribed.
- Don't save antibiotics for next time.
- Never use another person's prescription.
Ask your doctor about ways to treat the symptoms that are making your child uncomfortable, such as a stuffy nose or scratchy throat, without the use of antibiotics. The key to building a good relationship with your doctor is open communication, so work together toward that goal.
Use the medication properly. Antibiotics are only effective against a bacterial infection if taken for the full amount of time prescribed by the doctor — and they take time to kick in, too, so don't expect your child to feel better after taking the first dose. Most kids take 1 to 2 days to feel a lot better. Similarly, don't let your child take antibiotics longer than prescribed.
And most important, never use antibiotics that have been lying around your home. Never take antibiotics that were prescribed for another family member, either — doses for kids vary, and if your child did have an illness requiring antibiotics, you'd want to make sure you were treating it correctly. Saving antibiotics "for the next time" is a bad idea, too. Any remaining antibiotic should be thrown out as soon as your child has taken the full course of medication.
Help fight antibiotic resistance by taking simple steps to prevent the spread of infections. Encourage hand washing, make sure your kids are up to date on immunizations, and keep kids out of school when sick.
Doctors are aware of increasing antibiotic resistance and are trying to solve the problem. New antibiotics may be on the horizon, but antibiotics will continue to need to be prescribed and used appropriately.
Reviewed by: Steven Dowshen, MD
Date reviewed: November 2008 | <urn:uuid:5102d7e9-0dfd-422a-adae-4a754a5f6116> | CC-MAIN-2014-15 | http://www.choa.org/Child-Health-Glossary/A/AN/Antibiotic-Overuse-Dangers_KH_Parent | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609540626.47/warc/CC-MAIN-20140416005220-00479-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.956071 | 1,131 | 3.625 | 4 |
The proposed design (see below) features a 96,000-kilometre-long cable connecting an earth-based spaceport to a counterweight in orbit, roughly a quarter of the way to the moon. An elevator car would then transport people along the cable between the spaceport and a research station 36,000km above the earth – a journey that would take roughly 7.5 days.
But how realistic a vision is this? And what would a space elevator cable even be made of?
The space elevator concept first entered public consciousness through Arthur C. Clarke’s 1978 science fiction novel Fountains of Paradise. In the novel, an elevator made of a strong filament or cable was connected to a geosynchronous satellite to transport materials to and from Earth.
Literary fantasies aside, the reality is that the type of cable proposed by Obayashi Corp. can and will be made. Whether it works or not is another story.
Obayashi Corp’s proposed space elevator will utilise a material discovered in 1991 by Japanese physicist Sumio Iijima – carbon nanotubes (CNTs). CNTs are essentially single tubes (single-walled carbon nanotubes) or multiple concentric tubes (multi-walled carbon nanotubes) comprising sheets of graphene. CNTs are one of the strongest materials ever created, stronger than diamond, Kevlar, or even spider’s silk.
As such, CNTs would be the ideal material for creating a space elevator cable. Of course there are several issues that need to be addressed before this lofty goal can be realised.
The first, and most fundamental challenge, is that nanotubes can only be grown to around 20 centimetres in length, at present. So the first challenge is tethering these tubes together to form ropes, very much like the method used to make wool yarn.
CSIRO scientists have started to work on making fabrics out of sub-microscopic carbon nanotubes yarns, but the length of the CNTs being used – one to 300 microns, where 1 micron is one-millionth of a metre – make this a real challenge.
Nonetheless the technique of twisting nanotubes into a self-locking yarn has been highly successful.
So while we are close to making reasonably long nanotube yarns there is one intrinsic flaw: the self-locking mechanism in CNT yarns is held together by only van der Waals interactions – weak intermolecular forces between the nanotubes.
While the accumulation of these interactions along the body of a nanotube makes for quite strong bonding within the yarn, these forces are much weaker than if the tubes were “welded” to one another.
The ideal situation would be to fabricate an individual carbon nanotube 96,000 kilometres long. But this is unlikely: a CNT of this length, when stretched out, could wrap around the earth’s equator more than twice – hardly manageable in a lab.
Alternatively, scientists could chemically weld (via intramolecular covalent bonding) individual nanotubes, preferably end-on-end with a bonding structure similar, if not identical to, the structure of the carbon nanotubes themselves.
Current techniques can easily attach one nanotube to another or attach nanotubes to a variety of other materials, including nanoparticles, DNA, polymers and proteins. These nanocomposites have a broad range of applications from sensors to solar cells.
But in the context of a space elevator cable, the nanotechnologists' ambition of end-on-end carbon nanotube attachment is still elusive. Achieving this ambition may prove crucial before anyone will feel confident about being lifted into space by elevator.
Clearly without a strong enough material the entire idea of a space elevator is just an intellectual exercise. Happily there is a whole world of scientists out there working hard to turn our dreams into reality. | <urn:uuid:ba25e63b-5430-4cfa-b188-1303a3bcbe76> | CC-MAIN-2014-35 | http://theconversation.com/going-up-the-elevator-that-could-take-you-into-space-5743 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500832538.99/warc/CC-MAIN-20140820021352-00338-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.920959 | 820 | 3.890625 | 4 |
6 The North American theatre The pioneers North America was the earliest and the greatest theatre of oceanic emigration in which the methods of mass migration were pioneered. The activation of the transatlantic human transfusions was a vast project and many of its origins remain a mystery. But it began as a largely English venture. Mostly, the story of the peopling of America is told as variants on the theme of the dispeopling of old Europe: it is told conventionally as the ‘uprooting’ or the ‘transplanting’ of Europe’s poor and wretched. This fits in well with
4 Touring North America During the second half of the nineteenth century increasing numbers of British performers succumbed to the lure of performing abroad, particularly in the US. This was a marked change from the previous century when, as Travis Bogard explains, ‘No actor would cross the Atlantic and endure the uncertainties and hardships, the censorship, the meagre financial rewards of the eighteenth-century American theatre, if he could have survived in London, or, it must be assumed, anywhere in England’ (Bogard, 1977: 4). More recent scholarship (Anthony
The presence of the Church of England in North America offers an interesting case study of the later Stuart church, where some of the issues and problems encountered by the church in Old England were transplanted to British North America, but also where the radically different religious, political, and socio-cultural contexts across the Atlantic threw up new challenges for the church. This chapter will focus
12 Irish diaspora Catholicism in North America* David Doyle I In their global faiths as in their insular polities, the experiences of the Irish at home entailed a series of unstable ‘identities’ to ease relations with others. This was so despite their obligation of due deference to political authority, regardless of those exercising it. The search for status and prestige imposed choreography of positioning in social life which weakened any consistent outward witness to Catholic values. Impoverished political identities exacerbated this, regardless of their
1 Origins and development The origins and development of the English diaspora in North America The roots of the English diaspora lie in the sixteenth-century quest for an empire, which began processes of territorial settlement, first in the home islands, and then beyond the oceans. Mass plantations in 1580s Munster, for instance, signalled a new and more sustained phase of pacifying Ireland by English population settlement.1 In 1609 this approach was further intensified via systematic, planned, popular migrations as the English joined the Scots of the pre
From the early eighteenth century, a vibrant English associational culture emerged that was, by many measures, ethnic in character. English ethnic organisations spread across North America from east to west, and from north to south, later becoming a truly global phenomenon when reaching Australasia in the later nineteenth century. This books charts the nature, extent and character of these developments. It explores the main activities of English ethnic societies, including their charitable work; collective mutual aid; their national celebration; their expressions of imperial and monarchical devotion; and the extent to which they evinced transnational communication with the homeland and with English immigrants in other territories. The English demonstrated and English people abroad demonstrated and experienced competitive and sometimes conflictual ethnic character, and so the discussion also uncovers aspects of enmity towards an Irish immigrant community, especially in the US, whose increasingly political sense of community brought them into bitter dispute with English immigrants whom they soon outnumbered. Towards the end of the nineteenth century, the extent of English ethnic associational culture in North America was such that it resonated within England herself, resulting in the formation of a central organization designed to coordinate the promotion of English culture. This was the Royal Society of St George. Ultimately, the book documents that the English expressed their identity through processes of associating, mutualism and self-expression that were, by any measure, both ethnic and diasporic in character. The English Diaspora is based on a very large amount of untapped primary materials from archives in the United States, Canada, and the UK relating to specific locations such as New York, Philadelphia, Baltimore, Toronto, Ottawa, and Kingston, and London. Thousands of newspaper articles have been trawled. Several long runs of English associational periodicals have been garnered and utilized. Comparative and transnational perspectives beyond the US and Canada are enabled by the discovery of manuscript materials and periodicals relating to the Royal Society of St George.
apparently mainstream commercial present. Tattoos function as symptoms of a psychological and social deviance commodified in the construction of crime as entertainment, but also as signs of a self-confident and empowered youth culture closely linked to tattooing’s subcultural origins. The ostensibly divergent roles of tattooing as atavistic outsider art and emergent fashion become difficult to disentangle. This chapter offers three case studies of the depiction of tattoos in North American TV crime drama in order to interrogate these multiple
Can reading make us better citizens? This book sheds light on how the act of reading can be mobilised as a powerful civic tool in service of contemporary civil and political struggles for minority recognition, rights, and representation in North America. Crossing borders and queering citizenship reimagines the contours of contemporary citizenship by connecting queer and citizenship theories to the idea of an engaged reading subject. This book offers a new approach to studying the act of reading, theorises reading as an integral element of the basic unit of the state: the citizen. By theorising the act of reading across borders as a civic act that queers citizenship, the book advances an alternative model of belonging through civic readerly engagement. Exploring work by seven US, Mexican, Canadian, and Indigenous authors, including Gloria Anzaldúa, Dorothy Allison, Gregory Scofield, Guillermo Gómez-Peña, Erín Moure, Junot Díaz, and Yann Martel, the book offers sensitive interpretations of how reading can create citizenship practices that foreground and value recognition, rights, and representation for all members of a political system.
imagine the refugee, or to recognize distinguishing characteristics of refugeedom (as opposed to immigration). At a time when refugees were making their way across the Atlantic to North America, this visual displacement had a material impact: contributing to restrictions on their acceptance into distant countries. For scholars working with humanitarian imagery or practitioners working with refugees, this look back provides historical perspective to the visual culture of refugees and a corrective to thinking that when ‘out of sight’ means a positive resolution to
The sourcing of cadavers for North American skeletal reference collections occurred immediately after death and targeted the poor and marginalised. In Europe, collections sourced bodies that were buried and unclaimed after some time in cemeteries with no perpetual care mandate, and may have also targeted the underprivileged. The relationship between socio-economic status (SES) and abandonment was examined in a sample of unclaimed remains (603 adults and 98 children) collected from cemeteries in the city of Lisbon, Portugal, that were incorporated in a collection. Results demonstrate that low SES individuals are not more likely to be abandoned nor to be incorporated in the collection than higher SES individuals. Furthermore, historical data indicate that the poorest were not incorporated into the collection, because of burial practices. Although the accumulation of collections in North America was facilitated by structural violence that targeted the poor and marginalised, this phenomenon seems largely absent in the Lisbon collection. | <urn:uuid:d984f5ef-e09a-41f5-96a2-28f430c8f12c> | CC-MAIN-2023-14 | https://www.manchesterhive.com/search?q=%22North+America%22 | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00752.warc.gz | en | 0.955404 | 1,546 | 3.359375 | 3 |
Project New Media Literacies was established at MIT Comparative Media Studies and now housed at USC’s Annenberg School for Communications & Journalism. The project is led by Henry Jenkins III, Erin B. Reilly and Vanessa Vartabedian.
Participatory culture shifts the focus of literacy from one of individual expression to community involvement. The new literacies almost all involve social skills developed through collaboration and networking. These skills build on the foundation of traditional literacy, research skills, technical skills, and critical analysis skills taught in the classroom.
The new skills include…
- Play – the capacity to experiment with one’s surroundings as a form of problem-solving
- Performance – the ability to adopt alternative identities for the purpose of improvisation and discovery
- Simulation – the ability to interpret and construct dynamic models of real-world processes
- Appropriation – the ability to meaningfully sample and remix media content
- Multitasking – the ability to scan one’s environment and shift focus as needed to salient details
- Distributed Cognition – the ability to interact meaningfully with tools that expand mental capacities
- Collective Intelligence - the ability to pool knowledge and compare notes with others toward a common goal
- Judgment – the ability to evaluate the reliability and credibility of different information sources
- Transmedia Navigation – the ability to follow the flow of stories and information across multiple modalities
- Networking – the ability to search for, synthesize, and disseminate information
- Negotiation – the ability to travel across diverse communities, discerning and respecting multiple perspectives, and grasping and following alternative norms
- Visualization – the ability to interpret and create data representations for the purposes of expressing ideas, finding patterns, and identifying trends
from Confronting the Challenges of Participatory Culture: Media Education for the 21st Century, by Henry Jenkins, with Ravi Purushotma, Katherine Clinton, Margaret Weigel, and Alice J. Robison
The site also includes resources like Reading in a Participatory Culture
The Teachers’ Strategy Guide: Reading in a Participatory Culture, offers strategies for integrating the tools, approaches, and methods of Comparative Media Studies into the English and Language Arts classroom. This guide is intended to demonstrate techniques which could be applied to the study of authorship in relation to a range of other literary works, pushing us to reflect more deeply on how authors build upon the materials of their culture and in turn inspire others who follow to see the world in new ways.
This online guide is related to mapping in a participatory culture. The framework provides the guidance and the strategies are illustrated through the resources, projects, ideas, and people profiled. It is not meant to be complete. It is meant to keep growing as technology and the needs of educators evolve. It is meant to be more aggregate than prescriptive. | <urn:uuid:965917f6-e4b5-4f4c-a88c-17ef95d2c514> | CC-MAIN-2013-48 | http://librariesandtransliteracy.wordpress.com/2010/09/13/the-new-media-literacies-from-usc/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163818502/warc/CC-MAIN-20131204133018-00031-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.920827 | 580 | 3.234375 | 3 |
The history of the United States is large and complex, but can be broken down into milestones and also periods that split, unified, and transformed the United States right into the country it is now. The American flag didn’t appear like it does currently. Besides that, it undertook a great deal of modifications and adjustments.
The American Revolutionary War
Enter the American Revolution. In some cases described as the American War of Independence, or the Revolutionary War, it was a conflict which lasted from 1775-1783 as well as allowed the original 13 colonies to stay independent from Great Britain. Starting in Great Britain in the late 1790s, the Industrial Revolution at some point made its path to the United States as well as altered the focus of the country’s economy and the means it produces items.
These conflicts developed from growing tensions in between residents of Great Britain’s 13 North American colonies and also the early american government (which stood for the British crown). Efforts by the British government to increase earnings by collectin tax from the colonies (especially the Stamp Act of 1765, the Townshend Tariffs of 1767 and also the Tea Act of 1773) met with heated protest amongst numerous colonists, that resented their lack of representation in Parliament as well as required the exact same civil liberties as other British citizens.
George Washington was made its commander in chief. Congress hoped they could compel the British to bargain however George III declined to negotiate. Rather, in August 1775 he proclaimed that all the American colonies were in a state of rebellion.
By the fall of 1781, the American army had actually begun to force the adversary to retreat to Virginia’s Yorktown peninsula, near where the York River clears right into Chesapeake Bay. Claiming ailments, the British general sent his deputy, Charles O’Hara, to give up; after O’Hara approached Rochambeau to surrender his sword (the Frenchman deferred to Washington), Washington offered the nod to his very own replacement, Benjamin Lincoln, who accepted it. After French support assisted the Continental Army require the British surrender at Yorktown, Virginia, in 1781, the Americans had actually efficiently won their self-reliance, though the war would not officially finish til 1783.
The motion for American independence successfully won at Yorktown, contemporary observers did not see that as the definitive triumph. British and also American mediators in Paris signed initial peace terms in Paris late that November, and also on September 3, 1783, Great Britain officially identified the independence of the United States in the Treaty of Paris.
Just how the American Flag came to be
The American flag was created to represent the brand-new union of the thirteen original states: it would certainly have thirteen stripes, alternate red as well as white, and thirteen stars, white on a blue field. One of the very first flags had the stars arranged in a circle, based upon the suggestion that colonies were equal. The thirteen stripes, laid out side by side, stood for the battle for independence; red represented valiance, white signified purity as well as blue stood for commitment.
In 1818, after a couple of style adjustments, the United States Congress decided to preserve the flag’s initial thirteen stripes as well as add brand-new stars to reflect each brand-new state that entered the union.
While there is no doubt that the genuine Betsy Ross deserved interest in her own right, it is the legend of Betsy stitching the initial stars and stripes that has made her a remarkable historic number. The Betsy Ross story was given public attention in 1870 by her grandson, William Canby, in a speech he made to the Historical Society of Pennsylvania. Canby and various other members of Betsy’s family members authorized sworn affidavits specifying that they heard the story of the production of the very first flag from Betsy’s own mouth.
According to the oral history, in 1776, 3 men – George Washington, Robert Morris, as well as George Ross, went to Betsy Ross in her furniture store. She escorted them to her parlor, where they can have a private meeting. Right here, Washington took a folded up piece of paper from his inside coat pocket. On it, was a sketch of a flag with thirteen red as well as white stripes as well as thirteen six-pointed stars.
Washington asked if Betsy can make a flag from the layout. Betsy responded: “I do not know, yet I will attempt.” This line was made use of in the vouched statements of numerous of Betsy’s family members, suggesting that it is a straight quote from Betsy. As the story goes, Betsy suggested altering the stars to 5 points rather than six.
Some chroniclers think that it was Francis Hopkisnon that offered birth to the concept of the Stars and Stripes. Francis Hopkinson was a prominent patriot, a legal representative, a Congressman from New Jersey, an endorser of the Declaration of Independence, poet, artist, and identified civil servant.
He was assigned to the Continental Navy Board on November 6,1776. It was while working on the Continental Navy Board that he transformed his attention to creating the flag of the United States. The use of stars because style is thought to have been the result of an experience in the battle directly related to his propriety.
A book in Hopkinson’s collection at his home in Bordentown was taken by a Hessian soldier in December 1776, a dark year of the war. The book, Discourses on Public Occasions in America (London, 1762) by William Smith, D.D., had actually been a present to him by the writer. The soldier, an I. Ewald, composed on the inside cover that he had seen the author near Philadelphia and that he, Ewald, had taken the book from a great country seat near Philadelphia. The book was ultimately offered to a person in Philadelphia that returned it to Hopkinson. The soldier had written over and listed below Hopkinson’s bookplate, which had 3 six pointed stars as well as his household adage, “Semper Paratus”, or “Always Ready”. The safe return of the book could well have represented to Hopkinson the rebirth of the Americans’ wish.
In a letter to the Board of Admiralty in 1780 Hopkinson insisted that he had designed “the flag of the United States of America” as well as a number of ornaments, devices, and checks appearing on bills of exchange, ship documents, the seals of the boards of Admiralty as well as Treasury, and also the Great Seal of the United States. Hopkinson had actually obtained absolutely nothing for this job, and currently he submitted a bill and also asked “whether a Quarter Cask of the public wine” would certainly not be an affordable and also correct incentive for his labors.
Nevertheless, no one can be so certain who produced the American flag. The American flag is the sacred symbol of the nation. It signifies the residents’ birthright, their heritage of freedom acquired with blood as well as sorrow. The title deed of liberty, which is the nation’s to appreciate and also keep in trust for posterity. Timeless vigilance is the cost of liberty. As you see the flag silhouetted in front of the relaxed skies of the country, you are reminded that the American flag means what you are – no more, no less.
Top American Flags near state of Nevada
As quoted from the Star Spangled Banner:
O say can you see, by the dawn’s early light,
What so proudly we hailed at the twilight’s last gleaming,
Whose broad stripes and bright stars through the perilous fight,
O’er the ramparts we watched, were so gallantly streaming?
And the rockets’ red glare, the bombs bursting in air,
Gave proof through the night that our flag was still there;
O say does that star-spangled banner yet wave
O’er the land of the free and the home of the brave?
ZIP codes in Denio we serve: 89404 | <urn:uuid:386107c8-0570-4eba-bf92-6cfebfa2a88b> | CC-MAIN-2017-47 | http://americanflaggroup.com/american-flag-around-denio-nv-89404.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805977.0/warc/CC-MAIN-20171120090419-20171120110419-00219.warc.gz | en | 0.976442 | 1,686 | 3.46875 | 3 |
Raleigh, NC (May 12, 2020) – For years, the public has considered recycling to be one of the best methods of preserving the environment and preventing valuable materials from going to the landfill. Coupled with this is the misconception that landfills are actually harmful to the environment.
As a result of this misunderstanding, consumers, driven to do their sustainable part by avoiding the trash can, discard their items in the recycling bin with little regard or understanding of what does and does not belong in that bin. Thanks to this wish-cycling and confusion, consumers unknowingly create more contamination, rendering some of the material un-recyclable, as well as dangerous conditions for solid waste and scrap recycling facilities.
With these stressors already weighing on facilities, fires at material recovery facilities are on the rise, with records set in July, August and September of 2019 for reported fires.
Despite the recent increase in MRF fires, there is little data and evidence to explain how and why these fires spark. To fill in this data gap, the Environmental Research & Education Foundation (EREF), in collaboration with the Institute of Scrap Recycling Industries (ISRI), National Waste & Recycling Association (NWRA) and the Solid Waste Association of North America (SWANA) have partnered on a study to determine the causes and frequency of MRF fires in the U.S.
The primary objective of this effort is to compile information that summarizes the following information about fires at MRFs and scrap recycling facilities and in collection vehicles:
- Frequency of MRF and scrap recycling fires annually (i.e. % of facilities)
- Frequency of collection vehicles fires
- Suspected cause(s) of these fires
- Strategies/technologies used to fight the fire
- Damage caused by the fire (e.g. property, personnel injury/death, lost operating revenue)
- Preventative measures taken to minimize the potential for fires
- Likelihood that lithium ion batteries disposed of at MRFs or scrap yards caused a fire
Key industry organizations have rallied around the issue, with the project stakeholders representing a significant portion of the scrap and recycling industry. “These fires present a major risk to worker safety. For years, NWRA has fought to improve worker safety in the waste industry,” said Darrell Smith, President and CEO of NWRA. “This study will better inform our efforts.”
“The recycling industry is taking a proactive approach to addressing the growing concern of fires at scrap facilities,” said Robin Wiener, President of ISRI. “While this includes the implementation of new technologies, workforce safety initiatives, and public outreach on proper recycling, identifying the causes of fires is the first step to finding a solution to prevent them. The survey will help identify the root causes which we can then use to better direct resources to prevent future fires.”
“The information gleaned from this study has the potential to save facility owners money, reduce material loss and, more importantly, increase worker safety,” said David Biderman, Executive Director and CEO of SWANA. “We’re excited about the impact this research can have on the industry.”
A critical component of the study is a survey of recycling and scrap facilities, which recently went live. “Such information is critical and benefits the entire industry, as fires serve to further financial pressure on an already strained industry,” noted Bryan Staley, President and CEO of EREF. To participate in the survey, please visit the project website.
Project sponsorships are available! To sponsor this project, please contact Bryan Staley at [email protected].
EREF is a 501(c)3 class charity that funds and directs scientific research and educational initiatives for waste management practices to benefit industry participants and the communities they serve. For more complete information on EREF funded research, its scholarship program and how to donate to this great cause, visit erefdn.org. | <urn:uuid:62b0e947-fb74-4aa4-b064-68daeb245302> | CC-MAIN-2020-24 | https://erefdn.org/category/press-release/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00594.warc.gz | en | 0.941049 | 820 | 3.015625 | 3 |
Spine robot assembled to its full length with new urethane spacers. Color of the spacers denotes the hardness of the plastic, which ranges in steps from 40 durometer at the tip, to 90 durometer at the base. The spacers also change in thickness from the tip to the base. The routing of the rope through the tensioner system can been seen as well. Next step is terminating the ropes. First the center rope at the back of the baseplate, then the four tendon ropes into the pockets on each end of the winch drums. On each drum in this push-pull winch, the rope winds from one side as it unwinds from the opposite side. Adjusting the amount of force on the tensioner keeps the rope tracking properly in the grooves. | <urn:uuid:cf9bb543-fd83-4c2b-b594-058d9e5005ec> | CC-MAIN-2014-35 | http://srl.org/machines/spine/galleries/2011-06.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535924131.19/warc/CC-MAIN-20140901014524-00333-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.931392 | 161 | 2.65625 | 3 |
Antarctica; the southernmost continent on the earth overlying the South Pole. Antarctica is almost entirely south of the Antarctic Circle and is surrounded by the Southern Ocean. It is the fifth largest continent in area after North and South America, Asia, and Africa, and almost 98% of it is covered in ice. Antarctica is also known as the coldest, driest and windiest continent. The only living creatures that can survive in Antarctica are penguins, seals, lichen, mosses, and some types of algae. The name Antarctica is a version of the Greek compound word Antarktike’ meaning opposite of the Arctic.
A History of Antarctica
•In 1841 an explorer by the name of James Clark Ross passed through what is known today as the Ross Sea and discovered Ross Island.
•In 1907 an expedition led to the first climb of Mount Erbus and also led to parties reaching the South Magnetic Pole.
•December 1908 to February 1909 a man named Shackleton (and his party) were the first humans to cross the Ross Ice Shelf, and the first to journey the Transantarctic Mountain Range. They were also the first to set foot on the South Polar Plateau.
•In 1911 Roald Amundsen became the first to reach the geographic South Pole.
•During the 1930-1940s Richard Evelyn Byrd made several voyages to the Antarctic by lane and conducted extensive geological and biological research.
•In 1939 the United States Navy ran an expedition and sailed from Sydney Australia into the Antarctic Ocean and reported the discovery of an Antarctic continent west of the Balleny Islands.
•In 1956 George J. Dufek led a group of U.S. Navy men and successfully landed an aircraft there.
•In 1959 the Antarctic Treaty was signed prohibiting military activities and mineral mining and supporting scientific research. The treaty also protects the continent’s ecozone.
Antarctica is the coldest place on earth and scientists have recorded temperatures as low as -129 degrees F. It is a frozen desert with very little precipitation, receiving less than ten centimeters a year. Temperatures can reach on the interior during the winter between -80 degrees Celsius to -90 degrees Celsius, and reach a maximum of five to fifteen degrees Celsius near the coast in the summer time. If you were to live in Antarctica sunburn would be a major issue as the snow reflects almost all of the sun’s ultraviolet rays. Towards the edge of the continent there are strong katabatic winds which blow at storm force. In the interior of the continent the wind speeds decrease and are fairly moderate. Antarctica is colder than the Arctic because of two things:
1.Antarctica is above sea level- Temperature decreases with elevation
2.The Arctic Ocean covers the north polar zone. The warmth of the ocean is transferred through the icepack and prevents the temperatures in the Arctic from reaching the land surface of Antarctica.
Since most of the continent’s mass area consists of ice, temperatures stay cold, and it sits on solid rock of which it has been proven to be impervious to climate change. Antarctica however has been noticeably affected by global warming, specifically on the Antarctic Peninsula and in Pine Island Bay. Together they are contributing largely to a rise in sea levels. In 2003 Larsen-B collapsed due to global warming. A large ozone hole over Antarctica has also been identified by scientists, caused by emission of chlorofluorocarbons into the atmosphere.
As scientists continue to study the continent they find new things constantly. It continues to be a place of research and a continent of knowledge.
Learn more with these Antarctica websites. | <urn:uuid:1f977523-9404-4c00-9523-e78e223826e4> | CC-MAIN-2014-41 | http://www.surfnetkids.com/go/130/about-antarctica-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657121288.75/warc/CC-MAIN-20140914011201-00226-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.947686 | 747 | 3.640625 | 4 |
Manuela is required to go to school in order to obtain the monthly food donations from Finding Freedom Through Friendship. She can be seen holding her FFF contract in the above photo.
By requiring her family to commit to Manuela's education in order to receive their food staples, FFF is enabling Manuela and other children in rural Guatemalan families to have leverage within their household dynamic. Making sure a child attends school in the more remote areas of Guatemala takes stamina and determination. Children often have to walk long distances to get to school. They may not speak Spanish, which is spoken in schools, as a primary language. Parents may be illiterate, and therefore might not value education. School expenses often hamper desire to educate children.
When FFF facilitators present single mothers with contracts, we are making a statement on our belief that educating their children is a collaboration of efforts between FFF and the family. The majority of our mothers have to sign using their thumbprint (as did Manuela's, note above), which demonstrates the need for education even further. As the head of their households, an illiterate single mother is more at risk for becoming the victim of theft, for being taken advantage of financially, or needing to marry in order to provide for her children. Her ability to earn a life-sustaining salary is very restricted. FFF hopes to help break the cycle of illiteracy and poverty within the households of each single mother we assist. One contract at a time! | <urn:uuid:9a6e2f88-0c08-4d11-b5e4-14410e5857fe> | CC-MAIN-2017-30 | http://freedomthroughfriendship.blogspot.com/2011_02_27_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423842.79/warc/CC-MAIN-20170722022441-20170722042441-00449.warc.gz | en | 0.976982 | 302 | 2.625 | 3 |
has been a
Elephants (elle-EE-Faaaant) are large creatures that live in San Diego, Africa, Mexico, Asia, and India They are, in fact, larger than the moon . They have thick grey skin and ivory tusks laden in precious South African diamonds. They are the second largest living land mammal behind the Yeti, which may or may not be true (aka Big Foot).
The elephants once faced the threat of extinction. Even though they never were extinct wow this is pointless. Ironically, this was a result of efforts by environmentalists and other liberals to "protect" these noble beasts. In the last six months, a tremendous comeback has been made, largely because of George W. Bush's efforts to encourage elephants to "pull themselves up by their bootstraps." The African elephant population has tripled in the past 6 months - but environmentalists will not have you believe this. However, truthiness and wikiality activist Stephen Colbert has shown that the elephant population has actually tripled. Growth in elephant population was achieved thanks to Colbert fathering over 1,000 elephant pups. It is unknown how this was accomplished, but it seems likely that a special, as-yet unannounced elephant version of his popular Formula 402 was involved.
For someone new to the business of elephant relations, it will be initially only possible to tell which continent an elephant is from by listening for an accent or telltale stereotype mannerisms. As one gains experience, he or she will find that, in fact, they are all quite different. While the Asian and Indian elephants are strictly herbivores, its African relative is a beastly killer who feasts on the weaker African creatures. The American elephant is a different beast entirely, and is actually much more exciting and special than a regular elephant is.
One picture is worth 1,000 Truthyisms
God placed all elephants on Earth 5,999 years ago to replace the woolly mammoths.
God's prototype for the elephant was the well known woolly mammoth. The mammoth proved to be a singularly inept creature, unfit to survive due to its overly heavy coat of shaggy hair and comically long tusks. The widely accepted cause of the extinction of the woolly mammoth is the advent of indoor plumbing which rendered the primary occupation of mammoths, as comical talking showers, obsolete.
Mammoths are thought to be one of the primary causes of dinosaur extinction, largely because of their eating habits, which involved running really fast with their heads down skewering dozens of the slow-moving cold-blooded lizards on their enormous tusks. Shish-Kabobs were inspired by this process.
That mammoths, and the dinosaurs they allegedly skewered off the planet, actually existed is a subject of intense scientific and theoretical debate. While the existence of such comical creatures are supported by arguments that involve "science" and "carbon," the suggestion that man has not always been the ruler of the planet fills others with discomfort.
Asian elephants enjoy munching on trees most of the day. While African elephants hunt for live prey at night. Newborn infants are their preferred diet, although in times of extreme hardship, they will take sloppy seconds on Ann Coulter - which has lead to an outbreak of horrible flesh-eating diseases.
The trunk is one of the less important body parts of an elephant. Its main use is for drinking water, eating food, and slurping blood. But it is really not necessary for survival. In India trunks are being cut off and used in various clothes and food.
Tusks are important for both types of elephants as a means of harvesting food.
The Asian and Indian elephants use their tusks to topple trees and then they eat the leaves and bark alive. Each elephant eats nearly four trees a day. They are destroying the environment at an alarming rate.
The Africans are believed to use their tusks for killing. its believed that they impale their prey and suck it dry of blood through small holes on the tusk. If an elephant's tusks are removed the elephant will then regurgitate its stomach onto its intended meal and absorb nutrients via exogenous digestion.
In general, elephant tusks are easily regrown once removed, and removing elephant tusks is considered helpful to their physical and social health.
Asian elephants teeth are much like certain species of whale in the way that they are grass-like and catch food inside the threads for later eating. They utilize these teeth by eating poop - with their teeth exposed to the air - and catching the insects that get caught in them.
The African species has sharp lion-like teeth used for killing and playing a variety of reed instruments.
Their ears are so huge that they nearly touch the ground allowing other animals to eat them. Their ears grow constantly and, if eaten, will just grow back in about an hour. however if their ears are let to grow for too long, they will gain the ability to fly. Once airborne, they are unable to come back to the ground, and they will soon enter orbit and destroy all our satellites. Consequently, it is vitally important that they are eaten, for if some reason they would not obtain the ability to fly, their ears would grow and encompass the world in a gray pachydermal noachian apocalypse. (hahhaha my balls)
Its penis is huge
The elephant's testicles - about the size of a "respectable globe" - are located under 2 inches of skin, 12 inches of muscle, 4 inches of fat, and an extremely thick 69 inches of hair. Consequently, elephant vasectomies are extremely difficult to perform anal sex. Elephants, when they are sometimes feeling a little crazy, like to perform oral sex with the mouth. Now, how they do that is first the female (or male, depending on if the elephnat is homosexual) will put the opposite elephant testicles in their mouth. Then, they will begin to suck rapidly on the testicles with a rate of 23 sucks per 3 seconds. After being sucked for a good 2 days at a constant rate, the testicles will have ejaculated and turned neon orange.
American elephants are far more aggressive than their African and Asian relatives. They spend their days eating donkeys. In 2000 the American elephants ate many Floridian donkeys as well as many spider monkeys. Unlike other elephants, American elephants have red, white, and blue skin. And their ears look like George Washington's face.
The American elephants population is estimated at several million most living in the South and in Washington's Mexico. Those living in Alabama are easily distinguished from other American elephants as their tusks are looser. It is believed that once they have eaten all the available donkeys they will migrate into Canada. If and when this happens, their skin will lose the blue color, and will be coated in a layer of maple syrup. Also, their ears will resemble Wayne Gretzky's face, and they'll take up playing hockey. If this were to really happen, the American elephant will be no more but the Canadian elephant to appear all over Canada.
American elephants are the only animal visible from orbit.
Wild Connecticut ElephantEdit
The Wild Connecticut Elephant is known to be the most dangerous elephant in the known world. It has known to have killed fifteen people, twelve young pre-schoolers, five old ladies, two puppies, and Molly Ringwald's career. They are amazingly strong, being able to beat the Incredible Hulk in a grueling game of rock, paper scissors. And are truly God's most powerful creation next Mr. T, being able to having a staring contest with Chuck Norris, AND winning. None have been captured up to date but a body of one has been found in the stomach of Rossie O' Donnel. Scientists are currently attempting to penetrate the skin but have failed due because there are no Democrats to fund the research.
http://brasstrunky.blogspot.com/ has more information on these predators from the country of Africa...
African Elephant Edit
Even though Africa itself probably does not exist, African elephants still live there. They have often been described as the speedy land hippopotamus because of its large size, speed, and killing ability. African elephants can weigh from 50,000 to 500,000 pounds and run at a staggering speed of 55 miles per hour (Or 12% the speed of light!).
The African elephant is hard to examine because it burrows underground during the day, only coming out for 4 hours in the night to feed, mostly on the blood of virgins and un-baptised babies. People have tried to study the beast but many have never returned to tell their findings. These brave Elephantologists are thought to be dead and possibly harvested for their sweet nectar blood - an African Elephant favorite.
African Elephant population has more than tripled in the last six months (January 06 - June 06).
Asian Elephant Edit
Asian elephants are much calmer than their African relative. They spend their days eating trees, working in Walmart factories, and just lying about in the thick Asian grass.
Asian elephants are often found on the subway and are distinguished by their foul smell and unorthodox antics. When Asian elephants sit in a seat, elephants in adjacent seats move elsewhere.
The Asian elephants are many in numbers with nearly 9 billion roaming the land today. In fact there are so many of the Asian creatures that organizations have begun killing off the small and weak elephants in favor of having strong worker elephants which are also better tasting to use in Chinese food.
Asian elephants are known to be bullied by their much stronger and fiercer cousin: the American elephant.
Antarctic Elephant Edit
Antarctic elephants are a little known species that resembled the now-extinct "wooly mammoth," although there is no proof "wooly mammoths" even existed, because no humans saw them. They "chill" with the penguins and generally make pretty big asses of themselves when showing up at penguin parties.
Natural Predators Edit
The only animal capable of killing an African or Asian elephant by itself is the American elephant. However, there hasn't been a recorded incidence of this occurring since the last American elephant was brought over to America by the pilgrims.
It is a popular belief that packs of lions will occasionally bring down an elephant. Recent scientific evidence has proven that this is a myth as the claws and teeth of a lion, while capable of injecting deadly poison, are not long enough to penetrate the 5 inch thick skin of the elephant.
Only the colbear or the North American Grizzly bear hunting in packs are capable of killing an adult elephant. The cunning bears will stand one on top of the other up to three bears high, in a maneuver it is theorized they learned from escaped circus bears, allowing the top bear to mount the bewildered elephant. Once mounted, the bear is free to use its powerful jaws to pierce the one weak spot of the elephant, its tender neck joint, or simply ride the elephant to exhaustion.
Threat of overpopulation Edit
There was once a time when the great elephant faced extinction due to overhunting. But thanks to extreme conservationist efforts from groups like the "Stephen and Melinda Gates Foundation" and because of Babar the elephant population has tripled over the past several months. There is now an estimated 100 billion elephants roaming freely in North Dakota, Illinois, Idaho's Portugal, Africa and Asia.
This was shown in the show on Thursday, October 19th, 2006, that Stephen Colbert (like always) was right, and the African elephants are becoming overcrowded.
Elephant populations have recently surged in South America due to the abundance of carola, an edible seaweed that elephants thrive on.
As of now there shall be no more elephanting around the issue. There has become far too many Asians in order for the elephants to exist. The United States government has started executing Asians of all ethnicities at an alarming rate in order for the population of elephants to rise.
After hearing about Dr. Colbert's campaign to harness the love that dare not remember it's name, scientistas have started a birth control program!
Due to the massive explosion in the elephant population world wide (a quadrupling in the last 6 minutes), the cause of controlling their numbers has been taken up by the great humanitarian, Stephen Colbert. Hunting elephants with large caliber rifles or explosives is a kind and profitable way to ensure their continued survival.
Elephants are also overwhelmingly traditionalist and pro-life. Often known to stampede villages where the Bono-stapo and other Hollywood philanthropist liberals have been spotted.
Elephants are actually related to donkeys, so they are extremely democratic. They love Fox news. And other elephants penis's.
Elephant Rage Edit
An elephant will only attack a human if it feels threatened, is kept in captivity, has its territory invaded, needs a snack, or if a human comes into its general line of sight. There have also been heroic stories of elephants protecting humans by trampling vicious wild African bears.
Although thought to be a myth, some scientists claim that some elephants have hollow external bones that sprout from their spine causing them to get sexual urges every five minutes. Researches have concluded that a rare species of Elephants have wings. However, they are unable to fly, disproving evolution.
Catching an Elephant Edit
Although there are a lot of strategeries for catching elephants, the most effective way is to lullaby it with Heavy metal (preferably King Diamond) and proceed to throw a Poke Ball it. (Ultra Balls are most effective.) This tactic has been used by some of the most experienced Elephant hunters, including
Chuck Norris,Stephen Colbert, Rambo, and Mark Walberg.
What Elephants Do All DayEdit
- Elephants are amazing they go around and around and around on a ferris wheel
- How to hunt elephants - there's so many, the elephants will thank you
- The Elephant Song - even artists on the youtube recognize there's enough for every boy & girl to have their own
- Whitest Elephant found!!! GOP demands its rescue | <urn:uuid:733823fe-f7c8-4bf8-8081-bce60f5a8973> | CC-MAIN-2020-29 | https://wikiality.fandom.com/wiki/Elephant?veaction=edit | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890105.39/warc/CC-MAIN-20200706042111-20200706072111-00105.warc.gz | en | 0.960394 | 2,912 | 2.953125 | 3 |
UN says 90m girls not getting education
Updated: 2005-11-26 09:37
Some 90 million girls are being excluded from primary schools around the
world because of outdated stereotypes defining a female's place as in the home
and social pressures for early marriage, the United Nations said Friday.
The U.N. Children's Fund said 46 countries were failing to get as many girls
as boys into school, and that the global body's long-term goal of universal
education for children was far from a sure thing.
In even more countries, the overall enrollment of children was "unacceptably
low," and 25 million boys globally were not receiving a primary school
education, according to UNICEF's 100-page study on gender and education.
"Education of children, especially girls, is the cornerstone to national
progress," UNICEF Executive Director Ann M. Veneman said in a statement. "It
leads to greater economic productivity, reduced infant and maternal mortality
and a greater likelihood that the next generation of children will go to
While rates of school attendance were rising throughout the world, a number
of obstacles including poverty, HIV/ AIDS, armed conflict and natural
catastrophes continued to thwart efforts to get all girls into the classroom,
the study said.
Perhaps most subtly, it said gender roles often combined with poverty to
"shackle" girls by making them conform with outdated notions of what activities
a female should be allowed to undertake.
"Male privilege and entitlement (ensure) that when educational opportunities
are limited, boys will take available classroom space," the study said.
It also highlighted early marriage ¡ª sometimes for children as young as 10 ¡ª
as common in many cultures and often decisive in forcing girls to forgo an
education. Teen pregnancy was another factor listed.
Still more girls were prevented from going to school by their own parents
because it was simply unsafe in many places.
"Too often, schools themselves hurt the cause of girls' education," the
report said. "Many girls are victims of sexual harassment and violence inside
and outside of school. When parents are afraid that their daughters will not be
safe going back and forth to school or in the school environment itself, they
keep them home."
UNICEF said it was working with some "25 key countries" ¡ª such as
Afghanistan, Congo, India, Pakistan and Turkey ¡ª facing the greatest challenge
in getting girls to school. | <urn:uuid:935bd032-c61c-4b75-9ef7-2146917d30de> | CC-MAIN-2017-30 | http://www.chinadaily.com.cn/english/doc/2005-11/26/content_498183.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425339.22/warc/CC-MAIN-20170725162520-20170725182520-00303.warc.gz | en | 0.973431 | 523 | 3.109375 | 3 |
Economic epidemiology is a field at the intersection of epidemiology and economics. Its premise is to incorporate incentives for healthy behavior and their attendant behavioral responses into an epidemiological context to better understand how diseases are transmitted. This framework should help improve policy responses to epidemic diseases by giving policymakers and health-care providers clear tools for thinking about how certain actions can influence the spread of disease transmission.
The main context through which this field emerged was the idea of prevalence-dependence, or disinhibition, which suggests that individuals change their behavior as the prevalence of a disease changes. However, economic epidemiology also encompasses other ideas, including the role of externalities, global disease commons and how individuals’ incentives can influence the outcome and cost of health interventions.
Strategic epidemiology is a branch of economic epidemiology that adopts an explicitly game theoretic approach to analyzing the interplay between individual behavior and population wide disease dynamics.
The spread of an infectious disease is a population-level phenomenon, but decisions to prevent or treat a disease are typically made by individuals who may change their behavior over the course of an epidemic, especially if their perception of risk changes depending on the available information on the epidemics – their decisions will then have population-level consequences. For example, an individual may choose to have unsafe sex or a doctor may prescribe antibiotics to someone without a confirmed bacterial infection. In both cases, the choice may be rational from the individual’s point of view but undesirable from a societal perspective.
Limiting the spread of a disease at the population level requires changing individual behavior, which in turn depends on what information individuals have about the level of risk. When risk is low, people will tend to ignore it. However, if the risk of infection is higher, individuals are more likely to take preventive action. Moreover, the more transmissible the pathogen, the greater the incentive is to make personal investments for control.
The converse is also true: if there is a lowered risk of disease, either through vaccination or because of lowered prevalence, individuals may increase their risk-taking behavior. This effect is analogous to the introduction of safety regulations, such as seatbelts in cars, which because they reduce the cost of an accident in terms of expected injury and death, could lead people to drive with less caution and the resulting injuries to nonoccupants and increased nonfatal crashes may offset some of the gains from the use of seatbelts.
Prevalence-dependent behavior introduces a crucial difference with respect to the way individuals respond when the prevalence of a disease increases. If behavior is exogenous or if behavioral responses are assumed to be inelastic with respect to disease prevalence, the per capita risk of infection in the susceptible population increases as prevalence increases. In contrast, when behavior is endogenous and elastic, hosts can act to reduce their risks. If their responses are strong enough, they can reduce the average per capita risk and offset the increases in the risk of transmission associated with higher prevalence.
Alternatively, the waning of perceived risk, either through the diminution of prevalence or the introduction of a vaccine, may lead to increases in risky behavior. For example, models suggested that the introduction of highly active antiretroviral therapy (HAART), which significantly reduced the morbidity and mortality associated with HIV/AIDS, may lead to increases in the incidence of HIV as the perceived risk of HIV/AIDS decreased.
Recent analysis suggests that an individual’s likelihood of engaging in unprotected sex is related to their personal analysis of risk, with those who believed that receiving HAART or having an undetectable viral load protects against transmitting HIV or who had reduced concerns about engaging in unsafe sex given the availability of HAART were more likely to engage in unprotected sex regardless of HIV status.
This behavioral response can have important implications for the timing of public interventions, because prevalence and public subsidies may compete to induce protective behavior. In other words, if prevalence induces the same sort of protective behavior as public subsidies, the subsidies become irrelevant because people will choose to protect themselves when prevalence is high, regardless of the subsidy, and subsidies may not be helpful at the times when they are typically applied.
Although STDs are logical targets for examining the role of human behavior in a modeling framework, personal actions are important for other infectious diseases as well. The rapidity with which individuals reduce their contact rate with others during an outbreak of a highly transmissible disease can significantly affect the spread of the disease. Even small reductions in the contact rate can be important, especially for diseases like influenza or severe acute respiratory syndrome (SARS). However, this may also have an impact on policy planning for a biological attack with a disease such as smallpox.
Individual behavioral responses to interventions for non-sexually transmitted diseases are also important. For example, mass spraying to reduce malaria transmission can reduce the irritating effects of biting by nuisance mosquitoes and so lead to reduced personal use of bednets. Economic epidemiology strives to incorporate these types of behavior responses into epidemiological models to enhance a model’s utility in evaluating control measures.
Immunization represents a classic case of a social dilemma: a conflict of interest between the private gains of individuals and the collective gains of a society, and prevalence-dependent behavior may have significant impacts on vaccine policy formation. For instance, it was found in an analysis of the hypothetical introduction of a vaccine that would reduce (though not eliminate) the risk of contracting HIV, that individual levels of risk behavior were a significant barrier to eliminating HIV, as small changes in behavior could actually increase the incidence/prevalence of HIV, even if the vaccine were highly efficacious. These results, as well as others, may have contributed to a decision not to release existing semi-efficacious vaccines.
An individual's self-interest and choice often leads to a vaccination uptake rate less than the social optimum as individuals do not take into account the benefit to others. In addition, prevalence dependent behavior suggests how the introduction of a vaccine may affect the spread of a disease. As the prevalence of a disease increases, people will demand to be vaccinated. As prevalence decreases, however, the incentive, and thus demand, will slacken and allow the susceptible population to increase until the disease can reinvade. As long as a vaccine is not free, either monetarily or through true or even perceived side effects, demand will be insufficient to pay for the vaccine at some point, leaving some people unvaccinated. If the disease is contagious, it could then begin spreading again among non-vaccinated individuals. Thus, it is impossible to eradicate a vaccine-preventable disease through voluntary vaccination if people act in their own self-interest.
- d'Onofrio A, Manfredi P (2010). "Information-related changes in contact patterns may trigger oscillations in the endemic prevalence of infectious diseases". Journal of Theoretical Biology 256 (3): 473–478. doi:10.1016/j.jtbi.2008.10.005. PMID 18992258.
- Peltzman S (1975). "The effects of automobile safety regulation". Political Economy 83: 677–726. doi:10.1086/260352.
- Blower SM, McLean AR (1994). "Prophylactic vaccines, risk behavior change, and the probability of eradicating HIV in San Francisco". Science 265 (5177): 1451–1454. doi:10.1126/science.8073289. PMID 8073289.
- Blythe SP, Cooke KL, Castillo-Chavez C (1991). "Autonomous risk-behavior change, and non-linear incidence rate, in models of sexually transmitted diseases". Biometrics Unit Technical Report B-1048-M.
- Philipson, TJ; Posner, RA (1993). Private Choices and Public Health: The AIDS Epidemic in an Economic Perspective. Cambridge, MA: Harvard University Press.
- Klein E, Laxminarayan R, Smith DL, Gilligan CA (2007). "Economic incentives and mathematical models of disease". Environment and Development Economics 12: 707–732.
- Blower SM, Gershengorn HB, Grant RM (2000). "A tale of two futures: HIV and antiretroviral therapy in San Francisco". Science 287 (5453): 650–654. doi:10.1126/science.287.5453.650. PMID 10649998.
- Crepaz N, Hart T, Marks, G (2004). "Highly Active Antiretroviral Therapy and Sexual Risk Behavior: A Meta-analytic Review". JAMA 292 (2): 224–236. doi:10.1001/jama.292.2.224. PMID 15249572.
- Geoffard PY, Philipson T (1996). "Rational epidemics and their public control". International Economic Review 37 (3): 603–624. doi:10.2307/2527443. JSTOR 2527443.
- Del Valle S, Hethcote H, Hyman JM, Castillo-Chavez C (2005). "Effects of behavioral changes in a smallpox attack model". Mathematical Biosciences 195 (2): 228–251. doi:10.1016/j.mbs.2005.03.006. PMID 15913667.
- Anderson R, Hanson M (2005). "Potential public health impact of imperfect HIV type 1 vaccines". The Journal of Infectious Diseases 191: S85–S96. doi:10.1086/425267. PMID 15627235.
- Blower SM, Ma L, Farmer P, Koenig S (2003). "Predicting the impact of antiretrovirals in resource-poor settings: preventing HIV infections whilst controlling drug resistance". Current Drug Targets. Infectious Disorders 3 (4): 345–353. doi:10.2174/1568005033480999. PMID 14754434.
- Blower SM, Schwartz EJ, Mills J (2003). "Forecasting the future of HIV epidemics: the impact of antiretroviral therapies and imperfect vaccines". AIDS Reviews 5 (2): 113–125. PMID 12876900.
- Bogard E, Kuntz KM (2002). "The impact of a partially effective HIV vaccine on a population of intravenous drug users in Bangkok, Thailand: a dynamic model". Journal of Acquired Immune Deficiency Syndromes and Human Retrovirology 29: 132–141.
- Gray RH, Li X, Wawer MJ, Gange SJ, Serwadda D, Sewankambo NK, Moore R, Wabwire-Mangen F, Lutalo T, Quinn TC (2003). "Stochastic simulation of the impact of antiretroviral therapy andHIV vaccines onHIV transmission; Rakai, Uganda". AIDS 17 (13): 1941–1951. doi:10.1097/01.aids.0000076313.76477.fc. PMID 12960827.
- Hadeler KP, Castillo-Chavez C (1995). "A core group model for disease transmission". Mathematical Biosciences 128 (1-2): 41–55. doi:10.1016/0025-5564(94)00066-9. PMID 7606144.
- Smith RJ, Blower SM (2004). "Could disease-modifying HIV vaccines cause population-level perversity?". The Lancet Infectious Diseases 4 (10): 636–639. doi:10.1016/S1473-3099(04)01148-X. PMID 15451492.
- Auld MC (2003). "Choices, beliefs, and infectious disease dynamics". Journal of Health Economics 22 (3): 361–377. doi:10.1016/S0167-6296(02)00103-0. PMID 12683957.
- Bauch CT, Earn DJD (2004). "Vaccination and the theory of games". PNAS 101 (36): 13391–13394. doi:10.1073/pnas.0403823101. PMC 516577. PMID 15329411.
- d'Onofrio A, Manfredi P (2010). "Vaccine demand driven by vaccine side effects: Dynamic implications for SIR diseases". Journal of Theoretical Biology 264 (2): 237–252. doi:10.1016/j.jtbi.2010.02.007. PMID 20149801.
- Geoffard PY, Philipson T (American Economic Review). Disease eradication: private versus public vaccination 87. pp. 222–230.
- May SR (2000). "Simple rules with complex dynamics’". Science 287 (5453): 601–602. doi:10.1126/science.287.5453.601. PMID 10691541.
- Bauch CT, Galvani AP, Earn DJD (2004). "Group interest versus self-interest in smallpox vaccination policy". PNAS 100 (18): 10564–10567. doi:10.1073/pnas.1731324100. PMC 193525. PMID 12920181.
- Philipson, T. "Economic epidemiology and infectious disease". In Handbook of Health Economics. Edited by Cuyler AJ, Newhouse JP. Amsterdam: North Holland, 2000; volume 1, part 2, pages 1761–1799. doi:10.1016/S1574-0064(00)80046-3
- Philipson, Tomas J. "Economic epidemiology". New Palgrave Dictionary of Economics online. Palgrave Macmillan. Retrieved 1 January 2011.
- Gersovitz, M.; Hammer, J. S. (2003). "Infectious Diseases, Public Policy, and the Marriage of Economics and Epidemiology". The World Bank Research Observer 18: 129–157. doi:10.1093/wbro/lkg011.
- Sadique, M. Z. (2006). "Individual freedom versus collective responsibility: an economic epidemiology perspective". Emerging Themes in Epidemiology 3: 12. doi:10.1186/1742-7622-3-12. | <urn:uuid:d3e24b07-4acc-4f82-a3d0-fd2985d63473> | CC-MAIN-2014-10 | http://en.wikipedia.org/wiki/Economic_epidemiology | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678700738/warc/CC-MAIN-20140313024500-00026-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.819262 | 2,992 | 3.171875 | 3 |
The mantle is a part of a terrestrial planet or other rocky body large enough to have differentiation by density. The interior of the Earth, similar to the other terrestrial planets, is chemically divided into layers. The mantle is a highly viscous layer between the crust and the outer core. Earth's mantle is a rocky shell about 2,900 km (1,800 mi) thick that constitutes about 84% of Earth's volume. It is predominantly solid and encloses the hot core rich in iron and nickel, which occupies about 15% of Earth's volume. Past episodes of melting and volcanism at the shallower levels of the mantle have produced a thin crust of crystallized melt products near the surface, upon which we live. Information about structure and composition of the mantle either result from geophysical investigation or from direct geoscientific analyses on Earth mantle derived xenoliths.
Two main zones are distinguished in the upper mantle: the inner asthenosphere composed of plastic flowing rock about 200 km thick, and the lowermost part of the lithosphere composed of rigid rock about 50 to 120 km thick. A thin crust, the upper part of the lithosphere, surrounds the mantle and is about 5 to 75 km thick.
In some places under the ocean the mantle is actually exposed on the surface of the Earth. There are also a few places on land where mantle rock has been pushed to the surface by tectonic activity, most notably the Tablelands region of Gros Morne National Park in the Canadian province of Newfoundland and Labrador.
The mantle is divided into sections which are based upon results from seismology. These layers (and their depths) are the following: the upper mantle (starting at the Moho, or base of the crust around 7 to 35 km downward to 410 km), the transition zone (410–660 km), the lower mantle (660–2891 km), and anomalous core–mantle boundary with a variable thickness (on average ~200 km thick).
The top of the mantle is defined by a sudden increase in seismic velocity, which was first noted by Andrija Mohorovičić in 1909; this boundary is now referred to as the "Mohorovičić discontinuity" or "Moho". The uppermost mantle plus overlying crust are relatively rigid and form the lithosphere, an irregular layer with a maximum thickness of perhaps 200 km. Below the lithosphere the upper mantle becomes notably more plastic. In some regions below the lithosphere, the seismic velocity is reduced; this so-called low-velocity zone (LVZ) extends down to a depth of several hundred km. Inge Lehmann discovered a seismic discontinuity at about 220 km depth; although this discontinuity has been found in other studies, it is not known whether the discontinuity is ubiquitous. The transition zone is an area of great complexity; it physically separates the upper and lower mantle. Very little is known about the lower mantle apart from that it appears to be relatively seismically homogeneous. The D" layer at the core–mantle boundary separates the mantle from the core.
The mantle differs substantially from the crust in its mechanical properties which is the direct consequence of chemical composition change (expressed as different mineralogy). The distinction between crust and mantle is based on chemistry, rock types, rheology and seismic characteristics. The crust is a solidification product of mantle derived melts, expressed as various degrees of partial melting products during geologic time. Partial melting of mantle material is believed to cause incompatible elements to separate from the mantle, with less dense material floating upward through pore spaces, cracks, or fissures, that would subsequently cool and solidify at the surface. Typical mantle rocks have a higher magnesium to iron ratio and a smaller proportion of silicon and aluminium than the crust. This behavior is also predicted by experiments that partly melt rocks thought to be representative of Earth's mantle.
Mantle rocks shallower than about 410 km depth consist mostly of olivine, pyroxenes, spinel-structure minerals, and garnet; typical rock types are thought to be peridotite, dunite (olivine-rich peridotite), and eclogite. Between about 400 km and 650 km depth, olivine is not stable and is replaced by high pressure polymorphs with approximately the same composition: one polymorph is wadsleyite (also called beta-spinel type), and the other is ringwoodite (a mineral with the gamma-spinel structure). Below about 650 km, all of the minerals of the upper mantle begin to become unstable. The most abundant minerals present, the silicate perovskites, have structures (but not compositions) like that of the mineral perovskite followed by the magnesium/iron oxide ferropericlase. The changes in mineralogy at about 400 and 650 km yield distinctive signatures in seismic records of the Earth's interior, and like the moho, are readily detected using seismic waves. These changes in mineralogy may influence mantle convection, as they result in density changes and they may absorb or release latent heat as well as depress or elevate the depth of the polymorphic phase transitions for regions of different temperatures. The changes in mineralogy with depth have been investigated by laboratory experiments that duplicate high mantle pressures, such as those using the diamond anvil.
The inner core is solid, the outer core is liquid, and the mantle solid/plastic. This is because of the relative melting points of the different layers (nickel-iron core, silicate crust and mantle) and the increase in temperature and pressure as depth increases. At the surface both nickel-iron alloys and silicates are sufficiently cool to be solid. In the upper mantle, the silicates are generally solid (localised regions with small amounts of melt exist); however, as the upper mantle is both hot and under relatively little pressure, the rock in the upper mantle has a relatively low viscosity. In contrast, the lower mantle is under tremendous pressure and therefore has a higher viscosity than the upper mantle. The metallic nickel-iron outer core is liquid because of the high pressure and temperature. As the pressure exponentially increases, the nickel-iron inner core becomes solid because the melting point of iron increases dramatically at these high pressures.
In the mantle, temperatures range between 500 to 900 °C (932 to 1,652 °F) at the upper boundary with the crust; to over 4,000 °C (7,230 °F) at the boundary with the core. Although the higher temperatures far exceed the melting points of the mantle rocks at the surface (about 1200 °C for representative peridotite), the mantle is almost exclusively solid. The enormous lithostatic pressure exerted on the mantle prevents melting, because the temperature at which melting begins (the solidus) increases with pressure.
Because of the temperature difference between the Earth's surface and outer core and the ability of the crystalline rocks at high pressure and temperature to undergo slow, creeping, viscous-like deformation over millions of years, there is a convective material circulation in the mantle. Hot material upwells, while cooler (and heavier) material sinks downward. Downward motion of material occurs at convergent plate boundaries called subduction zones. Locations on the surface that lie over plumes are predicted to have high elevation (because of the buoyancy of the hotter, less-dense plume beneath) and to exhibit hot spot volcanism. The volcanism often attributed to deep mantle plumes is alternatively explained by passive extension of the crust, permitting magma to leak to the surface (the "Plate" hypothesis).
The convection of the Earth's mantle is a chaotic process (in the sense of fluid dynamics), which is thought to be an integral part of the motion of plates. Plate motion should not be confused with continental drift which applies purely to the movement of the crustal components of the continents. The movements of the lithosphere and the underlying mantle are coupled since descending lithosphere is an essential component of convection in the mantle. The observed continental drift is a complicated relationship between the forces causing oceanic lithosphere to sink and the movements within Earth's mantle.
Although there is a tendency to larger viscosity at greater depth, this relation is far from linear and shows layers with dramatically decreased viscosity, in particular in the upper mantle and at the boundary with the core. The mantle within about 200 km above the core-mantle boundary appears to have distinctly different seismic properties than the mantle at slightly shallower depths; this unusual mantle region just above the core is called D″ ("D double-prime"), a nomenclature introduced over 50 years ago by the geophysicist Keith Bullen. D″ may consist of material from subducted slabs that descended and came to rest at the core-mantle boundary and/or from a new mineral polymorph discovered in perovskite called post-perovskite.
Earthquakes at shallow depths are a result of stick-slip faulting; however, below about 50 km the hot, high pressure conditions ought to inhibit further seismicity. The mantle is considered to be viscous and incapable of brittle faulting. However, in subduction zones, earthquakes are observed down to 670 km. A number of mechanisms have been proposed to explain this phenomenon, including dehydration, thermal runaway, and phase change. The geothermal gradient can be lowered where cool material from the surface sinks downward, increasing the strength of the surrounding mantle, and allowing earthquakes to occur down to a depth of 400 km and 670 km.
The pressure at the bottom of the mantle is ~136 GPa (1.4 million atm). Pressure increases as depth increases, since the material beneath has to support the weight of all the material above it. The entire mantle, however, is thought to deform like a fluid on long timescales, with permanent plastic deformation accommodated by the movement of point, line, and/or planar defects through the solid crystals comprising the mantle. Estimates for the viscosity of the upper mantle range between 1019 and 1024 Pa·s, depending on depth, temperature, composition, state of stress, and numerous other factors. Thus, the upper mantle can only flow very slowly. However, when large forces are applied to the uppermost mantle it can become weaker, and this effect is thought to be important in allowing the formation of tectonic plate boundaries.
Exploration of the mantle is generally conducted at the seabed rather than on land because of the relative thinness of the oceanic crust as compared to the significantly thicker continental crust.
The first attempt at mantle exploration, known as Project Mohole, was abandoned in 1966 after repeated failures and cost over-runs. The deepest penetration was approximately 180 m (590 ft). In 2005 an oceanic borehole reached 1,416 metres (4,646 ft) below the sea floor from the ocean drilling vessel JOIDES Resolution.
On 5 March 2007, a team of scientists on board the RRS James Cook embarked on a voyage to an area of the Atlantic seafloor where the mantle lies exposed without any crust covering, mid-way between the Cape Verde Islands and the Caribbean Sea. The exposed site lies approximately three kilometres beneath the ocean surface and covers thousands of square kilometres. A relatively difficult attempt to retrieve samples from the Earth's mantle was scheduled for later in 2007. The Chikyu Hakken mission attempted to use the Japanese vessel 'Chikyu' to drill up to 7,000 m (23,000 ft) below the seabed. This is nearly three times as deep as preceding oceanic drillings.
A novel method of exploring the uppermost few hundred kilometres of the Earth was recently proposed, consisting of a small, dense, heat-generating probe which melts its way down through the crust and mantle while its position and progress are tracked by acoustic signals generated in the rocks. The probe consists of an outer sphere of tungsten about one metre in diameter with a cobalt-60 interior acting as a radioactive heat source. It was calculated that such a probe will reach the oceanic Moho in less than 6 months and attain minimum depths of well over 100 km in a few decades beneath both oceanic and continental lithosphere.
Exploration can also be aided through computer simulations of the evolution of the mantle. In 2009, a supercomputer application provided new insight into the distribution of mineral deposits, especially isotopes of iron, from when the mantle developed 4.5 billion years ago.
See also
- Core–mantle boundary
- Mohorovičić discontinuity
- Lehmann discontinuity
- Post-perovskite phase transition
- Mantle convection
- Mesosphere (mantle)
- Mantle xenoliths
- Mantle: Schlumberger Oilfield Glossary. Glossary.oilfield.slb.com. Retrieved on 2013-05-11.
- Robertson, Eugene (2007). "The interior of the earth". USGS. Retrieved 2009-01-06.
- Core: Schlumberger Oilfield Glossary. Glossary.oilfield.slb.com. Retrieved on 2013-05-11.
- "The structure of the Earth". Moorland School. 2005. Retrieved 2007-12-26.
- Asthenosphere: Schlumberger Oilfield Glossary. Glossary.oilfield.slb.com. Retrieved on 2013-05-11.
- Lithosphere: Schlumberger Oilfield Glossary. Glossary.oilfield.slb.com. Retrieved on 2013-05-11.
- Crust: Schlumberger Oilfield Glossary. Glossary.oilfield.slb.com. Retrieved on 2013-05-11.
- Mission to Study Earth's Gaping 'Open Wound'. LiveScience. Retrieved on 2013-05-11.
- The location of the base of the crust varies from approximately 10 to 70 kilometers. Oceanic crust is generally less than 10 kilometers thick. "Standard" continental crust is around 35 kilometers thick, and the large crustal root under the Tibetan Plateau is approximately 70 kilometers thick.
- Alden, Andrew (2007). "Today's Mantle: a guided tour". About.com. Retrieved 2007-12-25.
- The Mantle. mediatheek.thinkquest.nl (2000)
- Burns, Roger George (1993). Mineralogical Applications of Crystal Field Theory. Cambridge University Press. p. 354. ISBN 0-521-43077-1. Retrieved 2007-12-26.
- "Istria on the Internet – Prominent Istrians – Andrija Mohorovicic". 2007. Retrieved 2007-12-25.
- Carlowicz, Michael (2005). "Inge Lehmann biography". American Geophysical Union, Washington, D.C. Archived from the original on 2007-09-30. Retrieved 2007-12-25.
- Anderson, Don L. (2007) New Theory of the Earth. Cambridge University Press. ISBN 978-0-521-84959-3, ISBN 0-521-84959-4
- Alden, Andrew. "The Big Squeeze: Into the Mantle". About.com. Retrieved 2007-12-25.
- [email protected]. Retrieved 2007-12-26.
- Louie, J. (1996). "Earth's Interior". University of Nevada, Reno. Retrieved 2007-12-24.
- Foulger, G.R. (2010). Plates vs. Plumes: A Geological Controversy. Wiley-Blackwell. ISBN 978-1-4051-6148-0.
- Walzer, Uwe; Hendel, Roland and Baumgardner, John. Mantle Viscosity and the Thickness of the Convective Downwellings. igw.uni-jena.de
- Alden, Andrew. "The End of D-Double-Prime Time?". About.com. Retrieved 2007-12-25.
- Than, Ker (2007-03-01). "Scientists to study gash on Atlantic seafloor". Msnbc.com. Retrieved 2008-03-16. "A team of scientists will embark on a voyage next week to study an “open wound” on the Atlantic seafloor where the Earth’s deep interior lies exposed without any crust covering."
- "Earth's Crust Missing In Mid-Atlantic". Science Daily. 2007-03-02. Retrieved 2008-03-16. "Cardiff University scientists will shortly set sail (March 5) to investigate a startling discovery in the depths of the Atlantic."
- "Japan hopes to predict 'Big One' with journey to center of Earth". PhysOrg.com. 2005-12-15. Archived from the original on 2005-12-19. Retrieved 2008-03-16. "An ambitious Japanese-led project to dig deeper into the Earth's surface than ever before will be a breakthrough in detecting earthquakes including Tokyo's dreaded "Big One," officials said Thursday."
- Ojovan M.I., Gibb F.G.F., Poluektov P.P., Emets E.P. 2005. Probing of the interior layers of the Earth with self-sinking capsules. Atomic Energy, 99, 556–562
- Ojovan M.I., Gibb F.G.F. "Exploring the Earth’s Crust and Mantle Using Self-Descending, Radiation-Heated, Probes and Acoustic Emission Monitoring". Chapter 7. In: Nuclear Waste Research: Siting, Technology and Treatment, ISBN 978-1-60456-184-5, Editor: Arnold P. Lattefer, Nova Science Publishers, Inc. 2008
- University of California – Davis (2009-06-15). Super-computer Provides First Glimpse Of Earth's Early Magma Interior. ScienceDaily. Retrieved on 2009-06-16.
Further reading
- Don L. Anderson, Theory of the Earth, Blackwell (1989), is a textbook dealing with the Earth's interior and is now available on the web. Retrieved 2007-12-23.
- Jeanloz, Raymond (2000). "Mantle of the Earth". In Haraldur Sigurdsson, Bruce Houghton, Hazel Rymer, John Stix, Steve McNutt. Encyclopedia of Volcanoes. San Diego: Academic Press. pp. 41–54. ISBN 978-0-12-643140-7. Retrieved 2010-05-17.
- Nixon, Peter H. (1987). Mantle xenoliths: J. Wiley & Sons, 844p., (ISBN 0-471-91209-3).
- The Biggest Dig: Japan builds a ship to drill to the earth's mantle – Scientific American Magazine (September 2005)
- Information on the Mohole Project | <urn:uuid:406651e6-92e9-450d-9a98-eeebd4f19b00> | CC-MAIN-2013-20 | http://en.wikipedia.org/wiki/Mantle_(geology) | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383218/warc/CC-MAIN-20130516092623-00000-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.883689 | 3,930 | 4.5 | 4 |
- To protect effectively the mountain environment, its flora, fauna and natural resources.
- To reduce the negative impact of man’s activities. To respect the cultural heritage and dignity of local populations.
- To stimulate activities which restore and rehabilitate the mountain environment.
- To encourage contact between mountaineers of different countries through friendship, mutual respect and peace.
- To spread information and knowledge in order to improve man’s relationship with the environment.
- To use only resources which respect the energy needs of the environment and the elimination of waste products.
- To support mountain countries by way of development with a view to environmental conservation.
- To expand access to mountainous regions without difficulties of a political nature. | <urn:uuid:a18b9281-8fa5-4a09-8181-37e8d4a57185> | CC-MAIN-2020-05 | http://www.leschevaliersduvent.fr/english/kathmandu-declaration/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589861.0/warc/CC-MAIN-20200117152059-20200117180059-00267.warc.gz | en | 0.88701 | 149 | 3.09375 | 3 |
Spiders are a high-interest theme at any time of year. They can be a good theme for children who are frightened of spiders, and they can be a good theme for spider lovers. They fit well with a study of animals … perfect for differentiating between arachnids and insects. And they’re an especially good theme for Halloween.
Montessori-Inspired Printables at Living Montessori Now
My daughter, Christina (a former Montessori child), and I are partnering to bring you a series of Montessori-inspired printables. The printables are typically themed and use a number of Montessori principles (although you don’t need to be a Montessori teacher or homeschooler to use them):
- They use isolation of quality.
- They use photographs or realistic images to emphasize reality. Whenever I can, I’ll tell you the name of the object or animal featured. If you look at the credits pages, you’ll notice the tarantula is a Mexican redknee tarantula, and the spider is a jumping spider. Yes, a tarantula is a spider, too, but we gave it a separate printable because it’s so distinctive (and perfect for Halloween)!
- They typically use traditional Montessori colors such as red for consonants and blue for vowels.
- They use lowercase letters, which are what we introduce letter sounds with in Montessori education. (Children tend to pick up the uppercase letters without being introduced if they’re introduced to the lowercase letter sounds.)
- They often feature themed printable versions of Montessori materials.
Free Tarantula Do-a-Dot Printable for the Letter T and Free Spider Do-a-Dot Printable for the Letter S
To download tarantula do-a-dot printable, click here and then click on the file image in the upper right corner of the PDF to save to your computer (just choose where you want it saved).
To download spider do-a-dot printable, click here and then click on the file image in the upper right corner of the PDF to save to your computer (just choose where you want it saved).
Montessori-Inspired Activities Using the Tarantula and Spider Do-a-Dot Printables
Disclosure: This post contains affiliate links (at no cost to you).
Tarantula Do-a-Dot Letter T Tray with Glass Gems and Strawberry Huller
Glass gems are always popular with preschoolers. This is a fun activity for tarantula lovers, but it’s also a fun Halloween activity. That’s why I chose the Mexican redknee tarantula with its coloring that’s perfect for Halloween.
You could add a tracing activity to the printable. If you laminate your printable, you can use an erasable crayon like the Melissa & Doug Learning Mat Crayons or Crayola Erasable Crayons. For a 2-year-old or other young preschooler who’s not ready to write letters, you can just leave off the crayons.
Spider Do-a-Dot Letter S Tray with Glass Gems and Strawberry Huller
Zoey’s a bit apprehensive about spiders, but she had fun using a strawberry huller to place black glass gems on the dots.
(Note: In case you’re wondering, Zoey’s outfit is from Gymboree!)
If you want to know how to introduce the letter sounds for t and s, check out my post on how to teach letter sounds using Montessori principles.
More Spider Posts
Free Halloween Unit Study
- Spooky Footprint Haunted House Craft from Play Dough & Popsicles
- Halloween Number Game from Adventures of Adam
- Halloween Tree | A Fall Nature Craft for Kids from FrogMom
- Halloween Movies Not Scary from iGameMom
- Monster Learning Activities for Halloween from Books and Giggles
- Halloween Board Books from The Jenny Evolution
- Halloween Read and Play from My Storytime Corner
- Free Tarantula and Spider Do-a-Dot Printables (Montessori-Inspired Instant Downloads) from Living Montessori Now
- Halloween Preschool Printables from Living life and learning
- Gross and Jiggly Halloween Jello Worms: A STEM Activity for Kids from Schooling a Monkey
- Gruesome Nibbles from Tales of Education at Home
- Halloween Phonics Worksheet -Color by Letter from Mrs. Karle’s Sight and Sound Reading
- Pumpkin fairy house from The Usual Mayhem
- Halloween Chemistry Ideas from Planet Smarty Pants
HALLOWEEN POSTS AT LIVING MONTESSORI NOW + HALLOWEEN PINTEREST BOARD
- Montessori-Inspired Pumpkin Activities
- Homeschool Halloween
- Montessori-Inspired Pumpkin Unit
- 25+ Montessori-Inspired Halloween Activities
- Halloween Grace and Courtesy
- Montessori-Inspired Friendly Ghost Activities
- Montessori-Inspired Halloween Activities
- Montessori-Inspired Skeleton Activities
- Free Spider Printables and Montessori-Inspired Spider Activities
- 20 Pumpkin Phonics Activities
- Free Halloween Songs and Rhymes for Circle Time
- Halloween Activities for Montessori-Inspired Themes and Parties
- Montessori-Inspired Pumpkin Hammering for Toddlers
- 20+ Pumpkin Hammering Activities for Preschooler
- Free Skeleton Printables and Montessori-Inspired Skeleton Activities
- Free Spider Printables and Montessori-Inspired Spider Math Activities
- Kids’ Halloween Activities Pinterest Board
Montessori-Inspired Packs – Subscriber Freebies
Don’t miss our themed monthly packs! You’ll get the link and password for the Living Montessori Now subscriber library with the current pack and all the past monthly packs if you subscribe to the Living Montessori Now weekly newsletter!
Free Do-a-Dot Printables and Ideas for Using Them
I love the versatility of do-a-dot printables! If you’re doing a month-long theme, you could easily change out the type of do-a-dot activity weekly to add interest. Here are four ideas of hands-on activities for any of our do-a-dot printables from my frog do-a-dot printable post (see post for details and materials used).
Just click on an image to go to the post with the related free printable!
Note: I’ve arranged the following gallery in alphabetical order, although some posts have two do-a-dot printables (and two different letters). Also, I don’t introduce letters in alphabetical order. You can find out the order in which I introduce letter sounds here. I deviate from that order for our unit studies, though, and focus on a letter that’s simply related to our unit. That’s in addition to our other letter work.
Learn more about my eBook Montessori at Home or School: How to. Teach Grace and Courtesy!
If this is your first time visiting Living Montessori Now, welcome! If you haven’t already, please join us on our Living Montessori Now Facebook page where you’ll find a Free Printable of the Day and lots of inspiration and ideas for parenting and teaching! And please follow me on Pinterest (lots of Montessori-, holiday-, and theme-related boards), and Twitter. You can find me on bloglovin’, Instagram, and YouTube, too.
And don’t forget one of the best ways to follow me by signing up for my weekly newsletter. You’ll receive some awesome freebies in the process! | <urn:uuid:e698c6ea-84f5-40bd-98df-f2ca1a57803c> | CC-MAIN-2020-16 | https://livingmontessorinow.com/free-tarantula-spider-dot-printables-montessori-inspired-instant-downloads/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510846.12/warc/CC-MAIN-20200403092656-20200403122656-00194.warc.gz | en | 0.831206 | 1,654 | 3.015625 | 3 |
As an Alaskan child, visiting Florida for the first time when I was 17, mangroves were a fuzzy concept, loosely associated with swamps, alligators, and primordial ooze, and definitely NOT somewhere that I was looking forward to snorkeling. But, once I plunged off the side of the boat and under the two-foot thick opaque layer of vivid green algae, I was entranced by the fairy-tale scene of colorful sponges, tunicates, bryozoans and fishes. The trip was quite educational- I learned that mangroves do not , in fact, produce mangos, and informed that these plants are not one thing, but actually many different (and sometimes unrelated) species. A ‘mangrove’ is like a ‘tree’; it is plant with a special lifestyle, a lifestyle involving lots of salty water and a nice hot climate.
Fast forward ten years, and I am now learning that mangroves are a favored friend of biogeographers. For one, miniature mangrove islands played host to one of the founding experiments in the field of island biogeography. But, more directly, the bull’s-eye of mangrove diversity hovering over southeast Asia was a long-time poster child for the notion that the location where a group of species originates is the location where they eventually reach their highest diversity. How scientists eventually pieced together the evidence to show that the global distribution of mangrove diversity did not result from dispersion out of an east-Asian center of origin, is a classic saga of vicariance versus dispersal (read about it here).
Which finally brings me to today’s mangrove mystery- a story of vicariance and dispersal played out on a smaller stage, around the peninsula formed by Myanmar, Thailand, and Malaysia. During the most recent glaciation, when lots of water was locked up in polar icecaps, the Malay Peninsula was much larger and divided many mangrove species into two separate populations on its eastern and western sides. Individuals descended from each of these population centers now have different sets of genes (this is vicariance). Since we don’t have a historical record from 18,000 years ago, scientists have to think backwards- from the observation that mangroves growing on the east and west sides of the Malay Peninsula have two different sets of genes- to the inference that these two groups were once separated.
A group of scientists who study mangrove genetics set out to document whether a particular species of mangrove (Rhizophora mucronata) also showed evidence of having been historically divided. After sampling trees from all over the peninsula and nearby Sumatra, they did find two distinct groups, but these groups weren’t located where the scientists expected them to be. Instead of eastern and western populations being different, mangroves living on both the eastern and western sides of the peninsula were similar and only a few populations in the west around the Andaman Sea comprised a second group. Even more oddly, this distribution did not adhere to another proposed hypothesis predicting that individuals living closer together should have more similar genes.
What could be going on? To find the answer, the researchers had to look at a map of how water flowed around the peninsula. They discovered that ocean currents prevent water from the Andaman Sea from mixing with strait and South China Sea. Mangroves live on land, but their biology and dispersal are influenced by the ocean, especially for this particular species whose large seeds can probably float much farther than other species. While the currents could transport seeds from the eastern group all around the South China Sea and into the Malacca Strait, the movement of the water also prevented these seeds from making it into the Andaman Sea. So, the working hypothesis is that at some point in the past (maybe during the last glaciation) two groups of this mangrove species were separated and the genetic differences they developed are still maintained because ocean currents keep the two groups from mixing. Yet, the mystery of the Malaysian mangroves isn’t completely solved. The scientist still can’t explain exactly how the two groups arose in the first place.
What we learn from this research is that geography affects species’ genetics. Given enough time and the right circumstances these differences can result in the evolution of new species. Biogeographers typically think that distance and barriers are the two main features of geography that affect evolution and tend to view geological features as their chief determinants. Ocean currents add another layer of complexity, and beg the question ‘what other processes that operate over a shorter time-scale can influence species genetics?’ Where in the terrestrial realm are the analog of ocean currents?
You can find this article at:
Wee A.K.S., Takayama K., Asakawa T., Thompson B., Onrizal , Sungkaew S., Tung N.X., Nazre M., Soe K.K. & Tan H.T.W. & (2014). Oceanic currents, not land masses, maintain the genetic structure of the mangrove Rhizophora mucronata Lam (Rhizophoraceae) in Southeast Asia , Journal of Biogeography, DOI: 10.1111/jbi.12263 | <urn:uuid:940cc198-fc17-4622-935e-6d32a80cebd5> | CC-MAIN-2014-23 | http://biogeobits.blogspot.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877693.48/warc/CC-MAIN-20140722025757-00138-ip-10-33-131-23.ec2.internal.warc.gz | en | 0.954469 | 1,096 | 3.453125 | 3 |
Tuilaepa Sailele Malielegaoi, Prime Minister of Samoa, stressed that the magnitude of today’s threats required holistic solutions taken through a multilateral approach. Nations of the world needed to coordinate with each other as tackling current challenges was a shared responsibility. A vibrant institution was required to meet those challenges, one which was equal to the task and could respond to the imperatives of our time. “The United Nations provides the only viable framework and legitimate authority to act globally to address issues that transcend national borders,” he declared. The Organization needed to pay heed to its ability to offer itself as a “safe place,” not just for its traditional stakeholders — Member States — but also for international organizations, the business community and civil society.
The United Nations, however, was not without its shortcomings and it was crucial that the Organization’s role be constantly refined and adapted to respond to the world’s needs. Samoa had consistently supported a Security Council expansion in both permanent and non-permanent memberships. Economic and political liberalization over the past two decades had changed the contemporary geopolitical realities and landscape, thus enlarging the 15-member body in both categories was “essential for true multilateralism and for the Council’s integrity and credibility”, he noted, adding that ongoing reform of the General Assembly was equally vital.
Climate change and its impacts held dire implications for global peace and security. It threatened to intensify existing drivers of conflict in a way that could roll back development across many countries. While a new climate change instrument was currently under negotiation, progress had been “painfully slow”, contradicting the gravity of the problem. Vested national interests had taken precedence over concern for a global and just solution. A privileged few — with fortunate geographies and resource endowments — may have felt that they could afford to wait out negotiations on a legally-binding climate change agreement. Island nations at the frontline of climate change’s destructive impacts had no such luxury.
Any new climate change treaty, he said, would be ineffectual without full membership and participation of all United Nations Member States, especially those obligated to do so. The much publicized “fast track” funding announced in Copenhagen to meet the most vulnerable countries’ adaptation needs had become a “best kept secret”. Information on how much of the pledges had been honoured, disbursed and to whom had been scarce. When available, such information was often vague and bereft of coordination. In that regard, he called for the fast track resources to be made available without delay with clear, simplified guidelines to ensure that intended recipients could access assistance.
Continuing, he urged State parties to commit to reaching an agreement in Cancun founded on the Bali Action Plan. “We cannot afford to leave Cancun empty-handed. Concrete results must be achieved,” he said. Turning to global security, he noted that terrorism was a mutual area of concern, which demanded a collective response. On other matters, he said the United Nations should continue to prioritize the non-proliferation of weapons of mass destruction, as well as the risk of their acquisition by terrorists and other criminals. Nuclear terrorism was of the most challenging threats to international peace and security. Samoa believed that the only absolute guarantee against the use or threat of use of nuclear weapons was their “total elimination”.
In that light, his country welcomed the announcement that the United States was moving towards ratification of the Pacific region’s Nuclear Free Zone Treaty. Furthermore, it welcomed the recent United States brokered initiative for direct negotiations between Israel and Palestine to advance the two-State solution. He drew attention to the upcoming one year anniversary of a tsunami which had devastated his country, noting that stability had been re-established despite the heavy loss of life, injury and destruction of property. It was through the generous support of development partners that Samoa’s reconstruction phase was progressing well. | <urn:uuid:c7e7892a-132f-4d4b-9409-15e54c0f0b35> | CC-MAIN-2020-16 | https://gadebate.un.org/en/65/samoa | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494064.21/warc/CC-MAIN-20200329074745-20200329104745-00090.warc.gz | en | 0.972481 | 817 | 2.828125 | 3 |
This section is devoted to assisting a public child welfare agency successfully embed communications into their agency, providing guidance for the implementation of the communications plan and addressing the basics needed to be successful. It also illustrates the role of communications within an agency and how the agency can foster relationships and engage members of the community to join in efforts that support its mission.
As discussed in other sections, effective, two-way communications is vital to the success of any public child welfare agency. Whether communicating with the youth and families receiving services, caregivers, staff, media, policymakers, the courts, allied professionals, contracted providers or other stakeholders, the agency must be able to clearly explain its mission and goals and respond to inquiries in a candid and open way in order to build support and meet its objectives. Because communications is such an important part of the agency’s work, it is equally important that at least one person in the agency be charged with the function of coordinating the agency’s communications efforts. In addition, every agency, big or small, needs a communications plan (even a simple one) for everyday operations, as well as a plan that will guide the agency through times of crisis.The Resource Library is a virtual database containing resources created by the CEEWB, as well as links to outside resources such as mainstream media articles and reports, research studies, policy and issue briefs, peer-reviewed articles, data sets, toolkits, and more related to workforce engagement issues, from a range of sources. The views expressed in materials by outside sources do not necessarily reflect the views of the Center for Employment & Economic Well-Being or the American Public Human Services Association.
Discusses crafting and disseminating agency messages; identifying roles for management, staff and external stakeholders; and identifying when and how to communicate a communications strategy.
Discusses organizational capacities and resources, as well as low or no cost communications strategies.
External Factors Influencing Communications
Offers techniques for handling external factors that may hinder communications efforts and capitalizing onto external factors that enhance communications.
Confidentiality Considerations and Challenges To Transparency
Discusses the tension between confidentiality concerns and desire for greater agency transparency.
Branding and Social Marketing
Discusses agency image and utilization of commercial marketing and communications techniques to public child welfare. | <urn:uuid:a751cf2f-da92-425c-8ca5-60b84c3aa7a3> | CC-MAIN-2017-30 | http://local.aphsa.org/content/APHSA/en/pathways/Positioning-Public-Child-Welfare-Guidance-PPCWG/Communications/Implementation.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426693.21/warc/CC-MAIN-20170727002123-20170727022123-00296.warc.gz | en | 0.925953 | 460 | 2.53125 | 3 |
“Why did we wait so long to do something as simple as protecting the health of our families and our community?”
This is what people have wondered in cities across the country that decided to ban the use of gas-powered leaf blowers in their neighborhoods.
No doubt you’ve been talking on the phone, working, or just reading at home when the whining, revving noise of a leaf blower disturbed the peace. You can’t even escape it indoors—it penetrates walls and gets inside your head, interrupting your work and your kids’ homework, raising the levels of stress hormones of everyone and creating a host of negative health and environmental effects.
And when one leaf blower finally stops wailing, it’s only a matter of time before another one revs up nearby.
“Why did we tolerate these machines for so long?”
Not everything that’s annoying or polluting should be banned, but you’d be hard pressed to invent a machine that does so much harm to so many people across a neighborhood for so little benefit.
Besides disturbing the peace, leaf blowers contribute to health conditions like asthma, high blood pressure, compromised immune systems, hearing loss, heart disease, and more. And often, the workers tasked with operating these machines have the least access to health care and are exposed repeatedly and directly, for hours each day, when rakes and brooms are nearly as efficient, and battery leaf blowers are now as capable as–and cheaper to operate than–gas ones.
Environmentally, the gas blowers are the worst of the worst. Most have two-stroke engines, burning the oil they use, sending toxic air across the neighborhood, where it lingers for days. Edmunds, the automotive information website, determined two-stroke leaf blowers put out far more smog, hydrocarbons, and other harmful pollutants than even the biggest, baddest Ford V8 truck. The two-stroke leaf blower put out the same amount of hydrocarbons in a half hour as the Ford truck would driving from northern Texas all the way to Anchorage, Alaska.
And then—there’s climate change. As if the incessant noise and serious health effects weren’t bad enough, leaf blowers directly emit greenhouse gases and exacerbate climate change, threatening the lives and livelihoods of future generations—and our own.
We’re all eating all these costs, every day, for the dubious benefit of pushing dirt and leaves around. Brooms, rakes, and if necessary, electric blowers can do the same job without the massive costs.
We can live in a cleaner and healthier community by supporting the ban on leaf blowers in the city of Santa Cruz.
When it passes, and we’re enjoying cleaner air and newfound peace in our yards, gardens, and homes, we’ll all wonder, “Why did we wait so long?”
The Santa Cruz Coalition for a Healthy and Safe Environment (C.H.A.S.E.) is beginning a new push to convince the city council to finally ban gas-powered leaf blowers. You can help restore peace and clean air by contacting city council members to let them know you support the ban on leaf blowers, and joining our campaign. | <urn:uuid:96a4bb6f-60a0-4653-bda0-1fa125f0ebf2> | CC-MAIN-2023-40 | https://chasesantacruz.org/its-time-to-ban-leaf-blowers-in-santa-cruz | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00435.warc.gz | en | 0.934103 | 686 | 2.625 | 3 |
You must have heard innumerable times that the combination of talented teachers and high-quality technology, used in the right ways is all that’s required to exhilarate classroom experience of students and the teachers as well.
Most importantly, edtech is an important characteristic of 21st Century pedagogy and learning because it has the ability to empower the whole experience.
Technology based teaching methods and resources can effectively engage students and build their skills. But because, technology is still a new concept for the teachers and they are still calibrating themselves to the new style and models of pedagogy, therefore many educators encounter difficulties when using technology in the classroom. Considering this, we bring to you some helpful classroom hacks for the teachers to make their job both easy and fun.
1. Uses of Modern Technology in Classroom Teaching: Technology in Education
One of the most important aspects of education these days is the technology that is in place in a classroom and so, learn from expert Mark Valenti on how to use technology in classroom teaching. This video should help you gather enough confidence about using technology in teaching, as, it isn’t complex a task at all.
2. 50+ ways to use technology in the Classroom
The videos mentioned below is nothing short of a complete package, considering the fact that Vicki Davis, the Cool Cat Teacher shares with the fellow teachers on how to use technology in the classroom. This video should further boost your level of confidence in using different type of handy tools in pedagogy.
3. Assessment with Technology
We all know how important assessment is for the teachers. And in this regard, when technology is brought in the process, carrying forward any type of assessment say- pre-assessment, formative assessment and summative assessment becomes a lot easier and less time consuming. Check the video below to learn how technology can do the tricks!
4. Teaching Effectively Using Instructional Technology
In this video, you will find Lola Eniola Adefeso, Associate Professor in Chemical Engineering explaining on how she makes use of tablet PC and Clickers in a large lecture course. Using technology in the pedagogy empowers teachers. It helps the teachers in making their lecture sessions engaging for the students and which is why students pay complete attention to what is taught to them in the classroom.
5. Creating Google Classroom for Teachers
Google for education has created a very powerful tool for the teachers and learners. Using this tool, teachers will find that it really streamlines assignments, boosts collaboration between a teacher and the learner, fosters seamless communication and makes teaching the digital age more productive and meaningful.
The video below will help you to create a Google Classroom teachers account and also make best use of all the features available in the tool. The top four videos must have given you a lot of confidence in using instructional technology in the classroom and the video below is yet another positive back up for you in this line.
We hope you will find the list of videos mentioned above useful. Given the fact that you already have sound pedagogical knowledge, now it is just the time to integrate your technology skills with it and make teaching worthwhile for the students. There is absolutely nothing to fear and it’s all a matter of practice which you need to keep in mind as far as making use of technology in pedagogy is concerned.
Do you think likewise? | <urn:uuid:a40a5a6c-1e9e-49b7-b22a-84b45a0339b5> | CC-MAIN-2020-05 | https://edtechreview.in/trends-insights/insights/3300-videos-on-classroom-hacks-make-teachers-job-fun-easy | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610919.33/warc/CC-MAIN-20200123131001-20200123160001-00538.warc.gz | en | 0.947535 | 692 | 3.625 | 4 |
As an avid Food Network fan, particularly of the show Chopped, I have been intrigued by the ingredients that chefs must work with in each mystery basket. On a recent episode, Peach Palm Fruit was one such item.
The ingredient was packed in a jar with liquid; however, as I scrutinized it really carefully, it looked very familiar. As a matter of fact, I was convinced that it was a fruit that I enjoyed as a child that would be picked from a palm, not unlike some palm trees seen around the Virgin Islands.
The fruit would be boiled in salted water and when cooked and then cooled, we would peel off the outer covering and chow down on the savory orange flesh surrounding the seed. After we had eaten off all the flesh, which could sometimes be stringy, we would crack open the seeds to find the “coconut” inside. This was such a treat.
As it turns out I was correct. Peach Palm Fruit is what I call Peewah. So I started thinking about how many fruits, and produce in general, grown in the territory are called different names depending on where we first encounter them.
So here goes….this is a photographic column that will hopefully also be interactive. Look carefully to see if you recognize the fruit in the photos and if the names are unfamiliar. I encourage your feedback. Do you know Peach Palm Fruit or Peewah and, if so, how have you used it?
Next up is a fruit that is coming into season right now and other than eating them right out of their shell-like covering, few other uses come to mind, although recently I experimented successfully with creating a jelly and an exotic syrup. Known as kenep or genip in the Virgin Islands, I grew up calling them chennette. This season, because of the low rainfall, the fruits are so small that we can’t help but wonder whether there will be any pulp on the seeds.
Carambola is a prolific crop whenever the trees are bearing. And they deliver more than one crop a year. My name for this fruit is five finger. I guess the five ridges that form the fruit lent its name, but it is also called starfruit.
This becomes a little confusing because a fruit I know as caimite is also called starfruit. When it is sliced in half, there is a star-shaped pattern in the center. A ripe caimite is sweet and a little milky.
Sour cherries that are stewed and turned into a sweet treat for children and adults alike were known to me as cerise which is the French word for cherry, but they are also called jimbelin. In addition to the syrupy sweet confection, they are also eaten with salt and pepper sprinkled over the fruit for a spicy condiment.
Another fruit that I loved as a child is known to me as dongs, although I have heard them referred to as pommeserette and jojo. When really ripe, the flesh of this fruit becomes sweet and somewhat slippery and as such was often referred to by a very off-putting name, snatty nose.
On St. Thomas there is a tree adjacent to the eastern end of the Frenchtown ballpark. When in season very few people seem interested, so most of the fruit ends up on the ground unused.
Do you know these fruits? Do you know a different name for any of them? If so, please share. You may contact me at [email protected]
June Archibald owns and operates Precious Produce Farms on St. Thomas and its subsidiary Virgin Islands Fruit Preserves. | <urn:uuid:43e2a28d-c580-4bfe-aa40-5d9ecd83a869> | CC-MAIN-2017-39 | http://visourcearchives.com/content/2012/07/18/junes-viewsfrom-farm/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691977.66/warc/CC-MAIN-20170925145232-20170925165232-00170.warc.gz | en | 0.979717 | 757 | 2.59375 | 3 |
Today the earth is endangered by global warming with the rise in pollution. The solar energy has come to us as our saviour. The environmentalist’s continuous hard work has paid off. As of now the solar energy is considered to be useful and the best kind of renewable energy that we have. Solar energy has provided us the viable option when the need of energy that has grown. Solar power not only saves our planet from global warming but it also is economical.
India is a tropical country where the sun remains bright and hot throughout the day. On an average India receives sunlight for almost 300 days per year which roughly translates to 3000 hours of sunshine in a year. The use of solar energy is not limited to light but also for water heating. Water heating consumes lots of energy and is not limited to houses but it is also used by many industries and manufacturers.
There are many projects that have come up for tapping solar energy in India, few of them are :
- World’s biggest rooftop solar plant in Punjab,
- World’s 1st solar powered airport in Kerala,
- India 1st solar powered village Dharnai and much more.
Lack of power paralyzes the growth. Still, some villages in India are devoid of electricity. Dharnai was one of them a few years back. Dharnai is the village that falls in the state of Bihar in India. Though the electricity was initially provided by the state government but improper planning and lack of infrastructure made the people of Dharnai village suffer. The diesel generators were available but they were out of the reach due to the high cost of affordability.
The people of Dharnai suffered without electricity for almost 33 years. It was then the two NGO’s – BASIX and CEED (Centre for Environment and Energy development) along with the Greenpeace took the resourcefulness to bring the solar power to this village, Dharnai. The result was the beginning of Dharnai village to step into light after years of darkness and sufferings. It is Dharnai village which is credited for being the 1st village of India to be completely powered by the solar energy.
The solar power revolutionized the lives of the Dharnai villagers. The outcome of solar power was the generation of 100 Kilowatt of energy that was enough to provide the much-needed power. Two schools, 50 commercial establishments, around 2400 residence, street lights, tube wells for farmers, and a health centre were powered and brought to life. And. this was not all, the provision of battery backup was provided to glide smoothly over cloudy days. The result was obvious, 24 x 7 power availability. The solar power affected the lives of all the Dharnai village residents for good.
Only two years have passed since the solar power started operating but they are enough to change the dynamics of the Dharnai village. Everything looks bright for Dharnai starting from health, financial stability and moving towards entertainment. Dharnai has prospered in every sphere. From years of darkness, rural inscription and illiteracy the Dharnai village seems to have moved ahead towards future and is enjoying the life in top gear.
You may also like to Read : | <urn:uuid:a1289c56-8ec6-422c-b6f4-69662f4f0746> | CC-MAIN-2020-10 | https://amazingindiablog.in/dharnai-indias-first-fully-solar-powered-village/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145897.19/warc/CC-MAIN-20200224040929-20200224070929-00293.warc.gz | en | 0.979475 | 656 | 3.25 | 3 |
Program Goals and Objectives
Pharmacy-Based Immunization Delivery is an innovative and interactive practice-based educational program that provides pharmacists with the skills necessary to become primary sources for vaccine advocacy, education, and administration. The program reviews the basics of immunology, identifies legal and regulatory issues pharmacists must consider before starting an immunization program, and focuses on practice implementation.
The purpose of this educational program is to:
- Provide comprehensive immunization education and training.
- Provide pharmacists with the knowledge, skills, and resources necessary to establish and promote a successful immunization service.
- Teach pharmacists to identify at-risk patient populations needing immunizations.
- Teach pharmacists to administer immunizations in compliance with legal and regulatory standards.
Pharmacy-Based Immunization Delivery is conducted in two parts: the self-study and the live training. To earn a Certificate of Achievement, participants must complete all components of the program including the self-study, the self-study assessment, the Pharmacy-Based Immunization Delivery live training seminar, the final examination, and the injection technique assessment.
Self-Study Description and Learning Objectives
The first part - the online self-study learning modules - is meant to ensure that all participants have an understanding of vaccine-preventable diseases and the role of pharmacists as vaccine advocates and administrators. There are five learning modules that present in-depth information on immunology, practice implementation, and legal and regulatory issues as noted below, with appropriate references to the Centers for Disease Control and Prevention (CDC) resource publication, Epidemiology and Prevention of Vaccine-Preventable Disease. The self-study program includes a self-assessment test and real-life case studies that are designed to help reinforce and evaluate participants’ understanding of key information and concepts.
- Module 1 – Pharmacists as Vaccine Advocates discusses the pharmacist as a vaccine advocate. After completion of this activity, participants will be able to:
- Describe the current status of vaccine-preventable diseases in the United States and the effects of immunizations on morbidity and mortality rates.
- Identify potential opportunities for pharmacists to become involved in immunization delivery and explain the advantages of pharmacy-based immunization programs.
- List key resources available for immunization providers and educators.
- Compare available resources of immunization information and identify resources of particular value to the pharmacist’s own practice site.
- Module 2 – Immunology reviews the basic concepts of immunology and the role of vaccines in eliciting an immune response. After completion of this activity, participants will be able to:
- Identify the differences between active and passive immunity.
- Explain how vaccines elicit an immune response and provide protection from diseases.
- Describe the differences between live and inactivated vaccines.
- Classify the vaccines available on the U.S. market as live attenuated or inactivated.
- Module 3 – Vaccine-Preventable Diseases reviews key facts about vaccine-preventable diseases and the vaccines used for prevention. After completion of this activity, participants will be able to:
- Describe the clinical features and potential complications of vaccine-preventable diseases.
- List the vaccines available on the U.S. market for each vaccine-preventable disease.
- Identify the contraindications and precautions for the use of each vaccine.
- Recognize the target groups for vaccination based on the Advisory Committee for Immunization Practices (ACIP) recommendations.
- Review a patient’s medical and immunization history and determine vaccination needs based on the current ACIP recommendations.
- Outline an appropriate vaccination regimen for a patient, including the recommended schedule, dose, and route of administration.
- Educate patients about the possible adverse reactions following receipt of a vaccine.
- Module 4 – Implementing an Immunization Practice discusses establishing a pharmacy-based immunization program. After the completion of this activity, participants will be able to:
- Investigate the legal, regulatory, and liability issues involved in offering a pharmacy-based immunization program.
- Explain the federal Vaccine Injury Compensation Program and recall the requirements of this program.
- Describe Occupational Safety and Health Administration (OSHA) regulations designed to prevent employees’ exposure to bloodborne pathogens and needlestick injury at worksites where immunizations are given.
- Outline the principles and procedures for vaccine storage and handling.
- Identify potential options for obtaining reimbursement for vaccines and vaccine administration.
- Identify marketing strategies that can be used to promote a pharmacy-based immunization service.
- Module 5 – Administering Vaccines focuses on the clinical decision-making process for identifying people who need protection through vaccination, including how to find them, how to assess them, and how to immunize them. After the completion of this module, participants will be able to:
- List methods to identify patients who are at highest risk of vaccine-preventable illness.
- Review a patient case and identify that patient’s vaccine needs using the appropriate immunization schedule.
- Recall recommended patient screening questions for vaccination and identify valid contraindications for vaccinations.
- List five key factors that influence patients when making vaccination decisions.
- Identify common myths about vaccines and outline the facts that dispel these myths.
- Describe the requirements for providing Vaccine Information Statements to patients.
- Discuss the rationale for timing of vaccine administration and intervals between doses, including vaccine-vaccine spacing and vaccine-antibody spacing.
- Explain appropriate techniques for administration of vaccines by the intramuscular, subcutaneous, and intranasal routes.
- Describe the signs and symptoms of adverse reactions to vaccines and the emergency procedures that immunizing pharmacists should follow in the event of an adverse reaction.
Live Training Seminar Description and Learning Objectives
The second part of the program—the live training seminar—provides an active learning experience that focuses on pharmacy practice implementation. The live training seminar is based on the experience of practitioners involved in immunization advocacy and administration. The training seminar reinforces and expands on the self-study program and addresses areas such as immunization needs, legal and regulatory issues, and injection-technique training. Participants will be expected to practice giving intramuscular and subcutaneous injections.
After completing the live training seminar, participants will be able to:
- Identify opportunities for pharmacists to become involved in immunization delivery.
- Describe how vaccines evoke an immune response and provide immunity.
- Identify the vaccines available on the U.S. market for each vaccine-preventable disease and classify each vaccine as live attenuated or inactivated.
- Evaluate a patient’s medical and immunization history and determine in the patient falls into the target groups for each vaccine based on the Advisory Committee for Immunization Practices (ACIP) recommendations.
- Review a patient case and determine patient-specific vaccine recommendations based on the appropriate immunization schedule.
- Discuss the legal, regulatory, and liability issues involved with pharmacy-based immunization programs.
- Describe the signs and symptoms of adverse reactions that can occur after vaccination
- Describe the emergency procedures for management of patients with adverse reactions to vaccination.
- List the steps for appropriate intranasal administration technique for the live attenuated influenza vaccine.
- Demonstrate appropriate intramuscular and subcutaneous injection technique for adult immunization.
Certificate Training Program Completion Requirements
To earn a Continuing Pharmacy Education (CPE) Credit and/or a Certificate of Achievement, participants must meet all the following requirements:
- Read the self-study modules in their entirety and successfully complete the self-study assessment. A score of 70% or better is required. Participants may have a maximum of two attempts to achieve a passing score. Successful completion of the self-study component will result in 12.0 contact hours of continuing pharmacy education credits (1.2 CEU). ACPE UAN: 202-999-11-136-H01-P (Initial release date: 05/15/2011; expiration 05/15/2014)
- Attend a live training seminar offering and successfully complete the open-book final exam. A score of 70% or better is required. Participants may have a maximum of two attempts to achieve a passing score.
- Demonstrate competency in one subcutaneous and two intramuscular injections as assessed by the activity faculty during the live training seminar.
- Successful completion of both final exam and injection assessment will result in 8.0 contact hours of continuing pharmacy education credit (0.80 CEU).
ACPE UAN: 202-999-11-135-L01-P
Please Note CPR Requirement: All participants are strongly encouraged to obtain cardiopulmonary resuscitation (CPR) or basic cardiac life support (BCLS) certification. However, certification is not a prerequisite of the program. A Certificate of Achievement is awarded to participants who successfully complete all program requirements. The Certificate of Achievement is invalid, however, without written proof of current CPR or BCLS certification. | <urn:uuid:b5e05193-86b3-47f7-8fae-a4b733eafca4> | CC-MAIN-2014-23 | http://www.cpha.com/CE-Events/Certificate-Programs/Immunization-Certificate-Program | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510266597.23/warc/CC-MAIN-20140728011746-00343-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.876471 | 1,895 | 2.53125 | 3 |
Collective responsibility and Ministers 5.22 The principle of collective responsibility underpins the system of Cabinet government. It reflects democratic principle: the House expresses its confidence in the collective whole of government, rather than in individual Ministers. Similarly, the Governor-General, in acting on ministerial advice, needs to be confident that individual Ministers represent official government policy. In all areas of their work, therefore, Ministers represent and implement government policy. 5.23 Acceptance of ministerial office means accepting collective responsibility. Issues are often debated vigorously within the confidential setting of Cabinet meetings, although consensus is usually reached and votes are rarely taken. Once Cabinet makes a decision, Ministers must support it (except as provided in paragraphs 5.25 - 5.27), regardless of their personal views and whether or not they were at the meeting concerned
2. To avoid any doubt, collective Cabinet responsibility applies to Ministers outside Cabinet (Cabinet Manual 2008):
2.27 Ministers outside Cabinet have full legal powers as Ministers, and may be appointed to full portfolios. They have the same role, duties, and responsibilities as Ministers inside Cabinet, and are also bound by the principle of collective responsibility. (See paragraphs 5.22 - 5.28.) They do not attend Cabinet, but, with the agreement of the Prime Minister, may attend for particular items relating to their portfolio interests. They are usually members of one or more committees, attending other committees where relevant.
3. The only exception to this principle is "agree to disagree" regime implemented in the recent era of coalition government. The exception is, however, narrow and is not a blank cheque for Ministers from coalition parties to dissent at will (Cabinet Manual 2008):
5.25 Coalition governments may also decide to establish "agree to disagree" processes, which may allow Ministers within the coalition to maintain, in public, different party positions on particular issues or policies. Once the final outcome of any "agree to disagree" issue or policy has been determined (either at the Cabinet level or through some other agreed process), Ministers must implement the resulting decision or legislation, regardless of their position throughout the decision-making process. 5.26 "Agree to disagree" processes may only be used in relation to different party positions within a coalition. Any public dissociation from Cabinet decisions by individual Ministers outside the agreed processes is unacceptable. 5.27 Ministers outside Cabinet from parliamentary parties supporting the government may be bound by collective responsibility only in relation to their particular portfolios. Under these arrangements, when such Ministers speak about issues within their portfolios, they speak for the government and as part of the government. When they speak about matters outside their portfolios, however, they may speak as political party leaders or members of Parliament rather than as Ministers, and do not necessarily represent the government position. When such Ministers represent the government internationally, they speak for the government on all issues that foreign governments may raise with them in their capacity as Ministers.
4. The Maori Party and the National Party have adopted "agree to disagree" processes in their confidence and supply agreement (Relationship and Confidence and Supply Agreement between the National Party and the Māori Party):
Collective Responsibility The Māori Party agree to be bound by collective responsibility in relation to their Ministerial portfolios and their Associate Minister responsibilities. When the Māori Party Ministers speak about issues within their portfolios and Associate Minister responsibilities, they will speak for the government and as part of the government, representing the government’s position in relation to these responsibilities. When they speak about matters outside these responsibilities, however, they speak as the Co-Leaders of the Māori Party or as members of Parliament. The “agree to disagree” provisions apply as necessary. They will support the government’s position on all matters that are the subject of confidence and supply votes.
5. While the Maori Party and ministers from the Māori Party may be entitled to adopt different party positions on matters that are not matters of confidence and supply, ministerial dissent on matters within portfolios is expressly excluded. 6. In my view, the issue of Māori representation on the super Auckland Council is a matter which falls within Pita Sharples' Māori Affairs portfolio, for a number of reasons: (a) First, he said on the radio it did. He said he raised the issue in his capacity as Minister of Māori Affairs:
I have voiced my displeasure at the taking away of those seats. And I've done so as the Minister of Māori Affairs because I have a responsibility to represent the views of Māori people, and Auckland Maori including the mana whenua have made that very clear to me.
(b) Secondly, although the super Auckland Council proposal is principally being promoted by the Minister of Local Government, it's fair to say the question of Maori representation falls squarely within the rubric of "Māori Affairs". By defintion, the portfolio is panoptic (cf many commentators conceptualisation of the Foreign Affairs portfolio when agree to disagee issues arose during the term of the previous government).
(c) Thirdly. the Minister's own Ministry states that such matters fall within its responsibility. In its statement of the portfolio responsibilities provided by Te Puni Kokiri to the Minister of Māori Affairs, amongst other things, it notes that "managing and advising on Crown-Māori relationships at the national and local level" as one of the Ministry's "core functions". (d) Fourthly, the Minister of Māori Affairs is charged with some express, albeit indirect, statutory responsibility in relation to the reorganisation of local authorities and governance arrangements. Under section 33(2) of the Local Government Act 2002, one member of the Local Government Commission (which is the body responsible for these matters) is appointed by the Minister of Local Government only after consultation with the Minister of Māori Affairs.
There may be other indicia that support this view. I recognise, thouhg, that some might argue the portfolio responsibilities could be drawn narrower. But I think that's gilding the lily somewhat, especially as the Minister himself has admitted that it falls within his portfolio responsibilities. The upshot of this is that Pita Sharples, as Minister of Māori Affairs, has expressed dissent on a matter within the rubric of his portfolio, in breach of the agree to disagree provisions and the Cabinet Manual. Further, the Minister was quite candid in recounting discussions he had with the Prime Minister and Minister of Local Government about the matter. Again, very problematic. Teamed with the "unanimity" limb of the principle collective responsibility is the "confidentiality" limb of the same principle. Although the Cabinet Manual provisions are aimed at confidentially about Cabinet discussions, the reality of the present arrangements probably means it extends more broadly to cover similar discussions between Ministers. In any event, this is expressly reinforced by the Māori Party's confidence and supply arrangement (Relationship and Confidence and Supply Agreement between the National Party and the Māori Party):
Confidentiality It is agreed that where briefings are provided to the Māori Party, or where the Maori Party is involved in a consultative arrangement with regard to legislation, policy or budgetary matters, all such discussions shall be confidential unless otherwise agreed.
Disclosure of those discussions would therefore seem to breach that commitment and amount to a breach of the confidence and supply agreement. Now, I have some sympathy for Pita Sharples - the summary rejection of Māori representation seems reactionary and rank. And I don't quibble with the belief that the Māori Party representatives need to champion the views of Māori on this issue. But, the role of minister comes - along with power - with responsibility and constraints; the most notable constraint is collective responsibility. The Māori Party bought into these obligations when they accepted the Ministerial warrants. If they want to operate as an opposition party and be free to criticise and condemn government initiatives as they relate to Māori, then perhaps they ought not to have accepted the responsibilities of office. And as a final note, I believe the Prime Minister has previously indicated he would hold his Ministers to a higher standard and would not tolerate breaches of the Cabinet Manual. Does this mean the Prime Minister is now obliged to ask Pita Sharples to resign as Minister of Māori Affairs? | <urn:uuid:c630eff7-9876-4eda-b171-53f9480e9f97> | CC-MAIN-2013-48 | http://www.laws179.co.nz/2009_04_01_archive.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163065002/warc/CC-MAIN-20131204131745-00049-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.968385 | 1,708 | 2.828125 | 3 |
Is iron deficiency fatal?
Yes - iron deficiency kills trees. Trees need iron to manufacture chlorophyll. When a tree lacks chlorophyll, it can't produce adequate energy via photosynthesis and the tree will begin to decline. Worse, a tree in decline is also more susceptible to other diseases and damage from insects.
We can help!
Arbor Aesthetics uses a macro injection system to flush iron (and/or manganese, depending on the species) directly through your tree's vascular system via injection sites at the root flare. These treatments are performed in the fall and can provide up to three years of green, happy leaves for your tree!
Amy Grewe, Certified Arborist & Co-Owner | <urn:uuid:bfdc5348-e0d7-4dc0-8adc-8540e55fafe8> | CC-MAIN-2020-16 | https://www.arboraesthetics.com/blog/archives/06-2019 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500331.13/warc/CC-MAIN-20200331053639-20200331083639-00020.warc.gz | en | 0.898325 | 147 | 3.078125 | 3 |
St. Joseph, who is the patron saint of the family, is celebrated at the Spring equinox and his day is a feast of bread. At one time,
the Feast of San Giuseppe, as he is called in Italy, was an Italian national holiday. St. Joseph's feast day is still celebrated with
families gathering together to create enormous buffets for neighbors and friends. The table is said to overflow with an abundance
of food that the Father of the Holy Family provides. The centerpiece of St. Joseph's Day festivities is an alter laid with fine linens
and decorated with flowers and decorative breads. In America, the festival is like a giant potluck dinner, but the dishes served are
similar to those eaten in Italy and are always meatless - from fried croquettes of fish, sardines, calamari, and shrimp to pasta with
Italy, a highlight of the meal is the special sweets that are prepared. Although the names and shapes of these hot delicate fritters
differ from region to region, they are as much associated with St. Joseph's Day as turkey is to Thanksgiving. They are usually
called zeppole or frittelle; other names are cassatedde, sfinci, or bigne. The pastries may be fried or baked and are sometimes
based on flour.
1 cup water
3 tablespoons butter
1/2 teaspoon sugar
Pinch of salt
1 cup flour
1/4 cup sugar
2 tablespoons cornstarch
1 cup whole milk
2 egg yolks
1/2 tablespoon dark rum
1 teaspoon grated orange zest
1 teaspoon vanilla extract
3/4 cup heavy cream, whipped
Confectioners' sugar for dusting
To make the pastry:
Preheat oven to 375 degrees F. Line a baking sheet with parchment paper.
In a medium saucepan, combine water, butter, sugar, and salt. Bring to a
boil. Remove from heat. With a wooden spoon, beat in flour all at once.
Return to low heat. Continue beating until mixture forms a ball and leaves
side of pan. Remove from heat. Beat in eggs, one at a time, beating hard
after each addition until smooth. Continue beating until dough is satiny and
breaks in strands. Allow the mixture to cool.
Transfer the dough to a pastry bag with a large star tip. For each pastry,
pipe a 2-1/2 -inch spiral with a raised outer wall on the baking sheet. Bake
for 25 to 30 minutes until golden brown. Remove and allow to cool before
To make the filling:
Combine sugar and cornstarch in a saucepan. In a bowl, whisk together
milk and egg yolks Whisk milk mixture into sugar mixture. Place the
saucepan over medium heat. Bring the mixture to a boil, whisking
constantly. Boil for 1 minute; remove from heat. Stir in rum, orange zest,
and vanilla. Transfer the pastry cream to a bowl. Place a piece of plastic
wrap directly on the surface. Allow to cool for 30 minutes and then
refrigerate until cold. Fold in the whipped cream.
To assemble the zeppole:
Cut the pastries in half horizontally. Transfer the filling mixture to a pastry
bag with a star tip. Pipe some of the filling onto the cut side of the bottom
half of each pastry. Place the top half of the pastry on the filling.
Pipe a small amount of the filling into the hole in the center of each pastry.
Place a maraschino cherry in the middle. Dust the pastries with | <urn:uuid:38d95f1c-e361-41be-a167-141dfc026095> | CC-MAIN-2014-23 | http://www.mangiabenepasta.com/stjoseph.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274866.27/warc/CC-MAIN-20140728011754-00212-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.915091 | 766 | 2.5625 | 3 |
National Geographic Daily News recently reported the landing of North America’s largest-ever blue catfish, weighing an incredible 143 pounds and measuring 57 inches. The fish caught in Virginia in late June broke the previous record for a blue catfish by 13 pounds.
National Geographic fellow Zeb Hogan said the blue is the largest catfish in North America, and that there is an unconfirmed report of one huge catfish weighing a whopping 315 pounds that was caught in 1866 in Portland, Missouri.
While this province isn’t home to blue catfish, it certainly has plenty of channel catfish, typically referred to as “Manitoba monsters.” In fact, the Red River, is continually referred to as the best spot in the world to catch whooper channel “cats.”
Peter Bennet, a writer for the popular angling magazine, Field & Stream, emphasized in an article that channel catfish weighing over 30 pounds are “routinely” caught in the Red River.
Keith “Catfish” Sutton, who has travelled the world to angle for monster catfish — thus his nickname — in his book, Catfish: Beyond the Basics, makes particular mention of the Red River as being the best location for catching huge channel cats, despite the fact that the world-record for the species is from the Santee-Cooper Reservoir in South Carolina, where a cat weighing 58 pounds was landed on July 7, 1964.
In 1996, In-Fishing Magazine dubbed the Red River, the “jewel in the Catfishing World Crown.” To commemorate the merit of such a title, the town of Selkirk erected a huge statue to Chuck the Catfish.
The present Manitoba channel “cat” — the affectionate name given to the rather grotesque-looking fish by angling enthusiasts — record was caught from the Red River by Robert Antonichuk on August 16, 1992, that measured 118.11 centimetres (46.5 inches). Before fish were only measured to qualify for master angler awards, the record weight for a channel catfish was 36.53 pounds, or 16.57 kilograms. It was caught by Horst Durhack Jr. from the Winnipeg River in 1989.
In the U.S., channel cats are common in many states, and are always one of the favoured food fish. On the other hand, Manitobans invariably cringe at the mere mention of turning the slime-covered lethally-barbed beasts into a savoury meal.
“Catfish and hush puppies, the delicious duo which combines the channel catfish dipped in corn meal and deep-fried, and a flavourful corn meal hot cake, has rapidly become a hallmark of the deep south,” according to the pamphlet, Hook n’ Cook, published by Manitoba Conservation Fisheries. “River rats along the Mississippi have long sworn by the cat for easy catchin’ and good eatin’ ... Catfish are catching on so fast in North America that supply cannot keep up with demand.” The species is so popular south of the border that they’re raised on fish farms — “catfish by the acre.”
With apologies to Manitoba Conservative, and despite the recipes provided, catfish may be a delicacy in the U.S., but they’re far from “catching on so fast” in Manitoba as an eating fish.
But that wasn’t always the case. Catfish were at one time a commercial species caught from Lake Winnipeg and the Red River for sale in Winnipeg and beyond. Fishmonger Louis Pruden in 1871 announced in an August 2 Manitoba Liberal advertisement that he had “made arrangements for supplying the inhabitants of Winnipeg with fresh Sturgeon, Jackfish, Catfish and Whitefish in their season.”
Advertisements in city newspapers from the late 1880s gave catfish the same prominence as pickerel (the name age-old Manitobans gave to what the Americans call walleye, which is, unfortunately, a name that is gaining more prominence as the province attempts to lure more anglers from the U.S. to our lakes and rivers), sauger, goldeye, jackfish (a traditional local name for northern pike), whitefish and sturgeon. They latter were over-fished to near extinction in the early 1900s, but are now making a comeback thanks to local conservationists, while the other species are thriving.
Interestingly, the Winnipeg Fish Company in 1907 had an exhibit of live fish found in Manitoba lakes and rivers, which included a sturgeon weighing 120 pounds, a size of fish that has today vanished from the province’s waterways. The Telegram of July 5, 1907, reported the huge fish, caught just north of Winnipeg in the Red River, had died, but was replaced by another sturgeon of equal size and weight for the exhibition.
“Yesterday,” proclaimed the May 17, 1906, Morning Telegram, “S. Sigurdson’s boat the Fern passed here (Winnipeg Beach) en route to Selkirk laden with catfish, the cargo weighing 6,800 pounds. This is one of the best catches on record and is the earliest in 30 years.” The catch was shipped from Selkirk to the Winnipeg markets.
With flesh ranging in colour from white to pink, a Winnipeg restaurant was rumoured in the 1890s to have even tried to pass off the channel catfish fillets it served as cut from Red River salmon.
While Manitobans love pan-fired pickerel, as well as smoked goldeye or baked whitefish, the same cannot be said for cats prepared in any manner for the table, despite the assurances from our American cousins that they’re finger lickin’ good.
Yet, angling for monster channel catfish in the Red River is an extremely popular pastime, and has been for well over a century. As far back as 1895, channel cats were reported as being “exceedingly abundant” in the Red River, attracting intrepid anglers to test their mettle against the fighting fish. A brief news item in 1891 reported that even 9 1/2-year-old “Little Miss Curry” of Winnipeg landed a 20-pound catfish from the Red River. The Telegram on May 17, 1906, said: “Catfish weighing 12 to 14 pounds are being landed from the Red River at the north end of the city. Some exciting tussles are witnessed in landing these fish.”
For local anglers, “tussles” with monster cats is the main attraction. Ictalalurus punctatus rafinesque is not your typical catfish as it has a sleek body filled with muscles that allows it to jump clear of the water when hooked.
The ugliness of the fish and the abundance of more glamourous species such as pickerel is probably why Manitobans turn their noses up at the mere mention of a catfish meal. But, Manitoba Conservation assures us its flesh is “succulent and sweet” when cooked, and that all that is is required for preparation “is to make a cut around the head, following the contours of the gill covers. Then, holding the fish firmly by the head pull the skin off with a pair of pliers. Cut out the portions of the fins then remove the head, tail and entrails,” and cut into fillets, roll in corn meal and then fry.
Catfish and hush puppies anyone? | <urn:uuid:560833e2-96d4-43df-a236-b831b358b1fe> | CC-MAIN-2020-24 | https://www.winnipegrealestatenews.com/publications/real-estate-news/1304 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347414057.54/warc/CC-MAIN-20200601040052-20200601070052-00333.warc.gz | en | 0.963301 | 1,585 | 2.640625 | 3 |
History of the Vikings
OF the Celtic lands Wales, the modern Wales, that is, without Strathclyde Wales in North Britain or West Wales (Cornwall), suffered not the least from the marauding vikings of the ninth and tenth centuries; for on their way to Ireland, whether Danes coming from the south or Norwegians from the north, Cambria lay open to their attack, and there can be little doubt that from Anglesey and from the monasteries and settlements of the north and south coasts the vikings took a full toll of life and plunder. Yet the records of the raids are scarce and there is no coherent history of viking Wales, the reason being that this is the Celtic country that most successfully withstood the attack of the Northmen in the early colonizing period, yielding less to them than did Scotland or Ireland, and showing to the invader a fiercer and a firmer front. Thus upon the first appearance of the vikings (they were Danes) in 795, when after ravages in England they came to Glamorganshire to lay that county waste with fire and sword, manfully rose the Cymry against them, routed them in battle, and, driving them back to the sea with heavy loss, saw them sail off to Ireland in search of an easier prey. And thereafter followed a period of peace, if the chronicles are to be trusted, until the '50s and '60s of the ninth century when Anglesey in the north and Gower in the south were attacked, though in Gower it is known that the Northmen, like the first viking invaders of South Wales, were repulsed.
That the foreigners made no permanent settlements of historical import in the south at this period when the Irish colonies were founded must be due to this resolute defence of the stalwart Cymry, and that they likewise failed to gain a lasting foothold in the north, so temptingly close to Ireland and to Man, may be owing in no small degree to the energy and example of a gallant Welshman, Rhodri Mawr, prince of Gwynedd, who, succeeding to the throne in 844, reigned until 878 and died as lord of the whole of North Wales. His best-known exploit in the wars with the vikings was the slaying of Orm (who perhaps gave his name to the Ormes Heads at
Llandudno), the leader of a great Danish invasion from Ireland that had been directed against Anglesey and that in 855 was terrorizing the mainland of North Wales. Yet though Rhodri was strong enough to prevent viking colonization of a serious kind, he was not always successful in his struggle with the Northmen inasmuch as a later viking attack in 877 forced him to take temporary refuge in Ireland.
It was not only the Irish vikings who menaced Wales, for in 876 came Ubbe, son of Ragnar Lodbrok, from Northumbria with his Danes to Pembroke, this just before the attack on Devonshire, and there put many of the Christian population to death; and Danes from England they were who in 894 plundered in North Wales (p. 244 ), and who in 896, upon the breakup of the force that had wintered at Bridgenorth, broke into and laid waste the south-eastern counties of the Principality. But more serious was an attack in 915 when a viking host from Brittany, after sailing into the estuary of the Severn, landed on the south coast of Wales and penetrated far inland to the neighbourhood of Hereford, capturing in their progress the Bishop of Llandaff whom they took as prisoner to their ships, later to be ransomed by Edward the Elder for 40 pounds. Yet they met with defeat, these vikings, at the hands of the men of Hereford, Gloucester, and the border towns, so that they turned away to attack the Devonshire coast, and then, by way of Pembroke, went off to Ireland.
In North Wales too, now that Rhodri Mawr was gone, the vikings appeared again, and there these Gaill from Ireland thirsted for a conquest of the land rather than for mere plunder, such an intending colonist being Ingimund who in 902, after a victory of the Irish over the Dublin settlers, crossed to Anglesey and there took land for himself and his followers. But in due course he was driven out of the island and next is heard of attacking Æthelfleda's newly repaired fortress of Chester. Thereafter Anglesey was left in peace until 915 when the Dublin Gaill once more attacked the island.
Yet there was no serious attempt to hold Anglesey as a Norse colony and a long period of respite from the viking raids followed. For this was a time when another great prince, much honoured of posterity, was already advancing to a fame and dominion such as few of the early kings in Wales enjoyed and to an authority that seems to have made his lands temporarily secure from foreign attack. Hywel dda (Howell the Good) was originally a king in Cardigan, but by the annexation of Pembroke about 920 he had become lord of all
south-west Wales and by 942 he had made himself master also of the north, overlord, indeed, of the whole Principality. Supreme over all Wales, founder of Welsh unity not less by his law-giving than by the strength of his arm, staunch friend of the English, Hywel made of Cambria a realm that only the rashest of adventurers dared attack, and so at this very period wherein vikings abroad were seeking land in which to settle rather than to plunder it could only have been by the peaceful admission of a few of them as well-disposed traders that the wandering Norsemen might hope for access into the stalwart kingdom of Wales.
But with Hywel's death in 950 his mighty kingdom collapsed, at once rent asunder by civil wars. And upon Wales thus weakened by internal strife the Gaill descended with a fury and persistence that makes the second half of the tenth century the period of the worst sufferings of the country at their hands. Four notable viking chiefs who plundered Wales in this half-century were Eric Bloodaxe, who twice raided Cambria, the great Orkney earl Turf-Einar, Olaf Tryggvason, future king of Norway, and Svein Forkbeard, the future conqueror of England, who after much victorious fighting in Wales was later captured and imprisoned by the Welsh. But most of the attacks came from the settlements near at hand in Ireland or in Man, and it was most of all upon Anglesey and Carnarvonshire in the north and upon Pembroke in the south that their onslaughts fell. Holyhead was plundered in 961, Towyn in Merioneth in 963, Penmon in Anglesey in 971 by Magnus Haraldsson of Man, and to Anglesey in 972 came Godfred Haraldsson (p. 310 ), his brother, who made himself master of the island. Not that he could have held it for long, for in 980 he returned, this time in league with a Welsh chieftain, to lay Mona waste anew and to march with fire and sword throughout the Lleyn peninsula of Carnarvon. In 982 this same prince of the Isles invaded Pembroke, and in 987 for the third time he turned against Anglesey, gaining a memorable victory over the Welsh in which he took two thousand prisoners. Next year his, or other, vikings despoiled five rich monasteries of the west and south coasts, and in 989 Maredudd ab Owain (986-999), King of Deheubarth and overlord of all Wales, paid to the foreigners a tribute of a penny per head to redeem the Welsh prisoners of the invaders. In 992, in the wars against the English, Maredudd bribed some of the Gaill into his own service, but here, as in Ireland, alliances of this kind were no guarantee of immunity from the attacks of other vikings. Thus on Ascension Day in 993 Anglesey was raided
once more, and in 999 most of the population of St. David's was either put to the sword or captured and its bishop murdered.
There cannot be much doubt that the period of the chief viking attack upon Wales, the half-century following the death of Hywel dda, must have witnessed something more than mere raid after raid, and it was at this time in all probability that many viking adventurers won some temporary power and status in the land, especially along the coast from Newport to Neath, in the Gower Peninsula and in Pembroke, where Scandinavian place-names are common. (1) Thus there is a King Sigferth, surely some Scandinavian Sigfrid, in Wales who with Welsh princes attested a charter of Eadred in 955, and it was not much later (960) that the Danish viking Palnatoki, on visiting Wales, found one Stefni, with a fosterson Björn and a daughter Alof, established there in possession of an estate of some size. (2) For in Ireland Celt and Northman were learning to live side by side in harmony, and it well may be that some Scandinavians, making their home in Wales, even in these days of frequent attack upon the Cymry, were allowed to settle down in unchallenged ownership of land, their presence perhaps attracting profitable visits to Welsh harbours of the trading-ships bound for Dublin and the Norse towns of Ireland. Indeed it was perhaps the busy Norse and Danish trade in the Bristol Channel preceding, or resulting from, this Scandinavian settlement upon its north coast that led to the development of such sea-ports as Cardiff and Swansea into towns of no small significance in the commercial system of the British Isles.
The viking attacks upon Wales continued in the first half of the eleventh century, and especially in the '30s and '40s the Northmen of Ireland and the Scottish Isles were still an ever-present danger to the Principality. Yet gradually conditions changed, for in Ireland the Gaill were already long-established and universally recognized members of the state, so that when Wales, later in the century, was in danger of English or Norman attack the Irish Gaill were as much the allies of the Cymry as were the native Irishmen themselves. Gruffydd ap Cynan, the king whose stormy and interrupted reign over Gwynedd lasted from 1075 to 1137,
1. There is no satisfactory evidence of vikings earlier established in Wales. Hring and Adils, kings in Bretland and vassals of Æthelstan who fought against their overlord at Brunanburh in 937 (Egils saga, LI, 4), were probably Welsh princes. Hring has not been identified, but Adils must have been Idwal, king of Gwynedd.
2. For an attempt to localize this in Pembroke, see Saga-book of Viking Club, III, 163.
was, in fact, brought up in the Scandinavian settlement at Dublin, and by the marriage of his father Cynan to the Dublin princess Ragnhild was great-grandson of Sigtryg of the Silken Beard, king of Dublin at the time of the Battle of Clontarf. Norsemen and Irishmen together fought for him at every one of his battles in Cambria, whether against Welsh usurper or Norman invader, and it was to the Irish Norse that he fled whenever, as often happened, he needed asylum or fresh recruits.
The Norse attacks, therefore, of this period, the second half of the century, were few in number and were made not so much by the Irish foreigners as by the turbulent vikings of the western isles. In the '70s, St. David's was pillaged twice, and Bangor once, by 'pagans' who came probably from the Nordreys or Sudreys, and, indeed, when in 1090 St. David's was sacked for a third time the chronicles expressly record that it was the doing of 'pagans of the Isles'. And so too from the north came the attack of King Magnus Barefoot of Norway in 1098 who in the course of an invasion of the western sea had reached Man and thence sailed south to Anglesey. He found the island to be in the hands of two Norman earls, Hugh of Chester and Hugh of Shrewsbury, and these he fought in the battle of 'Anglesey Sound' wherein Hugh of Shrewsbury fell and the Normans were put to flight. Thereat King Magnus made Anglesey his own, so says his saga, as far south as ever the kings of Norway of old had owned it, but his overlordship was of negligible import, his fleet sailing away almost immediately and leaving the island to the struggles between the English and the Welsh. Yet it is said that Magnus came a second time to Anglesey during a later raid upon the west in order to obtain timber for the rebuilding of three fortresses in Man that he himself had previously demolished. But this, it seems, was the last of the visits of hostile viking fleets to Wales, except for such minor attacks as those of the Orkney Svein, and Holdbodi of the Isles in the twelfth century. | <urn:uuid:ae12ae8c-c6a8-4ba6-9ab9-b0e2029d4721> | CC-MAIN-2013-48 | http://northvegr.org/secondary%20sources/germanic%20studies/a%20history%20of%20the%20vikings/070.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164641982/warc/CC-MAIN-20131204134401-00057-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.980237 | 2,841 | 3.109375 | 3 |
You’ve all seen it. Three days ago, you searched for something on Amazon – a pair of shoes, a book, a new electric toothbrush – and yesterday when you re-entered Amazon looking for something else, up popped an advertisement for the shoes. “Ah, Amazon has remembered what I was searching for,” you mutter. “I should clean out my cookies.” But then, today, while on a website unrelated to Amazon or shoes, up pops an ad for the same shoes but from a different supplier. “Whoa,” you say. “What’s happening here?”
Welcome to the Internet of Things, IoT.
Google defines the IoT as follows:
The Internet of Things (IoT) is an environment in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Basically, the IoT is a connection of all things that can connect together via the internet. When you pay by credit card for your groceries in the supermarket, the details of every item you have bought go to many different databases for analysis. The supermarket wants to know what you’ve bought so as to study buying trends and restock warehouses. The credit card company is logging your purchase to make sure you are not exceeding your limit but also to track a number of other things: how much you are spending in supermarkets, petrol stations, cinemas, newsagents, and so on. Wine merchants want to know what wines you bought, and thus did not buy, and how much you are drinking between consecutive purchases. The pharmaceutical companies are logging your purchase of pain killers and anti-histamines. The instore bakery is monitoring purchase of baked-in-store bread and adjusting their output accordingly. And so it goes on but it doesn’t stop there. Vast databases now exist that can be analysed right down to the individual level to determine who we are and how we live our lives. Anything that is connected to the internet is a data gatherer and data exchanger.
If you wear a Fitbit activity tracker, every time you walk by your laptop a Bluetooth connection is established and the data gathered by the tracker is uploaded to your Fitbit account – number of paces, average heart rate, blood pressure, body temperature and now, what food you’ve eaten, your weight, how much sleep you’ve had and there’s more to come with these types of wearable health monitors. All this information can and is forwarded to large databases that analyse the health features of a population – individual, local, regional, by country, by continent, world-wide. Personal information about you can be passed to your local surgery and hence down to your medical doctor. In fact, your medical doctor could also indirectly access your supermarket purchases of alcohol and tobacco and cross-correlate to spot a connection between your drinking or smoking habits and a recent rise in blood pressure, say.
If you are driving a car fitted with a satnav system, the unit knows where you are (down to a few metres), how fast you are driving, whether you are driving recklessly in a crowded city, how often you take a break during a long journey. If a data analyser discovers that you routinely break the speed limit or push through rush-hour congestion above the average speed of other cars in the neighbourhood, you may well find your insurance premium goes up next time your car insurance comes up for renewal. Your insurance company has figured out you are a high risk driver.
Anything that is connected to the internet (technically, has an IP address) is a source of data and software engineers have already figured out how to slice and dice the data. Your smart home, your connected car, your activity tracker, your browsing habits, your Apple watch, your smartphone, your webcam, your credit card swipe, … anything that connects.
This is the age of the Internet of Things, folks. Welcome and beware! This used to be the stuff of science fiction authors. Not any more. | <urn:uuid:99c4a4d4-8016-4faa-a64f-3162eb1d6835> | CC-MAIN-2017-26 | https://ben-bennetts.com/2015/09/20/welcome-to-the-iot/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00517.warc.gz | en | 0.951618 | 850 | 2.84375 | 3 |
Skip to 0 minutes and 5 secondsThe UK has voted to end its membership of the European Union. As a result, the UK will negotiate both its withdrawal from the EU and the new relationship that will replace it. The EU has an official process for an existing Member State to withdraw, which was introduced with the Treaty of Lisbon in 2009. This procedure is set out in Article 50 of the Treaty on European Union. It begins with the UK government notifying the European Council of its intention to leave. At some point afterwards, negotiations will begin to agree the withdrawal and the new relationship. The negotiations can last for up to two years.
Skip to 0 minutes and 37 secondsIf a deal is not reached by then, then the UK would leave the EU with no agreement. This two-year period can be extended if the UK and all the remaining Member States agree. Once complete, the agreement will be voted on by the Council of the European Union. It will also need the support of the European Parliament. It is unclear if or how the agreement will be approved in the UK - for instance, through a vote in Parliament or through another referendum. The UK will not take part in any Council meetings that discuss the EU's side of the negotiations. The UK's EU membership covers many different aspects, all of which will presumably need to be addressed in some way.
Skip to 1 minute and 13 secondsAs with any negotiation, political agreement and compromise will be essential. It is currently unclear what kind of relationship the UK will seek to replace its EU membership, or what the remaining EU members will be willing to agree. There is no precedent, so it is difficult to foresee how the process will run. Similarly, it's not known how long the negotiations will take. The question has been raised of when the announcement to trigger Article 50 will be made, or even if this process will be followed at all. However, it is relatively likely that the UK will follow the Article 50 procedure. Beyond these points, we know very little about the negotiations that will take place.
Skip to 1 minute and 50 secondsThe UK government, in representing the UK, will have an essential role in the process. It's not clear whether or to what extent the devolved institutions in Scotland, Wales and Northern Ireland would be involved in the negotiations. Since the UK has voted to leave, the renegotiation of its EU membership from before is now void. As it stands, none of the provisions in the renegotiation will be implemented. We'll have a better sense of the way forward once it becomes clear what sort of relationship the UK will look to establish with the EU instead of membership.
Basics: Next steps after the vote
Anthony Salamone sets out the process for the UK to withdraw from the the European Union.
(Videographer: Kara Johnston)
© The University of Edinburgh CC BY SA 2016 | <urn:uuid:ad32b0b0-dbbf-4261-87d9-79af5095ec23> | CC-MAIN-2020-16 | https://www.futurelearn.com/courses/eu-referendum/1/steps/95194 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371805747.72/warc/CC-MAIN-20200407183818-20200407214318-00482.warc.gz | en | 0.965941 | 582 | 2.828125 | 3 |
Start with an idea and a piece of paper, and you have the beginning of a book. Fold the paper in half. Then draw or write or create secret code or mark with musical symbols. It’s your idea, so express it in your own unique way.
Colored paper adds pizzazz! Don’t forget that paper has two sides. Be sure to remember the name of the author and illustrator.
Stories can be told in many ways, and the tale might change each time. Young children often like to make audio recordings of stories. Adults who want to help might also write down the words.
You’ll find a million ways to embellish and add to your books. Check back and we’ll look at a few of them here. | <urn:uuid:5df79c24-321a-4220-a7fc-4d6f658dd481> | CC-MAIN-2020-29 | https://lizmacklinbooks.com/2020/03/20/everyone-can-make-a-book/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657169226.65/warc/CC-MAIN-20200716122414-20200716152414-00164.warc.gz | en | 0.949757 | 161 | 3.640625 | 4 |
SRA Imagine It! CCSS Teacher Resource
iOS iPad Education
Use this app as a digital alternative to the print SRA Imagine It! CCSS Teacher Resource Book. This resource will help SRA Imagine It! Reading and Language Arts teachers with lesson planning and with incorporating the Common Core State Standards into existing lessons.
It allows teachers to review the text complexities of each literature selection in SRA Imagine It! Each selection is rated with an overall text complexity rubric and individual criteria rubrics. This app also allows teachers to view key ideas and details about specific Common Core State Standards and provides a list of SRA Imagine It! resources that can be used to cover the standard and provide scaffolding for additional practice.
To learn more about the SRA Imagine It! Reading and Language Arts program visit www.ImagineItReading.com
* View overall and individual criteria Text Complexity ratings for each literature selection
* View details about specific Common Core State Standards that are most likely to pose difficulty for students
* Search by keyword for a specific reading selection or standard
* Capture your own notes on a specific reading selection or standard
* Bookmark your favorite or most used selection or standard for quicker access to information | <urn:uuid:9dedde09-cfcb-44a8-beca-a4659219c2d9> | CC-MAIN-2017-30 | http://appshopper.com/education/sra-imagine-it-ccss-teacher-resource | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424079.84/warc/CC-MAIN-20170722142728-20170722162728-00338.warc.gz | en | 0.862882 | 244 | 3.046875 | 3 |
An isogloss—also called a heterogloss (see Etymology below)—is the locative boundary of a certain linguistic feature, such as the pronunciation of a vowel, the meaning of a word, or use of some syntactic feature. Major dialects are typically demarcated by groups of isoglosses; for example the Benrath line distinguishes High German from the other West Germanic languages; and the La Spezia–Rimini Line divides the Northern Italian dialects from Central Italian dialects. However, an individual isogloss may or may not have any coincidence with a language border. For example, the front-rounding of /y/ cuts across France and Germany, while the /y/ is absent from Italian and Spanish words that are cognate with the /y/-containing French words.
One of the most well-known isoglosses is the centum-satem isogloss.
Similar to an isogloss, an isograph is a distinguishing feature of a writing system. Both concepts are also used in historical linguistics.
The Centum-Satem isogloss of the Indo-European language family relates to the different evolution of the dorsal consonants of Proto-Indo-European (PIE). In the standard reconstruction, three series of dorsals are recognised:
In some branches (for example Greek, Italic and Germanic), the palatals fell together with the velars: PIE *keup- "tremble (inwardly)" became Latin cupiō "desire" and *ḱm̥tom "hundred" became Latin centum (pronounced [kentum]); but *kʷo- "interrogative pronoun" became quō "how? where?". These branches are known as Centum branches, named after the Latin word for hundred.
In other branches (for example Balto-Slavic and Indo-Iranian), the labiovelars fell together with the velars: PIE *keup- became Vedic Sanskrit kopáyati "shaken" and *kʷo- became Avestan kō "who?"; but *ḱm̥tom became Avestan satəm. These branches are known as Satem branches, named after the Avestan word for hundred.
North-Midland isogloss (American English)
A major isogloss in American English has been identified as the North-Midland isogloss, which demarcates numerous linguistic features, including the Northern Cities vowel shift: regions north of the line (including Western New York; Cleveland, Ohio; lower Michigan; northern Illinois; and eastern Wisconsin) have the shift, while regions south of the line (including Pennsylvania, central and southern Ohio, and most of Indiana) do not.
||This section needs attention from an expert in Linguistics. (December 2009)|
A feature of the ancient Northwest Semitic languages is the following: w- > y- (w becomes y at the beginning of a word). Thus, in Proto-Semitic and subsequent non-Northwest Semitic languages and dialects, the root letters for a word for "child" were w-l-d. However, in the ancient Northwest Semitic languages, the word was y-l-d, that is, with w- > y-.
Similarly, Proto-Semitic ā (long a) becomes ō (long o) in the Canaanite dialects of Northwest Semitic. Note that within the Aramaic languages and dialects of Northwest Semitic, the historic ā is preserved. Thus, an ancient Northwest Semitic language in which historic ā becomes ō can be classed as part of the Canaanite branch of Northwest Semitic.
Such features can be used as data of fundamental importance for the purposes of linguistic classification.
For example, a distinguishing feature of the ancient Old Hebrew script (i.e., Iron Age Old Hebrew script) is the fact that the letters bet, dalet, 'ayin, and resh do not have an open head, while Aramaic of the same period has open-headed forms. Similarly, the bet of Old Hebrew has a distinctive stance (namely, leans to the right), while the bet of the Aramaic and Phoenician script series has a different stance (namely, both of these lean to the left).
Recently, Christopher Rollston has suggested using the term isograph to designate a feature of the script that distinguishes it from a related script series (e.g., a feature that distinguishes the script of Old Hebrew from Old Aramaic and Phoenician, etc.).
The term isogloss (Ancient Greek ἴσος ísos "equal, similar" and γλῶσσα glōssa "tongue, dialect, language") is inspired by contour lines or isopleths such as isobar. However, the isogloss separates rather than connects points of equal language. Consequently, it has been proposed that the term heterogloss (ἕτερος héteros "other") be used instead.
- Fortson IV, Benjamin W. (2004). Indo-European Language and Culture. Blackwell Publishing. pp. 52–54. ISBN 1-4051-0316-7.
- Rix, Helmut (2001). Lexikon der indogermanischen Verben. Dr. Ludwig Reichert Verlag. p. 359. ISBN 3-89500-219-4.
- Garr, W. Randall (2 June 2008). Dialect Geography of Syria-Palestine: 1000-586 BCE. Eisenbrauns. ISBN 1-57506-091-4.
- Daniels, Peter; Bright, William, eds. (8 February 1996). The World's Writing Systems. New York: Oxford University Press. ISBN 0-19-507993-0.
- Rollston, Christopher A. (2006). "Scribal Education in Ancient Israel: The Old Hebrew Epigraphic Evidence". Bulletin of the American Schools of Oriental Research 344: 47–74.
- Sihler, Andrew L. (2000). Language History. Current issues in linguistic theory 191. Amsterdam/Philadelphia: John Benjamins Publishing. p. 170. ISBN 90-272-3698-4.
- Chambers, J.K.; Trudgill, Peter (28 December 1998). Dialectology. Cambridge Textbooks in Linguistics (2nd ed.). Cambridge University Press. ISBN 0-521-59646-7.
- Woodard, Roger D. (31 May 2004). The Cambridge Encyclopedia of the World's Ancient Languages. New York: Cambridge University Press. ISBN 0-521-56256-2.
- An example of an isogloss in Southern England.
- Beyond the Isogloss: The Isograph in Dialect Topography: A discussion of the shortcomings and oversimplifications of using isoglosses.
- On Some Acoustic Correlates of Isoglossy: A humorous analysis of Russian isoglossy. | <urn:uuid:cf955988-2ddf-4866-973d-8d7d308386b6> | CC-MAIN-2014-10 | http://en.wikipedia.org/wiki/Isogloss | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021429299/warc/CC-MAIN-20140305121029-00018-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.840631 | 1,495 | 4.15625 | 4 |
Feb. 4, 2019Print | PDF
The bus is full but not crowded, with just one young woman standing. Still, when a man gets on, he deliberately stands too close to her and eventually touches her. A young man nearby hesitates. Should he say something? No, he decides, turning away from the woman’s clear discomfort and watching as she gets off the bus.
That’s one ending to the first of three videos that Eliana Barrios Suarez, associate professor of social work at Wilfrid Laurier University, developed with community partners as part of a project aimed at reducing gendered violence in the city of Ayacucho, a post-conflict community in Peru.
Fortunately, there’s another possible ending. The video returns to the moment of choice for the bystander, who decides he will intervene. This time, he loudly asks the man why he is touching the woman, which empowers the woman and others on the bus to confront the aggressor too.
“If you’re not part of the solution, you’re part of the problem,” the video’s tagline reads in Spanish. It’s the main message Suarez, her community partners and her primary research assistant, Laurier undergraduate student Andrea Morales, are trying to convey through their prevention program, called El que ve y ayuda/Rikuspa Yanapakuq, “Those Who See and Help” in Spanish and Quechua.
Ayacucho, in the Andes mountains of Peru, is a city of 175,000 with a high population of university students. During the 1980s and ‘90s, it was at the centre of armed conflict started by the Shining Path, a group known for its brutal violence as it fought to overthrow the government.
“In post-conflict communities, violence remains after the conflict ends and often starts to escalate in different ways,” says Suarez. “A culture of violence is difficult to change because to survive, some people may become desensitized. You get used to not looking at the bodies in the streets and even years later, that can extend to not noticing the assaults occurring around you.”
“A culture of violence is difficult to change because to survive, some people may become desensitized. You get used to not looking at the bodies in the streets and even years later, that can extend to not noticing the assaults occurring around you.” –Eliana Barrios Suarez
Suarez, a native of Peru, though not of the Ayacucho region, has been working with the local community for more than 10 years. While rates of violence against women are not necessarily higher than elsewhere in Peru or the rest of the world, “what’s different is that the community wants to do something about it,” says Suarez.
Working with Peruvian partners including Loyola Centre Ayacucho, a faith-based social justice organization, and faculty from San Cristóbal de Huamanga National University, as well as with Laurier faculty members Ginette Lafrenière and Jennifer Root, Suarez developed a sexual violence prevention program rooted in local traditions and concerns.
Suarez received $73,000 in funding for the project from the Social Sciences and Humanities Research Council of Canada (SSHRC), which allowed her to hire a Laurier research assistant as well as a field worker in Peru.
Morales was a second-year Global Studies and French student in the fall of 2016, when she heard a social work professor was looking for a Spanish-speaking assistant. Although Morales is also originally from Peru – she came to Canada with her family when she was nine – she didn’t know Suarez or what to expect of social work research.
A meeting with Suarez quickly convinced Morales that she wanted to get involved with the project.
“I’d taken a research methods class in Global Studies the year before and this was a great opportunity to not only see how research would work in practice, but to see it happen in my own country.” –Andrea Morales
“I’d taken a research methods class in Global Studies the year before and this was a great opportunity to not only see how research would work in practice, but to see it happen in my own country,” says Morales. “That it had to do with women’s rights, which is something I care a lot about, really drew me in too.”
In addition to assisting with research, translation, communications and logistics from Canada, Morales accompanied Suarez on two trips to Ayacucho, in 2017 and 2018. During the first trip, she helped survey community members and listened to their ideas and concerns. During the second trip, which was three weeks long, the team trained facilitators and rolled out the developed prevention training on a pilot basis.
Morales co-led some of the workshops with a local facilitator. Initially, it was nerve-wracking. She was born in Lima but hadn’t been to the Ayacucho region, one of the poorest in Peru, until her first research trip and was conscious of her different accent and lack of local knowledge.
Soon, however, the workshops became powerful vehicles for connection. Many participants shared personal experiences with sexual violence. Morales felt most people came away from the workshops with greater empathy for the victims of gendered violence and a new conviction that they should intervene as bystanders if it is safe do so. Those impressions were borne out by Suarez’s research.
“We found a significant change in attitudes in how workshop participants see sexual assault and in their intentions to step in and help,” says Suarez. “They see now these issues as a community problem and victims as possible members of their own families.”
“This is a community that has experienced so much violence in the past and now they want to prevent violence. It was a real privilege to help.” –Eliana Suarez
Morales, now in her final year of studies, says working on the project changed her for the better. Not only has she learned a lot about the research process, developed her presentation skills and formed a strong connection with her mentor, she has grown in confidence and adaptability.
“There were definitely times on the ground when things were changing so rapidly, we had to decide on the spot, ‘What do we do now?’ ‘How do we change this?’” says Morales, who is applying to master’s programs focused on international policy. “It taught me a lot about how to adapt and made me less scared about doing a major research project of my own.”
Suarez will be going back to Ayacucho this spring to wrap up her part of the project. The interdisciplinary project, however, will carry on. She’s handing it over to the local advisory committee, the Loyola Centre and San Cristóbal de Huamanga National University, all of which have started to carry out the training developed. More than 300 people have been trained to date, says Suarez.
Before she ends her involvement, Suarez plans to develop training modules adapted for specific groups, such as bus and taxi drivers’ associations, that have requested it. She is also planning to ensure project materials are translated to Quechua so the prevention training can be brought to surrounding rural areas where not everyone is fluent in Spanish.
“We are trying to transform something in the social context and I think it will work because it has been developed with and by the community, based on their particular needs,” says Suarez. “This is a community that has experienced so much violence in the past and now they want to prevent violence. It was a real privilege to help.”
We see you are accessing our website on IE8. We recommend you view in Chrome, Safari, Firefox or IE9+ instead.× | <urn:uuid:36e51715-6f9e-4b29-bed5-b6e1db67f284> | CC-MAIN-2020-29 | https://webctupdates.wlu.ca/news/spotlights/2019/feb/laurier-research-project-helping-prevent-sexual-violence-in-peru.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655919952.68/warc/CC-MAIN-20200711001811-20200711031811-00575.warc.gz | en | 0.971132 | 1,657 | 2.921875 | 3 |
M.A. in School and Public Librarianship
Special Educational Services/Instruction
College of Education
Holocaust memorials--United States; Museums and schools; Social sciences--Study and teaching
Library and Information Science
There are almost three hundred Holocaust museums/centers in the United States whose precise function is unclear. This study of 131 participants was concerned with what materials/resources were in their collection and what educational programs were offered. The electronic mail survey also asked: Who is able to use their collection? Who uses it most frequently? Where do they get funding? What is their main objective: preserve history or educate the public? The results showed that United States Holocaust museums/centers see themselves as responsible for education and furthering public understanding of the Holocaust. There are different angles future research about the relationship between libraries and museums/centers could take. While the Holocaust may be in the past, this study has shown that U. S. Holocaust museums/centers are destined to keep the memory of its victims alive and to continually educate the public, keeping it current history instead.
Peterson, Christie, "The educational role of United States Holocaust museums/centers" (2003). Theses and Dissertations. 1355. | <urn:uuid:80e1901e-d569-4191-bb94-2768fbc99999> | CC-MAIN-2023-23 | https://rdw.rowan.edu/etd/1355/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00026.warc.gz | en | 0.936988 | 329 | 2.5625 | 3 |
Learn how to add fractions with exceptional denominators, add and simplify fractions, or even add blended numbers. Get smooth-to-apprehend causes with actual-life examples. Master the skill of including fractions these days. Adding fractions can be daunting for plenty of college students, however, it shouldn’t be. In this article, we’ll ruin down the basics of including fractions, such as the way to upload bits with extraordinary denominators, add and simplify fractions, and even add blended numbers. With actual-existence examples and a conversational tone, you’ll be a pro at adding fractions in no time.
Why Adding Fractions Matters
Add fractions are a fundamental quantity-associated concept used in our regular workouts. We use divisions while estimating elements for a recipe, running out a tip, or identifying the space we want to tour. Adding portions permits us to consolidate at least two quantities to get them all out aggregate, making it a fundamental capability in technological know-how.
Adding Fractions with the Same Denominator
Add fractions with a comparable denominator is direct. To upload divisions, we want to have a shared aspect. The denominator addresses the all-out range of a balance that makes up a whole, at the same time as the numerator addresses the number of components we manage. To upload divisions with similar denominators, we add the numerators and hold an equal denominator.
For example, we want to add 1/four and 2/four. Since the denominators are something very comparable, we can add the numerators and maintain a comparable denominator to get:
1/4 + 2/four = ¾
Adding Fractions with Different Denominators
Adding fractions with various denominators requires a couple of additional means. We need to music down a shared aspect to add divisions with extraordinary denominators. The most effective approach for finding a shared element is to boom the denominators together.
For instance, we want to feature 1/four and 1/6. We can music down a shared issue employing duplicating the denominators together, much like this:
4 x 6 = 24
Then we need to trade every portion over completely to have a denominator of 24. To do that, we need to copy the numerator and denominator of each department with the aid of the same variety, to provide us with the shared aspect of 24.
1/four x 6/6 = 6/24
1/6 x 4/4 = 4/24
Since we’ve got a similar denominator, we can upload the numerators:
6/24 + four/24 = 10/24
Even so, we will work on this element employing partitioning the numerator and denominator through their maximum essential popular variable, which for this example, is 2.
10/24 ÷ 2/2 = 5/12
Along these strains, 1/four + 1/6 = 5/12.
Adding and Simplifying Fractions
We can simplify add fractions with the aid of dividing the numerator and denominator by way of their maximum huge not unusual aspect. Simplifying fractions makes it less complicated to work with them and decreases the chance of making a mistake.
For example, permits say we want to add 2/6 and 1/4. To upload those add fractions, we need to discover a commonplace denominator, that is 12:
2/6 x 2/2 = four/12
1/four x three/3 = 3/12
Now we will upload the numerators and simplify:
4/12 + three/12 = 7/12
7/12 is already simplified, so we don’t want additional simplification.
Adding Mixed Numbers
Mixed numbers are an aggregate of a whole variety and a fraction. To add mixed numbers, we want to convert them into mistaken fractions after which upload them.
For instance, we want to feature 2 1/four and three 2/three. To add those blended numbers, we first convert them to incorrect fractions:
2 1/four = nine/4
three 2/three = eleven/three
Now we can add the mistaken fractions by using locating a commonplace denominator:
nine/4 x 3/three = 27/12
eleven/three x 4/4 = forty four/12
Now we can add the numerators:
27/12 + forty four/12 = 71/12
Finally, we can simplify the fraction:
71/12 ÷ three/3 = 23 2/three
Therefore, 2 1/four + three 2/three = 23 2/three. Great post to read about Solar System Project Ideas.
Tips for Add Fractions
Here are a few recommendations to keep in thoughts when adding fractions:
- Always discover a not-unusual denominator before adding fractions with exclusive denominators.
- Simplify fractions earlier than adding them to lessen the chance of creating a mistake.
- Always double-take a look at your work to make sure your solution is accurate.
How do you upload fractions with one-of-a-kind denominators?
To upload fractions with unique denominators, discover a common denominator by using multiplying the denominators collectively. Convert each bit to have the common denominator after which upload the numerators. Simplify the fraction if feasible.
How do you add and sum fractions?
To upload and sum fractions, find a common denominator, and convert every bit to have the common denominator, after which add the numerators. Simplify the fraction if viable.
How do you add and simplify fractions?
To upload and simplify fractions, discover a common denominator, convert each bit to have the commonplace denominator, add the numerators, and then simplify the fraction by dividing both the numerator and denominator via their most tremendous commonplace component.
How can you upload 3 10 and a couple of five?
To upload three 10 and a pair of five, convert each combined wide variety to an unsuitable fraction, discover a commonplace denominator, and add the numerators, after which simplify the fraction if feasible.
Table: Add fractions
|Type of Fractions||Steps to Add|
|Same denominator||Add the numerators and keep the same denominator.|
|Different denominators||Find a common denominator, convert each fraction to have the common denominator, add the numerators, and simplify the fraction if possible.|
|Mixed numbers||Convert each mixed number to an improper fraction, find a common denominator, add the numerators, and simplify the fraction if possible.|
Jasper Bruxner is a passionate and versatile blogger with a keen eye for trends and a knack for crafting engaging content. As the founder of WendyWaldman.com, he has established himself as a trusted resource in a diverse range of niches, including food, tech, health, travel, business, lifestyle, and news. He tends to share the latest tech news, trends, and updates with the community built around Wendywaldman. His expertise and engaging writing style have attracted a loyal following, making him a respected voice in the online community. | <urn:uuid:51481a25-22e6-4907-a2a2-3bfd7e5ea7e7> | CC-MAIN-2023-50 | https://wendywaldman.com/add-fractions-understanding-the-basics/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00072.warc.gz | en | 0.895987 | 1,484 | 2.90625 | 3 |
M9220.127.116.11-53 | Wooton desk
Wooton Desk Company
1874, 19th century
183 x 109.5 x 78.5 cm
Gift of M. Bruce McNiven
© McCord Museum
Keywords: Desk (3)
Keys to History
As the pace of business quickened in the late 19th century, so did the need for better equipped and more efficient offices. This Wooton desk is an example of the emphasis on increased efficiency.
An advertisement for a Wooton desk in the May 17, 1884, issue of The Graphic magazine announced: "One hundred and ten compartments, all under one lock and key. A place for everything and everything in its place". This was the catch phrase for "The King of Desks," American businessman William S. Wooton (1835-1907), who manufactured and sold office furniture. Wooton desks were known for their many compartments, which provided a place for the organization and storage of documents and office supplies.
In the 1880s and 1890s typewriters and other new office machines began generating large amounts of paperwork, and the popularity of this desk waned - it could no longer hold everything! The filing cabinet was developed and people went back to using simpler desks.
This desk is made from oak, burled walnut, bird's-eye maple and tiger maple and includes doors that open to either side to reveal dozens of slots, shelves and small compartments.
This desk was made by the Wooton Desk Company in Indianapolis, Indiana.
This Wooton desk was patented on October 6, 1874.
The desk was acquired by Sir George Drummond during the 1870s and inherited first by his son, then by his grandson, both of whom were named Guy. | <urn:uuid:cd0d7564-6fed-48a3-aaa6-4ba43cd3708c> | CC-MAIN-2017-34 | http://collections.musee-mccord.qc.ca/en/collection/artifacts/M988.103.1.1-53 | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112539.18/warc/CC-MAIN-20170822181825-20170822201825-00263.warc.gz | en | 0.978811 | 378 | 2.734375 | 3 |
The problem of space pollution
Scientists are increasingly worried about the amount of debris orbiting the Earth
FEBRUARY 10th 2009 began like every other day in Iridium 33's 11-year life. One of a constellation of 66 small satellites in orbit around the Earth, it spent its time whizzing through space, diligently shuttling signals to and from satellite phones. At 3pm a report suggested it might see some excitement: two hours later it would pass less than 600 metres from a defunct communications satellite called Cosmos 2251. It did. A lot less. The two craft collided and the result was hundreds of pieces of shrapnel more than 10cm across, and thus large enough to track by radar—and goodness knows how many that were not. This accident came two years after the deliberate destruction by the Chinese of their Fengyun-1C spacecraft in the test of an anti-satellite weapon. That created over 2,000 pieces of junk bigger than 10cm, and an estimated 35,000 pieces more than 1cm across. Together, these incidents increased the number of objects in orbit at an altitude of 700-1,000km by a third (see chart).
Such low-Earth orbits, or LEOs, are among the most desirable for artificial satellites. They are easy for launch rockets to get to, they allow the planet's surface to be scanned in great detail for both military and civilian purposes, and they are close enough that even the weak signals of equipment such as satellite phones can be detected. Losing the ability to place satellites safely into LEOs would thus be a bad thing. And that is exactly what these two incidents threatened. At orbital velocity, some eight kilometres a second, even an object a centimetre across could knock a satellite out. The more bits of junk there are out there, the more likely this is to happen. And junk begets junk, as each collision creates more fragments—a phenomenon known as the Kessler syndrome, after Donald Kessler, an American physicist who postulated it in the 1970s.
According to the European Space Agency (ESA) the number of collision alerts has doubled in the past decade. Nicholas Johnson, the chief scientist for orbital debris at ESA's American equivalent, NASA, says modelling of the behaviour of space debris “most definitely confirms the effect commonly referred to as the Kessler syndrome”. Even the National Security Space Office at the Pentagon is worrying about whether a tipping-point has been reached, or soon will be.
Concerns like Dr Kessler's have caused launch agencies to take more care about what they get up to. In particular, accidental explosions in orbit have been reduced by depressurising redundant rockets after they have released their satellites. Also, the number of spy satellites launched has fallen since the demise of the Soviet Union. Nevertheless, there is still a problem.
The real threat now comes from collisions between things that are already up there—so much so that since the demise of Iridium 33, the normally secretive Strategic Command (Stratcom) of America's Defence Department has become rather helpful. Brian Weeden, an expert on space debris at the Secure World Foundation, a think-tank, says Stratcom now screens every operational satellite, every day, looking for close approaches, and notifies all operators. Even the Chinese? “Everybody,” he says, “the Russians, the Chinese, even the Nigerians.” This means that satellites' owners have better information with which to decide whether to use a small amount of their precious fuel reserves to avoid a collision.
But even this would not be enough. What is needed is a way to clean up the junk so that it is no longer a problem. Ideas for doing this are growing almost as fast as space debris. One proposal, originally made a decade ago by the American armed forces, would be to use ground-based lasers to change the orbits of pieces between 1cm and 10cm across by vaporising parts of their surfaces. This would produce enough thrust to cause the debris to re-enter the atmosphere. The proposal suggested a single laser facility would be enough to remove all junk of this size in three years.
Another way of slowing junk down, and thus causing it to burn up in the atmosphere, was proposed this month by Alliant Techsystems, a firm based in Minneapolis. Alliant suggests building special satellites enclosed in multiple spheres of strong, lightweight materials. Debris hitting such a satellite would give up momentum—and thus velocity—with each collision. As a bonus, many objects large enough to cause damage would be shattered by the collisions into fragments too small to cause serious harm.
However, many space agencies are considering a third option: robot missions that would dock with dead satellites and fire rockets either to boost them into “graveyard” orbits or to deorbit them completely, so they crashed into the sea. Jer-Chyi Liou, an expert on orbital debris at NASA, estimates that if such a mission started in 2020, and removed the five objects most likely to create future debris, it would more or less solve the space-junk problem.
ESA is thinking about this sort of solution, too. It is the owner of what has—perhaps unfairly—been termed “possibly the most dangerous piece of space debris” by a recent article in SpaceNews. The debris in question is Envisat, one of the largest Earth-observation satellites yet built. At the moment it is still working, but when its fuel runs out, sometime between 2016 and 2018, it will become a giant piece of junk—one that will remain in a crowded orbit for 150 years. Or not. For even conservative estimates suggest there is one chance in four that it will be destroyed in a collision during that period.
On the face of things, all this consideration of the problem is good. But this being space, where matters military are never far from the minds of those who think about it, there remains a serious question.
Satellites are crucial to modern warfare. They spy on battlefields and on even the peaceful activities of enemies, rivals and questionable allies. They provide communication links. Knocking them out—as the Chinese practised with Fengyun-1C—would be a useful military trick.
Any programme designed to remove satellites from orbit thus makes military types from other countries nervous. Some people, Mr Weeden among them, argue that such fears can be overcome if there is international co-operation over exactly which objects are removed and who is doing what. It would certainly be in everyone's interest to do so.
From the print edition: Science and technology | <urn:uuid:de5832d5-c38f-4ff2-942c-a436472e3e55> | CC-MAIN-2014-15 | http://www.economist.com/node/16843825/print | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00151-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.960866 | 1,357 | 3.46875 | 3 |
1. The problem statement, all variables and given/known data Calculate the Radius of Rubidium ion (which adopts sodium chloride structure.), if the density of Rubidium chloride is 2.76g*cm^(-3) and if we assume that the ions touch each other along the sides of the edge of the unit cell. I'm a bit lost here. I assume the density is the density of the whole unit cell. But how can I find a radius without knowing any length at all? | <urn:uuid:c1efbef3-1a06-40f8-9ac0-83f28d71c612> | CC-MAIN-2017-43 | https://www.physicsforums.com/threads/calculating-radius-of-rubidium-in-unit-cellhelp.648473/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823067.51/warc/CC-MAIN-20171018180631-20171018200631-00248.warc.gz | en | 0.830854 | 102 | 3.4375 | 3 |
What you’ll learn
- Create and paint a thematic series of sketches that represents a place you have traveled to using photographs or sketching live.
- Create finished sketches with ink pens that come to life when watercolor is applied.
- This course is a two for one since it includes sketching and beginning watercolor lectures.
- Combine skills learned from previous courses: Proportions, Contours, Landscapes and Perspective
In this course, I will teach you how to create a series of thematic, painted sketches that tell a story or feature a particular location. The instruction will focus on adding watercolors to your ink drawings of buildings, trees, sculptures and other landscape features. I will travel to Santa Fe, New Mexico where I will show you how to create a series of sketches that bring to life a particular place. You can use your previous sketches, create a series from past photographs or make a new series from a place around you.
I will introduce the idea of creating a thematic border around your sketches and you then you will watch me create my sketches. Half of the class, eight lectures, are dedicated to watercolors. I introduce watercolor techniques like flat and graded washes, glazing and creating value charts and creating study paintings.
I will cover the materials and techniques that I prefer, and then you will watch me paint, with step by step narrated instruction instruction of how to paint your sketches. If you are a beginning painter, you can stop at any stage, and if you are up for more of a challenge, watch as I turn my sketches into finished paintings! | <urn:uuid:24d0ae94-478d-4110-bd49-77e8d9d9123e> | CC-MAIN-2023-23 | https://coursefree.online/course/travelers-urban-sketchbook-4-adding-watercolors/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00750.warc.gz | en | 0.931747 | 333 | 2.875 | 3 |
|Preparing Your Child for Preschool,
Kindergarten & 1st Grade Too!
Fun, low-cost ways
to educate your
child from home.
|Letter Matching Preschool Worksheets
Note: The black and white preschool worksheets appear at the top
of the page. The colored print worksheets appear at the bottom.
|Letter Matching - Click the Links to Print Full Size
|These fun preschool worksheets that focus on letter matching combine
two important activities into one. They are learning to match and
learning the letters. Matching helps your child realize there is a difference
between similar looking items. Learning the letters will help to get your
child on the path to reading and writing. | <urn:uuid:bf3aed68-23cd-4a5f-8acf-e02b259dbdaf> | CC-MAIN-2014-10 | http://preparingyourchildforpreschool.com/Letter-Matching-Preschool-Worksheets.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010824518/warc/CC-MAIN-20140305091344-00061-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.895837 | 156 | 3.28125 | 3 |
Government makes judgements all the time. Yet how can we measure the accuracy of those making major decisions; decisions that could affect the lives of hundreds of thousands, and possibly the whole of society itself?
This session describes examples of how biases in government can lead to worse policymaking and presents forecasting as a tool which could structurally solve the problem. It explores how forecasting introduces more feedback into policymaking and can improve decision-making in conditions of scarce data. Dr Mark Egan and Robbie Tilleard of BIT take a look at their crystal ball to forecast the future of policy-making. | <urn:uuid:d734036b-a36d-4677-b715-761c152a3f51> | CC-MAIN-2023-23 | https://www.bi.team/forecasting-the-policy-future/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00709.warc.gz | en | 0.935587 | 119 | 2.546875 | 3 |
This essay explores the complex history of contrived photographs of Native American Indians created by non-Native photographers around the turn of the twentieth century. Based on research and surveys this essay overviews issues associated with contrived photographs, colonial narratives of history, and offers perspectives and survey feedback on practices that could improve archival description of controversial historical photographs of American Indians found in archives around the world.
Zachary R. Jones is the Archivist & Collection Manager for the Sealaska Heritage Institute, Juneau, Alaska and is an Adjunct Instructor of History at University of Alaska Southeast. Jones is also a Ph.D. student in Ethnohistory via University of Alaska Fairbanks, focusing on aspects of Tlingit Indian history.
Jones, Zachary R.
"Images of the Surreal: Contrived Photographs of Native American Indians in Archives and Suggested Best Practices,"
Journal of Western Archives: Vol. 6
, Article 6.
Available at: https://digitalcommons.usu.edu/westernarchives/vol6/iss1/6 | <urn:uuid:6fc5b5ea-bdf0-4a26-bc13-8fd4de9acea6> | CC-MAIN-2017-43 | http://digitalcommons.usu.edu/westernarchives/vol6/iss1/6/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825700.38/warc/CC-MAIN-20171023054654-20171023074654-00061.warc.gz | en | 0.861064 | 219 | 2.53125 | 3 |
Saint Teresa of Avila is an individual who is quite inspiring to me for her dedication to her ideals, especially to the idea that poverty among the religious Christians was essential. Teresa’s life, like those of most saintly figures in history, was a fascinating and complex epic of ideas and attitudes within the Catholic Church, and Europe as a whole. From her early days being educated in the Augustinian tradition, to her founding of the Discalced Carmelites alongside St. John of the Cross, and her expansion of Christian Mysticism; St. Teresa epitomizes the nature of Christian belief during the Renaissance.
Teresa of Avila was born Teresa Sánchez de Cepeda y Ahumada in 1515 to minor Spanish nobles of Jewish descent. Her life spanned the period during which the Protestant Reformation was at its height, and she was a major player in the Catholic “Counter-Reformation” through her works in Christian mysticism and meditation. Teresa was very religious from a young age, even attempting to go to Moorish Africa as a child in order to die a martyr. The death of her mother when Teresa was only 14 years old spurred her to a devotion to her faith far deeper than the norm, even for the time. Teresa also struggled personally to reconcile what she saw as “vanity” and “immodesty” in her lifestyle with her faith, most likely owing this way of thinking to the strict religious devotion of her father after the death of her mother.
After her mother died, Teresa was sent to a convent of Augustinian nuns to be educated, quite a common practice of the time among the nobility who wished to see their daughters educated. While living with the Augustinians, Teresa became very sick, possibly with a severe case of malaria, enduring her suffering only with the help of mystic spiritual texts about meditation such as “Tercer abecedario espiritual,” and “Tractatus de oratione et meditatione” by the Franciscan mystics Francisco de Osuna and Saint Peter of Alcantara. These writings, among others, almost certainly guided her later work in similar areas of mysticism and spirituality. Teresa experienced religious ecstasy, despite her pain, through the use of the spiritual methods and teachings of these earlier mystics, and she believed she had reached a perfect union with God through a series of steps. She also though that the nature of sin had become clear to her through her ecstasies.
Teresa worked with matters of spiritual growth throughout her life, writing several books about her experiences, the most famous being “The Interior Castle” which was inspired by one of her many mystical visions. Her writings dealt with the ascent of the soul through four stages of development: mental prayer, prayer of quiet, devotion of union, and ecstasy of union. These are the states she claimed to have passed through during her illness as a girl. Through this ascent, Teresa claimed to gain a keener understanding of sin and the relation of people to God. She established several important techniques for teaching this, namely the idea of spiritual growth as “watering a garden.”
Perhaps more important than her religious experience, St. Teresa’s reforms in the Church formed the basis for the return of many orders to poverty during a period in which monetary gain had become more important than spiritual advancement for the religious orders, and they established further, lasting reforms within the church. In 1535, Teresa entered a monastery of Carmelites at Avila, and she found that the nuns had been ignoring their duties of monasticism, instead paying attention to a stream of wealthy visitors and important supporters. Teresa’s work at reforming the Carmelite order began here where she resolved to found a reformed convent of Carmelites where the Order’s rule was kept in full.
Teresa emphasized a much stricter form of religious life which revolved around the original vows of poverty, chastity, and obedience, but added more severe rules such as ceremonial flagellation and discalceation, or removal of the shoes. Her first convent was founded in 1562, originally being received poorly for it’s extreme nature. She struggled with secular and religious leaders to sow the seeds of a reformed order. With the help of several powerful patrons, by 1563 she had moved to an even stricter convent and established the rules of absolute poverty and flagellation with the Papal sanction. It was in 1567 that Teresa received the right from the Carmelite general to establish new male monasteries in her new tradition and extend her rule to both men and women. With the help of SS. John of the Cross and Anthony of Jesus, Teresa established houses of the Discalced Carmelite Brethren.
In 1576, the larger Carmelite order began a campaign of persecution against the Discalced Carmelites with the help of the Inquisition. She needed to enlist the help of the King of Spain, Phillip II, in order to the deflect the accusations made by the larger and more corrupt order of Carmelites. The order eventually survived, and it still exists today. St. Teresa died in 1582, and she was canonized by Pope Gregory XV in 1662. For her work in the areas of Christian Mysticism and meditation, Pope Paul VI named her a Doctor of the Church in 1970. She was the first woman to be given that title.
“CONTENTS.” HISTORY . N.p., n.d. Web. 10 Mar. 2014. <http://www.ocd.pcn.net/hista.htm#The>.
“DEVOTIONS & PRAYERS.” : Infant of Prague. N.p., n.d. Web. 10 Mar. 2014. <http://devotionsandprayers.blogspot.com/2009/09/infant-of-prague.html>.
Rose, Jo. “Saint Teresa of Avila.” The Book of Saints. Bath, UK: Parragon, 2012. 168-69. Print.
“St. Teresa of Avila – Doctor of the Church.” – Saints & Angels. N.p., n.d. Web. 09 Mar. 2014. <http://www.catholic.org/saints/saint.php?saint_id=208>.
“St. Teresa of Avila.” CATHOLIC ENCYCLOPEDIA: St. Teresa of Jesus (Teresa of Avila). N.p., n.d. Web. 09 Mar. 2014. <http://www.newadvent.org/cathen/14515b.htm>. | <urn:uuid:31479a49-d471-4f36-a671-9019c2fc3275> | CC-MAIN-2017-39 | https://mmsweeney42.wordpress.com/2014/03/10/march-patron-saint-teresa-of-avila/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688208.1/warc/CC-MAIN-20170922041015-20170922061015-00325.warc.gz | en | 0.969263 | 1,405 | 3.421875 | 3 |
5 Ways AI Can be Applied in ELearning
Artificial intelligence (AI) has become a mainstay in virtually all aspects of human life. And now, its presence is reinforcing education in the aspect of eLearning more than any other modern technology.
Today, AI impacts the modern educational system in the areas of adaptive learning, virtual teachers and lecturers, customized digital learning interfaces, automated grading, and the automated plagiarism checking, as per report presented in this infographic.
Machine learning, an aspect of AI, enables machines to learn and make decisions for themselves based on the analysis of statistical data, behavior patterns, and even the outcomes of previous actions (learning by trial and error). In 2017, Netflix saved $1 billion by using machine learning and that’s only one of the positive examples of AI use.
A very basic example of the machine learning application is the classification of spam mail that most mail servers incorporate. Thus, by taking as reference a series of labels such as certain words or symbols in the subject or body of the message, the system is able to send certain emails to the spam folder automatically.
To make this automatic learning as efficient as possible, the machines need to absorb a lot of data. This is where big data comes into play. The technology of processing large volumes of data allows us to classify and generate reliable algorithms so that the machines increase their learning capacity.
These AI systems could be really useful when implemented in eLearning. Let’s check why.
ELearning systems are adaptable to different learning styles because they offer specific didactic content depending on the reaction of each learner to specific stimuli. With this, the identification of possible needs of a learner, his or her deficiencies, or problems on the learning material of a
particular course is easier done.
Collection of Helpful Additional Learning Resources
AI helps in the automated collection of data external to a specific course, which complements the material in a useful and practical way for the learners. This system helps to enrich and entertain the learning experience of the learners since it collects additional relevant studying material for
In addition, we can say that AI systems offer learners a unique and personalized learning experience through specific training plans for each person. In this sense, an AI system can be used as a stimulator of a specific course to help motivate the learners, reminding them to perform certain tasks, offering advice, and sending feedback on the work delivered, among other aspects.
Virtual Assistants as Teaching Assistants
AI systems such as chatbots offer virtual assistant services. Therefore, at any time, learners can contact the organization of the course and resolve questions in a few minutes. Something really useful both for the organizer of the course and for the learners.
Thanks to technology, education no longer has limits – global learning is now a possibility as AI can help eliminate boundaries. This technology can facilitate the learning from any location around the globe as AI applications can automatically alter lectures and course material to suit the language and tradition of learners worldwide.
In conclusion, we can say that eLearning can be greatly complemented by the good use of AI systems. | <urn:uuid:e6076e66-9d6a-40d0-bec7-c43dcb70037f> | CC-MAIN-2020-05 | https://yourelearningworld.com/5-ways-ai-can-be-applied-in-elearning/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00101.warc.gz | en | 0.931477 | 633 | 3.53125 | 4 |
Student Loan Myths Busted!
A recent LendEDU survey of more than 500 college students showed some troubling misconceptions about how student loans work — from the length of repayment plans to what happens if you cannot pay. With so much information and advice about student loans it's easy to be misinformed. Watch out for these five student loan myths.
MYTH #1 – Before applying for any type of a student loan, the applicant must have an established credit history.
TRUTH – Student loans do not require credit checks. Students have not had the opportunity to create a credit history before graduating from high school. Lenders adjust interest rates and repayment terms for these instances.
MYTH #2 – Student loans are designated for the payment of tuition exclusively. All other expenses, such as textbooks, computers, supplies, fees and living expenses must be paid for through other means.
TRUTH – Students are responsible for using the student loan money appropriately to cover the costs associated with attending an institution of higher learning. Limitations placed on how the money can be spent will be detailed in the student loan documentation.
MYTH #3 – Student loans will cause future credit problems for the graduate.
TRUTH – Prompt repayment of the student loans can create a positive credit history that demonstrates responsible handling of credit. Lenders scrutinize future borrowers through the history of on-time payments. Repaid student loans remain on the credit history for many years as an indication of the graduate’s ability to manage credit.
MYTH –The student must have sufficient personal property to serve as collateral for the student loan.
TRUTH – Student loan terms are written without collateral since the future employment is considered the means with which the loan will be repaid. In the federal student loan program, all students pay the same interest rate.
MYTH – Student loan default – The parents, or spouse, of the student will be given responsibility if the student defaults on the student loan payments.
TRUTH – The individual who signed the loan papers is responsible for repaying the student loan balance in its entirety. Certain hardship programs are available if catastrophic events prevent the graduate from repaying the loan. To make the loan payments more affordable, the graduate might want to consider a student loan consolidation program.
« Return to "Blog" | <urn:uuid:1a093e85-0e9c-4c1f-9b8e-3864c2e7e8d3> | CC-MAIN-2020-05 | https://www.palisadesfcu.org/blog/student-loan-myths-busted | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251678287.60/warc/CC-MAIN-20200125161753-20200125190753-00475.warc.gz | en | 0.960522 | 466 | 2.515625 | 3 |
When law enforcement seeks to identify the suspects and victims involved in missing and exploited children cases, sometimes the only lead is an image. Many such cases go unsolved. But over the past decade, facial recognition technology has helped solve more cases by enabling law enforcement to quickly connect names to images extracted from all types of content.
Facial recognition technology has existed in various forms since the 1960s. But only recently has it achieved a level of sophistication where it’s possible to identify a person through a single facial image — even one that’s grainy or taken from an off angle — by comparing it to the billions of facial images that exist online.
This is the capability provided by Clearview AI. Founded in 2017, the facial recognition company offers law enforcement agencies access to a database containing more than 20 billion facial images collected by publicly available means, such as images sourced from public social media posts, personal and professional websites, news articles, online mugshots, public record sites and thousands of other open sources.
It’s been a game-changer for law enforcement officials working human trafficking cases. | <urn:uuid:c6402b40-cb21-4090-a372-692d23a1bc31> | CC-MAIN-2023-23 | https://www.freethink.com/hard-tech/facial-recognition-technology | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00143.warc.gz | en | 0.93743 | 225 | 2.640625 | 3 |
There is nothing glamorous about Kidneys but these organs are the powerhouses of our excretory system, they filter all the blood in your body – between 7 -8 litres 25 times every day.
They sift out toxins and waste products, regulate the electrolytes and water content of our blodd, they also secret important hormones they play a key part in your overall health.
So what can we do to help these little wonder organs?
1 – Cut out the salt.
High blood pressure is one of the key factors in Chronic Kidney Disease (CKD) people who are cutting down on fat and sugar do tend to reach for the salty stuff as it can be as satisfying. People with immediate goals tend to check labels for salt and sugar but neglect the salt readings. As a rule of thumb, if you make half your plate fruit and veg then the salt content will naturally be low
2- Cook from Scratch
Cooking from scratch will not only make you more aware of the amount of salt you are consuming – things such as potassium and phosphorous can be a real risk to people suffering with late stage kidney disease. And there is evidence to link phosphorous and heart disease- so better safe than sorry – cook from scratch from fresh whenever possible and cut out the risks associated with these foods.
3- Don’t stress over individual minerals
You may hear people talking about their “macros”- meaning there micro nutrients’ - please life is too short for that rubbish- do you really need to know your trace nutrients from your amino acids? A healthy balanced diet will provide you with everything you need. Taking extra supplements without the advice of a doctor or due to a restrictive diet is never a good idea, as all you do is force the kidneys to work harder to excrete the extra unwanted elements you have in your body- the only supplement that is recommended for everyone to take, by the World Health Organisation is Vitamin D – if you are concerned about your diets, it may sound a lot but stop and think about the makeup of your food, and as long as you are getting about 50 different ingredients a week you will be fine.
4- Eat the rainbow
I know we say this all the time. But that is because it is true, we love the idea of a “Superfood” full of magical powers that will fix our health problems and undo the damage our naughtiness has done. But there is not one single Superfood that can wipe it all clean. We always advocate a balanced and varied diet, eating a rainbow is a good way to visualise it. Eating lots of different coloured fruit and veg will ensure you are getting the greatest amount of Phytonutrients, so go to town, red berries, broccoli, cabbage, oranges, beetroot sweet potato, vibrant strong colours make your plate more tempting.
5- Watch those portions,
Most of the time it isn’t the contents of our meals that are the problem it’s the size. Research done by the British heart foundation has shown that some portion sizes in supermarkets have actually doubled since 1993.
Many of the packages goods, from bagels, Pizza, ready meals, crisps and pies have ballooned for the last few years; Keep an eye on those portions by using smaller plates and bowl. Over eating means you are eating more nutrients that your poor kidneys have to filter, moderate your intake eat plenty of fruit and veg, small portions of protein and dairy, your body will automatically take care of itself.
Kidney Health Facts.
3 million people in the UK suffer with Kidney diseases and approximately 1 million don’t know they have a problem
83% higher risk of chronic kidney disease is faced by people who are overweight or obese when compared of those with a healthy weight.
60,000 people die every year because of Chronic Kidney Disease. | <urn:uuid:29a89d80-1d33-4abb-a205-3442336bead8> | CC-MAIN-2020-10 | https://www.4-fitsake.com/single-post/2017/08/14/Clever-Kidneys | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145529.37/warc/CC-MAIN-20200221111140-20200221141140-00148.warc.gz | en | 0.954351 | 799 | 2.71875 | 3 |
Intel's Open Source Technology Center has released GraphBuilder, an open source tool that you can use to create web-like structures for analyzing big data.
GraphBuilder is a Java library for constructing graphs out of large datasets for data analytics and structured machine learning applications that exploit relationships in data. The library offloads many of the complexities of graph construction, such as graph formation, tabulation, compression, transformation, partitioning, output formatting, and serialization. It scales using the MapReduce parallel programming model. The major components of GraphBuilder library, and its relation to Hadoop MapReduce, are shown in this diagram:
(Click in diagram to enlarge)
GraphBuilder will reveal hidden structure within big data. Writing on the GraphBuilder blog, Intel principal scientist Ted Willke explains that apps such as Hadoop MapReduce chop big data sets into slices and farm it out to masses of machines for filtering, ordering and transforming. Such systems don’t make it easy to extract knowledge from a different type of structure within the data, a type that is best modeled by tree or graph structures, Willke says:
“Imagine the pattern of hyperlinks connecting Wikipedia pages or the connections between Tweeters and Followers on Twitter. In these models, a line is drawn between two bits of information if they are related to each other in some way. The nature of the connection can be less obvious than in these examples and made specifically to serve a particular algorithm.”
The research team at Intel found that there are a number of systems available to process, store, visualize, and mine graphs but not to construct them from unstructured sources. With this in mind, Intel set out to develop a demo of a scalable graph construction library for Hadoop, and this became GraphBuilder, which has been open sourced this week at 01.org.
GraphBuilder not only constructs large-scale graphs rapidly, but also offloads many of the complexities of graph construction, including graph formation, cleaning, compression, partitioning, and serialization. Willke says that this makes it easy for just about anyone to build graphs for interesting research and commercial applications, and that using GraphBuilder, a Java programmer could build an internet-scale graph for PageRank in about 100 lines of code and a Wikipedia-sized graph for LDA in about 130.
You can try out GraphBuilder here: https://01.org/graphbuilder/ | <urn:uuid:9b6e56d4-996e-4d53-8979-097e688881cf> | CC-MAIN-2014-23 | http://www.i-programmer.info/news/136-open-source/5181-intel-graphbuilder-good-for-extracting-knowledge-from-big-data.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273663.2/warc/CC-MAIN-20140728011753-00047-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.923232 | 496 | 2.78125 | 3 |
The Self-Destruction of American Power
Washington Squandered the Unipolar Moment
On Tuesday, a military coup in Zimbabwe led to the house arrest of President Robert Mugabe and his wife, Grace, removing from power Africa’s oldest head of state and one of its worst. This was no popular uprising against tyranny, however. Rather, it was a palace coup within the ruling ZANU-PF party. The next leader of Zimbabwe, probably former Vice President Emmerson Mnangagwa or one of his proxies, is likely to continue Mugabe’s tyranny, though perhaps with less of a personal touch.
Mugabe is the only president Zimbabwe has ever known since the end of white minority rule in 1980. After independence, politics was organized around ethnic rivalries; Mugabe was associated with the Shona ethnic group, the opposition with the Ndebele. Ownership of productive land remained dominated by a tiny white minority. Although Mugabe was praised by the outside world during the first decade of his rule for pursuing racial reconciliation with the white minority, he also systematically destroyed the political power of his rivals, committing gross human rights violations and stirring up ethnic conflict in the process.
The year 1993 marked a turning point in Zimbabwe’s history. In the face of growing political opposition, which he claimed was financed by whites, Mugabe encouraged military veterans to forcefully seize white-owned land without compensation. This movement destroyed any remaining respect for the rule of law and thoroughly weakened the country’s democratic institutions. Mugabe gained the love and admiration of the rural masses, but earned the opprobrium of the West.
After laying waste to agriculture, Mugabe’s economic policies—often incoherent applications of Marxism-Leninism—subsequently degraded other sectors of what had once been a flourishing economy. At times, near-famine conditions prevailed, and hyperinflation became so pervasive that at one point Zimbabwe adopted the U.S. dollar as its currency. Many Zimbabweans fled the country as economic refugees and spread across Africa. Vast swaths of the country’s economy, notably diamond production, fell under the control of Chinese companies and Zimbabwean politicians connected to Mugabe. China has since become Zimbabwe’s largest trading partner and an assiduous supporter of the regime (and along with South Africa may have given its blessing to the recent coup). Beginning in 2001, the United States and United Kingdom imposed sanctions on Zimbabwe for Mugabe’s violation of human rights and the rule of law, while the dictator’s rhetoric and policy became progressively more anti-Western.
Elections continued to be held throughout his tenure, however, and as opposition to his rule grew, Mugabe increasingly resorted to violence and intimidation to maintain his stranglehold on power. He enriched individual military leaders in return for their support, over time surrounding himself with a loyal military cabal. The president, military figures, and their clients organized and transformed the ruling ZANU-PF and largely eliminated other parties. Mugabe, now 93, became an ever more arbitrary tyrant as he aged, and had in recent years become dependent on his wife, Grace, who is 40 years his junior. The military intervention on the night of November 14-15 was, more than anything, a palace coup within ZANU-PF targeting Grace.
The ZANU-PF has always been prone to factions based on personality; recently, it has been dominated by two. The first faction, and the one that perpetrated the coup, is close to Mnangagwa (who was removed from the vice presidency on November 6) and includes current and former military leaders involved in the overthrow of white minority rule in 1980. The rival faction, known as the G-40, is led by Grace, and is younger and more civilian in character. Most of its members did not participate in the war of independence. Grace, for example, was only 15 when white rule ended. Both Grace and Mnangagwa have sinister reputations, and there are no significant policy differences between the two factions. The only issue between them was who would succeed Mugabe when he died or was incapacitated.
Mugabe’s decision to fire Mnangagwa signaled that he was siding with his wife. The military then moved to counteract this, justifying their actions as targeting the “criminals around Mugabe.” They have not indicated any intent to change Mugabe’s political and economic system, nor have they removed him from the presidency. Groups that were props of the Mugabe regime, such as the War Veterans League and the ZANU-PF Youth League, are supporting the coup, although the latter did not do so until its leader was imprisoned. The coup may have been successful from the perspective of its perpetrators, but it is divorced from the cares and concerns of the Zimbabwean people, who will likely see no change in their day-to-day lives.
There is no indication either from Mnangagwa or the military as to who will now become chief of state, leaving Zimbabwe’s future unclear. Credible rumors suggest that negotiations are underway within ZANU-PF on a transition government. Potentially complicating things, over the last year a street opposition movement led by Christian preachers has been organizing demonstrations against the regime. Mugabe’s response had been to arrest them, and these arrests will likely continue with or without Mugabe. Yet the very fact that Mugabe has been deposed, even if by a palace coup, may allow for more popular opposition groups to form. If so, they will be a challenge to Mugabe’s successors. Meaningful change could come via a transition government, but profound changes to Zimbabwe’s political and economic system are more likely to come from the streets than from within ZANU-PF. | <urn:uuid:608a9fc8-ef46-48ff-9cbd-c3b666e4b8cc> | CC-MAIN-2020-34 | https://www.foreignaffairs.com/articles/zimbabwe/2017-11-17/mugabe-gone-zimbabwes-dictatorship-will-remain?cid=int-now&pgtype=hpg®ion=br2 | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00089.warc.gz | en | 0.980422 | 1,201 | 2.703125 | 3 |
The vertical battlefield.
"The worst policy is to attack cities ... attack cities only when there is no alternative." wrote Sun Tzu Sun Tzu (sn dz), fl. c.500–320. B.C. in his Art of War (c. 500 BC). He was correct: urban fighting involves challenges and costs that can far exceed those of conventional warfare Conventional warfare is a form of warfare conducted by using conventional military weapons and battlefield tactics between two or more states in open confrontation. The forces on each side are well-defined, and fight using weapons that primarily target the opposing army. . The effectiveness of superior weapons and communications technology Noun 1. communications technology - the activity of designing and constructing and maintaining communication systems
engineering, technology - the practical application of science to commerce or industry is blunted in the urban environment, but new tactics, training and equipment are being developed to try to overcome these disadvantages.
Armies fight in cities not because they want to, but because they have to. Population, especially in the developing world, is rising rapidly and becoming more city-centric. One estimate suggests that by the year 2010 75 percent of the world's population will live in urban areas. American military doctrine Military doctrine is the concise expression of how military forces contribute to campaigns, major operations, battles, and engagements. It is a guide to action, not hard and fast rules. Doctrine provides a common frame of reference across the military. recognises that cities are the battlefields of the future, but urban warfare Urban warfare is a modern warfare conducted in urban areas such as towns and cities. As a distinction, warfare conducted in population centers before the 20th century is generally considered siege warfare. presents special challenges, especially for the attacker.
The problems are greatest for technologically advanced attackers who face determined defenders. Classic recent and current examples are the Russians in Grozny, Israelis in the towns of the Gaza Strip Gaza Strip (gäz`ə), (2003 est. pop. 1,330,000) rectangular coastal area, c.140 sq mi (370 sq km), SW Asia, on the Mediterranean Sea adjoining Egypt and Israel, in what was formerly SW Palestine. and West Bank and American forces in Iraq and Afghanistan. Urban fighting sharply reduces the effectiveness of sophisticated sensors and weaponry and favours less sophisticated mobile weaponry, local knowledge and guerrilla tactics.
Cities have two defining features that make urban warfare difficult: buildings and people.
Imagine a battlefield that has been folded back on itself multiple times, so that a conflict which would cover a much wider area on level ground is compressed into a few square kilometres. This is the urban battlefield, vertical rather than horizontal, a '360-degree fight' in which upper floors of buildings, basements, sewers and tunnels are all places where defenders can hide from and fire on attackers in the streets.
This compressed and complex battlefield makes it difficult for commanders and troops to gain an overview of the action, while the small area of action increases the likelihood of fratricide frat·ri·cide
1. The killing of one's brother or sister.
2. One who has killed one's brother or sister.
[Middle English, from Old French, from Latin . The urban landscape offers increased possibilities for ambushes and flanking operations: buildings, and even the rubble from buildings, provide cover for snipers and mobile artillery such as RPGs (rocket-propelled grenade RPG, or rocket-propelled grenade is a loose term describing hand-held, shoulder-launched anti-tank weapons capable of firing an unguided rocket equipped with an explosive warhead. launchers).
Also, a tank that breaks down can block an entire line of advance, a fact that the Chechen defenders used to their advantage in the 1994-95 battle for Grozny. Confident in their superior firepower, the Russians paraded through the streets in columns converging on the presidential palace. By disabling the tanks at the front and rear of each column, the Chechens immobilised the rest and were able to attack them at leisure.
Conventional air strikes are of limited effectiveness in cities, partly because of the greater risks of collateral damage collateral damage Surgery A popular term for any undesired but unavoidable co-morbidity associated with a therapy–eg, chemotherapy-induced CD to the BM and GI tract as a side effect of destroying tumor cells and partly because of terrain features. Urban canyons reduce the ability of aircraft to manoeuvre, and so make them more vulnerable to attack by air defence artillery and missiles hidden on high buildings. The combination of high-rise buildings and low cloud further reduces the effective above ground level (AGL (programming) AGL - (Atelier de Genie Logiciel) French for IPSE. ) operating area, while aircraft silhouetted against overcast skies are easy targets. The 'clutter' of lights, smoke and dust can obscure ground fire or missile launches and create visual confusion.
Tanks, artillery and missile batteries are at a similar disadvantage, designed for firing at targets at a distance and on the flat. Closely packed buildings deny conventional weapons adequate range and lines of sight, while limits on gun elevation and depression create areas that are safe from fire--for instance in basements and in tall buildings.
Other disadvantages are subtler. Night vision goggles goggles,
n the protective eyewear worn by dental personnel and patients during dental procedures.
see periocular leukotrichia. and thermal sights may be dazzled by city lights, fires and background illumination. Reduction in visibility can similarly degrade the performance of weapons sensors and laser- or optically-guided weapons. Turbulence caused by wind channelled along city streets can affect aircraft performance and weapons delivery. Smooth urban surfaces increase the chance of ordnance ricocheting or 'rabbiting', while impact-fused explosive rounds may not detonate det·o·nate
intr. & tr.v. det·o·nat·ed, det·o·nat·ing, det·o·nates
To explode or cause to explode.
[Latin d at all if fired against rubble. Fighting in close quarters close quarters
at close quarters
a. engaged in hand-to-hand combat
b. very near together
Noun 1. means that fragments from the exploding target as well as muzzle blast and back blast can cause injury to those firing the weapon.
Navigation and communication capabilities are also fragmented by the city landscape. High buildings block radio communication and GPS satellite navigation. Available military maps are often inadequate and out-of-date, especially once landmark buildings are reduced to piles of rubble. Important battle areas below ground and inside buildings are not visible to reconnaissance planes or drones, and stealthy stealth·y
adj. stealth·i·er, stealth·i·est
Marked by or acting with quiet, caution, and secrecy intended to avoid notice. See Synonyms at secret. movement is difficult in a strange environment.
People--the attackers, defenders, civilian population and other groups such as the media--further complicate the urban warfare picture. One problem the urban commander faces is situational awareness Situation awareness or situational awareness (SA) is the mental representation and understanding of objects, events, people, system states, interactions, environmental conditions, and other situation-specific factors affecting human performance in , or knowing where all these people are. With communication links faulty and reporting difficult, basic questions such as; Where am I? Where are my soldiers? Where are friendlies? Where is the enemy? may be difficult to answer with any certainty.
The small combat units that are typical of urban warfare are even more isolated, physically and in terms of communications, both from their commander and from other units in the same area. Fighting at close quarters is stressful and increases the chances of fratricide and breakdowns in discipline.
In urban warfare, the defenders can be difficult to distinguish from the civilian population, while relations with the city's inhabitants
The game is based loosely on the concepts from SameGame. can be as complex as the terrain. General Charles Krulak, the former Commandant of the United States Marine Corps United States Marine Corps (USMC)
Separate military service within the U.S. Department of the Navy (see U.S. Navy), charged with providing marine troops for seizure and defense of advanced bases and with conducting operations on land and in the air in connection with , described future urban operations as a 'three block war', suggesting that the attackers may be providing humanitarian assistance in one part of the city, conducting peacekeeping operations in another and fighting a lethal mid-intensity battle in a third part.
or Cable News Network
Subsidiary company of Turner Broadcasting Systems. It was created by Ted Turner in 1980 to present 24-hour live news broadcasts, using satellites to transmit reports from news bureaus around the world. Syndrome
There is a fourth 'block': the media. By denying access to foreign journalists, the Israeli Defence Force left the Palestinians to tell the only available stories of the April 2002 attack on Jenin in occupied territories This article is about occupied territory in general: for more specific discussion of the territories captured by Israel in the Six-Day War, see Israeli-occupied territories.
Occupied territories of the West Bank, and widespread media reports of a massacre resulted. In January 2003, a conference report by the Jaffee Centre for Strategic Studies at Tel Aviv University Tel Aviv University (TAU, אוניברסיטת תל־אביב, את"א) is Israel's largest on-site university. concluded that greater openness would be essential in future Israeli combat operations. But media access creates its own problems. Ever since the battle for the city of Hue during the Vietnam War Vietnam War, conflict in Southeast Asia, primarily fought in South Vietnam between government forces aided by the United States and guerrilla forces aided by North Vietnam. , commanders have had to reckon with to settle accounts or claims with; - used literally or figuratively.
to include as a factor in one's plans or calculations; to anticipate.
to deal with; to handle; as, I have to reckon with raising three children as well as doing my job s>.
See also: Reckon Reckon Reckon the impact of their operations on home viewers watching the evening news.
US Army doctrine recognises the urban warfare threat to non-combatants and recommends removing them from the scene. But this can be easier said than done. The Israeli forces attempted to evacuate Jenin before beginning action against Palestinian Islamic Jihad Noun 1. Palestinian Islamic Jihad - a militant Palestinian terrorist group created in 1979 and committed to the creation of an Islamic state in Palestine and to the destruction of Israel; smaller and more exclusively militant that Hamas forces there, but approximately 2000 of the 13,000 inhabitants of the camp chose to stay behind. In the days before the November 2004 assault on Fallujah, the offer of free passage to non-combatants allowed hundreds of insurgents Insurgents, in U.S. history, the Republican Senators and Representatives who in 1909–10 rose against the Republican standpatters controlling Congress, to oppose the Payne-Aldrich tariff and the dictatorial power of House speaker Joseph G. Cannon. , including their leader Abu Musab Abu Musab (Arabic ابو مصعب) can refer to:
The Cost Factor
Urban warfare requires more of almost everything than conventional warfare does, and casualties are historically higher. In 2003 US Army doctrine assumed three to six times greater casualty rates than in any other environment, although in recent engagements such as Fallujah the initial toll was lighter than expected.
Casualties come not just from weapons but also from shattered glass, falling debris, rubble, ricochets, fires and falls from heights. Stress, illness and environmental hazards such as contaminated contaminated,
v 1. made radioactive by the addition of small quantities of radioactive material.
2. made contaminated by adding infective or radiographic materials.
3. an infective surface or object. water and toxic industrial materials increase the numbers. Even without casualties, more troops are needed to attack a city than to defend it. A proportion of these will need to stay back to secure captured buildings and keep access routes clear, reducing the numbers available for the advance.
In the wake of the Grozny campaign, some analysts, both Western and Russian, argued that the costs of urban warfare were too high and recommended standoff tactics, in effect a modern siege instead. But most accept that fighting in cities is a necessary evil. If this is so, what are the factors that can help make urban warfare more effective?
What is profoundly different about urban warfare is the terrain. Thinking, tactics, training and technology all need to adapt to a very different situation.
Until recently military thinking was dominated by the 'total war' model of World War II, in which civilian deaths and the destruction caused by heavy bombing were acceptable. One of the differences in modern urban warfare is that avoiding collateral damage has become a major declared objective. This radically changes military rules of engagement.
Serious military thinking about the problems of modern urban warfare is relatively new. The 1976 edition of US Army field manual FM 100-5, Operations, admitted, <<The whole subject of combat in built up areas is one in which the US Army is not well versed.>> This is changing, and the result is tactical thinking which takes into account the special circumstances special circumstances n. in criminal cases, particularly homicides, actions of the accused or the situation under which the crime was committed for which state statutes allow or require imposition of a more severe punishment. of three-dimensional warfare.
Two important areas of tactical thinking concern the roles of tanks and aircraft, especially attack helicopters, in modern urban warfare. The lessons of Grozny and the 'BlackHawk Down' scenes in Mogadishu suggest that both platforms are vulnerable in urban operations, but their advocates say that a change in tactics, in particular their use in combined operations For the department of the British War Office during World War II, see .
In the military, combined operations are operations conducted by forces of two or more allied nations acting together for the accomplishment of a single mission. See also
A 2001 monograph by Major Frank Tate Frank Tate is the name of:
Major branch of the U.S. military forces, charged with preserving peace and security and defending the nation. The first regular U.S. fighting force, the Continental Army, was organized by the Continental Congress on June 14, 1775, to supplement local Command and General Staff College The Command and General Staff College (C&GSC) at Fort Leavenworth, Kansas is a United States Army facility that functions as a graduate school for U.S. military leaders. It was originally established in 1881 as a school for infantry and cavalry. , Fort Leavenworth Fort Leavenworth (lĕv`ənwûrth'), U.S. military post, 6,000 acres (2,430 hectares), on the Missouri River, NE Kans., NW of Leavenworth; est. 1827 by Col. Henry Leavenworth to protect travelers on the Santa Fe Trail. The oldest U.S. , Kansas, argues that 'attack helicopters have the flexibility, precision, firepower and responsiveness that ground combat forces desperately need to move through a hostile city.' Somewhat surprisingly, he points to Russian air attacks on Grozny to support this claim. The Russians used precision-guided weapons at close range, flying only over buildings and terrain that were controlled by Russian ground soldiers. Attacks were co-ordinated by Russian forward air controllers on the ground.
Tate concluded that aircraft survival in the city is significantly increased when they operate over terrain held by friendly forces. He also points to the importance of developing new training and tactics, focusing on running and diving fire at close range and combined arms Combined arms is an approach to warfare which seeks to integrate different arms of a military to achieve mutually complementary effects.
Though the lower-echelon units of a combined arms team may be of homogeneous types, a balanced mixture of such units are combined into an training with infantry.
Working together in an urban environment, infantry and armour can form mutually supporting teams that complement each other's strengths and mitigate each other's weaknesses. Unsupported armour is vulnerable to anti-tank teams with weapons such as RPGs. Unsupported infantry is vulnerable in open spaces, but can move through buildings to clear enemies from an area and provide security for the tank advance, protecting the vulnerable flanks and rear of armoured vehicles. Tanks in turn provide suppressive fire Noun 1. suppressive fire - fire on or about a weapon system to degrade its performance below what is needed to fulfill its mission objectives
firing, fire - the act of firing weapons or artillery at an enemy; "hold your fire until you can see the whites of their to protect the infantry. Further support can be provided by engineers and artillery, as well as aircraft and drones, to create a total force capable of fighting in three dimensions.
Communications between members of a team and with other teams is probably more important, and more feasible, than communicating with headquarters. As Marshal Vasili I. Chuikov, Hero of the Soviet Union and Defender of Stalingrad, once observed, 'In street fighting For other uses, see Street Fight.
Street fighting is a term used to denote unsanctioned, usually illegal, hand-to-hand fighting in public places. The term also usually carries the connotation that the fighters are largely unskilled, or at least not professional martial , a soldier is on occasion his own general'.
In some cases, the technologies for achieving such low-level communications are low technology. Tanks and infantry should be marked in an easily seen way so they can identify one another, and buildings should be marked to indicate capture by friendly forces. Soldiers can carry a simple 'cheat card' containing a small map identifying objectives and the call sign and radio frequency of each company operating in the area.
Tactics need to be communicated to those who are doing the fighting. One way of doing this is through training. As with doctrine, training in the techniques of urban warfare is relatively new, as the US Marines started urban training programmes in the 1980s, the US Army about a decade later.
Currently both forces use large and sophisticated LVC LVC Lebanon Valley College
LVC Laser Vision Correction
LVC Live Virtual Class (Sun Microsystems)
LVC Levi's Vintage Clothing
LVC Live Virtual Constructive (simulation space)
LVC Low Voltage Cutoff (live, virtual, constructive) training programmes. These involve a network to co-ordinate live action, vehicle simulators and computer war games. Replica Iraqi villages are springing up at US Army training facilities all over the United States United States, officially United States of America, republic (2005 est. pop. 295,734,000), 3,539,227 sq mi (9,166,598 sq km), North America. The United States is the world's third largest country in population and the fourth largest country in area. . 'Leschi Town'--originally built at Fort Lewis, Washington to train tank crews in mock battles against a Russian enemy makes it the world's most complete urban training facility. Urban training is also being upgraded and expanded at the US Army's National Training Center at Fort Irwin, California, and the JRTC JRTC Joint Readiness Training Center (Fort Polk, LA, USA) (Joint Readiness See: readiness. Training Center) at Fort Polk Fort Polk, U.S. army post, 200,000 acres (80,937 hectares), SW La.; est. 1941 and named for the Rev. Leonidas Polk. It is a major army warm-weather training center. , Louisiana. In all, some 80 new facilities have been funded for construction through 2009. The aim is to expose trainees to the sights, sounds and feel of combat operations, and also to the cultural differences they will encounter in Iraq. Fort Polk employs up to 1000 actors, including some 200 Arabic speakers playing combatants and civilians in 18 villages spread over 40,000 acres.
More training in close-action firing, using new weapons and sights being developed for the Iraq war Iraq War: see under Persian Gulf Wars.
or Second Persian Gulf War
Brief conflict in 2003 between Iraq and a combined force of troops largely from the U.S. and Great Britain; and a subsequent U.S. , is also being emphasised by US Marine and Army training teams. At Camp Lejeunc, North Carolina North Carolina, state in the SE United States. It is bordered by the Atlantic Ocean (E), South Carolina and Georgia (S), Tennessee (W), and Virginia (N). Facts and Figures
Area, 52,586 sq mi (136,198 sq km). Pop. , Marines develop combat shooting techniques and accuracy at short distances through the Enhanced Marksmanship Marksmanship
(1846–1917) famed sharpshooter in Wild West show. [Am. Hist.: Flexner, 67]
son of Pan, companion to Muses; skilled in archery. [Gk. Myth. Program (EMP EMP
electromagnetic pulse ). A two-day Weapons Manipulation Live Fire course run by the I Marine Expeditionary Force's Special Operations Operations conducted in hostile, denied, or politically sensitive environments to achieve military, diplomatic, informational, and/or economic objectives employing military capabilities for which there is no broad conventional force requirement. Training Group at Camp Pendleton, California, is also teaching close-in combat and firing skills. The transportation school at Fort Eustis Fort Eustis is a United States Army facility located in Newport News, Virginia.
The post is the home to the Army Transportation Corps, and also home to the U.S. Army Aviation Logistics School. , Virginia, is developing weapons training for drivers, using live rounds and simulated weapon systems, performed in a mock city to simulate urban conditions.
Computer-based training See CBT.
(application) Computer-Based Training - (CBT) Training (of humans) done by interaction with a computer. The programs and data used in CBT are known as "courseware." also sharpens urban warfare skills. Urban Resolve is a major distributed computer simulation created by US Joint Forces Command's J9 Joint Experimentation Directorate and Joint Futures Laboratory. It allows rival teams in three locations to develop tactics for attack and defence in a 'virtual' city of 2015. The simulation makes heavy use of C4ISR C4ISR Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance
C4ISR Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance
C4ISR Command Control Communications Computers Intelligence Surveillance and Reconnaissance (command, control, communications, computers, intelligence, surveillance and reconnaissance Intelligence, Surveillance and Reconnaissance may refer to:
Even the multi-role computer game played on personal computers has been pressed into service as a training aid intended to train units going to Iraq on better ways to avoid being ambushed. The experience of 'dying' several times in succession teaches lessons that the US Department of Defense hopes will stick in the soldier's mind.
Portable simulations that can be used by troops in theatre are also an urgent requirement. One problem faced by raiding parties searching for insurgents or hidden weapons is that they have probably never been to the house they are about to raid and may not even have been to the immediate neighbourhood. Even if a good GPS signal can be obtained, the soldiers run the risk of breaking into the wrong building. At best, this might give the target time to escape; at worst it might provide impetus for some irate new recruits to go over to the insurgency side. Darpa's Urbanscape programme is working on the technologies needed to create three-dimensional images of the actual neighbourhood and the specific building that has been targeted.
Intelligence gathering, small arms small arms, firearms designed primarily to be carried and fired by one person and, generally, held in the hands, as distinguished from heavy arms, or artillery. Early Small Arms
The first small arms came into general use at the end of the 14th cent. and sniper equipment, specialised weapons, improved armoured fighting vehicles and other weapons are some of the major technologies that have emerged from urban warfare requirements.
One major problem in urban warfare is mapping complex three-dimensional terrain in a way that provides clear and usable information for those moving through it. Such is the speed with which towns and cities evolve that traditional maps with be out of date. Even if they are not, maps will not show the internal structure of specific buildings, or underground features such as sewers that could be exploited by either side. Intelligence officers must be equipped and trained to handle the task of dynamically mapping buildings and other locations of interest. Noting the location of doors and windows Doors and Windows is a multimedia disk by the Irish band The Cranberries. Track listing
Most of today's hardware used for intelligence gathering (such as overhead reconnaissance and electronic intelligence-gathering systems) was designed to meet the needs of open terrain warfare, but is much less effective when tasked with tracking down mobile or even irregular forces Armed individuals or groups who are not members of the regular armed forces, police, or other internal security forces. within a city. "Our current surveillance and reconnaissance systems simply cannot provide enough information of the type needed to understand what's really going on throughout a city", Darpa Director Dr. Tony Tether Anthony J. Tether was appointed as Director of the Defense Advanced Research Projects Agency (DARPA) on June 18, 2001. DARPA is the principal Agency within the Department of Defense for research, development, and demonstration of concepts, devices, and systems that provide highly told the US Senate Committee On Armed Services' Subcommittee On Emerging Threats And Capabilities, in March, 2005. <<Persistent, staring reconnaissance, surveillance and target acquisition For the RSTA/ISTAR/STA doctrine, see .
For Artillery STA, see .
For the USMC snipers, see . systems would vastly improve knowledge about what's going on What's Going On is a record by American soul singer Marvin Gaye. Released on May 21, 1971 (see 1971 in music), What's Going On reflected the beginning of a new trend in soul music. throughout a city in all three dimensions and over time,>> he told the Subcommittee.
"We need a network, or web, of sensors to better map a city and the activities in it, including inside buildings, to sort adversaries and their equipment from civilians and their equipment, including in crowds and to spot snipers, suicide bombers or improvised explosive devices. We need to watch a great variety of things, activities and people over a wide area and have great resolution available when we need it. And this is not just a matter of more and better sensors, but just as important, the systems needed to make actionable intelligence Having the necessary information immediately available in order to deal with the situation at hand. With regard to call centers, it refers to agents having customer history and related product data available on screen before the call is taken. out of all the data."
The imagery from drones can play a major role in locating targets, but only if their imagery is immediately available to the front-line units taking part in combat operations. Traditional drone operating techniques involve the air vehicle being controlled from a rear position and sending its information to that position. For urban warfare, the units engaged in combat need to be able to task drones and directly obtain the data they need.
Working under an $11.6 million Darpa contract, Northrop Grumman Northrop Grumman Corporation (NYSE: NOC) is an aerospace and defense conglomerate that is the result of the 1994 purchase of Grumman by Northrop. The company is the third largest defense contractor for the U.S. is developing a heterogeneous urban reconnaissance, surveillance and target acquisition (Hurt) technique that would allow soldiers to ask for reconnaissance imagery unobtainable by high-altitude or fixed sensors. The Hurt is intended to simultaneously order drones to conduct wide-area surveillance while dispatching an individual air vehicle to any location that is requested by a soldier to provide a close-up look.
Israeli experience in using tactical drones to support operations in Palestinian Authority-controlled territory has highlighted a need for lightweight systems that can be operated autonomously by front-line units. When packed into its launcher/container, the electrically powered Rafael Skylite is small and light enough to allow one soldier able to carry two air vehicles in a backpack, while another carries the ground control station. The plane is 1.1 metres long, has a wingspan of 1.7 metres and weighs 6.5 kg. After launch it can fly a fully autonomous mission using pre-programmed waypoints. After being recovered using a ground net, the vehicle can be fitted with a fresh battery and booster then folded and repacked into the launcher/container.
The Israel Aircraft Industries (IAI IAI Infection And Immunity (journal)
IAI International Alliance for Interoperability
IAI Institut für Angewandte Informatik
IAI Inter-American Institute for Global Change Research
IAI International Association for Identification ) Mosquito is even smaller. An electrically-powered drone intended to monitor a local area up to one km x one km after being launched by hand or bungee, it is only 34 cm in wingspan and 30 cm long. It weighs 500 grams at launch and can fly at heights of up to 300 ft. Drones in this miniature category are small enough to be flown through a window to obtain images of a building's interior.
Bertin in France started developing the vertical take-off and landing HoverEye in 1999. It was recently demonstrated to the French procurement authorities (DGA DGA Directors Guild of America (movie directors union)
DGA Délégation Générale pour l'Armement (France)
DGA Directeur-Grootaandeelhouder (Dutch: Managing Director and Major Shareholder) ) and is now ready for marketing through Sagem. Partnership with Sagem involves integration work, particularly with the French Felin and Boa programmes in sight. Electrically powered, the HoverEye incorporates an obstacle avoidance radar, uses inertial navigation and GPS, but to remedy the inefficiency of the latter in urban environment, Bertin is currently working on a visual recognition back-up system. Weighing 3 to 3.5 kilos, the electrically powered, carbon-glass fibre composite HoverEye has an autonomy of about 15 minutes, however, a thermal engine is also envisaged as an option for increased endurance.
PackBots, the briefcase-sized robots with cameras that became stars of the TV news, made their debut in Afghanistan and have since been deployed in Iraq, moving through buildings to track insurgents.
The Centre for Emerging Threats and Opportunities' Reconnaissance Surveillance and Target Acquisition Cloud concept has explored the use of small or even micro-sized robots for reconnaissance, a potentially useful tool in Third World urban environments where Western military personnel would be highly conspicuous among the civil population.
On a digitised urban battlefield, ground-based fixed or mobile sensors could be linked to armed drones, allowing fire to be delivered against mobile targets at short notice. However, engineers face the problem of making such sensors small enough to be unnoticeable by the local populace.
In some cases, sensors are designed to be fired or even hand-thrown. Titan's Grenade-Launched Imaging Modular Projectile projectile
something thrown forward.
see blow dart.
forceful vomiting, usually without preceding retching, in which the vomitus is thrown well forward. System (Glimps), combines a camera and a radio transmitter in a 40mm projectile. Currently under development, it is intended to extend surveillance capabilities in an urban environment.
Rafael is developing a similar product, but the prime role of its Firefly is to capture imagery of the terrain being over-flown. Fired from a 40 mm grenade launcher it has a maximum range of 600 metres. Combat evaluation by the Israel Defense Force is expected later this year. Another product with a similar role is the Israel Military Industries surveillance variant of its rifle-launched Air Burst Ammunition (ABA). While the basic ABA is a munition that can be fired in airburst air·burst
Explosion of a bomb or shell in the atmosphere.
Noun 1. airburst - an explosion in the atmosphere
blowup, detonation, explosion - a violent release of energy caused by a chemical or nuclear reaction , point detonation and time-delayed detonation modes, the surveillance version carries a digital camera and wireless datalink.
Although there is no shortage of new sensors, their imagery still needs to be rapidly interpreted to provide useable intelligence. Sensors that can sort civilians from suicide bombers are unfortunately not yet available, although USDigiComm has, in the process of designing a short-range concealed weapon concealed weapon n. a weapon, particularly a handgun, which is kept hidden on one's person, or under one's control (in a glove compartment or under a car seat). detector for indoor use, developed a long-range detector that can recognise handguns and bombs outside and at a safe-enough distance to protect both personnel and assets. There are no known weapon detection systems on the market today that can detect concealed weapons from a distance greater than a few yards and the most common devices in operation are electromagnetic or magnetic devices which require the use of a walk through portal, such as those used at airports. The USDigiComm invention will not only detect a concealed weapon but, as the company boasts, also has the capability of identifying the type of weapon.
Armed robots are also being developed for use as combatants. The first military application for Foster-Miller Talon robots was explosive ordnance disposal The detection, identification, on-site evaluation, rendering safe, recovery, and final disposal of unexploded explosive ordnance. It may also include explosive ordnance which has become hazardous by damage or deterioration. Also called EOD. , a role in which they have been used in Bosnia and are currently in service in Afghanistan and Iraq. The Talon can also be equipped with an M16 rifle, M240 or M249 machine-guns or Barrett 50-calibre rifles and used for armed reconnaissance.
A prototype Swords (Special Weapons Observation Reconnaissance Direct-action System) robot was delivered to the 3/2 Stryker brigade for evaluation, and successfully tested in Kuwait in December 2003. Additional prototypes have been manufactured and delivered to the Army Ardec for evaluation. The US Army is also evaluating alternative weapon fits, including 40 mm grenade launchers and M202 anti-tank rocket launchers.
In February 2005 Carnegie Mellon University's National Robotics Engineering Consortium and United Defense were selected to develop the Gladiator tactical unmanned ground vehicle The Gladiator Tactical Unmanned Ground Vehicle (TUGV) is a remotely operated unmanned ground vehicle employed by the United States Marine Corps.
The Gladiator is designed to be able to operate at all times of the day through the use of image intensifying or thermal devices. for the US Marine Corps.
In September 2003 United Defense was selected for the task of designing and developing two Armed Robotic Vehicle (ARV ARV
American Revised Version
ARV n abbr (= American Revised Version) → traducción americana de la Biblia
ARV n abbr (= ) variants intended to reduce soldier exposure in high vulnerability reconnaissance and assault missions. The ARVRSTA variant is being designed to provide reconnaissance, surveillance and target acquisition for the Future Combat System Units of Action, while the ARV-Assault variant will provide direct and indirect fires to support mounted and dismounted operations (see Robot Wars Armada International 4/2005 for more details on ground robots).
In March 2005, Metal Storm announced that it had completed a series of live fire demonstrations held at the US Army's range facility at Picatinny Arsenal in New Jersey. These involved multiple live firings of a purpose-built version of the Metal Storm 40 mm weapon system mounted on a Talon unmanned ground vehicle Unmanned ground vehicles or UGV are robotic platforms that are used as an extension of human capability. This type of robot is generally capable of operating outdoors and over a wide variety of terrain, functioning in place of humans. (UGV UGV Unmanned Ground Vehicle
UGV Unattended Ground Vehicle ).
The vehicle was equipped with a four-barrel array loaded with four rounds per barrel and an optical targeting system able to provide two-axis control and stability. It successfully engaged a variety of targets, including simulated personnel, an infantry carrier and a bunker with pyrotechnic rounds.
Better Small Arms
In the US Army, some units have replaced their M16A2 rifles with the shorter and handier M4 and M4A M4A MPEG 4 Audio (audio compression format)
M4A Mpeg4 Audio 1 carbines, while the standard M249 light machine gun is being phased out in favour of a paratrooper model with a barrel as short as that of the M4 carbine.
Such compact weapons may be easier to handle in the confined spaces within vehicles, bunkers, and buildings, but the shorter barrel reduces the muzzle velocity of the 5.56 mm round. As a result the bullet loses the velocity-generated fragmentation effect (an important factor in its lethality) at a relatively short range.
Combat experience in Afghanistan and Iraq has shown that the current 5.56mm Nato round lacks stopping power stopping power Radiation oncology The ability of a material to stop ionizing radiation; alpha paticles are stopped by a piece of paper, gamma radiation by thick lead shielding Radiology The density of a tissue reflected in an image's whiteness; white , particularly when fired from short-barrelled weapons such as the M4/M4A1 family of carbines. One attempted solution was the Mk 262, Mod 0 and Mod 1 cartridges, which replace the standard four-gram SS109 bullet with a heavier five-gram projectile.
Working with the US Army, Remington has now developed the 6.8 x 43 mm Special Purpose Cartridge, while Barrett Firearms has created a new upper receiver that can be fitted to existing M16 or M4 weapons, converting them to the new calibre. This upgrade is made possible by the fact that the new cartridge has the same overall length as the 5.56 mm and is of only slightly larger diameter. The new round gives improved performance and lethality and is better matched to the demands of CQB CQB Close Quarters Battle
CQB Close Quarter Battle (Mike Curtis novel) (Close Quarters Battle Close Quarters Battle (CQB) or close quarters combat (CQC) is a type of fighting in which small units engage the enemy with personal weapons at very short range, even to the point of hand-to-hand combat. ) and urban warfare operations. For the moment, there is no plan to switch to this calibre across the board, but it is being used to boost the firepower of Special Forces and selected front-line combat units.
In December 2004 MTC mtc - A Modula-2 to C translator.
ftp://rusmv1.rus.uni-stuttgart.de/soft/Unixtools/compilerbau/mtc.tar.Z. Technologies Land Forces Group announced that it had developed a new rifle sight that would allow soldiers to fire around corners, over or under barriers, and into buildings using a variety of off-angle firing positions, with only the hands and forearms exposed. Suitable for use on any weapon that has a Picatinny 1913 rail weapon mount, the Parascope Urban Combat Sight incorporates a five-sided prism and has viewing ports from the rear for normal firing, and from the side for indirect firing. It does not interfere with normal operation when left on the weapon. Development was funded by the US Army's Communication-Electronics Command and Darpa. Currently under evaluation, the new sight could be fielded late in 2005.
As its name suggests, the Israeli company Corner Shot specialises in systems that allow soldiers to view targets 'around the corner' through a small video camera attached to the barrel of a weapon. The latest product to be announced To be announced (TBA)
A contract for the purchase or sale of an MBS to be delivered at an agreed-upon future date but does not include a specified pool number and number of pools or precise amount to be delivered. is Corner Shot 40, which can be fitted to 40 mm grenade launchers. The video camera allows the user to scan around corners or into doorways, viewing the imagery on a liquid crystal monitor mounted in the rear section of the system, or transmit the image to nearby units, to a rear area command post or a central command.
To supplement its trained snipers, the US Army is using what it terms squad-designated marksmen. At first it equipped these with 7.62 mm calibre M14 rifles, but returning this 1960s era weapon to front-line service created logistic and training problems. By modifying the current 5.56 mm M16A4 rifle, the Army has created the Squad Designated Marksman Rifle. This incorporates a heavier match-grade barrel, a two-stage trigger and folding bipod bi·pod
A stand having two legs, as for the support of an instrument or a weapon. legs. It is used with match-grade 5.56 mm ammunition.
As events in Iraq and the Israeli occupied territories show, there is a role to be played in urban warfare by non-lethal weapons or other riot control technologies. However, this is a specialised field in which there are many development efforts underway, so cannot be covered in a general discussion on urban warfare.
In April 2005, Alliant Techsystems delivered the first six prototype XM25 advanced airbursting weapon systems to the US Army for field testing. This fires an air-bursting 25 mm HE round. The fire control system of the XM25 is based on a laser rangefinder, and loads the target range into the chambered round. The projectile estimates the distance it has flown by counting the number of revolutions it makes. This information allows it to detonate at a precise point along its trajectory, defeating enemy personnel sheltering behind a wall, inside a building or in a foxhole. Maximum range is more than 500 metres.
Israeli operations within the towns and refugee camps of the Gaza Strip have spurred the development of specialised munitions mu·ni·tion
War materiel, especially weapons and ammunition. Often used in the plural.
tr.v. mu·ni·tioned, mu·ni·tion·ing, mu·ni·tions
To supply with munitions. for use against buildings and bunkers. Rafael's Simon known as the Rifled-Launched Entry Munition in US service consists of a shaped-explosive charge in a plastic housing that incorporates a nose-probe-mounted detonator detonator (dĕ`tənā'tər), type of explosive that reacts with great rapidity and is used to set off other, more inert explosives. Fulminate of mercury mixed with potassium chlorate is a commonly used detonator. and a stabilising tail. It is designed to blast down a door. For harder targets, the company offers the wall-breaching standoff munition. This is able to blow a man-size hole in layered brick walls.
Israel Military Industries has developed the Shipon, a 100 mm calibre weapon able to carry an anti-tank/anti-fortification warhead able to penetrate up to 800 mm of armour or an anti-fortification/anti-personnel warhead that is designed to explode inside a building. In its basic form the Shipon cannot be fired in enclosed spaces, unlike the follow-on Shipon-UT based on a gas-tight modified Davis system.
AFVs Better Suited
US Army M1A2 Abrams tanks are receiving an urban-warfare upgrade in the form of the Tank Urban Survival Kit (Tusk). This will install a series of improvements, some of which are still in development. Designed for traditional armoured warfare, the M1 Abrams assumed that the primary threat would always be in the front sector, "but today it's a 360-degree fight", says Tusk product manager Lt. Col. Michael Flanagan.
The first Tusk component to reach the field has been the loader's armoured gun shield, which provides protection to the loader when the soldier is firing the 7.62 mm machine-gun from the turret. By March 2005 about 130 shields had already been purchased and sent to units in Iraq. The loader's firing position is also receiving a thermal sight, allowing the machinegun to be used in the dark. A system that allows the loader to fire the gun from inside the turret, while seeing the thermal sight's image, is under development.
Also under development are improvements to the commander's station outside the turret, although different systems are necessary for the M-1A2 Abrams and its older M1-A1 brethren. "Because of things we added to the turret in the A2, the commander's station had lost the ability to shoot the .50 calibre machinegun while under armour," explains Flanagan. <<We're developing a remote weapons station that will probably be similar to the one used on the Stryker to allow that weapon to be fired from inside the turret.>>
Explosive reactive armour similar to that used on the Bradley will be fitted to protect the tank's sides, while slat armour will be added to protect the vehicle's rear. Both modifications are intended to counter rocket-propelled anti-tank grenades.
A tank/infantry telephone will be installed to allow nearby infantry to communicate with the tank crew (see second section: Please Tell Me!).
Most of these add-ons will be incorporated into a kit, first examples of which could be deployed later this year. Installed in the field, they could be removed before a tank unit leaves the theatre of operations Noun 1. theatre of operations - a region in which active military operations are in progress; "the army was in the field awaiting action"; "he served in the Vietnam theater for three years"
field of operations, theater of operations, theatre, theater, field and left there to be used by the next Abrams unit deployed to the area.
There are two schools of thought on the best type of AFV AFV Alternative-Fuel Vehicle
AFV America's Funniest Home Videos (TV show)
AFV Armored Fighting Vehicle
AFV America's Funniest Videos
AFV Amniotic Fluid Volume
AFV America's Funniest Home Video
AFV Avantage Fiscal for use in urban environments. Wheeled vehicles have a higher mobility than tracked designs, and have proven popular for peacekceping operations. However, they are more vulnerable than tracked vehicles.
In its normal form, ERA can pose a danger to nearby infantry and civilians. The development of Composite Lightweight Adaptable Reactive Armour (Clara) by Dynamit Nobel shows a possible solution--instead of using steel plates to sandwich the explosive fill, Clara uses plates made from plastic composites.
Active Protection Systems have their own disadvantages. Like ERA, counter-munitions fired against incoming threats may pose a danger to bystanders, while systems based on electronic countermeasures may not take effect fast enough to decoy DECOY. A pond used for the breeding and maintenance of water-fowl. 11 Mod. 74, 130; S. C. 3 Salk. 9; Holt, 14 11 East, 571. or deflect threats fired against them at short range.
The Darpa is developing better ways of protecting vehicles from RPG (Report Program Generator) One of the first program generators designed for business reports, introduced in 1964 by IBM. In 1970, RPG II added enhancements that made it a mainstay programming language for business applications on IBM's System/3x midrange computers. attacks. It has developed an advanced, lightweight bar armour to protect US Marine Corps Hummers and is testing novel, high-strength nets intended to stop RPG and mortar rounds. For the longer term, Darpa's Iron Curtain project will develop and test a close-in weapon system A Close-in weapon system (CIWS) is a naval shipboard weapon system for detecting and destroying incoming anti-ship missiles and enemy aircraft at short range (the threat(s) having penetrated the ship's available outer defences). Typically, the acronym is pronounced "Sea-whiz". able to shoot down incoming RPGs and missiles, though the bullets fired to achieve this may pose a collateral damage problem in urban conditions.
The General Dynamics Stryker infantry carrier was fielded operationally in Iraq in September 2003, and around 300 are reported to be in service there. The vehicle seems to be popular with its users. Since it is quieter than a tracked vehicle, it gives the enemy less warning of its approach.
To provide the Strykers with greater protection they have been fitted with protective slat armour. Known as the 'bird cage', this in intended to prematurely trigger the fuze fuze
n. & v.
Variant of fuse1.
Noun 1. fuze - any igniter that is used to initiate the burning of a propellant
fuse, primer, priming, fuzee, fusee of rocket-propelled grenades. A December 2004 internal US Army report that leaked to the press cited problems with this add-on armour, saying that it was effective against only about half of the RPGs fired at the vehicle. However, press reports say that this finding is distorted by an Army judgement that the 'bird cage' has failed if fragments from the exploding warhead strike the main armour, even if the latter is not penetrated. However, the slat armour adds an extra 2300 kg to the vehicle's combat weight, a load that is reported to strain the vehicle's engine and create problems with the automatic tyre pressure system.
The traditional primary role of a tank is to engage other tanks at long range. For this reason the ammunition load is normally biased towards armour-piercing, fin-stabilised discarding sabot (APFSDS APFSDS Armor-Piercing Fin-Stabilized Discarding Sabot ) rounds. For urban warfare, the target is unlikely to be another tank, while high explosive (HE) ammunition, including high explosive squash head High explosive squash head (HESH) is a type of explosive ammunition that is effective against buildings and is also used against tank armour. It was fielded chiefly by the British Army as the main explosive round of its main battle tanks during the Cold War. (Hesh) or high explosive plastic (Hep) would be the weapon of choice for use against buildings and bunkers. Thermobaric ammunition may be more effective than conventional HE rounds in killing personnel inside buildings or bunkers.
During combat operations in Iraq, US Army M1 Abrams tanks found two 120mm rounds to be effective tools for urban warfare--the M908 and the M1028. The M908 round was created by replacing the existing dual-mode (proximity and impact) fuze of the M830A1 with a hard steel nose that allows the projectile to penetrate an obstacle before detonating det·o·nate
intr. & tr.v. det·o·nat·ed, det·o·nat·ing, det·o·nates
To explode or cause to explode.
[Latin d . It can be used to destroy concrete obstacles, clearing the way for the infantry and fighting vehicles to advance.
Fired from the 120 mm tank gun, the M1028 120 mm Canister Tank Cartridge releases a payload of 1100 tungsten balls that provide a shotgun-like effect. Intended to be used against massed assaulting infantry armed with hand-held anti-tank and automatic weapons at close range, the M1028 was designed to defeat 50 per cent or more of a ten-man squad with one shot and a similar proportion of a 30-man platoon with two shots. The Army asked that the round be effective against targets at ranges of 200 to 500 metres and ideally at 100 to 700 metres. In January 2005, General Dynamics Ordnance and Tactical Systems was awarded a $ 5.8 million fixed-price contract for low-rate initial production of 3600 rounds.
These are not the only 120 mm rounds to be designed with urban warfare in mind. While Israel is reported to be using its local equivalents of the M908 and M1028 during counter-insurgency operations in the Gaza area, it is also believed to be using an Israel Military Industries (IMI IMI International Masonry Institute (Washington, DC)
IMI Israel Military Industries
IMI Institute of the Motor Industry
IMI International Market Insight
IMI Imposto Municipal Sobre Imóveis (Portugal) ) 'stun cartridge'. Designed to create a high level of noise and pressure/blast at ranges of up to 30 metres, it can be used to suppress sniper fire from buildings or disperse hostile civilians trying to approach the tank.
In March 2004 the US Army Tank-Automotive and Armaments Command began a search for a new round able to defeat light and medium vehicles, buildings, bunkers and double reinforced concrete walls with low collateral damage. The warhead would have no explosive fill or fuze, but was expected to obtain its explosive effects by using hydrostatic shock to couple non-explosive energy. Being inert, it would avoid the safety problems associated with the M830A1 and its M908 derivative, and improve the combat survivability sur·viv·a·ble
1. Capable of surviving: survivable organisms in a hostile environment.
2. That can be survived: a survivable, but very serious, illness. of light vehicles from which it was fired.
To replace the M908 and M1028, along with the M803A1 HE round and M393A3 105 mm Hep-T round, the US Army plans to develop the XM1069 Line-Of-Sight Multipurpose mul·ti·pur·pose
Designed or used for several purposes: a multipurpose room; multipurpose software.
Adjective round. Suitable for use against hard targets such as bunkers, buildings and vehicles it will also have an anti-personnel role.
The XM1069 will be fitted with an Ardec-designed multi-mode fuze offering impact, impact/delay and airburst (time) modes. Full-bore (120 mm) and sub-calibre projectiles are envisaged. Both would be fin-stabilised.
The design of traditional MBTs is not well matched to urban conditions. For a start, the long gun barrel needed to drive an APFSDS round up to high muzzle velocities may be a distinct disadvantage in cramped surroundings. A more significant problem particularly for MBTs of Russian origin--is that limited depression angles prevent the barrel from being aimed at short-range targets located near ground level. A high elevation angle would also be useful when engaging short-range targets on the upper floors of multi-story buildings, or delivering indirect fire against threats behind buildings.
Given that MBTs must still be able to counter the threat posed by enemy armoured vehicles, the traditional tank gun and APFSDS rounds seem assured of a long-term future, but today's limited budgets effectively rule out the development of tank variants optimised for urban warfare.
Surprisingly, this has not been the case in cash-strapped Russia. During the fighting in Grozny, the Russian Army had to use ZSU-23-4 Shilka self-propelled quadruple 23 mm air-defence cannons against high-elevation targets that could not be engaged by tanks. To provide a longer-term solution, the Uralvagonzavod Machine Building Plant used the T-72 as the basis of the new BMPT BMPT Bundesministerium für Post Und Telekommunikation (Federal Ministry of Post and Telecommunications)
BMPT British Military Powerboat Trust (Southampton, UK) tank support combat vehicle.
Protected by add-on explosive reactive armour, this is armed with a turret carrying one or two 2A42 30 mm automatic cannon able to fire at elevations of up to 45 degrees, a coaxial 7.62 mm machine gun and four launchers for Ataka (AT-9) anti-tank guided missiles A list of ATGMs by country. Brazil
A practical compromise might be the installation of secondary armament selected with urban warfare in mind. Israel's Merkava has a 60 mm breech-loading mortar able to fire high explosive, smoke and illumination rounds for engaging enemy anti-tank teams and helping to conserve main gun ammunition. On the Merkava Mk 1, the mortar was externally mounted, but on subsequent models it is mounted in the left side of the turret roof and can be loaded and fired from within the turret. Israeli officials have hinted that the Merkava Mk 4 variant could also be fitted with special purpose and non-lethal weaponry for urban warfare operations.
Any light, self-propelled anti-aircraft gun system has the potential to be used against ground targets. Early in 2005, the US Army's 3rd Cavalry Regiment was reported to have modified eight Boeing Avenger self-propelled anti-aircraft missile systems to allow them to be used as gun trucks in Iraq. Army engineers removed the right-hand Stinger missile pod, then remounted the vehicle's 0.5-inch machine-gun in place of the pod and increased the weapon's ammunition load from 250 to 600 rounds.
In the original configuration, the machine-gun cannot be depressed sufficiently to fire at front-sector ground targets. Changes were made to the fire control software, allowing the flir and laser rangefinder to be used to direct the machine-gun against targets in any direction and at any elevation.
More Accurate Weapons
To provide its Iraq-based artillery units with a 'smart' projectile, the US Army plans to speed up the service introduction of the Excalibur 'smart' 155 mm artillery round by approximately 15 months, and in doing so hopes to equip several brigades by March 2006. This will be done by curtailing service testing, and by sending the first rounds to combat units rather than training units.
Israel Aircraft Industries' MBT MBT Minimum (Spark Advance For) Best Torque
MBT Masai Barefoot Technology
MBT Main Battle Tank
MBT Mechanical Biological Treatment (waste treatment)
MBT Master of Business Taxation Missiles Division developed the Fireball fireball, very bright meteor leaving a trail in the sky that can remain visible for several minutes; often a distinct sound, perhaps caused by very low frequency radio waves, is associated with it. 120/121 mm 'smart' mortar round specifically to meet the needs of urban combat. The round flies a ballistic trajectory after launch. Around the peak of its trajectory, it will switch to a gliding path under the control of an on-board Global Positioning System Global Positioning System: see navigation satellite.
Global Positioning System (GPS)
Precise satellite-based navigation and location system originally developed for U.S. military use. (GPS) system. Once the bomb's semi-active laser has acquired the target (which must be designated by a ground-based or airborne laser), it will begin a steep terminal dive, a trajectory intended to minimise collateral damage in an urban environment.
Infantry-operated anti-tank missiles are being widely used as "portable artillery' by front-line units. In 21 of the 28 major battles fought since the early 1980s, antitank missiles were used not against tanks, but against vehicles, trucks, buildings, mud huts, bunkers, caves, small boats and even individual snipers. Recognising this trend, the US Department of Defense now uses the term 'close combat missile systems' rather than 'anti-tank' missiles.
MBDA MBDA Minority Business Development Agency (US Department of Commerce)
MBDA Michigan Broadband Development Authority
MBDA Minnesota Band Directors Association
MBDA Matra BAE Dynamics Alenia
MBDA Magnolia Ballroom Dancers' Association sees semi-active command-to-line-of-sight (Saclos) missiles as being better suited to non-MBT targets than the imaging infrared guided missiles such as the Raytheon Javelin and Rafael Spike/Gill. It is now offering the new Saclos-guided Milan Extended Response. Ruag is currently developing a new range of weapons particularly well suited for urban warfare. The first is a new tandem warhead for the Milan (although neither Ruag nor MBDA admit this as being an official development) that has a main charge using a cast molybdenum molybdenum (məlĭb`dənəm) [Gr.,=leadlike], metallic chemical element; symbol Mo; at. no. 42; at. wt. 95.94; m.p. about 2,617°C;; b.p. about 4,612°C;; sp. gr. 10.22 at 20°C;; valence +2, +3, +4, +5, or +6. liner. Recent tests witnessed by Armada International's Editor-in-Chief proved that the warhead was able to easily defeat up to 1.5 metres of rolled homogeneous armour This article or section is in need of attention from an expert on the subject.
Please help recruit one or [ improve this article] yourself. See the talk page for details. .
Returning to the new all-digital Milan firing post, the unit will be able to handle all earlier models of Milan, including the Milan ER, and will allow remotely controlled firing. In close-quarters and urban combat this will improve the survivability of the firer.
Other munitions developed by Ruag include the 81 mm Mapam mortar bomb, the Crad vehicle-launched grenade and the Mep penetration warhead. The Mapam 81 is in fact a derivative of the 60 mm Mapam, but expels a mix of approximately 4800 steel balls of 4 and 6.2 mm in diameter. Because the balls are embedded in the bombs composite material body there are no other fragments than the balls, which means that their speed, penetration capability and range are perfectly determined and consistent. The 60 can be safely fired at a minimum range of 70 metres and the 81 at 100.
The Crad uses the same design, but applied to 76 mm anti-personnel grenades. Launched from the vehicle they explode at a range of about 45 metres and at a height of between seven and two metres on their downward trajectory to expel a shower of steel balls, but only ahead of them. Dismounted vehicle followers thus remain totally safe.
The Mep is a wall penetrator that is designed to fit anti-tank shoulder fired weapon warheads such as the AT-4, Panzerfaust and RPG7 without altering the ballistic trajectories of the original munitions. Recent firings conducted just after those of the Mapam and Crad showed that the Mep was able to penetrate 20 cm of double reinforced concrete and then explode. Because the Mep penetrates the wall without setting off any charge whatsoever, it can be safely fired at a range of 50 metres. While it will disable people within the aimed area of a building, it will not harm those (like hostages or innocent civilians) located in a neighbouring room. Ruag is also actively working in the area of what it terms "Starblast Technology", which is a softer designation for an optimised and better-controlled hybrid thermobaric warhead that emphasises overpressure overpressure,
n excessive pressure applied at the end of a physiologic joint range to confirm the severity of pain, thus helping determine the manual treatments. rather than high temperature. This could find useful urban warfare applications in penetrators, but also in roof-attacking weapons. Ruag is in the process of becoming the leading European warhead specialist as it already supplies warheads for the Tow, Nlaw, Bill 2 and Milan missiles amongst many others
In a rather ironic twist of events, after a period during which the trend for fire-and-forget weapons was all the rage General Public's All the Rage was released in 1984 by I.R.S. Records. Track listing
Unearthed has had three incarnations - they first visited each region of Australia where Triple J had a transmitter - 41 regions in all. the Predator missile in its Sraw-Multi-Purpose version, production of which had been cancelled in 2003. To fulfil an urgent requirement from the Corps, Lockheed Martin has converted 400 Predators for urban assault in Iraq with a blast warhead optimised for breaking walls and dealing with the lighter types of armoured vehicles.
Longer-ranged tactical weapons now under development, such as the Lockheed Martin Joint Common Missile (JCM JCM Journal of Clinical Microbiology
JCM Journal of Chinese Medicine
JCM Japan Collection of Microorganisms
JCM Joint Common Missile
JCM Journal of Conceptual Modeling
JCM Joint Commission Meeting
JCM Journal of Composite Materials
JCM Job Characteristics Model ) and the Raytheon Principal Attack Missile (Pam) and Loitering Loitering (IPA pronunciation: ['lɔɪtəˌrɪŋ] is an intransitive verb meaning to stand idly, to stop numerous times, or to delay and procrastinate. Attack Missile (Lam), on the other hand will also be useful in future urban combat. The fast transfer of target information envisaged under network-centric warfare will allow missiles to be directed against a target as soon as it is located. The Pam and Lam will be able to fly to the reported position of the target, and then fly a diving attack.
On 10 May 2005, France, Sweden and Britain agreed to pool their technology demonstration programme funding on a next-generation missile. MBDA hopes that the study will result in a common requirement for a new missile to be developed by the three nations, perhaps in partnership with Germany, Italy and Spain. Development of what MBDA terms the European Modular Munition (EMM (Expanded Memory Manager) Starting with 386-based PCs, an EMM is software that converts extended memory (beyond one megabyte) into EMS memory, the first technique used to increase memory in the PC. ) could run from 2009 to 2014, allowing the resulting weapon to enter service around 2015.
The company is studying a combination of imaging infrared and semi-active laser designation for terminal homing. As the missile approaches the target area, the missile's seeker would generate infrared imagery of the target zone. A ground-based or drone-mounted laser designator would then be used to illuminate the target for a few seconds--long enough to allow a wide-angle semi-active laser channel to locate the marked target, allowing the missile to re-centre the field-of-view of its imaging channel, then begin final homing.
The latest generation of 'smart' bombs can use lighter warheads than the 454-kg and 907-kg 'iron' bombs that were the traditional candidates for receiving add-on guidance kits. This trend is illustrated by the GBU-38 version of the GPS-aided Jdam, which is based on a 500 lb (227 kg) bomb, and by the Boeing Small Diameter Bomb, which is based on a 250 lb (113 kg) bomb. The GBU-38 completed its initial operational evaluation on 28 September 2004, and was declared operational on 8 October. On 29 October, the US Navy made the first combat launches.
Testifying before the Senate Armed Services The Constitution authorizes Congress to raise, support, and regulate armed services for the national defense. The President of the United States is commander in chief of all the branches of the services and has ultimate control over most military matters. Subcommittee on Strategic Forces on 16 March, 2005, Lance W. Lord General Lance W. Lord was a four star U.S. Air Force general, and commander of Air Force Space Command, Peterson Air Force Base, Colorado.
General Lord entered the Air Force in 1969 as a graduate of the Otterbein College ROTC program. , Commander of the US Air Force Space Command, described how during 'Operation Vigilant Resolve', the First Marine Expeditionary Force The largest Marine air-ground task force (MAGTF) and the Marine Corps principal warfighting organization, particularly for larger crises or contingencies. It is task-organized around a permanent command element and normally contains one or more Marine divisions, Marine aircraft wings, and in Fallujah was able to call in precision air strikes against individual buildings and structures This is a list of famous or notable buildings with articles about them. By Category
An even more dramatic approach to reducing collateral damage is illustrated by the US Air Force's HardStop (Hardened Surface Target Ordnance Package). This is a GPS-guided bomb that will dispense 54 smaller bomblets in a pattern that can be programmed to cover a radius of anything from 3 metres to almost 17 metres. The individual bomblets arc designed to penetrate the roof of a building and explode inside, confining most of its destructive effects to within the building. Some of the bomblets can be programmed to go through one or more floors before exploding, thus spreading the weapon's lethal effects over the height of a multi-storey building. The HardStop has been tested at Eglin Air Force Base Eglin Air Force Base is the home of the United States Air Force 96th Air Base Wing of the Air Force Materiel Command, and is also headquarters for more than 45 associate units. in Florida and is expected to become operational in Iraq later this year.
Worst Kind of War
The three-dimensional maze of urban operations is probably the worst logistical problem a commander can face. But city fighting is not the only problem faced by the Israeli forces in the West Bank, and US-led coalition forces in Iraq. Tactics and technology that focus only on overcoming the disadvantages of urban fighting may be missing the point. These are counter-insurgency operations, and share the characteristics of what Greg Wilcox and Gary Wilson have identified as 'fourth generation warfare'. In a May 2002 article 'Military Response to Fourth Generation Warfare Fourth generation warfare (4GW) is a concept in American military doctrine defined in 1989 by a team of American analysts, including William S. Lind, used to describe warfare's return to a decentralized form. in Afghanistan', they warned that, "Fourth generation warfare is manifesting itself in highly compartmentalized com·part·men·tal·ize
tr.v. com·part·men·tal·ized, com·part·men·tal·iz·ing, com·part·men·tal·iz·es
To separate into distinct parts, categories, or compartments: "You learn . . . , cellular, predatory networks operating outside the framework of nation-states. How do we counter and win against a formless form·less
1. Having no definite form; shapeless. See Synonyms at shapeless.
2. Lacking order.
3. Having no material existence. foe? In fact, how do we know when we have won?"
Urban warfare also makes heavy demands on supplies of all kinds. Cities are warmer than the countryside, and soldiers need more drinking water drinking water
supply of water available to animals for drinking supplied via nipples, in troughs, dams, ponds and larger natural water sources; an insufficient supply leads to dehydration; it can be the source of infection, e.g. leptospirosis, salmonellosis, or of poisoning, e.g. , as well as a high-calorie diet to compensate for the exertion needed to fight in buildings. More medical supplies are needed, particularly if soldiers must fight in sewers or other unsanitary un·san·i·tar·y
Not sanitary. environs, while uniforms and equipment wear out more quickly. As well as body armour and helmets, urban soldiers need additional protection, including knee and elbow pads, heavy gloves and ballistic eyewear to reduce the risk of injury.
Finally, urban warfare tactics require thinking in three dimensions, what US National Security Analyst C. L. Staten calls <<spherical>> security. Some of the rules of three-dimensional warfare include:
* wherever possible, attack the upper floors and work downwards
* exploit high positions for observation and positioning snipers
* position stay-behind forces to make sure the enemy doesn't re-enter re·en·ter also re-en·ter
v. re·en·tered, re·en·ter·ing, re·en·ters
1. To enter or come in to again.
2. To record again on a list or ledger.
v.intr. cleared buildings.
FM 3-06.11, the 2002 US Army Field Manual on combined arms operation in urban terrain, contains detailed instructions on moving through the three-dimensional landscape and recommends avoiding doors and windows and clearing rooms and hallways with a grenade before entering. One piece of advice suggests another good reason for attacking a building from above, which is 'Throwing fragmentation grenades up a stairway has a high probability for the grenades to roll back down and cause fratricide.' | <urn:uuid:cd86c91d-7912-46d7-99ee-4e152adbd6e8> | CC-MAIN-2013-48 | http://www.thefreelibrary.com/The+vertical+battlefield.-a0136078091 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164022934/warc/CC-MAIN-20131204133342-00032-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.936047 | 15,268 | 2.765625 | 3 |
G235: Critical Perspectives in Media Theoretical Evaluation of Production Question 1(b) Representation: MUSIC VIDEOThe media does not represent andconstruct reality, but instead represents it?4. Representation – Definition• How the media shows us things about society – but this is through careful mediation. Hence re-presentation.• For representation to be meaningful to audiences there needs to be a shared recognition of people, situations, ideas etc.• All representations therefore have ideologies behind them. Certain paradigms are encoded into texts and others are leftout in order to give a preferred representation (Levi – Strauss, 1958).5. Representation• Representing is about constructing reality, it is supposed to contain verisimilitude and simplify people’s understanding oflife.• Representation refers to the construction in any medium (especially the mass media) of aspects of reality such as people,places, objects, events, cultural identities and other abstract concepts. Such representations may be in speech or writing aswell as still or moving pictures.• The term refers to the processes involved as well as to its products. For instance, in relation to the key markers of identity- Class, Age, Gender and Ethnicity (the cage of identity) - representation involves not only how identities are represented(or rather constructed) within the text but also how they are constructed in the processes of production and reception bypeople whose identities are also differentially marked in relation to such demographic factors. Consider, for instance, theissue of the gaze.How do men look at images of women, women at men, men at men and women at women?6. • Richard Dyer (1983) posed a few questions when analysing media representations in general.• 1. What sense of the world is it making?• 2. What does it imply? Is it typical of the world or deviant?• 3. Who is it speaking to? For whom?To whom?• 4. What does it represent to us and why? How do we respond to the representation?7. How do you think the following groups are represented in your music video?Types of people:• Class – In my video the class of my artist is represented in an upper class perspective, this is mainly demonstratedthrough the mise-en-scene such as the lavish bedroom and her clothing. The use of a large fur scarf and cigarette holderconnote this status. However, the video rejects that the lifestyle has a positive outcome, visible in her disjunctive andaggressive posture towards the camera.• Age – The artist in my music video is young, and arguably adheres to the stereotypes that the young are ‘careless’ and‘naïve’. For example, my artist is shown through a mid-shot tearing up flowers and has no care for the person on the otherend of the telephone (seen by hanging up).• Gender – The artist is a female and adheres to stereotypes that she takes care of her appearance, such as by applyingmake-up and with her hair in rollers, arguably to impress and be admired by other people. Although artist is shown giving apowerful stance/lip-syncing towards to camera which suggests that she is independent and not reliant on a male‘protector’• Ethnicity – The artist is represented as White British.• Sexuality -The artist is represented as a straight woman.• Disability – The artist is not represented with a disability.8. Theories• Particularly in relation to film – objectification of women’s bodies in the media has been a constant theme.Laura Mulvey (1975) argues that the dominant point of view is masculine. The female body is displayed for the male gazein order to provide erotic pleasure for the male (voyeurism). Women are therefore objectified by the camera lens andwhatever genders the spectator/audience is positioned to accept the masculine POV.The Male Gaze can be applied to my music video as the female is enhanced through mise-en-scene, such as red lipstick anda short dress in order to make her more appealing to the dominant male point of view. The camerawork enhances thisthrough the use of high angles to make the artist appear as a weaker subject in position to the audience’s gaze. However,
this is often challenged through the artist’s powerful stance and disregards for the camera e.g. mid-shot shows her puttingher hand in front of the camera lens. In this sense she is therefore aware of the audience’s gaze and aware that she doesnot want to be objectified by them by denying them a viewpoint.John Berger ‘Ways Of Seeing’ (1972)“Men act and women appear”.“Men look at women. Women watch themselves being looked at”.“Women are aware of being seen by a male spectator”This theory can be evidently applied to my music video as the artist looks at herself in the mirror and towards the cameralens through the mirror. This signifies that she is aware of being looked at and has become the object of the malespectator. In close-up shots of her looking down this supports the idea that they are aware of being seen by a malespectator as the artist wants to be perceived as feminine and desirable.Jib Fowles (1996)“in advertising, males gaze and females are gazed at”.Paul Messaris (1997)“female models addressed to women....appear to imply a male point of view”.The female artist in my music video supports this as it directly addresses the female target market as they are able tofamiliarise with them more. However, the way my artist is dressed appears to imply a male point of view as she is dressedcertainly to gain to attention of the male view. For example, as she applies lipstick and is seen with rollers in her hair thisimplies that the male point of view of women is to get ‘dolled’ up and to impress them.• In terms of magazine covers of women, Janice Winship (1987)has been an extremely influential theorist. “The gazebetween cover model and women readers marks the complicity between women seeing themselves in the imagemasculine culture has defined”.Jean-Francois Lyotard (1984) and Jean Baudrillard (1980)share the belief that the idea of ‘truth’ needs to bedeconstructed so that dominant ideas (that Lyotard argues are “grand narratives”) can be challenged.The narrative within my music video supports this belief as it rejects an entire “grand narrative” through the use ofamplification in order to represent the lyrics. For example, although a negotiated reading is evident that the artist is goingthrough a post-relationship it is challenged whether there is a resolution or whether this is actually the ‘truthful’ case.Baudrillard discussed the concept of hyperreality – we inhabit a society that is no longer made up of any original thing for asign to represent – it is the sign that is now the meaning. He argued that we live in a society of simulacra – simulations ofreality that replace the real. Remember Disneyland?• We can apply this to texts that claim to represent reality – social realist films?Hyper reality can be applied to my music video as the mise-en-scene, such as the 1950s telephone and magazine, alongsidemodern heels and location has creates a conflicting idea of whether it is entirely real. Therefore this would not representreality and instead replaces real artefacts of modern day clothing and technology.Merrin (2005)argues that “the media do not reflect and represent reality but instead produce it, employing thissimulation to justify their own continuing existence”.This can be applicable to my music video as the mise-en-scene related to the 1950s is reliant on the audience’s previouscultural knowledge associated with that time period to establish connections that it may not represent modern daysociety. However, through her powerful behaviour this would not have been seen at the time, as women were often seenas the submissive, so will be able to acknowledge that the producer encoded it as a modern day text.David Gilmore• Man the protector• Man the provider• Man the impregnator• We often judge a text’s realism against our own ‘situated culture’. What is ‘real’ can therefore become subjective.
• Stereotypes can be used to enhance realism - a news programme, documentary, film text etc about football hooligans,for e.g, will all use very conventional images that are associated with the realism that audiences will identify with such asshots of football grounds, public houses etc.Stereotypes of 1950s – rotary telephone/roller in hair (suggest no modern technology to style the hair)/1960smagazine/mirror with a handle/classic roses/location of bedroom is quite archaic/17. 4. Stereotypes?O’Sullivan et al (1998)details that a stereotype is a label that involves a process of categorisation and evaluation.• We can call stereotypes shorthand to narratives because such simplistic representations define our understanding ofmedia texts – e.g we know who is good and who is evil.The artist is obviously a young girl within my music video and complies with stereotypes as she is not conservative in theway she dresses and often rebels against traditional ideas, in this case through her costume. The mid-shots of her smokingalso enhance the rebellious stereotype and provide connotations that she is careless and free willed.First coined by Walter Lippmann (1956)the word stereotype wasn’t meant to be negative and was simply meant as ashortcut or ordering process.• In ideological terms, stereotyping is a means by which support is provided by one group’s differential against another.Orrin E. Klapps (1962) distinction between stereotypes and social types is helpful.• Klapp defines social types as representations of those who belong to society.• They are the kinds of people that one expects, and is led to expect, to find in one’s society, whereas stereotypes arethose who do not belong, who are outside of one’s society.Klapp’s theory that stereotypes are kinds of people who are outside of one’s society and do not belong can be applied tomy music video as the artist is represented alone. Especially in the scenes outside, with her placed on the far right third ofthe camera frame, it connotes her as an outsider from traditional expectations. Her unique styling would not adopted bythe masses and therefore does not belong to mass culture in this sense.Richard Dyer (1977)suggests Klapp’s distinction can be reworked in terms of the types produced by different social groupsaccording to their sense of who belongs and who doesn’t, who is in and who is notThe target audience may see her unique styling as something that represents her as exclusive and desirable, rather than anoutsider. The young target market of the music video would embrace this more and see her as “in” and “fashionable”.Tessa Perkins (1979)says, however, that stereotyping is not a simple process. She identified that some of the many waysthat stereotypes are assumed to operate aren’t true.• They aren’t always negative (French good cooks)• They aren’t always about minority groups or those less powerful (upper class twits)• They are not always false – supported by empirical evidence.• They are not always rigid and unchanging. Perkins argues that if stereotypes were always so simple then they wouldnot work culturally and over time.Martin Barker (1989)- stereotypes are condemned for misrepresenting the ‘real world’. (e.g. Reinforcing that the (false)stereotype that women are available for sex at any time) . He also says stereotypes are condemned for being too close toreal world (e.g. showing women in home servicing men, which many still do).• Bears out Perkins’ point that for stereotypes to work they need audience recognition.Dyer (1977)details that if we are to be told that we are going to see a film about an alcoholic then we will know that it willbe a tale either of sordid decline or of inspiring redemption.• This is a particularly interesting potential use of stereotypes, in which the character is constructed, at the level ofcostume, performance, etc., as a stereotype but is deliberately given a narrative function that is not implicit in thestereotype, thus throwing into question the assumptions signalled by the stereotypical iconography. | <urn:uuid:c8fdb3d4-25b5-492c-933e-638d8f4bc84c> | CC-MAIN-2017-43 | https://www.slideshare.net/SianLynes/media-representation-essay | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828178.96/warc/CC-MAIN-20171024052836-20171024072836-00720.warc.gz | en | 0.957093 | 2,647 | 3.34375 | 3 |
Site Map : http://www.popularmechanics.com
Index -> Science -> Energy -> Nuclear
Mexican Truck Thieves and Cobalt-60, Explained
After news broke of a bizarre truck theft in Mexico, in which the truck was carrying a radioactive source of cobalt-60, media reports said the unlucky thieves were already exposed to a fatal dose. How can that be? Nuclear safety expert and PopMech co
Everything You Wanted to Know About Iran and Nuclear Enrichment
What does the new interim deal to contain Iran's nuclear ambitions really mean? Nuclear safety expert and PopMech contributor Andy Karam explains.
Just How Dangerous Are the Fukushima Leaks?
Radiation safety expert Andrew Karam analyzes reports that radioactive water is leaking from the Fukushima Dai-ichi nuclear plant, getting into the groundwater and the Pacific Ocean.
Floating Nuclear Power: Inside Russia's Reactors at Sea
Russia plans to built floating reactors that can dock at remote Arctic cities to provide energy and fresh water. Here's how they work.
Pandora's Promise: When Greens Embrace Nuclear Power
Robert Stone's new documentary, out today in New York and this weekend around the country, follows environmentalists who have reached the same difficult conclusion he has: When it comes to generating electricity, nuclear power is only practical way t
Take a Look Inside a Tiny Nuclear Reactor
This year Westinghouse will begin fuel tests for its Small Modular Reactor (SMR), a downsized system that puts out 225 megawatts.
Is the "Superfuel" Thorium Riskier Than We Thought?
A new study in Nature says that using thorium as a nuclear fuel has a higher risk for proliferation into weapons than scientists had believed.
8 Labs & Science Relics Worth a Visit
Excited about The Oatmeals quest to create a Tesla museum in New York? Here are eight other science pilgrimages you could make.
40 Years of Fukushima Cleanup: Timeline
Last March a tsunami damaged the reactor cooling systems at the Fukushima Daiichi nuclear plant, causing the leak of high levels of radiation. Owner Tokyo Electric Power Company recently released its 40-year cleanup plan.
Next Up in Nuclear: Small Modular Reactors
The Obama administrations next move in boosting energy techonlogy will be nearly $500 million in support of small modular reactors.
What Those Fukushima Radiation Counts Really Mean: Analysis
Radiation safety expert Andrew Karam is back from Japan, where he took radiation detectors to assess the contamination levels himself. Not all radiation measurements are created equal, so Karam walks us through what the numbers really mean.
The Bridge to Fusion: 4 Advanced Nuclear Fission Technologies Pages: 2 3 4
Today, in the wake of the Fukushima accident, engineers at labs and nuclear facilities are developing advanced fission technologies that could bridge the gap to fusion, and could also turn into important power sources in their own right.
How Japan Reacted to the Fukushima Emergency
Radiation safety expert, Dr. Andrew Karam, explains what the Japanese did, and why, to respond to the nuclear emergency and reduce the radiation exposureand what to do now that the alert at Fukushima has reached level 7, the highest stage.
What Went Wrong: Fukushima Nuclear Disaster
We turned to radiation expert Dr. Andrew Karam, a radiation safety professional with more than 30 years of experience. Karam takes us step by step through what happened during the nuclear shutdown at Fukushimaand what went wrong.
Japanese Nuclear Reactor Shut Down by Earthquake Releases Radioactive Gas
With both the Fukushima Daiichi nuclear power plant and its backup cooling systems knocked out by the enormous earthquake and tsunami, Japanese energy officials must vent radioactive gases.
Mini Reactors Show Promise for Clean Nuclear Power's Future (July 2008)
Efficient Centrifuge Enriches Nuclear Power Future: How It Works (April 2008)
The Next Atomic Age: Can Safe Nuclear Power Work for America? (August 2006) Pages: 2 3
Concerns over foreign oil dependency and global warming are pushing attention to a new Manhattan Project. Check out the future of nuclear power that's being birthed right now in the Idaho desert.
Florida Outage Aside, New Plants Pave Clean Road for Nuke Power (February 2008)
Patrick Moore and Anna Aurillo Debate The Necessity of Nuclear Power
Nuclear energy has been a controversial topic ever since the first reactor powered four 200-watt light bulbs in the Idaho desert in 1951. Today, the United States is gearing up for the next generation of reactor designs, breathing new life into the d | <urn:uuid:0e2b3211-2d0b-46f3-8d4a-283ae06d1d81> | CC-MAIN-2013-48 | http://www.popularmechanics.com/sitemap/section_7530 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052995/warc/CC-MAIN-20131204131732-00077-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.902454 | 941 | 2.546875 | 3 |
A lingua franca (/ / (listen); lit. Frankish tongue; for plurals see § Usage notes), also known as a bridge language, common language, trade language, auxiliary language, vehicular language, or link language, is a language or dialect systematically used to make communication possible between groups of people who do not share a native language or dialect, particularly when it is a third language that is distinct from both of the speakers' native languages.
Lingua francas have developed around the world throughout human history, sometimes for commercial reasons (so-called "trade languages" facilitated trade), but also for cultural, religious, diplomatic and administrative convenience, and as a means of exchanging information between scientists and other scholars of different nationalities. The term is taken from the medieval Mediterranean Lingua Franca, a Romance-based pidgin language used (especially by traders and seamen) as a lingua franca in the Mediterranean Basin from the 11th to the 19th century. A world language – a language spoken internationally and by many people – is a language that may function as a global lingua franca.
Lingua franca refers to any language used for communication between people who do not share a native language. It can refer to mixed languages such as pidgins and creoles used for communication between language groups. It can also refer to languages which are native to one nation (often a colonial power) but used as a second language for communication between diverse language communities in a colony or former colony. Lingua franca is a functional term, independent of any linguistic history or language structure.
Lingua francas are often pre-existing languages with native speakers, but they can also be pidgin or creole languages developed for that specific region or context. Pidgin languages are rapidly developed and simplified combinations of two or more established languages, while creoles are generally viewed as pidgins that have evolved into fully complex languages in the course of adaptation by subsequent generations. Pre-existing lingua francas such as French are used to facilitate intercommunication in large-scale trade or political matters, while pidgins and creoles often arise out of colonial situations and a specific need for communication between colonists and indigenous peoples. Pre-existing lingua francas are generally widespread, highly developed languages with many native speakers. Conversely, pidgin languages are very simplified means of communication, containing loose structuring, few grammatical rules, and possessing few or no native speakers. Creole languages are more developed than their ancestral pidgins, utilizing more complex structure, grammar, and vocabulary, as well as having substantial communities of native speakers.
Whereas a vernacular language is the native language of a specific geographical community, a lingua franca is used beyond the boundaries of its original community, for trade, religious, political, or academic reasons. For example, English is a vernacular in the United Kingdom but is used as a lingua franca in the Philippines, longside Filipino. Arabic, French, Mandarin Chinese, Spanish, Portuguese, Hindustani, and Russian serve a similar purpose as industrial/educational lingua francas, across regional and national boundaries.
International auxiliary languages created with the purpose of being lingua francas such as Esperanto and Lingua Franca Nova have not had a great degree of adoption globally so they cannot be described as global lingua francas.
The term lingua franca derives from Mediterranean Lingua Franca, the pidgin language that people around the Levant and the eastern Mediterranean Sea used as the main language of commerce and diplomacy from late medieval times, especially during the Renaissance era, to the 18th century. At that time, Italian-speakers dominated seaborne commerce in the port cities of the Ottoman Empire and a simplified version of Italian, including many loan words from Greek, Old French, Portuguese, Occitan, and Spanish as well as Arabic and Turkish came to be widely used as the "lingua franca" (in the generic sense) of the region.
In Lingua Franca (the specific language), lingua means a language, as in Portuguese and Italian, and franca is related to phrankoi in Greek and faranji in Arabic as well as the equivalent Italian. In all three cases, the literal sense is "Frankish", leading to the direct translation: "language of the Franks". During the late Byzantine Empire, "Franks" was a term that applied to all Western Europeans.
Through changes of the term in literature, Lingua Franca has come to be interpreted as a general term for pidgins, creoles, and some or all forms of vehicular languages. This transition in meaning has been attributed to the idea that pidgin languages only became widely known from the 16th century on due to European colonization of continents such as The Americas, Africa, and Asia. During this time, the need for a term to address these pidgin languages arose, hence the shift in the meaning of Lingua Franca from a single proper noun to a common noun encompassing a large class of pidgin languages.
Douglas Harper's Online Etymology Dictionary states that the term Lingua Franca (as the name of the particular language) was first recorded in English during the 1670s, although an even earlier example of the use of Lingua Franca in English is attested from 1632, where it is also referred to as "Bastard Spanish".
The use of lingua francas has existed since antiquity. Latin and Koine Greek were the lingua francas of the Roman Empire and the Hellenistic culture. Akkadian (died out during Classical antiquity) and then Aramaic remained the common languages of a large part of Western Asia from several earlier empires.
The Hindustani language (Hindi-Urdu) is the lingua franca of Pakistan and Northern India.[self-published source?][page needed] Many Indian states have adopted the Three-language formula in which students in Hindi-speaking states are taught: "(a) Hindi (with Sanskrit as part of the composite course); (b) Urdu or any other modern Indian language and (c) English or any other modern European language." The order in non-Hindi speaking states is: "(a) the regional language; (b) Hindi; (c) Urdu or any other modern Indian language excluding (a) and (b); and (d) English or any other modern European language." Hindi has also emerged as a lingua franca for the locals of Arunachal Pradesh, a linguistically diverse state in Northeast India.It is estimated that 90 percent of the state's population knows Hindi.
Swahili developed as a lingua franca between several Bantu-speaking tribal groups on the east coast of Africa with heavy influence from Arabic. The earliest examples of writing in Swahili are from 1711. In the early 1800's the use of Swahili as a lingua franca moved inland with the Arabic ivory and slave traders. It was eventually adopted by Europeans as well during periods of colonization in the area. German colonizers used it as the language of administration in Tanganyika, which influenced the choice to use it as a national language in what is now independent Tanzania.
When the United Kingdom became a colonial power, English served as the lingua franca of the colonies of the British Empire. In the post-colonial period, some of the newly created nations which had multiple indigenous languages opted to continue using English as an official language .
French is still a lingua franca in most Western and Central African countries and an official language of many, a remnant of French and Belgian colonialism. These African countries and others are members of the Francophonie.
Russian is in use and widely understood in Central Asia and the Caucasus, areas formerly part of the Russian Empire and Soviet Union, and in much of Central and Eastern Europe. It remains the official language of the Commonwealth of Independent States. Russian is also one of the six official languages of the United Nations.
In Qatar, the medical community is primarily made up of workers from countries without English as a native language. In medical practices and hospitals, nurses typically communicate with other professionals in English as a lingua franca. This occurrence has led to interest in researching the consequences and affordances of the medical community communicating in a lingua franca.
Indonesian – which originated from a Malay language variant spoken in Riau – is the official language and a lingua franca in Indonesia, although Javanese has more native speakers. Still, Indonesian is the sole official language and is spoken throughout the country. Persian is also the lingua franca of Iran and its national language.
The only documented sign language used as a lingua franca is Plains Indian Sign Language, used across much of North America. It was used as a second language across many indigenous peoples. Alongside or a derivation of Plains Indian Sign Language was Plateau Sign Language, now extinct. Inuit Sign Language could be a similar case in the Arctic among the Inuit for communication across oral language boundaries, but little research exists.
- Hall, R.A. Jr. (1966). Pidgin and Creole Languages. Cornell University Press. ISBN 0-8014-0173-9.
- Heine, Bernd (1970). Status and Use of African Lingua Francas. ISBN 3-8039-0033-6.
- Kahane, Henry Romanos (1958). The Lingua Franca in the Levant.
- Melatti, Julio Cezar (1983). Índios do Brasil (48 ed.). São Paulo: Hucitec Press.
- Ostler, Nicholas (2005). Empires of the Word. London: Harper. ISBN 978-0-00-711871-7.
- Ostler, Nicholas (2010). The Last Lingua Franca. New York: Walker. ISBN 978-0-8027-1771-9.
- Rosetta Stone
- Global language system
- International auxiliary language
- Koiné language
- Language contact
- List of languages by number of native speakers
- List of languages by total number of speakers
- Mediterranean Lingua Franca
- Mixed language
- Mutual intelligibility
- Universal language
- Working language
- World language
- "lingua franca – definition of lingua franca in English from the Oxford dictionary". Oxforddictionaries.com. Retrieved 18 June 2015.
- Viacheslav A. Chirikba, "The problem of the Caucasian Sprachbund" in Pieter Muysken, ed., From Linguistic Areas to Areal Linguistics, 2008, p. 31. ISBN 90-272-3100-1
- Nye, Mary Jo (2016). "Speaking in Tongues: Science's centuries-long hunt for a common language". Distillations. 2 (1): 40–43. Retrieved 20 March 2018.
- Gordin, Michael D. (2015). Scientific Babel: How Science Was Done Before and After Global English. Chicago, Illinois: University of Chicago Press. ISBN 9780226000299.
- "vehicular, adj." OED Online. Oxford University Press, July 2018. Web. 1 November 2018.
- LINGUA FRANCA:CHIMERA OR REALITY? (PDF). ISBN 9789279189876.
- Intro Sociolinguistics – Pidgin and Creole Languages: Origins and Relationships – Notes for LG102, – University of Essex, Prof. Peter L. Patrick – Week 11, Autumn term.
- Romaine, Suzanne (1988). Pidgin and Creole Languages. Longman.
- "Lingua Franca, Pidgin, and Creole". 3 April 2015. Retrieved 29 April 2019.
- "The Difference Between Lingua Franca, Pidgin, and Creole Languages". Teacher Finder. Retrieved 29 April 2019.
- Directorate-General for Translation, European Commission (2011). "Studies on translation and multilingualism" (PDF). Europa (web portal). Archived from the original (PDF) on 15 November 2012.
- "lingua franca | linguistics". Encyclopædia Britannica. Retrieved 8 August 2017.
- Lexico Triantaphyllide online dictionary, Greek Language Center (Kentro Hellenikes Glossas), lemma Franc ( Φράγκος Phrankos), Lexico tes Neas Hellenikes Glossas, G.Babiniotes, Kentro Lexikologias(Legicology Center) LTD Publications. Komvos.edu.gr. 2002. ISBN 960-86190-1-7. Retrieved 18 June 2015.
Franc and (prefix) franco- (Φράγκος Phrankos and φράγκο- phranko-
- "An etymological dictionary of modern English : Weekley, Ernest, 1865–1954 : Free Download & Streaming : Internet Archive". Retrieved 18 June 2015.
- Archived 12 October 2014 at the Wayback Machine
- Brosch, C. (2015). "On the Conceptual History of the Term Lingua Franca". Apples - Journal of Applied Language Studies. 9 (1): 71–85. doi:10.17011/apples/2015090104.
- Webster's New World Dictionary of the American Language, Simon and Schuster, 1980
- "Online Etymology Dictionary". Etymonline.com. Retrieved 18 June 2015.
- Morgan, J. (1632). A Compleat History of the Present Seat of War in Africa, Between the Spaniards and Algerines. p. 98. Retrieved 8 June 2013.
- Oxford Dictionaries, Oxford Dictionaries Online, Oxford University Press.
- Houghton Mifflin Harcourt, The American Heritage Dictionary of the English Language, Houghton Mifflin Harcourt, archived from the original on 25 September 2015, retrieved 25 February 2018.
- Merriam-Webster, MerriamWebster's Collegiate Dictionary, Merriam-Webster.
- Ostler, 2005 pp. 38–40
- Ostler, 2010 pp. 163–167
- Mohammad Tahsin Siddiqi (1994), Hindustani-English code-mixing in modern literary texts, University of Wisconsin,
... Hindustani is the lingua franca of both India and Pakistan ...[self-published source]
- Lydia Mihelič Pulsipher; Alex Pulsipher; Holly M. Hapke (2005), World Regional Geography: Global Patterns, Local Lives, Macmillan, ISBN 0-7167-1904-5,
... By the time of British colonialism, Hindustani was the lingua franca of all of northern India and what is today Pakistan ...
- "Three Language Formula". Government of India Ministry of Human Resource Development Department of Education. Archived from the original on 22 February 2012. Retrieved 16 May 2016.
- Chandra, Abhimanyu (22 August 2014). "How Hindi Became the Language of Choice in Arunachal Pradesh." Scroll.in. Retrieved 12 March 2019.
- Roychowdhury, Adrija (27 February 2018). "How Hindi Became Arunachal Pradesh's Lingua Franca." The Indian Express. Retrieved 12 March 2019.
- "Swahili language". Encyclopædia Britannica. 27 August 2014. Retrieved 29 April 2019.
- E. A. Alpers, Ivory and Slaves in East Central Africa, London, 1975.., pp. 98–99 ; T. Vernet, "Les cités-Etats swahili et la puissance omanaise (1650–1720), Journal des Africanistes, 72(2), 2002, pp. 102–105.
- Mollin, Sandra (2005). Euro-English assessing variety status. Tübingen: Narr. ISBN 382336250X.
- "Department for General Assembly and Conference Management – What are the official languages of the United Nations?". United Nations. Archived from the original on 12 October 2007. Retrieved 25 January 2008.
- Tweedie, Gregory; Johnson, Robert. "Listening instruction and patient safety: Exploring medical English as a lingua franca (MELF) for nursing education". Retrieved 6 January 2018.
- "English – the universal language on the Internet?".
- "Lingua franca del Mediterraneo o Sabir of professor Francesco Bruni (in Italian)".
- "Sample texts". from Juan del Encina, Le Bourgeois Gentilhomme, Carlo Goldoni's L'Impresario da Smyrna, Diego de Haedo and other sources
- "An introduction to the original Mediterranean Lingua Franca". | <urn:uuid:83edd35a-a6e9-4cc4-a719-58b15e0bbba4> | CC-MAIN-2020-10 | http://conceptmap.cfapps.io/wikipage?lang=en&name=Linguae_francae | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148850.96/warc/CC-MAIN-20200229083813-20200229113813-00213.warc.gz | en | 0.860875 | 3,524 | 3.8125 | 4 |
Rainwater Recycle system
Rainwater resource problems in Taiwan
Taipei city has abundant rainfall, with an average of approximately 2,000mm rainfall each year. However, because of uneven time and space distribution of rainfall, only with Feitsui Reservoir as the only water supply for Taipei city, it is easy to have water shortage in case of insufficient rainfall. Due to environmental protection and preparation concerns, advanced countries such as Europe, America and Japan use buildings or open areas to collect rainwater for reuse. In other words, “rainwater storage and reuse” has become a new method in sustainable use of water resource.
Rainwater recycle system
Process of “rainwater reuse” in the National Chiang Kai-shek Memorial Hall The rainwater storage and reuse system were funded by and the school campus improvement project at the Green department, conducting by Architecture and Building Research Institute, of Ministry of Interior. The engineering work was conducted in two phrases, respectively finished in 2003 and 2004. It was constructed to collect rainwater from main buildings of the National Chiang Kai-shek Memorial Hall, then direct to the collection tank through the sewage system. After a buffering/sedimentation/filtration process, direct to two 900 tones and 300 tones underground cement storage tanks located near the flower beds. After purification, the water is used for irrigation and replenishing pool water.
1.Collection: Collect rainwater on the roof
2.Temporary storage: Collection tank for initial storage
3.Water purification: Buffering, sedimentation, filtration
4.Storage: Underground rainwater storage tank
Introduction of the Rainwater Recycle system in the National Chiang Kai-shek Memorial Hall
The National Chiang Kai-shek Memorial Hall is located in Taipei City, with an area of 250,000 m2. As one of the most representative sights in our country, tourists worldwide come for visits. Furthermore, with an elegant and quiet environment, it is the perfect spot for recreation activities.
In order to construct a city ecological park for a high quality outdoor instruction, over three hundred species of plants and flowers were planted. With constant maintenance, flowers bloom throughout the year, attaining beautiful scenery. Each year, 25,000 tones of water is required for irrigation, approximately a year’s worth of water usage for 70 small families. If tap water and groundwater is used for irrigation, not only does it require huge funding, but also destroy the environmental ecology. Hence, it is essential to use rainwater as substitute water supply. | <urn:uuid:c2a9361c-ef96-4771-abb4-36105ef65897> | CC-MAIN-2023-23 | https://www.cksmh.gov.tw/en/content_110.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00408.warc.gz | en | 0.938925 | 535 | 3.015625 | 3 |
· Cardiovascular Support
· Bioavailable Form of Magnesium
How it Works:
Magnesium is a mineral that is essential for a wide range of fundamental cellular functions as it is a cofactor in at least 300 different enzymatic reactions.* Magnesium is well known for its roles in healthy cardiovascular function and bone formation and mineralization.* It is also critical for the regulation of muscle contraction and nerve conductivity through its influence on cell membrane permeability, as well as on the maintenance of the proper charge balance of the bodily fluids.* In addition, Magnesium is essential for the production of cellular energy from the metabolism of carbohydrate and fat.*
Take 2 tablets daily with food, or as directed by your healthcare practitioner.
Cautions / Interactions:
Large doses of oral magnesium may have a laxative effect. Magnesium may interact with some antibiotics, diuretics, bisphosphonates, and muscle relaxants. In addition, many medications can affect magnesium absorption and excretion. If you are taking prescription medications, consult your healthcare practitioner before using this product. | <urn:uuid:14e66044-379e-4d9d-806f-718b329f4b65> | CC-MAIN-2023-40 | https://www.acu-market.com/magnesium-citrate-200mg-high-potency-100-tabs-by-protocol | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00363.warc.gz | en | 0.925699 | 227 | 2.609375 | 3 |
The tendency towards aniconism and the erasure of the secular-religious distinction is a bit of a conundrum.
Some scholars posit that it was part of a trend from before the rise of Islam. Indeed, even in the 6th century, before the coming of Islam, there was already starting to be a drift away from representational art and a corresponding preference for geometric and stylized vegetal decoration. Notably, Byzantine artists, for instance, made less use of portraiture and depicted human figures, if any, as types rather than real people. This is seen as a reaction to the verisimilitude of Hellenic art.
So the region as a whole may have been in the throes of a cultural shift favouring abstract decoration.
In pre-Islamic Arabia, ordinary people were used to the colourful Byzantine mosaics of the churches and houses in Syria. Arab merchants bought Byzantine and Sasanian fabrics, which one account describes as follows: “stitched in gold and silver thread depicting fantastic beasts peering out at the spectator…”. They also purchased Sasanian dishes decorated with “strange beasts, gods and splendid scenes of hunting and feasting rulers”.
Over time, however, with the advent and spread of Islam, the artistic vocabulary of the region started to change. So too the objects made and sold. By the time the Islamic faith had found its own artistic grammar, Arabic culture had become nonpictorial.
Some say nonpictorialism was somehow intrinsic to Islam because of the metaphysical notion of God. That said, there are few religious texts from Islamic antiquity that positively advise against representation. But in any case, they do not have the authority of the Quran. Therefore, it would be reasonable to say nonpictorialism was not really intrinsic to Islam and the theological justification and legal injunctions for it followed – rather than initiated – Muslim cultural practice. Soon enough, Muslim philosophers helped make the arguments for the wider shift to nonpictorialism. | <urn:uuid:3fba2165-9ad4-4e96-a37b-e5b965cb6765> | CC-MAIN-2023-23 | https://www.rashmee.com/2020/09/07/why-muslim-opinion-started-to-tend-towards-aniconism/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00150.warc.gz | en | 0.965309 | 405 | 2.984375 | 3 |
Nasal obstruction, often referred to as nasal congestion or "stuffiness", is a very common problem. It is usually due to a combination of factors, such as a deviated nasal septum, enlarged inferior turbinates, and inflamation of the lining of the nose (such as from nasal allergies). When medications fail to improve nasal breathing, surgery becomes an option. Surgery is tailored to the specific anatomic problem, which can be challenging.
Septal deformities include both septal deviations (or deflections) and septal spurs. These malformations may be present from birth, or they may be the result of trauma to the nose. Septoplasty is a surgical procedure designed to return the septum to a more midline position.
INFERIOR TURBINATE ENLARGEMENT
The inferior turbinates are normal structures that serve an important function. They humidify and warm air as it enters the nose and makes its way to the lungs. Enlarged inferior turbinates can contribute to nasal obstruction. Inferior turbinate reduction surgery can be performed in a variety of ways, with very high success rates. | <urn:uuid:0ef2a5f6-aeaa-47d5-9ca8-b652a6c97139> | CC-MAIN-2023-23 | https://www.sinusri.com/nasal-obstruction | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00168.warc.gz | en | 0.939178 | 252 | 3.328125 | 3 |
Dishwasher Salt is sodium chloride (e.g bog standard salt) with no iodine added sold for use in helping to soften water in dishwashers.
It is, however, a granular salt, with grains larger than table salt: the fine particulars of a salt ground for table use might clog the softener mechanism in dishwashers, or interfere with the process so that you end up hardening the water.
The soft itself doesn't soften the water. The salt doesn't even get in to where the dishes are. What it is used for is to "activate", or "reset" the mechanical device in the machine that does the water softening. The device is a basket-like contraption that contains resin in small yellow balls.
The purpose of the resin balls is to remove calcium and magnesium ions from incoming hard water. The resin has a negative atomic charge, and so attracts sodium ions (which have a positive charge) to its surface. Calcium and magnesium also have positive charges, but the calcium and magnesium ions are more highly charged, so they are able to elbow their way onto the resin, displacing the sodium ions on the resin in a 2 to 1 ratio: for every 1 calcium or magnesium ion that gets trapped on the resin, 2 sodium ions are released. By trapping the calcium and magnesium, the water is softened. The process is called "ion exchange."
The process only works, though, as long as there are sodium ions on the resin. After a number of uses, the resin becomes saturated with calcium and magnesium ions, and there are not enough sodium ions left to do the job of removing more from the water. The resin balls have be "reset" with brine (salt water.) A strong brine solution is allowed to flow over the resin, thus displacing the calcium and magnesium built up there, and resetting the surface with sodium ions. This is called "regeneration." Dishwasher machines usually do it automatically, either after a certain amount of water has flowed through or every several uses of the machine. The recharging brine is then flushed straight out, and doesn't even enter the dishwasher. Then, the resin balls are rinsed with clean water, and that rinse water is flushed out as well.
The water softener is at the bottom of each dishwasher. There's a lever or a front panel button on the machine that controls how much salt goes through. Some levers are easy to knock as you are filing the salt dispenser up with salt. The lever or button may be marked with a + / - . The numbers on the lever or button correspond to the "hardness" number for water for your area, which you can get from your local water authority, or the people who test your well for you. If it is set to minimum or 0, no salt, or practically none, will get through.
Some machines have indicators such as lights telling you when you need to top up with salt.
Dishwasher salt is commonly used in dishwashers in Europe, and in the UK. Sixty percent of the homes in the UK have hard water; most of these are in the south and east of England. The process is not needed in Scotland, however, as the water is very soft there.
When you go to fill the salt container, it may be full of water. Just put the salt in anyway; it will sink to the bottom and displace the water. Besides, when the salt gets used, it gets made into a brine solution anyway, so don't worry about needing it dry. Most machines come with a funnel, that you stick into the hole in the salt cup to make it easier to fill.
If you live in a hard water area, you need to use salt even if you use 3-in-1 tablets, which contain salt -- as that salt doesn't reset the water softener device.
Watch out if you have North America relatives trying to help in the kitchen, so that they don't make the mistake of putting detergent in the salt compartment.
SaltCoarse Salt; Dishwasher Salt; Finishing Salts; Presa di Sale; Roman Salt; Salmuera; Salt Potatoes; Salt; Well Salt
Please share this information with your friends. They may love it. | <urn:uuid:628e1102-0def-4a34-b2d8-2242e9184af4> | CC-MAIN-2017-34 | http://www.cooksinfo.com/dishwashersalt | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105086.81/warc/CC-MAIN-20170818175604-20170818195604-00359.warc.gz | en | 0.945644 | 883 | 3.390625 | 3 |
Mashudu Netsianda, Senior Reporter
ONCE a small pole and mud settlement about 130 years ago, Bulawayo’s Makokoba suburb, also known as Old Location by virtue of being the oldest township and the first black African suburb in the city, is not an ordinary suburb.
It holds a special place in the history of the country’s liberation struggle.
History has it that it was named after the actions of one Mr Fallon, a native commissioner at the time, who used to walk around with a stick (ukukhokhoba in Ndebele).
The word describes the noise of the stick hitting the ground ko-ko-ko or knocking on doors.
Makokoba, the home of early nationalism, evokes memories of the country’s protracted liberation struggle. Most importantly, it became the epicentre of political activism and the birthplace of African nationalism in Zimbabwe, which ultimately led to the country’s independence from colonialism in April 1980.
It is in this suburb that glaring disparities between black and white communities in terms of race were more pronounced during the colonial era of Rhodesia.
Nationalists like Dr Joshua Mqabuko Nkomo, Zimbabwe People’s Revolutionary Army (ZPRA) commanders such as Cdes Jason Ziyaphapha Moyo, Ackim Ndlovu, Dumiso Dabengwa, Ethan Dube and Sikhwili Moyo among others used Makokoba as a political stringboard from where they mobilised masses to join the liberation struggle.
One of the earliest and most respected of the African nationalists in Zimbabwe, Cde Benjamin Burombo came to Bulawayo in the early years of World War II and earned a living by selling biscuits in the railway compound.
He founded the British African National Voice Association, a trade union with political overtones, and became its president.
Although he had never received any formal education, he taught himself the rudiments of law by his own reading.
In 1948 he was largely instrumental in organising a country-wide strike that led to an urgent examination of wages by the Native Labour Board.
He bitterly opposed the proposed Native Land Husbandry Bill, and when the Bill became law in 1951, he successfully challenged a number of cases where the Act had been wrongly implemented by native commissioners.
His successes in this direction provided the inspiration for the next generation of nationalist leaders to mount a full-scale campaign against the Act in the late 1950s.
Reminiscing the painful days of the liberation struggle, ZPRA Chief of logistics, Retired Colonel Thomas Ngwenya (87) said as young political activists in Makokoba, they endured daily torture at the hands of the repressive Rhodesian security forces in their quest to liberate the country.
“I came to Makokoba in the early 1950s and after finishing Standard Six at St Patrick’s Mission before the buildings today in 1953, I decided to venture into politics having realised that blacks were being discriminated against. As young boys we would stage a protest and march into the city centre,” he said.
“When I got my first job as a bus conductor, it pained me to see a lot of discrimination along racial lines. Blacks had their own buses and whites theirs.”
Rtd Col Ngwenya later joined the Transport and Allied Trades Union before he subsequently went into politics.
“I joined the youth league of the National Democratic Party (NDP), which was led by Dr Joshua Mqabuko Nkomo.
I remember during those days Rhodesia police in armoured vehicles would come to Stanley Hall where we used to conduct meetings and disrupt our meetings and we would in turn throw stones at them,” he said.
“During those days, the likes of Jason Ziyaphapha Moyo and Edward Ndlovu also used to stay in Makokoba a few streets away from my house, which was Number 1099 along 6th Street and we used to cause havoc as young political activists.”
Rtd Col Ngwenya said after the banning of NDP, Zapu was formed and he joined the party.
“When the Rhodesians banned Zapu that is when Joshua Nkomo said enough is enough and vowed that they will continue and that is how I took my first bold step towards joining the liberation struggle in the 1960s.”
He recalled the period when he would travel to Salisbury, which is now Harare to convey political messages using a car belonging to an Indian businessman, who was also a Zapu member.
“I would leave Bulawayo at 2AM for Salisbury where I would deliver the message and then get the message from that end and travel back to Bulawayo to relay it to the party structures in Makokoba.
That was my first political assignment,” said Rtd Col Ngwenya.
He also reminisced how one of their cadres, Cde Bobbylock Manyonga was arrested while transporting a consignment of weapons from Bulawayo to Salisbury.
“Cde Manyonga spilled the beans under interrogation and torture and police raided my home in Makokoba leading to my arrest and I was taken to Ross Camp and later Bulawayo Central Police Station where I was remanded for three days before being taken to Grey Street Prison,” said Rtd Col Ngwenya
At Grey, Rtd Col Ngwenya met a fellow comrade and veteran nationalist Cde Velaphi Ncube.
“It was then that Cde Velaphi Ncube got to know that Manyonga had been arrested and he yelled at me saying ‘get out of here!’
Indeed, a letter was written on toilet paper, taken out by Rtd Col Ngwenya’s girlfriend, one MaNdlovu, during a visit to the prison.
The letter was given to Cde Ethan Dube who passed it on to Leo Baron, ZAPU’s legal advisor and lawyer.
Rtd Col Ngwenya secured bail through the party lawyer and skipped the country to Zambia aboard a train.
Gogo Pretty Khumalo (80) who grew up in Makokoba, said during the liberation struggle the suburb was a hotbed of political revolt and dissension against colonialism.
“It was not easy growing up in Makokoba because of the political situation at the time. Rhodesian security forces would descend at our homes in the middle of the night torture us for supporting the liberation struggle.
I remember in the mid-1960s, a lot of youths dropped out of school and crossed into Zambia to join the liberation struggle,” she said.
“Political meetings were held at Stanley Square under the guise of residents’ meetings.
I remember one-night bullets rained and we had to cover our windows with mattresses as bullet shields.”
Gogo Khumalo said during their numerous raids, Rhodesian police would force a son-in-law to kick his mother-in-law.
“It was so humiliating to be forced to either kick or step on your mother-in-law.
They would force us to do all sorts of bad things during their raids,” she said.
As part of efforts to honour liberation icon Cde Jason Ziyaphapha Moyo, his house in Makokoba suburb is set to be refurbished and transformed into a historical monument.
The rebranding and refurbishment of the house, Number 141 along 10th Street in the city’s oldest suburb is in recognition of Cde Moyo’s contribution to the liberation struggle and the need to preserve his legacy.
Friends of Joshua Trust and Zanu-PF are spearheading the project of restoring the two-roomed house, turning it into a historical township attraction.
Officially launching a fundraising campaign for the restoration, refurbishment and rebranding of JZ Moyo House yesterday, Zanu-PF Vice-President and Second Secretary Cde Kembo Mohadi said the restoration of the house is in sync with President Mnangagwa’s recent visit to the city to launch the Bulawayo Heritage Trail.
Former ZPRA chief of military intelligence, Rtd Brigadier-General Abel Mazinyane who first met Cde JZ in 1969, said transforming the late nationalist’s house into a museum is a befitting honour for his contribution to the liberation struggle.
“We used to call Cde JZ Makokoba because he would hardly spend a day without talking about his life in that suburb.
I am happy because his name will not be erased in the history books,” he said. Friends of Joshua Trust chief executive officer Ms Beverly Pullen said plans are underway for Cde JZ’s house to be enshrined and presented as a historical tourism attraction.
“This will be the first house to be enshrined in Makokoba and the idea is to have all other sites and houses in Makokoba with historical relevance to be refurbished and packaged in a similar way,” she said.
Ms Pullen said Cde JZ Moyo House will contribute immensely to the growth and development of Makokoba.
“Preserving the history of a place through its significant historic resources gives a community its unique character and it involves much more than simply preserving and restoring old buildings such as 141 on 10th Street.
There are also economic, cultural, environmental and educational benefits of historic preservation, all of which are inextricably connected to one another,” she said.
Article Source: The Chronicle | <urn:uuid:8f95bf1b-0fde-4e2f-aff9-b1b980399cd7> | CC-MAIN-2023-50 | https://teamzimbabwe.org/watch-makokoba-home-of-early-nationalism/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00803.warc.gz | en | 0.970272 | 2,008 | 2.78125 | 3 |
Prof.dr.ir. J.F. Groote (1965) studied computer science at Twente University (at that time Technische Hogeschool Twente), obtained a PhD at the University of Amsterdam on research executed at the Centre for Mathematics and Computer Science in Amsterdam. Since 1997 he is working at Eindhoven University of Technology where he occupies a chair in software modelling and verification.
In other engineering disciplines it is very common. Before an artefact is constructed, architects and engineers have created many models of the object-to-be-built. These models are used to understand it thoroughly to guarantee that once the artefact is constructed, it functions as desired.
In software constructions models are uncommon, and if they exist, are often verbose and imprecise. We will show that software can be built by first making formal models and analysing these. Measurements from industrial application shows that the number of bugs during construction can be reduced ten fold, and the total time to construct the artefact can be reduced with a factor 3.
For the techniques used see: https://mitpress.mit.edu/books/modeling-and-analysis-communicating-systems | <urn:uuid:32eb9fda-806f-45cb-bb73-b28e4d10f8d9> | CC-MAIN-2017-47 | http://www.sen-symposium.nl/history/2016/program/groote/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805114.42/warc/CC-MAIN-20171118225302-20171119005302-00757.warc.gz | en | 0.938296 | 244 | 2.515625 | 3 |
Ancient oasis settlement found in Egypt
Published on August 30th, 2010 | by Admin0
The settlement at Umm el-Mawagir in Egypt’s Kharga Oasis, more than 300 miles (500 kilometres) south of Cairo, has been excavated for the past year by a Yale University expedition, whose initial findings suggest it was an administrative post with massive baking facilities, possibly to feed local troops.
“The amount of bread production was pretty amazing,” said John Darnell, head of the expedition, citing discoveries of ovens, bread moulds and storerooms at the site, far out of proportion to its size.
“It’s probably a good bet they were basically baking enough bread to feed an army, literally,” he said.
The site was home to a few thousand inhabitants and also includes remnants of mudbrick buildings, similar to those used for administrative purposes in the Nile Valley to the east, suggesting close contact between the two regions. | <urn:uuid:be1b68f2-5a34-4b2a-856b-afefd57bb4e8> | CC-MAIN-2017-43 | http://www.ablogabouthistory.com/2010/08/30/ancient-oasis-settlement-found-in-egypt/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00139.warc.gz | en | 0.975035 | 209 | 2.53125 | 3 |
2-Month-Old Baby (8 Weeks)
At 2 months old, your baby may have reached certain developmental milestones. Some of these milestones include holding their head steady when being held upright, smiling on their own in response to you, tracking a moving object, and making sounds other than crying. This is also a good time to make sure your car seat is installed properly and that it fits your baby's height and weight.
You and Your 2-Month-Old BabyTwo months -- can you believe how time flies? At this point, you may have noticed how much more engaged your baby has become. Her surroundings have somehow become much more intriguing to her budding curiosity!
Even you, the center of her universe, have become even more captivating than before. Isn't it amazing how many facial expressions your baby has already? While most of them are the result of your baby imitating you, remember that imitation is the highest form of flattery!
Your baby's weight at this point is well above her initial birth weight. A 2-month-old baby boy, on average, will weigh just over 11 pounds, and the average baby girl will weigh about 10 1/2 pounds. There are the little bruisers that hit that mark early and, of course, there are the peanuts that take a little while longer. As long as they are happy and healthy, a number is still just a number.
Boys in the 50th percentile for height will top the charts at 23 inches "tall." The 2-month-old baby girls will measure up to 22 ½ inches.
Developmental Milestones of a 2-Month-Old InfantWhile every child is different and will progress at their own pace, it is always interesting to see what the average child has achieved at this point in their development. Some of the characteristics of development of an infant at 2 months are:
- The ability to hold their head steady when being held upright
- Smile on their own and in response to you or someone or something else they genuinely enjoy
- Can consistently focus both eyes and track a moving object
- Will actively seek out the source of new sounds
- Will make sounds other than crying.
(To learn more about the progress of your infant, click Infant Developmental Milestones -- The First 3 Months.) | <urn:uuid:4d1579f6-b988-49c9-b4bc-a72309aaa900> | CC-MAIN-2014-15 | http://kids.emedtv.com/baby-week-by-week/2-month-old-baby-(8-weeks).html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206118.10/warc/CC-MAIN-20140423032006-00561-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.961868 | 471 | 2.875 | 3 |
You can measure the humidity level in your house with a hygrometer, an inexpensive device that can be purchased at discount stores and hardware stores. Humidity is the amount of water vapour in the air, and keeping indoor humidity between certain levels is beneficial for your home.
Normal House Humidity
Normal house humidity is between 30 and 50 per cent. Lower and higher levels can cause various problems.
Humidity tends to fall below 30 per cent in very dry climates, and in houses where a furnace or wood stove runs a lot during the winter. A portable or whole-house humidifier keeps humidity in the normal range.
Low Humidity Problems
Houses that are too dry can cause people to have dry throats and noses, resulting in respiratory problems. Low humidity also causes dry skin. Wood can shrink, resulting in loose furniture joints. Additionally, you'll notice static electricity in clothing and carpeting giving you small shocks.
Humidity rises over 50 per cent in humid climates, especially during warm temperatures. Central air conditioning is the best solution, but room air conditioners and dehumidifiers also can help.
High Humidity Problems
High levels of humidity in a house can result in mould and mildew, problems with dust mites causing allergic reactions, infestation by other bugs, flaking paint and peeling wallpaper. | <urn:uuid:bb7b8776-15ee-4c2e-9e7f-0751ff224150> | CC-MAIN-2017-43 | http://www.ehow.co.uk/facts_5081759_normal-house-humidity.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824543.20/warc/CC-MAIN-20171021024136-20171021044136-00737.warc.gz | en | 0.921246 | 272 | 3.109375 | 3 |
Presentation on theme: "Haiti Earthquake January 2010. At 4.53pm on Tuesday 12 January, a major earthquake hit Haiti, measuring 7.0 on the Richter scale. It struck just 10 miles."— Presentation transcript:
At 4.53pm on Tuesday 12 January, a major earthquake hit Haiti, measuring 7.0 on the Richter scale. It struck just 10 miles south-west of the bustling capital Port-au-Prince. This is the strongest earthquake that Haiti has experienced in more than 200 years. 12 January: Haiti
The earthquake was so strong that many buildings including the National Palace and the cathedral have collapsed. Thousands of people have died, including the Archbishop, Monsignor Joseph Serge Miot. Destruction
“This is the worst disaster Haiti has experienced. Many people have been killed in Port-au- Prince. Their bodies are everywhere on the streets of the capital. People are still under the debris.” Scale of disaster “The hospitals are overwhelmed with the dead and injured. The risk of disease is great. The streets and public places are filled with people who do not know where to go.” Joseph Jonidès Villarson Head of Emergencies, Caritas Haiti
"Haiti is the poorest country in the western hemisphere. Its people are used to civil strife, hurricanes and floods, but earthquakes are not a normal occurrence. With the majority of the population living in abject poverty, this earthquake will greatly increase their suffering." Clare Dixon, Head of Latin America and Caribbean, CAFOD Poverty worsens impact
Poverty in Haiti Haiti threw off French colonial control and slavery in 1804. Yet there is still a huge wealth gap between the Creole-speaking black majority and the French- speaking minority, one per cent of whom own nearly half the country's wealth. Decades of violence, instability and dictatorship have left Haiti impoverished. This poverty makes the impact of the earthquake even greater. Survivors urgently need clean water, food, basic shelter and medicines. Three million people live in the affected region, so substantial humanitarian assistance will be needed.
We have worked in Haiti since 1970 supporting projects that focus on literacy, agriculture, legal aid and empowering women. We have a lot of experience in supporting emergency response programmes through our partners in Haiti, including the relief efforts following two hurricanes in 2008. CAFOD and Haiti CAFOD poster from 1996
Our local partner is Caritas Haiti. Their emergency response team is working round the clock to support people in urgent need. Caritas agencies from all over the world are helping; Caritas Brazil, Peru and Venezuela have much experience of natural disasters in the region, as well as from France, Switzerland and the USA. How is CAFOD involved?
We have pledged hundreds of thousands of pounds to our partners in Haiti, who will find out what is needed to help the most vulnerable people. The money pledged will help our partners supply water, food, medicines and shelter to people in the worst affected areas and will support the people of Haiti to rebuild their lives in the longer term. Our partners’ work
Catholic schools, parishes and individuals across England and Wales have responded quickly and generously, raising over £500,000 for CAFOD’s work in the first week. Find out how to give to CAFOD>> We are also participating in the Disasters Emergencies Committee appeal Find out how to give to the DEC>> Haiti appeal
As he helped survivors, Dr Louis-Gerard Gilles, a former senator, said, "Haiti needs to pray. We all need to pray together." Let us pray
For the people of Haiti Lord our God, give comfort and healing to all people affected by natural disasters. We remember especially the people of Haiti. We mourn those who have died. May they rest in peace. We pray for those left behind as they rebuild their lives. May they experience your loving care in every person who helps them. We pray for CAFOD’s partners and for all who are working to save lives and to support the survivors. Thank you for your many blessings. Make us generous to share them with our sisters and brothers. We make our prayer through Christ our Lord, Amen | <urn:uuid:0fb1f825-92ec-4b42-9c59-0bc6567ba758> | CC-MAIN-2017-39 | http://slideplayer.com/slide/3771033/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693240.90/warc/CC-MAIN-20170925182814-20170925202814-00006.warc.gz | en | 0.958992 | 864 | 2.96875 | 3 |
What is acne?
Acne is one of the most common skin problems, affecting about 90% of all people at some time during their life. While acne usually occurs in adolescence and young adulthood, it may be troublesome well into the 20s, 30s and even 40s.
Misinformation about acne often prevents proper treatment. Many people do not seek the advice of a clinician because acne is common and will "probably go away by itself." While this may be true, much cosmetic damage and psychological anguish can be avoided if acne is controlled from the start.
How acne develops:
The skin's sebaceous glands, attached to hair follicles, secrete an oily semi-fluid substance called sebum that softens and lubricates our hair and skin.
Pores and hair follicles become plugged with sebum, dead skin cells, bacteria, and other debris. Whiteheads or blackheads form just below the skin surface.
- Whiteheads (also called closed comedones) occur when the backed-up material is trapped below the skin's surface, forming a firm white bump.
- Blackheads (also called open comedones) occur when the backed-up material stretch the duct and its opening and become exposed to air. The resulting discoloration is not dirt but oxidation of gland products and accumulation of pigment. (Some individuals have large skin pores; these are not blackheads but rather a normal variation of skin.)
Pimples (or pustules) occur when the material remains backed up, irritates surrounding tissues and causes inflammation, redness and perhaps discomfort.
In severe cases of acne, cysts (fluid-filled sacks) develop. Without proper treatment, cysts may increase the likelihood of scarring.
Pores and hair follicles can become plugged for a variety of reasons.
- Hormones: At puberty, the body begins producing more androgen-type hormones, which cause the sebaceous glands to enlarge and produce more sebum. Because males produce more androgens than females, they tend to have more severe cases of acne.
- Heredity influences the size and activity of the sebaceous glands. The larger and more active the glands are, the greater the chance of developing acne.
- Bacteria: Normal skin bacteria (e.g. propionibacterium acnes) can act upon sebum to produce irritating substances, resulting in inflammation when the substances are released into surrounding skin.
Other contributing factors and self-care:
- For those with a few blackheads or pimples, washing the face gently with a mild soap 2-3 times a day may be enough. However, excessive cleaning can make acne worse. See also Acne Cleansers and Soaps. Also, non-prescription products with benzoyl peroxide have an antibacterial and drying effect and help unblock pores to prevent formation of lesions.
- Certain foods, such as chocolate and colas, do not cause acne as was once believed. However if you feel certain foods aggravate your acne, avoid those foods.
- Avoid tight-fitting clothes and gear, such as sweat headbands and turtlenecks.
- Certain cosmetics, hair care products and moisturizers may block pores. Check labels and choose products that are water-based, oil-free and non- comedogenic (won't clog pores).
- Oily hair may contribute to clogging the surface of pores, so shampoo hair regularly.
- Do not pick or squeeze blackheads, whiteheads or pimples, because this can cause infection, increased inflammation and scarring.
- Emotional stress may worsen acne - see Stress and Mental Health for suggestions to manage stress.
- Excessive humidity may make acne worse.
- Certain drugs, especially steroids or those containing iodine, may affect acne. Talk to your clinician about side effects and treatment options.
- Onset of menstruation, for some women, increases acne.
Based on severity and individual needs, a clinician may recommend some of the following treatments to control acne. None of these is an overnight remedy; they all must be used for a number of months to determine their effectiveness for any individual. Acne may initially flare up when the treatment begins.
Acne cleansers and soaps remove oil and bacteria from the skin surface. However, sebum production occurs deep in the sebaceous glands, not on the skin surface, so acne cannot be scrubbed off mechanically. Cleaning is a very small part of acne treatment. Once oil reaches the skin surface, few problems are caused except for the oily appearance that most people do not like. Excessive cleaning (e.g. scrubbing or use of abrasive cleaners) may provoke inflammation and actually make acne worse
Topical agents are applied to the skin for treatment of mild to moderate acne. These medications may be used individually or in combination.
- Benzoyl peroxide products (non-prescription and prescription forms) have an antibacterial and drying effect.
- Topical antibiotics (by prescription only) may decrease bacterial population on the skin and in the pores, altering the composition of sebum and reducing the inflammatory process. Examples include clindamycin, erythromycin and metronidazole. Use of these products alone may lead to bacterial resistance, so they are often used in combination with benzoyl peroxide.
- Retinoids, available by prescription, such as Retin-A (tretinoin), Differin (adapalene) or Tazorac (tazarotene) and other keratolytic agents (alphaglycolic, salicylic or lactic acid) act primarily to unblock pores and prevent formation of blackheads and whiteheads. Some of these preparations can be quite drying as well as irritating. Because retinoic acid is derived from vitamin A, some people have attempted to self-treat their acne by taking large amounts of vitamin A supplements. This is not recommended because vitamin A taken by mouth does not have the same effects as topical vitamin A and because serious side effects, including liver damage, could result from this practice. All of the retinoids decrease the skin's natural UV protection, making users of these products more sensitive to sun exposure and increasing risk of sunburn. Therefore, avoid prolonged exposure to sun and sunlamps and use sunscreen daily.
Oral antibiotics (available by prescription only) decrease bacteria on the skin, alter sebum composition and/or reduce inflammation. They may be recommended for moderate to severe acne or acne that has not responded to topical medications. However, improvement may not be apparent for up to three months after treatment begins. Oral antibiotics may be used in combination with some topical agents. Common types include tetracycline, minocycline, erythromycin and doxycycline.
Hormone pills (by prescription only) that include spironolactone and cyproterone acetate shrink sebaceous glands, decreasing the amount of sebum produced. Most women who take birth control pill notice no change in acne but some note an increase or decrease in acne. Males should not take hormone pills due to side effects (e.g. breast enlargement, inability to achieve or maintain erection).
Accutane (isotretinoin, by prescription only) is a synthetic vitamin A derivative, used since 1982 for treatment of severe inflammatory cystic acne that has not responded well to other treatments. This medication requires careful medical supervision because of side effects and precautions. For example, pregnant women should not use Accutane because it causes birth defects in nearly 100% of cases.
Surgery includes extraction of blackheads or whiteheads, cryosurgery (a freezing technique) and injection of steroids into the lesions. These methods can be used to treat individual lesions as an adjunct to overall management of acne.
For more information:
UHS clinicians manage acne and can treat most cases. If additional consultation is needed, the clinician will refer students to a dermatologist at UHS. You must have a referral (written consultation request) from a UHS clinician to visit a dermatologist. To visit UHS, see Schedule an Appointment.
The UHS Pharmacy carries acne products.
AcneNet offers extensive information about acne, treatment and skin care from the American Academy of Dermatology. | <urn:uuid:9569411c-45f8-43c9-bf28-6f28b9edd0ff> | CC-MAIN-2017-34 | https://www.uhs.umich.edu/acne/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109157.57/warc/CC-MAIN-20170821152953-20170821172953-00080.warc.gz | en | 0.921227 | 1,727 | 3.375 | 3 |
Project management: everything you need to know
We explain everything you need to know about project management...
Project management happens across all industries. Usually used to complete projects rather than business as usual (BAU) work, it comprises a number of stages, from developing the initial idea, to planning, implementing and analysing success of a project.
However, it is a pretty complicated process and here are lots of different ways of completing a project. Although most organisations use formal methodologies' to complete projects, some have their own way of working, which can further complicate matters.
We'll talk through the different methodologies common in the IT industry, stages and some tools to help manage projects without formal qualifications.
Types of project management
As the name would suggest, the waterfall method is a sequential project management technique, with stages that flow downwards, just like a waterfall. Stages include conception, initiation, analysis, design, construction, testing, production/implementation and maintenance, with each stage being fully completed before the next starts. It originated in manufacturing, but has since moved on to cover software development, although because it wasn't specifically designed for software development, it's not really the most effective.
Projects IN Controlled Environments (PRINCE2) is a qualification-led project management methodology, which takes a project and organises it into manageable chunks and controllable stages. It was developed by the government for IT systems projects and because it's been designed specifically for that, it's more effective than Waterfall project management techniques for software and app design. It's led by principles and processes, making it an extremely structured way of managing a project. Processes are Starting up a Project, Initiating a Project, Directing a Project, Controlling a Stage, Managing Product Delivery, Managing a Stage Boundary, Closing a Project.
Agile is a much more team-based project management methodology, with collaboration and communication forming the basis of everything. Processes and tools are replaced by individuals and interactions, working software is more important than the documentation issued alongside it and everything is built around responding to change rather than following a plan. It's a much more evolutionary way of working, making it more flexible for projects that are likely to adapt over time.
Lean is a way of developing products fast. It's very responsive to change like Agile and, as its name suggests, aims to be the most efficient way of developing as possible, eliminating waste, sharing learning with flexibility built in its core. Although it goes as far against one of the formal project management principles as it possibly can, by ruling decisions should be made as late as possible, this makes it super-adaptable, although does put some organisations off using it.
DevOps combines elements of Agile project management and lean methodologies and is increasingly the most favoured on technical, such as application development and digital transformation projects, because it's so flexible. It dictates that software and developers should work collaboratively with IT departments, through streamlined communications - the Agile element, but concentrates on getting products and services to market fast - the lean project management philosophy. It's a relatively new practice in comparison with the older methodologies, but is rapidly being adopted in cloud-forward organisations because of its flexibility and room for scale.
The process of a project
What's clear from breaking down the main project management methodologies is that they all comprise similar elements, which is the key to successfully managing a project.
Breaking it down into identifying the goal or problem (initiation), planning the steps to carry out the objective (planning stage), executing the project to meet the deliverables set in the initiation stage (while all the time monitoring and controlling the scope of the project) and finally, closing the project to ensure it's met its objectives, is crucial.
This last stage will also include handing over the project to the operations team, so it can be integrated into the BAU environment, so t can continually evolve if it needs to, making it fit for purpose. Obviously if there is a major update needed that doesn't fit into BAU, it will then need to be handed back to the project management team for the process to start again.
Best tools to help with project management
Although onboarding a project manager is the most effective way of ensuring projects get off on the right foot and are managed successfully throughout, if you're not ready to commit to a formal project management methodology to help plan and execute projects, there are lots of project management tools to help you management one-off projects.
Many of these are free and take the drag and drop approach, enabling you to assign and set tasks, moving them across columns as they progress. Others allow you to track progress to share with the board, if they're all about numbers, data visualisations and ROI.
Although project management requires investment to make it run smoothly, it's worth the outlay, speeding up the time it takes to get products and services to market, while also dramatically improving the productivity of your employees, across departments.
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now | <urn:uuid:6e9da9c6-ae54-45e5-a692-8247aff2e2ef> | CC-MAIN-2020-05 | https://www.itpro.co.uk/strategy/28489/project-management-everything-you-need-to-know | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700675.78/warc/CC-MAIN-20200127112805-20200127142805-00282.warc.gz | en | 0.949475 | 1,131 | 2.875 | 3 |
Protective Practices: A History of the London Rubber Company and the Condom Business
From humble beginnings wholesaling at a small tobacconist-hairdresser shop in 1915, the London Rubber Company rapidly became the UK's biggest postwar producer and exporter of disposable rubber condoms. A first-mover and innovator, the company's continuous product development and strong brands (including Durex) allowed it to dominate supply to the retail trade and family planning clinics, leading it to intercede in the burgeoning women's market.
When oral contraceptives came along, however, the company was caught in a bind between defending condoms against the pill and claiming a segment of the new birth control market for itself. In this first major study on the company, Jessica Borge shows how, despite the "unmentionable" status of condoms that inhibited advertising in the early twentieth century, aggressive business practices were successfully deployed to protect the monopoly and squash competition. Through close, evidence-based examination of LRC's first fifty years, encompassing its most challenging decades, the 1950s and 1960s, as well as an overview of later years including the AIDS crisis, Borge argues that the story of the modern disposable condom in Britain is really the story of the London Rubber Company, the circumstances that befell it, the struggles that beset it, the causes that opposed it, and the opportunities it created for itself.
LRC's historic intervention in and contribution to female contraceptive practices sits uneasily with existing narratives centered on women's control of reproduction, but the time has come, Borge argues, for the condom to find its way back to the center of these debates. Protective Practices thereby re-examines a key transitional moment in social and cultural history through the lens of this unusual case study.
Dr. Jessica Borge is a research associate , at Archives and Research Collections, King's College, London and a researcher in the private sector. You can visit her website at: https://londonrubbercompany.com/
The audio only version of this program is available on our podcast. | <urn:uuid:39b791d7-8572-443e-8643-dd37c0a654a3> | CC-MAIN-2023-40 | https://www.hagley.org/ru/research/history-hangout-jessica-borge | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00704.warc.gz | en | 0.945558 | 424 | 2.5625 | 3 |
One of the most innovative features of the Scottish independence referendum was that 16 and 17 year-olds were allowed to vote. Many pre-ballot commentators assumed that they would lean towards voting in favour of independence. But did they in reality? David Kingman investigates
The recent Scottish independence referendum was the first time that 16 and 17 year-olds were given the right to vote in the UK. This made it an interesting test case for a range of arguments which are frequently advanced both for and against lowering the voting age in local and national elections.
Would young people bother to vote at all? If they did vote, would the dream of independence offered by the Scottish National Party appeal to their youthful idealism?
And the answer is…
Now that the dust has begun to settle on the referendum, it is possible to try and answer some of these questions using the data which have been gathered on how people actually voted. Of course, the vote was anonymous, so it is impossible to assign individual votes to particular members of the electorate. The closest that we can get is to look at the data taken from surveys that asked people how they voted after the fact.
The best sources of information in this regard were two polls, one conducted by the Conservative Party peer Lord Michael Ashcroft, and the other that was undertaken by YouGov. Of the two of them, the YouGov data appear to be more robust because they were based on a much larger sample of the electorate than the Ashcroft survey, although neither of them can be classed as definitive. The YouGov survey managed to gather the opinions of 283 voters from the 18–24 age cohort, while the Ashcroft survey only had 14. However, bearing these limitations in mind, the results they gathered can still provide some interesting insights into how the youngest members of the electorate cast their votes.
The YouGov survey, which asked members of their polling sample how they had voted on the night of the referendum, found that 16–24 year-olds actually favoured staying in the union by a small margin (35% to 33%). Interestingly, YouGov found only one age group, the 25–39 year-olds, where a majority were in favour of independence. Their data suggested that the voting patterns of the youngest group of voters were remarkably similar to those of people in their 40s and 50s; the idea that the vision of an independent Scotland would appeal to an iconoclastic streak among the youngest members of the electorate appears to have been misplaced.
Although it was based on a smaller dataset, the Ashcroft survey actually looked at the issue of how young people voted in greater depth than the one conducted by YouGov. His results suggested that 16–17 year-olds may actually have been in favour of independence by a strong margin (71% in favour), but this then fell to less than half being in favour among 18–24 year-olds. Although this suggests the opposite conclusion to the YouGov data – that the youngest categories of voters were more likely to favour independence – the sample size is simply too small to draw any firm conclusions.
The YouGov data also suggested that turnout didn’t vary greatly by age group. The youngest category of voters in their sample (those aged 16–24) had a confirmed turnout rate of 68%, which is similar to the high levels recorded among the older age cohorts, and remarkably high overall by the standards of recent British elections. It may not be clear exactly how young people voted, but they certainly can’t be accused of not taking the opportunity to exercise their votes seriously.
The outcome of the referendum – a resounding no vote for independence – ultimately raised more questions than it answered about the future of British politics. The poll had a similar effect upon the debate over votes for young people, which some commentators think should be reopened.
Those in favour of permanently lowering the voting age argued that, having given young Scots a first taste of exercising their democratic rights, the British government shouldn’t withdraw it at subsequent elections. This would also mean that the franchise would have to be extended to all 16 and 17 year-olds across the UK, to avoid creating unfairness.
Those who oppose any further lowering of the voting age argue that the Scottish referendum was a special case, a once-in-a-generation poll that occurred largely outside the normal democratic process. In legal terms, 18 remains the age which most clearly demarcates the threshold between youth and adulthood, and receiving the right to vote is an important part of this.
Only one thing looks certain – with the Scottish Nationalists, Labour and the Lib Dems having all pledged to lower the voting age if they get into power, the issue won’t go away any time soon. Whether the outcome of the Scottish Referendum supports either side of the argument is a question for which we would need far more detailed data to be able to answer. | <urn:uuid:e280a208-a075-4f75-b359-767c51093a83> | CC-MAIN-2017-43 | http://www.if.org.uk/2014/10/04/how-did-young-people-vote-in-the-scottish-referendum/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00306.warc.gz | en | 0.981486 | 994 | 3.15625 | 3 |
From time to time, I’m going to add websites or problems that I think challenge visitors in rich ways. One of my very favorites is a little wonder called “Petals around the rose”. There is a nice implementation by Lloyd Barrett on his website. Prepare to spend some time on this, and don’t bother going if you’d ever contemplate doing a web search for solutions. If it takes you a week to solve, it’s a well-spent week. It took me several days (so no, I don’t want to hear about it if you solve it simply after visual inspections 🙂 ). There are several problem solving aspects that I think make this a rich experience… [No spoilers below]
Over the years, I’ve developed a number of questions/suggestions I often use in assisting students in the development of new problem-solving strategies. The goal is to guide students find strategies for approaching novel problems (the good kind, where you aren’t just adjusting for different values, but are really trying to figure out something ‘new’). Continue reading
We all want our students to ‘think critically’ and ‘become better problem solvers’. But what does that mean, and how do we scaffold and provide opportunities developing problem-solving strategies? Obviously, this question is deeper and wider than a single blog post, but I wanted to put my first card on the table. First and foremost, this must all begin with ‘legitimate’ problems. To me, this means ones where a student must reach beyond plug-and-play; there must be elements of identifying which information is useful, choosing approaches that attack weak points of the problem, finding their own path rather than following ones already mapped out. Two cases that I think exemplify ‘real’ problems are Petals around the rose and (surprise surprise) my own PatternMaster.
The rest of this introductory post is dedicated to a distillation of George Polya’s advice to young mathematicians | <urn:uuid:220d7e36-6560-4fd5-814e-e866ba103bca> | CC-MAIN-2020-24 | https://www.thinkbio.guru/tBioWordPress/category/problem-solving-strategies/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388012.14/warc/CC-MAIN-20200525063708-20200525093708-00208.warc.gz | en | 0.954246 | 429 | 2.671875 | 3 |
Christmas Holiday Fire Safety
Taking responsibility for your family’s safety is important every day. It rings especially true around the holidays, historically one of the most dangerous times of the year. The following "12 Days of Holiday Fire Safety" tips were developed to prevent the most common types of home fires that occur during the holiday season. Related video: 12 Days of Holiday Fire Safety (Rogers TV)
- Water fresh trees daily.
- Check all sets of lighting before decorating to ensure they are in good condition.
- Make sure you have working smoke alarms.
- Make sure you have working carbon monoxide alarms.
- Make sure everyone knows how to get out safely if a fire occurs.
- Use extension cords wisely.
- Give space heaters space.
- When you go out, blow out all candles.
- Keep matches and lighters out of sight and reach of children.
- Watch what you heat! Stay in the kitchen when cooking.
- Encourage smokers to smoke outside.
- Keep a close eye on anyone in your household who consumes alcohol while cooking or smoking.
Halloween is an exciting day for children. Keep the following safety guidelines in mind to ensure you have a safe and spooktacular Halloween!
|Around-the-house Safety Tips
- Keep the path leading up to your door free of obstacles for the little ones, especially those with masks who might have trouble seeing in dim light.
- Keep pets indoors on Halloween to protect them from hazards and prevent them from being aggressive to visitors.
- Before you light those candles in your pumpkin, consider using inexpensive safety glow sticks or flameless candles.
|Costume Safety Tips
- Wear a light-coloured or bright costume. Use reflective tape or arm bands to heighten visibility.
- Wear a costume that is properly fitted to reduce the chance of tripping on it.
- Select a costume that is constructed from flame-retardant materials.
- Make sure vision is not restricted. Consider completing your costume with make-up rather than masks. Masks may require that the eye-holes be cut larger for the sake of good peripheral vision.
- Shoes should fit properly even if they do not go well with a costume.
- If a child's costume requires the use of props, such as a flexible plastic sword, make sure the sharp tip is cut or filed round.
- Glow sticks are an excellent way to increase a child's visibility. Consider creating a fun necklace with string to ensure kids will want to wear them as part of their costumes.
- Accessorize with a flashlight!
|Rules for Trick or Treaters
- Bring a flashlight
- Walk instead of running
- Stay on the sidewalks (if there is no sidewalk, walk on the left-hand side of the street facing traffic)
- Avoid jaywalking
- Do not cut across lawns or take short-cuts
- Take masks off when walking from one house to the next
- Do not go inside houses and do not get into vehicles
- Only visit houses that are lit
- Stay away from animals you are not familiar with
- Vandalism is not just a 'trick' - it is against the law and has consequences.
|Rules for Parents
- Be aware of the route your children plan to follow.
- If you are unable to take them out yourself, consider asking another parent, an older sibling or a babysitter to do the honours for you.
- Ensure your child wears a watch so you can establish an agreed upon curfew.
- Teach your children to recognize the places along their route where they can obtain help: Police Station, Fire Station or any other well indicated public place.
- Although tampering of loot is rare, remind children that they must have their candy inspected by their parents or guardian prior to eating them.
Looks like your screen is a bit too small
The page you are attempting to view is not currently compatible
with the dimensions of your device. Please visit this page on a | <urn:uuid:0b0bffd1-0af6-4c96-9383-a2c06a4fe137> | CC-MAIN-2017-30 | http://www.barrie.ca/Living/Emergency%20Services/BarrieFire/Hazards/Seasonal-Safety/Pages/holiday-safety.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425254.88/warc/CC-MAIN-20170725142515-20170725162515-00139.warc.gz | en | 0.919961 | 833 | 3.078125 | 3 |
Physics-O level – Energy, work and power
- This course would cover the fundamental principles of energy conservation and the different types of energy.
- Topics would include the work done by a force, the concept of power, and the efficiency of engines.
- The course would provide an understanding of the basic principles of energy and how they apply to real-world systems.
- Topics covered include kinetic energy, potential energy, mechanical energy, thermal energy, and electrical energy.
- The course may also cover the laws of energy conservation and the concept of energy transfer and storage.
- The course will also cover thermodynamic concepts like internal energy, enthalpy and the laws of thermodynamics. Additionally, the course will delve into the topic of engine efficiency, and the various ways in which energy can be converted from one form to another, and the factors that affect the efficiency of an engine.
Num of Sessions | <urn:uuid:601bedcb-3a04-42db-82de-363f3765fee4> | CC-MAIN-2023-23 | https://www.doerdo.com/live_courses/o-level-energy-work-and-power/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00182.warc.gz | en | 0.915413 | 230 | 3.453125 | 3 |
Science Training Implementing New Science Standards
On January 16, science teachers from across the region participated in the first day of a three-day workshop series at the Gallia-Vinton ESC designed by the Ohio Department of Education to prepare teachers for implementing the new state learning standards in science. Ohio’s Strategic Plan for Education, titled “Each Child Our Future,” was adopted in 2018 and includes revisions to the academic learning standards. This three-day workshop series provides science teachers with a structured exploration and comparison of the new standards, an overview of best practice pedagogies, as well as guided planning time for determining how their science curricula will be impacted and how best to transition to the new standards. The state’s science assessments will become aligned with the new standards beginning next year (AY 2020-2021). Science teachers from Vinton County Local School District, Wellston City School District, Jackson City School District, Gallia County Local School District, Gallipolis City School District, Symmes Valley Local School District, Chesapeake Union Exempted Village School District, and Oak Hill Union Local School District are participating in the workshop. The workshop is being held at the Gallia-Vinton ESC and is being facilitated by Dr. Jacob White. | <urn:uuid:af2cb188-961e-4ca5-8f73-56cdff561067> | CC-MAIN-2020-10 | http://www.galliavintonesc.org/protected/ArticleView.aspx?iid=6GAPG2Y&dasi=4GYAI | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146714.29/warc/CC-MAIN-20200227125512-20200227155512-00256.warc.gz | en | 0.958612 | 258 | 2.765625 | 3 |
Starr collaboration illuminates mysterious pathway to immortality in cancer cells
(Medical Xpress) -- Cancer cells are immortal because they circumvent failsafe mechanisms that stop out-of-control cell proliferation. One of these mechanisms the progressive shortening of chromosomes is prevented by replenishment of telomeres, the protective elements at the ends of chromosomes. Most cancer cells do this with an enzyme called telomerase, but approximately 10 to 15 percent of human cancers use a different pathway called ALT (alternative lengthening of telomeres). Whether or not a tumor has ALT makes a difference. For example, people with glioblastoma live twice as long if the tumor uses ALT.
With support from the Starr Cancer Consortium, a team of scientists from The Rockefeller University, The Broad Institute of MIT and Harvard, Memorial Sloan-Kettering Cancer Center and Weill Cornell Medical College set out to demystify ALT. The team carried out a detailed analysis of a large panel of ALT cell lines for their genetic and cell biological features. How ALT is activated was not known but recent data pointed the finger at an enzyme called ATRX. ATRX changes the way DNA wraps around proteins in chromosomes.
In an article published online July 19 in PLoS Genetics the team shows that loss of ATRX is a common event in the genesis of ALT lines. They also show that ALT cell lines frequently undergo chromosomal changes and are impaired in their ability to detect and repair damage in their DNA.
These hallmarks of ALT are expected to help the detection of ALT-type tumors in the clinic and may lead to ALT-specific treatments, says Titia de Lange, Leon Hess Professor and head of the Laboratory of Cell Biology and Genetics at Rockefeller University, team leader and co-author of the paper. They may also help explain differential survival benefit of ALT tumors.
This work represents a remarkable collaborative effort among five laboratories at four different institutions, says John Petrini, a member of Memorial Sloan-Ketterings Molecular Biology Program, team member and co-author of the paper. Each of us brought our specific expertise to bear on this intriguing and important problem.
It exemplifies the power of collaboration, says William Hahn, a senior associate member of the Broad Institute, team member and co-author of the paper. | <urn:uuid:897cc4e7-a559-47be-9e52-eb1581b2ddcb> | CC-MAIN-2020-24 | https://medicalxpress.com/news/2012-07-starr-collaboration-illuminates-mysterious-pathway.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348502204.93/warc/CC-MAIN-20200605174158-20200605204158-00151.warc.gz | en | 0.936574 | 481 | 2.796875 | 3 |
Let's Explore the Oregon Trail Activity Pack
Oregon Trail Activity Pack with Flip Book: Your students will love learning about the Oregon Trail with this creative activity pack!
This pack includes many interactive activities and learning opportunities for students including:
Informational Articles on:
✔The Oregon Trail
✔Go West Young Man!
✔Life on the Trail
✔Settling Out West
With Character Studies where they will meet:
✔Abigail Jane Scott, a young pioneer
Student Activities Included:
✔Oregon Trail Graphic Organizer
✔5 page Oregon Trail Flip-Up Booklet
✔Vocabulary Flip Flaps
✔For Elementary Grades
SEE IT ON TPT
There are 3 main activities:
Westward Expansion Vocabulary:
Introduce the vocabulary words with the real-life photo posters included. You could post these posters around the classroom and have students travel around to match up and define the words in their flip flaps or use as a center activity. These colorful posters are excellent for a bulletin board display too!
Have students read the informational articles about the Oregon Trail. Each article has questions and scenes for students to connect and color. Next, read the character studies where students will Meet Abigail Jane Scott. The character studies come in color and black and white for students to color. You could have students work with a partner or in small groups. These could also be used at a center or learning station activity.
There is a custom-created graphic organizer to highlight key information, and/or use for review. Have students complete the Map Activity and 5-page Flip-Up Booklet with a cloze passage, timeline activity, important items, and four facts about life on the Oregon Trail. I usually have students complete the pages of the flip-up booklet at a station or as a center activity. Then we build the pages of the booklet one by one. The booklets fit perfectly inside their interactive notebooks or as a stand-alone booklet. You could fold a 12x18 piece of construction paper in half to make a cover for the booklets.
This is a Digital Download. No Physical Product will be shipped.
- These specific files are ©2018 Heart 2 Heart Teaching, LLC. All rights reserved.
• For personal use, classroom use, and non-commercial use only. It is unlawful to distribute any part of this file for any reason (whether they are free or for purchase).
- Clipart, graphics, photographs, found inside this product are copyrighted. They may not be extracted from this file without written permission from the original artist(s).
- We'd love to see how you use these activities in your classroom--- Tag @heart2heartteaching on Instagram!
How will I receive my download?
Once purchased, you will first receive an order confirmation email. Right after that, you receive a separate email with a link that you will click to download the zipped file. You will receive one or more PDF files.
What if I can't find the email with the Printable in it?
If you're using Gmail as your mail service, be sure to check the "spam," "promotions," and "updates" folders/tabs! Your email will be sent via our automated system (omitting the potential for human error) so if you ordered the download and entered the correct email address, you can be sure it's in your email somewhere!
What's a ZIP file?
Many of our resources are in a compressed ZIP file. A ZIP file is a compressed folder with multiple files. A ZIP file takes up less storage space making it easier to download. ZIP files are able to be opened easily, just follow the steps below depending on your system.
For Microsoft Windows:
- Right click on the ZIP folder
- Choose Extract All from the menu
- Choose a place to save the file
- Click Extract
For Google Chrome:
- After it finishes downloading
- Click on the download box at bottom left of the browser page
- Click Extract All at the top of the page
For Mac Users:
- Double click on the ZIP folder
- The file should automatically extract
Other Options--try opening the ZIP file using one of these free websites:
Where do I print my download?
For BEST RESULTS, print the posters on the premium brochure and flyer paper from Office Depot. Using this paper gives the posters a vibrant look that really makes the colors pop! Or send the file to a print shop. But don't worry about that if you need these quickly! Just print on regular paper on the best quality setting on your printer.
Having Printing Issues?
Many of our files are PDF’s are large units with a lot of graphics and photographs. Sometimes, it may look fine on your screen, but may not print out correctly. If you’re having trouble printing a PDF, please be sure that you're opening the PDF with the latest version of Adobe Acrobat Reader
After downloading and installing Adobe Acrobat Reader:
- Open the PDF
- Click Print
- Select Shrink oversized pages
- Click Advanced
- Check the box: Print As Image
- Click Print | <urn:uuid:fc5f6abc-0983-4511-80bd-badbb3d76188> | CC-MAIN-2020-05 | https://heart2heartteaching.com/products/oregon-trail-unit-with-articles-activities-flip-book | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00321.warc.gz | en | 0.883682 | 1,077 | 3.140625 | 3 |
A stand down of an employee occurs when they are told to cease work activities and go home. During the stand down period there is no expectation of work and no right to wages.
When can an employee be stood down?
Under the Fair Work Act 2009 (Cth) an employer can stand down an employee in circumstances where the employee cannot be ‘usefully employed’. The Act gives three specific instances of when an employee may not be able to be usefully employed.
- During a period of industrial action, i.e. during a strike.
- When there is a breakdown of machinery or equipment, in circumstances where the employer cannot be held responsible for the breakdown.
- For any cause warranting a stoppage in work activities that is outside the employer’s control, i.e. due to a flood, natural disaster, loss of power etc.
Just because there is a strike, a breakdown of machinery or an occurrence that disrupts the normal flow and pace of work activity, does not mean that an employee cannot be usefully employed. In fact, it is quite possible for an employee to be put to good use during such times. As such, before one of the aforementioned scenarios can confer upon an employer the right to stand down a worker, the employer must first show that there is no use to which the employee may be put.
In determining whether or not an employee can be usefully employed, the case of Re Carpenters and Joiners Award (1971) 17 FLR 330 lays down certain legal principles. In particular the case establishes that:
- A worker will be capable of being usefully employed if they can undertake work activities which are within the terms of their employment contract, even if the work is not of the type that the employee usually engages in.
- If there is work for some but not all of the employees, the employer cannot validly stand down the entire workforce. If, however, electing only some of the employees to work would cause an industrial dispute, then all workers may be stood down.
- If the utilisation of some employees during a proposed stand-down period will result in a reduced workload when normal work activities are resumed, so be it.
When can an employee not be stood down?
An employer cannot stand down a worker for the reasons identified in the Fair Work Act 2009 (Cth) – if the employee is bound by an enterprise agreement or contract of employment and the agreement includes its own stand-down provisions. In such a case, strict adherence to the term of the document takes precedence over the legislative stand-down provisions.
Remedies available to a worker who has been unlawfully stood down
The burden of establishing that a stand-down provision has been lawfully exercised rests with the employer. As such, it is important that the right is exercised with care and caution. An employee who has been unlawfully stood down may:
- sue the employer for a breach of contract;
- seek injunctive relief;
- seek declaratory relief; and
- seek the recovery of wages lost during the stand-down period.
Would you like to know more about the stand down provisions found under the Fair Work Act 2009 (Cth), under an employment contract or your rights and responsibilities concerning the same? Our dedicated and specialist team of LegalVision lawyers would be happy to assist you with any queries that you may have. | <urn:uuid:6f560418-08bf-411f-83e2-971bb5c58da1> | CC-MAIN-2017-43 | https://legalvision.com.au/under-what-circumstances-can-i-stand-down-an-employee/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826210.56/warc/CC-MAIN-20171023164236-20171023184236-00472.warc.gz | en | 0.952305 | 695 | 2.53125 | 3 |
What you can treat dry cough in children?
Every parent begins to worry when there is a dry cough in a child than to treat him? What causes this symptom? What drugs can relieve severe coughing? Coughing is a natural function of the body, which is aimed at preventing airway foreign agents.
A dry cough occurs in children for a variety of reasons:
- influenza, SARS, acute respiratory infections;
- the inhalation of small objects, which cause irritation of the larynx;
- inflammation in the upper respiratory tract: bronchitis, tracheitis, bronchial asthma;
- allergic reactions;
- dry air in the room;
- cigarette smoke, polluted air in the street;
- cancer of the lungs;
- congenital malformations of the heart.
Given that the cough may not only develop because of the presence of infectious or viral diseases, but also signal more serious diagnoses, signs you need to consult a doctor for advice. Only a doctor have to prescribe medicinal drugs as self-medication can have dire consequences.
Treatment of dry cough
Dry cough in children, all therapeutic measures should be discussed with a doctor, as the recovery procedure takes place with some peculiarities:
- High probability of development of side effects, allergic reactions and overdose. This is particularly relevant issue in children up to 2 years. Many drugs have age restrictions, so only a consultation with a physician and full compliance with all recommendations will allow you to avoid unpleasant moments.
- Most drugs cough causes drowsiness, dizziness, so children need to give before bed to a child to be able to relax.
- Children under 2 years are not recommended to give expectorant medicines, as at this age they have not yet learned how to expectorate phlegm.
- Any disease produce toxins in the body, so treatment must include plenty of warm drinks.
You should be prepared to provide emergency assistance in case of dry cough. Almost always a dry cough is accompanied by seizures in which the child is unable to cough and he has a lack of air. If the child does not provide correct and timely help, it may lead to asphyxia. In such cases, you must perform the following steps:
- unbutton in the area of the neck area;
- to call an ambulancehelp;
- a baby to turn back to him and slightly tilted down, and then run the small pats between the shoulder blades;
- if the cause of the asthma was an allergic reaction or bronchial asthma, it is necessary to give a child an inhaler.
What drugs should only tell a doctor, but the principle of treatment in almost all cases, is standard.
First and foremost, with dry cough child prescribe medicines that act on the specific center in the medulla oblongata.
This center is responsible for coughs, so all drugs have the principle of peripheral and Central effects. They are prescribed not for all kinds of dry cough, only in the case of severe attacks, accompanied by vomiting or convulsions.
Special attention should be paid to the instruction to all antitussive drugs. It is forbidden to take those medicines, which contain narcotic substance.
Children under 2 years of dry cough is better to treat with herbal remedies, but here we must be careful with allergic reactions.
At the slightest manifestations of Allergy one should immediately stop taking the cough syrups.
In many cases the treatment of dry cough standard. Prescribed the following medications:
- Cough with a reflex action. They block the signal from the brain that slows down the process of sputum discharge.
- Mucolytics. They are necessary for the liquefaction of sputum and its exit to the outside.
- Cough medicines to liquefy the phlegm. The main active ingredient of these medicines is soda, ammonium chloride.
Any treatment will be effective only if proper care of the child. Regular walks in the fresh air, wet cleaning, airing will make the healing process fast.
Physiotherapy is recommended to perform with any dry cough, in addition, which is caused by allergies. Most often, dry heat, inhalation therapy with the use of herbal baths with essential oils, aromatherapy.
But all these methods of treatment for cough should be used with caution in order not to provoke an allergic swelling of the Airways.
Excellent job with the cough, hot compresses, mustard plasters. Ointments, compresses you can buy at the pharmacy or make them yourself. It is forbidden to make warming procedures in the fieldheart.
Traditional methods of treatment of dry cough in children
- To alleviate bouts of severe coughing, reduce their symptoms will help the infusion of pine sticks. For its preparation you need 0.5 liters of milk to boil and add 1 tablespoon of pine buds. Insist broth for one hour and given a warm 50 ml every 2 hours. If the child doesn't like boiled milk, then you can instead take plain water. A more pleasant taste to give the young spruce shoots.
- The fat badger, goat, sheep is excellent as a means of warming. Perform the procedure it is possible only in the absence of temperature of the baby. Enough to slightly melt the fat and RUB the chest and upper back, wrap a warm scarf. Such procedures can be performed several times a day.
- This fat can be taken internally with warm milk or tea. If the child is not drinking beverages with fat, in pharmacy special capsule with him.
- Radish. It acts as mucolytic agent, helps bring the phlegm on the surface. To prepare the drug in two ways. For example, cut a small hole in the radish and put 1 tsp. of honey. The resulting juice drink 1 teaspoon 4-5 times a day. Can a radish cut into small pieces, sprinkle with sugar and place in the oven and wait until begins to stand out juice. It also take 1 teaspoon 4-5 times a day.
- Onions can be used as syrups, compresses. Syrups are prepared from the bow on the same principle, that of radish. The vegetable should be ground and mixed with sugar. Take small portions 2 times a day. This medication not all children will be able to drink without problems, as the taste will be quite unpleasant. Warm up the onions must be cut into pieces, fry in a dry pan and applied on the area of the trachea.
- Onion, garlic is recommended to use as aromatherapy. It is desirable cut into small pieces and put in the headboard.
- The juice of aloe leaves helps not only to neutralize a dry cough, but also to strengthen the child's immune system. Enough to take butter and honey in equal proportions, mixed with a few leaves of aloe, which previously was in the fridge at least 10 days. Ready to give the mixture 4-5 times a day before meals.
- Cakes made of honey and mustard can be used instead of the regular mustard. They need to take a spoonful of honey, add mustard powder, vodka and vegetable oil. All of this mix and form a pellet. In the first minutes you must control the reaction of the skin because honey is a strong allergen.
What else is recommended
- Boiled potatoes in their skins helps ascompresses. It is necessary to boil a few potatoes in their skins, mash these and add 2 drops of vegetable oil. From the warm mass to form a pellet and applied to the chest and back of the child. Such procedures are best performed at night.
- Coughing helps to calm the compress of honey and fat. In equal proportions mix the fat and honey, ready mix plaster foot, chest, back.
- Excellent warming effect has camphor oil. You can RUB the chest and back at night. If the child has no temperature, it is recommended to use warm foot baths. For best effect you can add mustard. After the procedure feet should wear wool socks.
All the recipes of folk medicine are effective and useful only in the case of a full consultation with your doctor.
Dry cough is always painful for a child. To quickly alleviate the unpleasant symptoms, you must consult a doctor and strictly follow all the recommendations. | <urn:uuid:73ffba55-a7b5-4120-a476-49c8b2ca1a25> | CC-MAIN-2023-23 | https://respiratory.vsebolezni.com/kashel/suxoj-kashel-u-rebenka-chem-lechit.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00202.warc.gz | en | 0.941336 | 1,727 | 3.234375 | 3 |
Submitted to: American Society of Agronomy Meetings
Publication Type: Abstract Only
Publication Acceptance Date: 8/8/2007
Publication Date: 11/7/2007
Citation: Stevens, W.B., Jabro, J.D., Evans, R.G., Iversen, W.M. 2007. In-season movement of fertilizer nitrogen in conventional and strip till sugarbeet systems. American Society of Agronomy Meetings. Interpretive Summary:
Technical Abstract: Strip tillage represents a lower input alternative to conventional tillage sugarbeet (Beta vulgaris L.) production. A one-pass strip till system significantly reduces fuel use while enhancing soil conservation. Nitrogen use efficiency with strip tillage should also be greater because fertilizer is banded directly below the seed row rather than broadcast and incorporated as with conventional tillage. Research was conducted at Sidney, MT to determine if fertilizer distribution in the soil during the growing season is more favorable with strip tillage than with conventional tillage. A vertical grid sampling scheme was implemented utilizing a linear transect perpendicular to and centered on the crop row. A soil core 1.7 cm in diameter and 60 cm in length (depth) was extracted every 5 cm along the transect using a hand-operated sampling device that encased the core in a plastic sleeve. The resulting data were then used to construct two-dimensional graphical representations of the soil NO3-N concentration of a vertical cross section (60 x 60 cm) of the crop row in the early, mid and late growing season. Soil NO3-N concentrations at planting showed that fall-applied N remained within 60 cm of the soil surface, but that substantial amounts had leached to a depth of 50 cm with strip tillage and 40 cm with conventional tillage. By mid season, soil NO3-N concentrations in the 5 to 40 cm depth range had been depleted to about 3 mg kg-1. Concentrations were higher in the 45 to 60 cm depth range indicating that N was leaching out of the 60 cm sampling zone. One month prior to harvest most of the sampling zone was relatively depleted of NO3-N, with average concentrations less than 4 mg kg-1. Concentrations were somewhat higher in the top 5 cm, due presumably to mineralization of organic N residues. | <urn:uuid:84d9e025-7bac-4467-acf8-19b6198955e0> | CC-MAIN-2017-26 | https://www.ars.usda.gov/research/publications/publication/?seqNo115=223093 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00120.warc.gz | en | 0.932946 | 480 | 2.6875 | 3 |
- ¡Colorín Colorado! Carta a los padres de familia
Bienvenidos a ¡Colorín colorado! Esta sección bilingüe ha sido diseñado pensando en ustedes, con el fin de brindarles información útil para ayudar a sus hijos a convertirse en buenos lectores y en estudiantes exitosos
- Builidng Collaboration Between Schools and Parents of ELLs
Transcending barriers, creating Opportunities Robin Waterman, Ed.D. Beth Harry, Ph.D.University of Miami. This Practioner's Brief, was sponsored by the National Center for Culturally Responsive Education Systems (NCCREST)
- Colorin colorado
Information, activities and advice for Spanish-speaking parents and educators of English language learners
by 3 users
- ¡Colorín Colorado! Boletín para padres y familias
This is a newsletter in Spanish for parents.
- Colorín Colorado :: Lessons Learned from Immigrant Families
Lessons Learned from Immigrant Families By: Young-Chan Han (2010)The author shares several stories of immigrants adjusting to the school and culture with recommendations for schools.
- Engaging Families in Children's Mathematical Learning
Engaging Families in Children's Mathematical Learning: Classroom Visits with Latina Mothers by Marta Civil and Beatriz Quintos
- Involvement of Parents of Diverse Cultural and Linguistic Backgrounds
A summary of critical issues and promising practices in the Mid-Atlantic region.
- LAB at Brown: Teaching Diverse Learners -- Family and Community
The following information presents a basis for building family/teacher relationships by presenting facts and resources that educators of diverse learners need to know in order to promote communication between home and school.
- Motheread/Fatheread: A Family Literacy Program
Lydia Bassett, Program Officer for Humanities Washington explains how this program uses quality children's literature to help parents read effectively with their children, improve parenting and literacy skills, and increase family communication.
- Parents: Content Reading and Writing for students MS to HS
Do you have a child in middle school or high school who is having difficulty with reading and writing? Are these difficulties having an impact on performance? Do you want guidance for offering help at home? If so, welcome to Literacy Matters. There are three routes you can follow to get started.
- PBS Parents . Early Math . About the Site | PBS
Welcome to the PBS Parents Guide to Early Math, an online "math coach" for parents and caregivers looking for ways to nurture the development of their child's early math skills.
by 2 users
- Reading Is Fundamental: See the Spanish Version also
¡Leamos en familia!RIF provides free reading resources to families, children, and educators. These resources include activities, tips, articles, contests, interviews, and games. Recommended by Lucy G'Fellers
actual keyword list
- Reading Rockets : Parent tips
Articles from A-Z Parent Tips As a parent, you of course want the very best for your children! The articles provide you with tips on how to support your child's reading and language development.
- Teachers' Biggest Challenge: Not Being Able to Communicate with Students and Their Parents
By Dr. Suzanne Irujo, ELL Outlook™ Contributing Writer This is the fifth and last in a series of articles exploring classroom implications of some of the findings of a study done by Gándara, Maxwell-Jolly, & Driscoll (2005). These researchers interviewed teachers of English language learners (ELLs) in California and identified challenges they face. This article provides suggestions and links for communicating with parents.
- U.S.A. Learns FREE site for Adults
This is a free site to help Adults learn English. Spanish directions are available.
- Ways to Accommodate Parents of English Language Learners
Top 3 Ways to Accommodate Parents of English Language Learners
- The Midwest LINCS Family Literacy Special Collections
1 - 17 | <urn:uuid:76295201-65fb-4592-b558-303599a208b9> | CC-MAIN-2013-48 | http://www.netvouz.com/jgordon/folder/1975309882782334982/Parents | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163848048/warc/CC-MAIN-20131204133048-00026-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.815382 | 862 | 2.84375 | 3 |
The Jet Set Hyperloop!
Is Elon Musk’s tube train a blast from the past?
The Hyperloop. It’s new – It’s different – It’s amazing!
Except that it’s not that new.
But it is amazing- and a little different!
Low pressure tube travel –
Hovering. floating, levitating- Rapid low friction travel has been a dream- no- a mission– since the first efforts in the 19th century to create a working pneumatic train. The ideas date back to the 18th concepts of George Medhurst’s “Atmospheric Railway”.
Some early designs featured a moving shoe in a pneumatic tube which pulled a train above it. Other, more ambitious designs would place passengers in the tube. There had been experiments in Britain, efforts in France, and several demonstrations built in the U.S .
Indeed, a small pneumatic subway line was opened in 1870 under Broadway in New York!
19th century pneumatic efforts deserve-and may get- an additional post- which will profile the early risk takers- Entrepreneurs and technical men such as New York’s Alfred Beach and Chicago’s Joe Stoetzel – as well as other bold pneumatic champions.
The general hyperloop concept (as we know it today) has been around for over 100 years- The specific technology to make such a system a reality has been in various stages of prototype since the early 1960’s. These were government agency efforts, scientific efforts –yet no one person had the engineering and business skills to make such a system seem feasible to the general public.
Perhaps we needed an 19th century salesman for the 20th century commuter. We may have needed a person passionate about the idea of moving many more people, much more efficiently. A true believer- who’d be able convince a skeptical public that traveling at high speeds in a windowless tube is a good idea- A person with business sense, a command of engineering and physics- and little ol’ time moxy.
“…it really does not seem so rankly impractical to conjecture on the possibilities of such a high speed railway… A fortune awaits the man who is big enough for the job. It wants another Tesla or Edison and he is bound to arrive sooner or later.”
A Tesla? How about a Musk?
Elon Musk’s Hyperloop Idea
Back in 2012, Elon Musk announced that he’d soon make public a set of plans for something new he’d been mulling over. Musk had been stuck in traffic so often traveling between his Tesla and Space X plants, that he began considering better ways to commute, He (and every other Californian) knew that a High Speed rail line was being planned for travel through the congested areas of Southern California. Certainly some high speed rail is better than what exists now. However, going by the latest estimates, by 2025 only the first 250 miles of bullet train track will exist between San Jose and Bakersfield. Total LA to -San Francisco High Speed Rail cost- 64 Billion dollars.
Musk, never one for thinking conventionally, decided to create a better commute. A Hyperloop. Details would be forthcoming.
Musk: “It’s a cross between a Concorde, a rail gun, and an air hockey table.”
Good to his word, in August 2013 Musk released his Hyperloop plan. It featured a low pressure tube and an air levitated train traveling high speeds, with low energy consumption. However, the big challenge he faced was one of physics- Given his system’s very high speeds, an air compression barrier would form in front of a hyperloop vehicle traveling in a confined space . Given the tight quarters in the tube he’d planned, pressure buildup in front of the vehicle would definitely have been a problem. Actually, this pressure barrier-known as the Kantrowitz Limit– wasn’t simply a problem, it was a potential showstopper:
Attempting to pass a high-speed passenger-pod through a very low pressure tube runs squarely into the Kantrowitz fluid flow limit. Historically, the solutions to working within the limit have been “go fast” and “go slow”. A major innovation in the Hyperloop proposal provides a novel third approach to remain below the Kantrowitz limit while still moving at high-subsonic velocities: adding a front-end inlet compressor to actively transfer high-pressure air from the front to the rear of the high-speed transport capsule, and thus bypassing much of the air that would have resulted in the dynamic shock of the choked flow
Musk solved the problem– as did a set of scientists and engineers in the 60s. In a decade characterized by ambitions bold enough to send men to the moon, engineers were planning trains like no one had seen before. The jet set seemed to want- to need – travel well past the speed of sound. Such speedy travel had seemed possible for most of the 20th century, indeed patents were granted as early as 1912. It was a matter of technology timing, political will, and money.
The 20th Century’s Very High Speed Train Experiments
High speed travel tube experiments date back to the earliest days of the last century. Early in the 1900’s, Professor Boris Weinberg, a Russian mechanical engineer, presented a potential travel wonder- an electromagnetic method of transporting you through a vacuum “from New York to San Francisco in half a day”.
The car of the vacuum electric system is a three hundred-pound cylinder three feet in diameter with conical ends hermetically sealed. You lie prone within it — its solitary passenger. There is no track. The car is really a free body sustained by electromagnets which are placed thirty feet apart
There had been an earlier work- documented in the magnetic levitation patent of Emile Bachelet, however, in his version, there was to have been no evacuated tube.
Even the famed rocket scientist, Robert Goddard, once drafted – in detail- a possible travel tube system – A 1,200 m.p.h. from New York to Boston! He’d written about it in a 1909 issue of Scientific American.
Goddard had worked on several tube train patents– His first application was to have been a magnetically levitated and accelerated vehicle – the actual patent he received (posthumously) was for his second work, a train car levitated and accelerated by “fluid pressure between relatively movable parts”.
Despite the apparent soundness of some of the aforementioned designs, the technology of the time would have made building and operating any of these systems nearly impossible. Unless a perfect vacuum could have been maintained, or the vehicles designed to move incredibly fast, these concepts would have faced same the fundamental pressure challenge that Elon Musk did so many years later – The Kantrowitz Limit.
Tube Pressure Wave Solution Came in 1947
Tubeflight and Joseph Foa
A concept for addressing the “showstopper” air pressure problem referenced earlier had already been (somewhat) solved by 1947:
Joseph V. Foa, while working at Cornell Aeronautical Laboratory, was looking at both the promise and challenges of tube trains. Instead of employing a vacuum, his tube system combined air-cushion suspension with jet propulsion in an entirely new way.
At the time, Foa thought that a fanjet or ramjet could be used to shift the air in the front of the car to its rear. There would be a much smaller – (or perhaps no) air column issue to address. Therefore, the cars could go faster, and less energy would be needed to move them In the lab he was able to prove that such a system would work, and propel the oncoming air around the vehicle- and would add thrust!
Later, after moving on to Rensselaer Polytechnic, Dr Foa began working on designs for several very large vehicles- one of which was to be nine feet in diameter and 195 feet long. It would hover from the tube wall by way of six very large air cushion pods. The planned top speed of this vehicle was some 400 Mph. Foa proposed tubes that would go through the ground, or be slightly elevated, like a pipeline. Dr Foa continued working on the project at Rensselaer, and created tubeflight test vehicles as well as an outdoor pipeline / subscale tube test rig.
Dr Foa’s other design? Transcontinental class craft- powered by ramjets-moving supersonically, at up to 2000 miles per hour. At these speeds. and without the concerns of weather, high speed tube travel could have seemed quite practical.
Foa felt that the tubes for these vehicles could be either put on the surface, elevated down the center strip of superhighways, or buried underground like a pipeline. At such high speeds the tubes would have to be extremely straight – and stable.
Several other Jet Set travel tube proposals simply chose to start with tunnels:
Gravity Vacuum Tube Train
Lawrence K. Edwards, an engineer at Lockheed, proposed a subsurface gravity-vacuum system called “Gravitrains” – whose movement would be based on the weight of the vehicle and pneumatic pressure. It was a rather straightforward concept: After leaving a station the cars would run through underground tunnels on a downward incline- and the forward momentum would coast them upward to stations at the surface.
In 1967 Edwards proposed building such a system to work in concert with the (then new) BART trains in the Bay Area. His system was to be known as Bay Area Gravity-Vacuum Transit, and would have operated alongside BART for much of its route from San Jose to Marin. Stations were to be three miles apart- between them, air would be evacuated in the tubes in front of the train, which would pull it on its parabolic course. Exiting the station, the tube would slope downhill until midway between stations, then gradually climb back uphill to the next station. A top speed of over 210 mph between each of the 23 stops was anticipated. Illustrated Gravitrain:
In 1972, Robert Salter, an engineer for the Rand Corporation, made public the first of several sets of evacuated tube train proposals based on internal studies the consulting firm had done. The initial presentation suggested a U.S. Focused Very High Speed Transit System Later, in 1978, he proposed a more ambitious system – The Trans-Planetary Subway System or “Planetran” The vehicles in these systems were to travel at high supersonic speeds. In Rand’s concept, like the 60’s plans which preceded it, tubes were to be constructed using incredibly advanced boring methods- but it was to be done in phases. For example, in Phase 2, the thought was that perhaps the military might use the incomplete tubes as protected staging areas-
Which makes sense given that RAND (short for R-AND-D) usually did studies for the Defense Department. Additionally, the plans included provisions for sharing the proposed large,multi-lobed tube chamber with freight trains. (See attached illustrations below) What was unique about the Rand proposals were that they accounted for the politics and economics of such an ambitious (and expensive) idea.
Given the potential high Mach (supersonic) speeds- Cost benefit comparisons with both the SST and possible future Hypersonic plane were made. Credit Rand with clearly presenting the idea of phased building, sharing with conventional railroads, utilities, telecom, etc. The attached illustration above lists “missile basing”, one wonders who saw this report at the time- and would such a large set of rather empty tunnels be seen as entirely peaceful? Especially since the chambers would be large enough for several missiles to be moved without being seen. Perhaps this part of the plan was a bit provocative.
Say what you will- Planetran was a bold proposal. Of all the concepts presented here- Rand’s was the most ambitious. Despite the daunting technical challenges- it featured the largest tunnels, the fastest trains, and a nationwide system plan. It also featured an incredibly rapid construction schedule and overly optimistic cost estimates.
Advanced Tunneling as Priority
For each of the proposals outlined above , engineers at M.I.T. felt tunnels 500 feet underground were the answer. The structure of rock is uniform at those levels, and soil issues and rights of way would not be concerns. The practicality of the MIT plans was predicated on bringing drilling /tunneling costs down by 75 percent- From the (then) Secretary of Transportation, John Volpe:
“One big drawback is the high cost of tunneling. Our Department has research programs underway looking toward technological breakthroughs to reduce tunneling costs and time frames”
Nuclear Tunnel Boring
Given the successful high temperature rock drilling efforts earlier in the decade- in the late 60’s new techniques were considered by Federal researchers to address the high tunnel cost problem. If the time and capital costs of boring and drilling through rock could be reduced, fast underground travel tubes could be considered. Enter the nuclear boring machine! Yes, Los Alamos National Labs designed several nuclear powered tunnel boring machines whose tips would get so hot as to melt the rock in front of the device. These powerful “nuclear subterrenes” were to push forward, with drill tips as hot as 1700 degrees Fahrenheit! What would be left behind the machine? Smooth glass walls- A ready made tube for a gravity-vacuum vehicle, a Planetran, or a Tubeflight train.
Several patents were issued for this bold. unconventional tunnel boring technology. Given their potential, nuclear TBM’s were also considered for use by the mining and oil industries as it had “particular advantage at hitherto inaccessible depths“.
Additional Advanced Tunneling methods
It’s clear that among many policy makers, there was an expectation that technology would make tunneling cheaper, and surface land rights would get increasingly costly. Therefore, tunneling experiments seemed an obvious candidate for Federal support. The (then new) U.S. Department of Transportation (DOT) was investigating additional new tunneling methods:
Tunnels of the future may be bored by jets of flame or hyper-velocity jets of water. Chemicals, laser beams, or plastic-encased pellets of water fired from powerful gas guns may be used to cut through or break up the rock.
High Speed Train Propulsion
Tunnels or no, the means of high speed propulsion would need to advance to at least the prototype level. Some had proposed moving the vehicles with jets, others suggested on board propulsion supplied by external microwave power transmitted to the train cars through their travel tubes. Each needed testing. One far-out 50’s concept that is rarely seen:
This is included in the interest of being thorough. (This article is, after all about Jet Set tube train efforts).
At the time, “Atomic” was all the rage. There were plans for atomic powered vehicles of all sorts. It was, therefore, not that far-fetched to think that one day soon a train could be powered by a small atomic pile. If such a nuclear powered train were inside an enclosed cylinder- (perhaps a travel tube made of glass!) voila- a super train!
How would it have operated? At the stations, the wheels would lower to hold the the train. As the train moved forward ,the air just in front of the train would be forced around its cars. This would have created a compressed/pressured air layer- keeping the train from the walls of the tube. The wheels then would have been retracted.
This is similar to some of the other concepts. What’s different here is the nuclear reactor feeding super-heated air to the jet turbines – which then would have pushed the train forward with incredible thrust.
Also shared with other concepts is the notion of simultaneous boring / melting of rock to form the tubes and tunnel walls (in this case the melted rock would form glass). It’s no surprise that part of this concept came from the Owens-Illinois Glass Company.
The Linear Induction Motor
In November 1961, Popular Science published a feature article on the work Dr. Eric Laithwaite of Manchester University was doing on Linear Motors. The promise of this approach was a potential train design whose speeds could approach 200 miles per hour. The concept was simple- it began with a standard design “unwound” squirrel cage induction motor. It was then straightened (made linear) so that the train carried only the field coils (half the motor) and, on the track bed a vertical aluminum plate would have acted as the armature (the other half of the motor). Rather than spin (in a conventional design) a linear motor’s electrical force applied becomes propulsive.
Dr Laithwaite’s thinking was that the train sets could be rather light, as only the field coils need to travel with the vehicle. As the on-board wheels would not drive the vehicle, skidding and spinning on hills or ice would be no longer be a concern. Eventually, air cushions could be used in place of those conventional wheels. According to the article, British Transport was planning on building experimental tracks in London, including one, which at seven miles, would have allowed for a top speed of 150 mph. The video just below features a program overview. Starting about 3:35 into the following video Dr Laithwaite makes the linear motor principle quite clear. At 11:15 the actual full size test unit is shown operating. The concept illustrations in Popular Science had become a reality.
Despite the initial optimism (and working “hovertrain” prototypes in Britain and France) – the affordability and practicality of the linear motor / air cushion concept had started to come into question. In fact, the Linear motor train program in Britain seems to have been shuttered prematurely (1973/’74) due to a fall off in government support. British Rail was committed to its own advanced passenger train, and claimed it would be too expensive to scrap existing track and rolling stock. The government was interested in the induction technology of the Hovertrain, but without a customer -it was difficult to justify the program’s additional costs. British rail was, instead, interested in moving to its own Advanced Passenger Train “APT” (tilt train on rail) technology, which itself was delayed and mired in controversy. In America, however, linear motor and hover technology were each just getting started.
America Builds Its High Speed Trains
Travel Tubes, Linear Motors or Turbo Fans? Vacuum or atmospheric? Power carried internally or externally? In America, what appeared to be lacking was a specific set of proven on-vehicle technologies. Several combinations were planed- Trains that would float on a cushion of air, powered forward by propellers, turbojets, ramjets or linear induction motors. In the U.S. , it was time to move out of the lab, and test in the real world.
In 1965, the Federal Railway Administration (FRA) authorized an effort to build several prototype hovering vehicles under the Tracked Air Cushion Vehicle (TACV) program. TACV would be a hovertrain powered by a linear induction motor (LIM), The goal was performance of some 300 miles per hour. In 1971, Garret, Grumman, and Rohr were each selected to build a test unit for the program. Each firm’s vehicle was to be a test bed to investigate one or more aspects of the linear motor, air cushion, and guideway.
TACRV – Grumman
In the middle of all this, Los Angeles was looking for a solution to connect Los Angeles International Airport with San Fernando Valley by 1972. So now there was…a (perceived) critical need for a high-speed ground transportation (HSGT) system. Also planned for was a connection from LAX to San Diego.
UTACV – Rohr
Stage three of the TACV project was a complete linear motor powered hovertrain with passenger seating- The Urban Tracked Air Cushion Vehicle This vehicle was made by Rohr, (and is pictured) However, the vehicle arrived late in the test program and, given that funds were running dry, its tests were performed over only 1.5 miles of track. Rohr’s wonder train could therefore only go as fast as 145 mph.
Despite its great aesthetics, the train had many drawbacks. It had issues with electrical supply, energy efficiency and noise. There were concerns about static charge, and the large amounts of flying debris generated as it hovered into the station area.
Budgets extinguished, all advanced vehicle testing ended in October of 1975.
The Jet Set Hyperloop efforts ended with -a good deal of research done, many years of experimentation, and three built and tested prototypes. However, there would be no tubes, no hover trains, no linear power. Separate ongoing maglev efforts remained in the lab, despite trials in Germany and Japan. The costs of these new systems were seen as simply too high for a new, untried mode which would not immediately fit into the existing rail network.
Additionally, some of the TACV prototypes were commissioned from defense contractors as indirect Federal support (the Vietnam war was winding down). These contractors had little to no experience making products for- or selling to- the mass transportation market. Despite the U.S. Government’s efforts to drum up support for domestic high speed rail (including funding the first transportation expo!) there was little support shown this technology at the local or state levels.
1970s America Slows its High Speed Train
Metroliner and Turbo Trains
Given the lack of support for new infrastructure and train technologies, safe, incremental change was the new order of the day. The Northeast Corridor infrastructure was to be repaired and upgraded, and the line would be served by a new high speed conventional train (The 125 Mph Metroliner).
At the same time the two largest passenger railroads, after years of declining ridership- (and loss of U.S. Mail contracts)- combined in 1968 to form the Pennsylvania- New York Central. Several years later, PennCentral declared bankruptcy.
In 1970, AMTRAK was formed by the US government to pick up the shattering pieces of America’s passenger railways. At the time, implementing incredible new train technologies would have been out of the question.
Just after its formation, there was some movement by Amtrak to lure passengers back to the railroad. Outside the northeast, additional corridors saw some upgrades, and were served by new tilting Turbo trains, and imported Turbo Liners. Neither turbo train was able to go near its rated design speeds, due to poor signaling and track conditions at the time.
With limited funding and a railroad network that was simply too antiquated to operate high speed trains that were becoming common in European countries such as France and Germany there was little chance of any such [very high speed]technology being used in the United States.
21st Century High Speed Transit
Amtrak High Speed
Currently Amtrak runs several high speed services including the 150 mph tilt train, the Acela Express. It has plans for an even faster, 220 mph Acela replacement, but, like the California High Speed train mentioned earlier- this program comes with an extremely high price tag: Amtrak’s “Vision for the Northeast Corridor” will cost $150 Billion.
Many of the 20th century tube travel concepts outlined here featured powerful electromagnets. The magnets would either levitate the train, propel it, or both. There are now several 250 mph+ commercial magnetic levitation lines in operation (China, Japan) – In China, there is even talk of an incredibly high speed “Super Maglev”
Despite the technical achievements of Maglev, there are still very few actual surface commercial routes.
What about the Jet Set idea of convincing people to travel in a small low pressure tube at near supersonic speeds? They said it best a century ago, and it bears repeating:
it really does not seem so rankly impractical to conjecture on the possibilities of such a high speed railway… A fortune awaits the man who is big enough for the job. It wants another Tesla or Edison and he is bound to arrive sooner or later.” | <urn:uuid:50754cbb-e0ed-4c06-afe9-0dce2d331afc> | CC-MAIN-2017-30 | http://theworksmith.com/2016/02/25/the-jet-set-hyperloop/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423769.10/warc/CC-MAIN-20170721102310-20170721122310-00235.warc.gz | en | 0.971527 | 5,100 | 2.640625 | 3 |
Reconstructed by Marquette University
Like most European medieval structures, it was not built in a single generation but showed the accretions of various periods and architectural styles, a living record in miniature of the history of the little village and of France.
After the French Revolution, when the archives of many of the French churches were lost or destroyed, it gradually fell into ruin and wind-swept dilapidation.
Then, after the First World War, Jacques Couëlle, a brilliant young architect and archeologist from Aix-en-Provence, passed through Chasse and came upon the Chapel which he excitedly referred to as "ce monument absolument unique en son genre." Couëlle attained fame as one of France's leading restorers of ancient buildings, reconstructing a thirteenth century château at Castellaras, restoring an abbey in Spain, and assembling medieval sculptures for the Louvre. Today he has become one of France's most important modern architects, responsible for the developments at Castellaras-le-Neuf on the slopes of the Alpes Maritimes.
In the 1920's Couëlle made meticulously careful architectural drawings of the Chapel at Chasse, taking numerous photographs and measuring and numbering stones. All of these drawings and photographs are stamped with his special seal which is reproduced here:
In 1926 Gertrude Hill Gavin, daughter of James J. Hill, the American railroad
magnate, acquired the Chapel, and it was Couëlle who negotiated its transfer to
her fifty-acre estate at Jericho, Long Island, in the New World.
The Chapel in question must have been built in the fifteenth century, perhaps even before, and was called the Chapelle de St. Martin de Sayssuel . . . this Chapel, dating from the Middle Ages, formed a small edifice which was without doubt used for devotions and for the burial of influential people of the community.Among the many historic memorials in the Chapel he especially noted the tomb-still a part of the sanctuary floor-of Chevalier de Sautereau, a former Chatelain of Chasse, who was "Compagnon d'Armes" of Bayard (1473-1524), the famous French knight "Sans peur et sans reproche" (without fear and without reproach).
Stone-by-stone the Chapel was dismantled and shipped in 1927 to Long Island amidst anxieties lest the French government stop the exportation. These fears were well founded, for shortly thereafter the French "Monuments Historiques" halted shipments of such monuments abroad.
The reconstruction plans for Long Island were made by one of America's leading architects, John Russell Pope, who also planned the National Gallery in Washington, D.C., for Andrew W. Mellon and designed the Frick Mansion in New York, which has since become the Frick Museum.
Added to the Chapel were two important and priceless treasures-duly noted by John Russell Pope on his blueprints-with which numerous legends are associated: the early Gothic altar and the famous Joan of Arc Stone. The stories surrounding the latter are especially interesting. They tell of how Joan of Arc (1412-31) prayed before a statue of Our Lady standing on this stone and at the end of her petition kissed the stone which ever since has been colder than the stones surrounding it. What seems certain is that the niche, of which it is a part, is of the same period as Joan of Arc and as the Chapel.
One of America's most distinguished stained glass artists, Charles J. Connick of Boston, who was responsible for much of the stained glass in the Cathedral of St. John the Divine in New York, was commissioned by Mrs. Gavin to design and execute four stained glass windows in the style and colors of the vitraux of The Sainte Chapelle in Paris. He set them in the original stone mullions and traceries from Chasse.
On Long Island the Chapel was attached to an impressive French Renaissance château that Mrs. Gavin also brought stone-by-stone from France.
In 1962 the Gavin estate passed into the possession of Mr. and Mrs. Marc B. Rojtman. Shortly before they were to move in, a fire, which smoldered for sixteen hours, gutted much of the château but almost miraculously spared the Chapel.
The exterior facade of the château, which in the sixteenth century belonged to the royal line of the Dukes of Orléans-Longueville at Melun in France, was saved. This the Rojtman's presented to the Metropolitan Museum where it is scheduled to be installed at the east end of the Medieval Sculpture Hall, where it will survey the Spanish Cathedral Gates of the Hearst Collection and the J. P. Morgan Collection of Medieval Art. For this gift the Metropolitan Museum of Art made the Rojtmans "Fellows in Perpetuity."
In 1964 the Rojtmans presented the Chapel to Marquette and had it dismantled and sent to the campus for the University to reconstruct. They also gave numerous furnishings for the Chapel, including a crucifix, banner, a dozen priedieux, torchères, candlesticks, lectern, missal stand, vestments, and antependium-all of approximately the same period as the Chapel. In addition they presented an early Gothic antique font, probably of the twelfth or early thirteenth century.
The dismantling of the Chapel on Long Island began in June 1964 and took nine months to complete. Each stone was marked in three places: green for the top, red for the bottom, the inside carrying the number of the stone in relation to the others. Eighteen thousand antique terra cotta roof tiles were removed and packed. A fleet of trucks, each truck carrying forty thousand pounds, brought the Chapel stones to Milwaukee, where the first shipment arrived in November 1964. After the material was stored for the winter and the ground was cleared, reconstruction on the campus started in July 1965.
Architectural plans for the reconstruction at Marquette were initiated by the French architect Lucien David and revised and completed by the noted Ernest Bonnamy, a graduate of the French Beaux Arts and a member of the famous firm of Kahn and Jacobs, New York. The rebuilding was done by Siesel Construction Company with the careful supervision and cooperation of Roy H. Dirks of the Office of Campus Planning and Construction.
The principles of reconstruction were those employed at the Cloisters, a division of the Metropolitan Museum of Art at Fort Tryon Park, New York. Several changes were made to adapt the Chapel to the campus: the nave was lengthened, necessitating the addition of several windows; the tomb of Chevalier de Sautereau and the niche were moved to the left and the sacristy to the right-restoring them to their original positions in France-and such modern concessions as in-the-floor electric heating were introduced.
After traveling from Chasse to Long Island and then to Marquette, the Chapel so fittingly dedicated to St. Joan of Arc on May 26, 1966, has come to a new home far from the Rhone River Valley where it stood for over five hundred years.
"It is doubtful," wrote Milton Samuels, Chairman of French and Company, New York, in the official appraisal papers dated April 9, 1964, "if such an historic architectural monument would be permitted to leave France today."
The Chapel is, to our knowledge, the only medieval structure in the entire Western Hemisphere dedicated to its original purpose: Ad Maiorem Dei Gloriam.
John Pick (+l981)
See also Contemporary photos of the Chapel on the campus of Marquette University, Milwaukee, Wisconsin(not part of this brochure)
Copyright 1966 by Marquette University. Reprinted with Permission | <urn:uuid:5c7e7708-2727-490a-8db9-99e30c32951c> | CC-MAIN-2014-15 | http://www.uwgb.edu/wisfrench/library/wisc/jeanne/index.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535775.35/warc/CC-MAIN-20140416005215-00416-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.964511 | 1,640 | 3.015625 | 3 |
Abnormal eye movements in psychotic patients were first described more than 100 years ago.(Diefendorf AR, Dodge R (1908): An experimental study of the ocular reactions of the insane from photographic records. Brain 31:451– 489). Over the years several attempts have been made to explore this defect as a marker of the disease. Schizophrenic patents and family members have deficits in smooth pursuit eye movements. Incidence vary between 12-95%. However, up to 20% controls also show this defect. Gaze maintenance is also defective in schizophrenia, though not all studies agree on this.Free moving scan paths, where subjects view pictures (free-viewing) show that eye movements are confined to limited area/ limited features of the source.
This group of researchers ( Aberdeen and Munich Universities) studied the above defects in cases and controls and tried various classifier models to find the best model to distinguish between cases and controls.
88 schizophrenia patients, mostly outpatients on second generation antipsychotics, participated in the study. Any neurological condition/head injury was an exclusion criteria.Controls were free of substance abuse and family history of psychosis.Infrared eye-movement recording was performed using head- mounted equipments with a remote camera and head/chin rest.Smooth pursuit involved tracking a circular target for 20 sec as it moved . Free-viewing scanpaths were produced in response to 56 color images (8-sec each). Gaze maintenance was tested (Fixation stability test) by maintaining steady gaze only on a central circular target for 5 sec and to ignore an identical distracter target.
Case control data was used to generate models. This included gradient boosted decision trees (GBDT) and probabilistic neural networks (PNN). The model used all 55 dependent measures in the above tests.
Performance on pursuit, scene viewing, and steady fixation tasks were all abnormal in the schizophrenia group compared with control subjects
The boosted decision tree (GBDT) method achieves close to complete separation on single tasks. Using combined measures from all tasks GBDT achieves complete separation of the training data and cross- validated performance is good (accuracy 87%).
Retesting (stability): The GBDT model was used to check for a change in predicted status of 26 schizophrenia and 8 control individuals attending for reassessment 9 months later, with 82.4% accuracy.All control subjects were correctly classified.
Novel cases: Predictive performance was tested using novel schizophrenia (n= 36) and control volunteers (n =13) recruited at a later date. Six schizophrenia cases and two control subjects were misclassified (79.6% accuracy).
Modified PNN reached 98% accuracy in discriminating cases and controls. A simplified PNN model using only the free viewing and fixation tasks produced accuracy of 95%.
The group consider that the free- viewing scan paths represent a generalsed deficit in schizophrenia. This appears to be the biggest discriminator of cases and controls.
It also appear that these abnormalities are state markers.(abnormalities are independent of effect of medications, independent of duration of illness, age of onset or severity of illness).
Some differences in German and Scottish samples.High proportion of cases smoked.Replication cohort was of much younger age. Authors discuss the reasons for these and how these factors may not affect the observations
1. Is this specific to schizophrenia? further research required with other disorder groups
2. How does this fit with our current understanding of patho physiology of schizophrenia?
Clinical practice: Eye movement recordings are less time consuming and easy to roll out. Replication in further samples is eagerly awaited.
Summary of the article:
Simple viewing tests can detect eye movement abnormalities that distinguish schizophrenia cases from controls with exceptional accuracy. Benson PJ, Beedie SA, Shephard E, Giegling I, Rujescu D, St Clair D.Biol Psychiatry. 2012 Nov 1;72(9):716-24. | <urn:uuid:77cdf402-c588-4139-bb69-1b4e271a5e25> | CC-MAIN-2017-43 | https://psychiatristupdate.wordpress.com/2012/11/05/can-eye-movement-tests-diagnose-schizophrenia-with-accuracy-biol-psych-nov-2012/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822625.57/warc/CC-MAIN-20171017234801-20171018014801-00488.warc.gz | en | 0.934338 | 809 | 2.609375 | 3 |
- A peremptory challenge is made by an attorney who wishes to have a person excused from jury service without giving or having to justify a reason that they would be an unsuitable juror.
There is a notable exception to this called a Batson challenge. The Supreme Court ruled in the case of Batson v. Kentucky (1986) that peremptory challenges cannot legally be used to remove jurors on the basis of their race alone. The court expanded the list of impermissible reasons for a peremptory challenge to include sex in J.E.B. v. Alabama ex rel. T.B. (1994). Some states include other reasons as well. This is an area of ongoing litigation, not only to include additional impermissible reasons for peremptory challenges (such as on the basis of religion, sexual orientation, political affiliation, etc.), but also to effectively enforce the currently existing prohibitions.
In most trials, the number of peremptory challenges each side may make is limited and varies according to the type of case and the seriousness of the offense. In general, more peremptory challenges are allowed in criminal trials than in civil trials and more are allowed in progressively more serious criminal cases, with the most being allowed in capital cases. The number (or a range, especially in the case of trials with multiple defendants) of peremptory challenges is often specified by law.
Contrast this with a challenge for cause.
Note: the term is pronounced PERemptory challenge, not PRE-emptory challenge.
Petit Jury, Petty Jury
- A petit jury, sometimes called a petty jury, is what most people think of when they hear the word jury. This is a body of individuals who listen to an entire trial and then retire to another room to deliberate and decide the case.
In a criminal trial, the petit jury decides whether the accused is guilty or not guilty of each charge. In all capital cases, and for some lesser criminal offenses in some states, the petit jury is also called upon to decide the sentence if the accused is convicted. In civil cases, the petit jury is responsible for finding for the plaintiff or the defendant, for awarding damages, and sometimes for deciding other matters depending on what is at issue in the case.
Note: regardless of which spelling is used, the first word in this term is pronounced PETTY, not like PETITE.
Plea Bargain, Plea Deal, Plea Agreement
- A plea bargain, also referred to as a plea deal or plea agreement, is a deal in which an accused person agrees to plead guilty or no contest in exchange for concessions by the prosecutor. The prosecutor may agree to drop one or more charges, reduce a charge to a less serious one, make certain sentencing recommendations to the judge that are more favorable to the accused, etc.
Unfortunately, one of the side effects of plea bargaining is that prosecutors then have an incentive to stack charges against the accused. By artificially inflating the number of charges or the seriousness of the charges made, prosecutors leave themselves room to bargain with the excessive or unjustly harsh charges. This gives them unfair leverage with which to bully the accused into forfeiting their right to trial by jury.
Presumption of Innocence
- One of the key foundations of the criminal legal system in the United States is the principle that the accused is presumed to be innocent until proven guilty.
The prosecution bears the entire burden of proof to prove true beyond reasonable doubt each and every element of a crime a defendant is charged with. If the prosecution fails to do so for one or more charges, the accused is supposed to be considered by the legal system to be innocent of those charges.
However, whether the legal system actually upholds this standard in practice is called into question by the practice of sentencing on acquitted conduct. This is an area of substantial legal dispute and active litigation.
See standards of proof. | <urn:uuid:c2efa9c5-4356-423b-a204-0b91d8986ffc> | CC-MAIN-2020-05 | https://fija.org/library-and-resources/library/definitions/p.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00109.warc.gz | en | 0.945941 | 814 | 2.859375 | 3 |
The equal treatment of all people was originally contained within a number of different acts.
Since October 2010 these were consolidated and harmonised into the Equality Act 2010. This act defined equality as “the condition of possessing the same rights, privileges and immunities, whilst being liable to the same duties”.
This act therefore specifically protects certain characteristics such as someone’s age, disability or race. However it is important to recognise that these characteristics are fluid, allowing everyone’s self-identification to be protected even if this is not expressly stated within the act.
All employees are entitled to equal treatment in the work place. This includes;
- Reasonable adjustments – Includes any adjustments that need to be made to cater for a person’s disability.
- Equal opportunities – All employees should be given the same opportunities to progress themselves and their career.
- Equal pay – This will mean that pay reviews will be based on a person’s performance only and not the protected characteristics or their relationship with the assessor.
- Fair treatment – ensures that all employees are treated equally and not discriminated against or bullied.
Types of Discrimination
Discrimination is defined as unjust and prejudicial treatment of a person focusing around the protected characteristics. The main two types of discrimination are;
- Direct discrimination – Less favourable treatment because of a protected characteristic.
- Indirect discrimination – When a policy, practice or rule is applied to everyone in the same way, but puts someone with a protected characteristic at a ‘particular disadvantage’ without a good reason for it.
Unfortunately, sometimes a person may find themselves in a situation where they are not being treated equally. In these circumstances:
- Speak to your manager or any member of the management team that you feel comfortable approaching.
- Review your employee handbook and the policies as this may include information about how to raise any issues you are having with a colleague or manager.
- Remember that your employer has a responsibility to protect its employees from discrimination. | <urn:uuid:997bc202-250c-43ba-98c0-9cdf3b333a9e> | CC-MAIN-2020-29 | https://www.healthassured.org/blog/equality-employment/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657172545.84/warc/CC-MAIN-20200716153247-20200716183247-00046.warc.gz | en | 0.956913 | 411 | 3.765625 | 4 |
(Natural News) For the first time since 1973, the United States now leads the world in terms of oil production. And according to reports, we have the ground underneath Western Texas and Eastern New Mexico to thank.
A new assessment by the U.S. Geological Survey (USGS) estimates that untapped regions of what’s known as the Delaware Basin, a component of the greater Permian Basin, contain 46.3 billion barrels of oil, 281 trillion cubic feet of natural gas, and 20 billion barrels of natural gas liquids – an amount two times larger than what was estimated in a 2016 assessment of just the Wolfcamp shale play in Permian’s Midland Basin.
These estimates take into account access to continuous, unconventional oil comprised of “undisclosed” but “technically recoverable” resources, according to the USGS. This means that such resources are accessible using methods like slant drilling and hydraulic fracturing, also known as “fracking.”
“Christmas came a few weeks early this year,” stated U.S. Secretary of the Interior, Ryan Zinke, about the unexpected discovery. “American strength flows from American energy, and as it turns out, we have a lot of American energy.”
Will the 2nd Amendment Be Destroyed By the Biden Admin?
“Before this assessment came down, I was bullish on oil and gas production in the United States. Now, I know for a fact that American energy dominance is within our grasp as a nation.”
For more related news, check out Fracking.news.
For the first time EVER, the U.S. now exports more oil than it imports
This news comes at the same time that President Donald Trump has announced that, for the first time, the U.S. is now exporting more crude oil than it’s importing.
This makes the U.S. more robust in terms of energy independence than even Middle Eastern energy powerhouses like Saudi Arabia, which is known for its oil production.
According to the official numbers, the U.S. exported a net of 211,000 barrels of oil during the week that ended on November 30, 2018. Based on historical records provided by the Energy Department, this is the first time this has ever happened since the numbers first started getting tracked back in 1973.
“So when does the U.S. send a delegate to OPEC meetings?” joked Kyle Cooper, a consultant at ION Energy in Houston, as quoted by Reuters. “It’s really quite amazing. I do think that will occur more and more often in the coming years.”
New technologies make it possible to detect, access domestic energy resources
As for America’s vast domestic oil and natural gas reserves, we wouldn’t even know about these latest ones were it not for advancements in the technology required to identify them.
“In the 1980s, during my time in the petroleum industry, the Permian and similar mature basins were not considered viable for producing large new recoverable resources,” says USGS Director, Dr. Jim Reilly.
“Today, thanks to advances in technology, the Permian Basin continues to impress in terms of resource potential.”
The latest assessment put together by the independent oil and natural gas consulting firm Rystad Energy back in 2016 estimates that there’s currently 60 billion barrels of shale oil sitting underneath the ground in Texas alone – which is more recoverable oil than in the entire nation of Saudi Arabia.
These energy reserves in the Delaware and Midland assessments contain “our largest continuous oil and gas assessments ever released,” says Reilly. “Knowing where these resources are located and how much exists is crucial to ensuring both our energy independence and energy dominance.”
Just the Delaware area alone consists of 10,000 square miles of land that span five different counties in Texas, and another three in New Mexico. It is now said to be among the top areas for producing oil and natural gas in the entire country.
Sources for this article include:
Your Daily Briefing:
Fight Online Censorship!
Get the news Google and Facebook don't want you to see: Sign up for DC Dirty Laundry's daily briefing and do your own thinking! | <urn:uuid:70ee563f-61eb-4f22-9c30-073d26e7691c> | CC-MAIN-2023-14 | https://dcdirtylaundry.com/worlds-largest-oil-reserves-just-discovered-under-texas-new-mexico/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00704.warc.gz | en | 0.954969 | 901 | 2.78125 | 3 |
Inflation has been described as a both a general condition of rising prices, measured by increases in the Consumer Price Index (CPI), and an expansion of the money supply that causes a currency's value to fall. U.S. CPI-based annual inflation has risen steadily through 2008 and by September was above 5.3%.
Inflation defined by rises in CPI measurements focuses more on inflation's results rather than the causes of inflation, some argue. Earlier definitions, by contrast, stressed its origination through a sudden increase ('inflation') in the supply of currency and/or goods to an economy.
According to InflationData.com, a tracking website, the CPI-based annualized monthly U.S. inflation rate has varied from 3.94% in April to 5.60% in July 2008. The site claims it measures the inflation rate accurately to two decimal places whereas the U.S. Bureau of Labor Statistics, which compiles the raw data, calculates the rate to only one decimal place.
According to the Bureau of Labor Statistics, the Consumer Price Index only increased .1 percent in November 2010 on a seasonally adjusted basis. In all of 2010, the index increased 1.1 percent before seasonal adjustment.
In the beginning of 2011, the Financial Times reported that inflation would be a common theme in the new year. Inflationary pressures have been building from the developed countries such as the United States and Europe as well as emerging markets like China and Brazil to the smaller markets like Thailand, Malaysia and Vietnam. Investors are left in demand for index-linked bonds that offer protection against rising prices. Inflation will also change the way investors look at emerging markets as they decide if the overheating risks outweigh the respected countries' positive growth. | <urn:uuid:15a1d823-f8f8-4185-b07d-b1610faebb31> | CC-MAIN-2020-24 | http://ww.marketswiki.com/wiki/Inflation | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390755.1/warc/CC-MAIN-20200526081547-20200526111547-00293.warc.gz | en | 0.95731 | 357 | 3.40625 | 3 |
A potent lemony herb related to parsley, celery and carrots.
It is also known as coriander, though in the US, coriander generally refers to the dried seeds of the cilantro plant. Cilantro is a powerful, bright, almost citrusy herb. Interestingly, those who say they hate cilantro aren't just being picky- to some people, due to a genetic quirk, cilantro tastes like soap. Cilantro is often used in Latin, Caribbean, and Asian dishes, typically chopped and sprinkled on spiced dishes just before serving. Americans refer to coriander by the Spanish "cilantro" because our first widespread use of the herb came via Mexican dishes. Cilantro has a very distinct smell and taste, though at first glance it's virtually indistinguishable from parsely (so be sure to always read your labels). Cilantro stems can be chopped and used just like the leaves, or you can add them whole to simmering soups, stews, and broths for a punch of extra flavor. Like most herbs, cilantro is highly perishable, so if you don't plan to use it within a few days, store it stem-down in a glass of refrigerated water.
NEVER MISS OUT AGAIN, OPT IN TO RECEIVE OUR NEWSLETTER | <urn:uuid:debe730b-a0ae-4e65-b91c-4a82f00a0f46> | CC-MAIN-2020-10 | https://www.peachdish.com/ingredient/cilantro | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144058.43/warc/CC-MAIN-20200219061325-20200219091325-00276.warc.gz | en | 0.946092 | 269 | 2.515625 | 3 |
Newspapers have always played an important role in genealogical research. In the
case of San Francisco California, this role becomes even more important.
On April 18, 1906 a devastating earthquake shook the San Andreas fault near San Francisco. Even greater than the damage caused by the quake itself, estimated at $20,000,000, was the damage caused by the subsequent fires that broke out in the city. By the time the fires had been extinguished, leaving another $400,000,000 in losses, most of the city had been destroyed including the government buildings. The loss included nearly all of the public records held by the city/county government --- land records, vital statistics, court records, and so on.
Compounding the loss, the State of California did not require recording of vital statistics (births, marriages, and deaths) until 1 July 1905. Prior to that date, counties kept their own records. After July 1905, a standard form was used by the counties, and duplicate copies were sent to the State, thus only those events that occurred between July 1905 and April 1906 survive for San Francisco city/county.
Records of a few other events also survived. For example, nearly 5000 marriages have been found in eleven volumes of "General Records" for the years 1850-1858 and a few other miscellaneous records have been located. Because of this great loss to the records of San Francisco, the newspaper accounts of events become the key to finding genealogical information.
In addition to replacing the lost public records, there is also another important aspect to the publication of vital statistics in the San Francisco newspapers. San Francisco, like New York City was a major port of immigration. Like New York City, the new immigrants tended to remain in the city for a long period of time thus a large segment of the city's population was foreign-born --- In 1872, 52% of the voter population was foreign-born compared to 33% statewide. The detail provided in the newspaper death notices and some marriage notices often lists the place of birth, even down to the local village or parish.
From 1949 through the 1950s, the California Branch of the Daughters of the American Revolution undertook a project to transcribe the vital statistics from the San Francisco Evening Bulletin. Their transcriptions have been published in 23 volumes of annual alphabetized lists for the years 1855 through 1874 (except 1869). Copies of these volumes are available at the California State Library in Sacramento.
The years 1869 and 1875 through June 1905 still remain a problem for research since there is no index to the events published. The intent of this project is to compile an index those years using the San Francisco Morning Call.
It should be noted that although the majority of events recorded in the San Francisco Call took place in San Francisco and vicinity, many events occurred in other locations in California from Eureka to Los Angeles. Some events, affecting family or friends in San Francisco, occurred as far away as Paris France, Hong Kong, Ireland, and New York City. Since San Francisco was a port city, there are also several events recorded for deaths at sea.
Printed Indices to San Francisco Newspapers In The Holdings of the California
Alsworth, Mary Dean, comp., "Gleanings from Alta California - Marriages and Deaths Reported in the First Newspapers Published in California 1846 through 1850" (Rancho Cordova, CA: Dean Pub., 1980)
Alsworth, Mary Dean, comp., "More Gleanings from Alta California - Vital Records Published in California's First Newspaper - Year 1851" (Rancho Cordova, CA: Dean Pub., 1982)
_____, Vital Records from San Francisco Daily Alta California 1854 (Calif. DAR, 1955)
_____, Vital Records from San Francisco Bulletin, Alta California 1855 (California DAR, 1956)
_____, Vital Records from San Francisco Daily Bulletin 1856-1868, 1870-1874 [22 vols.] (California DAR 1943-1962)
_____, San Francisco Call Index 1894-1903 [4 vols. - indexes feature articles only]
California Information Card File [State Library's primary card file - includes many references to feature articles found in the San Francisco Morning Call, the San Francisco Chronicle, and Daily Alta California from 1849 forward.]
The information used to prepare this web page, including reference to these San Francisco newspapers, is found in Newspaper Holdings of the California State Library by Marianne Leach (Sacramento, California, copyright 1986 by the California State Library Foundation).
The following is not an all inclusive list of all available San Francisco newspapers contained therein nor of those available at the California State Library. For example, there are also several foreign-language newspapers that served the various ethnic communities.
A limited number of copies of this publication are still available for sale at $47.10 postpaid to US and Canadian addresses from:
California State Library Foundation
1225 8th Street, Suite 345
Sacramento, CA 95814-4809, USA
Telephone: (916) 447-6331
There are several newspapers from San Francisco that can fill the gap in vital records left by the destruction of public records in the 1906 earthquake. The major of these are:
Alta California - the run of this paper covers January 1849 to June
1891. It was a daily newspaper. (There is also a weekly paper with the same
name that is scattered in the run and covering the period January 1849
through December 1852).
Evening Picayune - the run of this paper covers August 1850 into
Francisco Daily Evening News - the run of this paper covers November
1853 into January 1854. In Jan 1854, this paper merged with the Daily
Evening Picayune and became known as the San Francisco Daily
Evening News & Picayune. Under this name, the run of the paper
continues into May 1856.
Evening Bulletin - the run of this paper starts with scattered
issues in 1855 and runs into May 1895. In May 1895, this paper changed its
name to The Bulletin and the run continues under that name
until 19 September 1928. On 20 Septmber 1928, another name change occurred;
the paper's name becoming the San Francisco Bulletin by which
name it continued until 28 August 1929. On 29 August 1929, the San
Francisco Bulletin merged with the San Francisco Call & Post
(see history below) and became the Call Bulletin by which name
it continued until August 1959.
As a sidenote, another San Francisco paper, San Francisco Journal of Commerce [September 1920 - June 1924] merged with the Bulletin in June 1924. The Journal had been know as the Daily Journal of Commerce from January 1872 into September 1920.
Morning Call - the run of this paper covers December 1856 to March
1895 when it was renamed the San Francisco Call. Under this
new name, the paper continues from March 1895 to December 1913. In December
1913, the San Francisco Call merged with the Evening
Post (see history below) to become the San Francisco Call &
Post. It remained under this name until August 1929 when it merged
with the San Francisco Bulletin (see above).
Evening Post - the run of this paper covers the period December 1871
to December 1913. In December 1913, it merged with the San Francisco
Call to become the San Francisco Call & Post (see
above). Another paper, the San Francisco Evening Globe [July
1908 - June 1909] merged with the Post in June 1909.
Francisco Chronicle - the run of this paper begins 31 August 1868.
Francisco Examiner - the run of this paper begins on 12 June 1865. | <urn:uuid:0c5cac16-41d5-4092-a4db-3834ee11259d> | CC-MAIN-2017-43 | http://www.jwfgenresearch.com/SFCallHome.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823350.23/warc/CC-MAIN-20171019160040-20171019180040-00493.warc.gz | en | 0.948885 | 1,606 | 3.3125 | 3 |
Algae-based biofuels: a review of challenges and opportunities for Developing Countries
Algae have recently received a lot of attention as a new biomass source for the production of renewable energy. Some of the main characteristics which set algae apart from other biomass sources are that algae can have a high biomass yield per unit of light and area, can have a high oil or starch content, do not require agricultural land, fresh water is not essential and nutrients can be supplied by wastewater and CO2 by combustion gas. The first distinction that needs to be made is between macroalgae (or seaweed) versus microalgae. Microalgae have many different species with widely varying compositions and live as single cells or colonies without any specialization. Although this makes their cultivation easier and more controllable, their small size makes subsequent harvesting more complicated. Macroalgae are less versatile, there are far fewer options of species to cultivate and there is only one main viable technology for producing renewable energy: anaerobic digestion to produce biogas. Both groups will be considered in this report, but as there is more research, practical experience, culture and there are more fuel options from microalgae, these will have a bigger share in the report. | <urn:uuid:41224fbd-999d-43b8-ab91-3f78ef7fc954> | CC-MAIN-2023-40 | http://sa.indiaenvironmentportal.org.in/content/278273/algae-based-biofuels-a-review-of-challenges-and-opportunities-for-developing-countries/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00673.warc.gz | en | 0.955717 | 249 | 3.109375 | 3 |
Skin cancer is the most common form of diagnosed cancer in the United States, and the incidence of skin cancer has risen dramatically worldwide in the last decade, which makes skin cancer prevention a public health concern worldwide (Glanz, Schoenfeld, & Steffen, 2010; Guy & Ekkwueme, 2011). Individuals with an increased chance of developing skin cancer have the following risk factors: outdoor occupations, participating in regular sunbathing by natural or artificial sunlight, light or fair skin, and those who are uninformed about the importance of preventative measures. Knowledge about skin cancer and methods to prevent the disease have increased among the general public; however, “despite such awareness, American adolescence and young adults have the lowest skin protection rates of all age groups” (Heckman et al., 2011). Glanz et al. found in their study project SCAPE that tailored communication (tailored materials and personal feedback risks) showed significant improvements in individuals’ skin cancer preventative behavior change. Studies like this lend proof to the fact that continued research needs to be done to unveil the most effective methods to use for specific populations, especially for young adults.
In today’s society, advancing medical knowledge, diagnostic testing, and noninvasive treatments have taken precedence over primary prevention of skin cancer. By educating and providing techniques to young adults regarding primary prevention and early detection, skin cancer can be better controlled and cases can be reduced (Kasparian, McLoone, & Meiser, 2009). In this systemic review of the literature, we hope to identify the most effective methods of prevention that young adults (aged 18–30 years) can practice.
Scholarly Databases, Search Terms, and Criteria
Using the predetermined search terms skin cancer, melanoma, young adults, prevention, incidence, behaviors, and barriers, a systematic search was conducted on the following search engines: MEDLINE, PubMed, OhioLINK, University of Cincinnati Search Summons, and CINAHL. Initial search results for articles relating to prevention and behaviors related to skin cancer in young adults (aged 18–30 years) yielded 13,788 articles. After applying initial limitations, the search results produced 118 articles. Final limitations and study reviews produced 20 articles used for this systematic review of literature. These limitations include articles written in English, date range no earlier than 2008, full-text articles, randomized controlled studies, and academic articles. Inclusion criteria consisted of young adult (aged 18–30 years), sun exposure, ultraviolet (UV) tanning bed use, use of sun protection, melanoma and nonmelanoma skin cancers, prevention and counseling, education, and use of skin cancer screenings. Exclusion criteria consisted of studies with most populations outside of the age range (younger than 18 years and older than 30 years), participants already diagnosed with skin cancer, practitioner-focused pieces, and articles published in nonscholarly journals.
Levels of Evidence
While researching articles to determine the best practice based on evidence, a practitioner must understand that not all articles or suggestions are equivalent when deciding which techniques to bring into practice. A critical analysis is necessary to determine which evidence is most beneficial to the healthcare system. The 2011 Oxford Centre for Evidence-Based Medicine (OCEBM) Levels of Evidence II is a grading schema that allows the clinician to quickly establish pertinent findings and “to appraise evidence for prevalence, accuracy of diagnostic tests, prognosis, therapeutic effects, rare harms, common harms and usefulness of (early) screening” (OCEBM, 2011, p. 1). On the basis of a scale rating of Level 1 (likely strongest evidence) to Level 5 (likely weaker evidence), the clinician can quickly determine best evidence for practice when reading a research article. The OCEBM Level of Evidence II does not intend for the grading scale to be an absolute gold standard for care, recognizing that judgment, individual patient situation, and clinical experience must coalesce with the grade to evaluate the pertinent findings. This technique can be used to determine the best evidence-based practice to increase the likelihood of skin protection and to reduce multiple risk factors of skin cancer.
Strengths and Limitations
Skin cancer poses a potential threat to all people. Research and interventions need to focus on specific preventative methods that are effective for young adults (aged 18–30 years). Because of the fact that this age group is the least compliant in practicing preventative measures, one can generalize effectual sun-protective approaches and techniques to the entire population (Kasparian et al., 2009). Once practitioners are armed with the facts and data of which preventative methods are most effective, this evidence-based information can be used to provide more successful anticipatory guidance. By creating a more educated population, proper education should have a direct effect on reducing the over two million new cases of skin cancer diagnosed per year in the United States (Lin, Eder, & Weinmann, 2011).
The target population represents one limitation to current research. The systematic review is assuming that what will work for one age group is transferable to the entire population. In addition, once research and information regarding effective preventative methods are established, practitioners cannot force people to practice those methods or to comply with recommendations. Another limitation in most of the studies is that the survey instruments or devices used in measuring skin cancer protection methods are not universal, making it difficult to interpret the studies’ results.
Primary Care Counseling
Interventions and strategies of skin cancer prevention, including clinical and self-examination of the entire body, continue to be an effective way to control the incidences of melanoma mortality by detecting curable melanoma lesions. Cancer detection techniques should be discussed during appointments in a primary care setting; however, limited controlled studies have been conducted to prove this as a key factor for evidence-based practice (Kasparian et al., 2009). By presenting the patient with educational material with instructions on conducting a self head-to-toe examination to recognize suspicious skin lesions, practitioners are holding the patient accountable for his or her own skin safety. Patients must also be reminded to protect themselves from sunburns. Some studies indicate that sunburn in adolescence can predispose a person to skin cancer later in life; however, the actual percentage of prevention is controversial among researchers. Therefore, it is important to instill healthy sun-protective behaviors and attitudes in children and young adults so that such practices as wearing sunscreen, avoiding tanning beds, and realizing that one does not have to be tan to be attractive resonates as habits in adulthood.
Behavioral counseling regarding sun-protective activities in the pediatric primary care setting has produced a moderately significant statistical improvement in skin care safety in adolescence and young adults (Lin et al., 2011). It is important for practitioners to advocate for the use of sunscreen and other interventions that can reduce sunburn and exposure to UV rays. Adolescents respond and relate to computer-based programs that introduce the importance of decreasing sun exposure midday, wearing sunscreen, and donning other protective gear. Young women are more concerned with the perceived increased attractiveness that a suntan can psychologically create, suggesting that the primary motivation for tanning is enhancement of physical appearance (Kasparian et al., 2009). Appearance-focused counseling needs to be available to this demographic (Lin et al., 2011). Also, more randomized control trials should be conducted to determine the most effective way to present the benefits of refraining from indoor tanning and sun exposure for young adults, especially women. An inadequate number of healthy ideals exist to relinquish the suggestion that a suntanned body enhances physical appearance. Healthier and improved opinions that reverse the effects of self-consciousness from peer judgment and snub idyllic “norms” of body image would enhance the potential for permanent, long-term behavioral changes in young women (Hillhouse, Turrisi, Stapleton, & Robinson, 2008).
Social comparison with peers’ opinions can determine related risks and behaviors a young person is willing to engage, or not engage in, independent of his or her own beliefs about self. Minimal trials studying the use of educational material or counseling to create optimum sun-protecting behaviors have been conducted; however, Hoffner and Ye (2009) found that presenting information about sunscreen and skin cancer, either with positive framing or negative framing, improves the intention of sunscreen use in the future when compared with the control group who was given information about nutrition. Positive framing introduces constructive lifestyle changes and outcomes, including the idea that wearing sunscreen aids in maintaining young, healthy-looking skin. Oppositely, negative framing that motivates modifications with negative dangers, such as the problems of not choosing a protective lifestyle, may cause skin cancer and prematurely aged skin.
More research needs to be conducted to determine if behavioral counseling and introduction of healthy skin material by a primary care provider increases the rate of early prevention and detection of skin cancer. A systematic review of the material revealed that most of the general population does not engage in adequate sun-protective behavior, and there is limited research of best evidence-based practice that determines why or what interventions will significantly decrease sun exposure and risk of skin cancer (Kasparian et al., 2009; Lin et al., 2011). Future research needs to be conducted to determine why people engage in unsafe skin lifestyles so that early prevention interventions and educational programs can become commonplace in the primary care setting.
To prevent the harmful effects of UV exposure, individuals must protect themselves. Using sunscreen with at least 30 sun-protection factor (SPF), remaining in the shade, and wearing protective clothing (hats and long sleeves) are effective preventative methods to help limit direct UV exposure (Burnett & Wang, 2011; Linos et al., 2011; Teramura, Mizuno, Naito, Arkane, & Miyachi, 2012).
Sunscreens have been shown to provide excellent prevention against squamous cell carcinomas and their precursors, actinic keratosis (Burnett & Wang, 2011). In more recent years, an SPF of 30 specifically has been also shown to significantly reduce the rate of developing risks factors for melanoma, known as melanocytic nevi, in children (Burnett & Wang, 2011; Green, Williams, Logan, & Strutton, 2010). Sunscreens, however, can give individuals a false sense of security. Studies have shown that higher SPF sunscreens are associated with longer sun exposure when compared with the lower SPF sunscreens (Teramura et al., 2012). Several trials have also shown that sunscreens are rarely applied correctly because individuals are not likely to apply sunscreen in the correct dosages or frequently enough for full UV protection (Buller et al., 2011; Linos et al., 2011; Teramura et al., 2012). One study found that, to achieve laboratory dosing, individuals should apply double the recommended amount of sunscreen directed to get the desired thickness needed to achieve the UV protection as indicated by the SPF percentage (Teramura et al., 2012). Because of improper application, the use of sunscreen as the sole protection against skin damage is not associated with decreased reports of sunburns (Linos et al., 2011). Fewer reported sunburns have been found to be associated with combinations of wearing hats, being covered in longer length clothing, and seeking shade (Linos et al., 2011). Avoiding the sun during peak hours of 10 A.M. to 3 P.M. will also help cut back the UV exposure. Comprehensive skin coverage is what is needed to achieve optimum UV protection.
Avoidance of Tanning Beds
Despite the fact that the International Agency for Research on Cancer labeled tanning beds as “carcinogenic to humans,” young adults still continue to expose themselves to the deadly light (Zhang et al., 2012). In response to this label, the tanning bed industry has launched a campaign to downplay the health risks associated with use by focusing on the healthy benefits the UV light produces, such as skin cells producing vitamin D. However, researchers’ evidence proves time and again that the health risks outweigh any potential benefits from any exposure. Zhang et al. revealed that there is a significant relationship between the use of tanning beds and the increased risk of developing all three types of skin cancer; it was also the first study to unveil a dose–response effect. The strongest evidence reports a 75% greater risk of melanoma in those who start using tanning beds at an earlier age, during adolescence or young adulthood. (Boniol, Autier, Boyle, & Gandini, 2012). Wehner et al. (2012) found that tanning bed exposure was associated with a 67% increased risk of squamous cell cancer and a 29% higher risk of basal cell cancer. The significant increase in skin cancer risk when exposed to tanning beds at an early age makes educating young adults about the ill effects crucial.
Research has revealed that primary providers are seen as the most reliable source for information, and they have the greatest opportunity to counsel patients about changing tanning bed behaviors (Robinson, Kim, Rosenbaum, & Ortiz, 2008). Unfortunately, time constraints and insurance company reimbursements interfere with the ability of providers to spend enough time counseling patients, and most providers are reduced to distributing generalized pamphlets or videos in an effort to educate. The best chance for primary care providers to deliver information that will be utilized by young adult patients is by using personalized, tailored communications with adapted behavior modifications and appearance-focused interventions to reveal underlying UV damage to skin such as photoaging, appearance information, and UV photolight (Dodd & Forshaw, 2010; Glanz et al., 2010). Two other groups that can prove useful in the fight to restrict tanning bed use are lawmakers and nonmedical professionals. Lawmakers can use their power to place restrictions on the tanning bed industry. California was the first state to enact a law on October 9, 2011, and other countries around the world began initiatives that will ban anyone under the age of 18 years from using a tanning bed (Zhang et al., 2012). Although this is a step in the right direction, further restrictions need to be placed on light wattage, exposure time, or eliminating home tanning bed sales altogether in an effort to change the ease of accessibility. Another group that can work in conjunction with healthcare professionals is nonmedical professionals, such as estheticians and cosmetologists. When properly educated to recognize skin cancer, nonmedical professionals who work with areas of the body that are highly susceptible to skin cancer have the opportunity to identify suspicious areas earlier. These technicians have more contact with the general population and are able to spend more time discussing the potential dangers of tanning bed use (Ng, Chang, Cockburn, & Peng, 2012).
Skin cancer is the single most common cancer in adults (aged 25–29 years) and second most common in young adults (aged 15–29 years) in the United States (Baghianimoghadam, Mohammadi, Noorbala, & Mzloomy-Mahmoodabad, 2011; Diao & Lee, 2013). Because of the increasing rate of incidence, skin cancer prevention has become an even more important public health concern (Glanz et al., 2010; Guy & Ekwueme, 2011). Undeniably, exposure to UV radiation can cause skin cancer. There have been numerous studies conducted looking at the effects of counseling, sunscreen use, and avoidance of indoor recreational tanning. All of these methods help in reducing the exposure to UV radiation, and proper practice of these techniques can ultimately prevent the likelihood that an individual will develop skin cancer.
Persistent anticipatory guidance is needed for the target population of individuals between the ages of 18 and 30 years. The education needs to include risk factor information regarding peak hours to avoid direct sunlight, the amount of sunscreen needed to protect sun-exposed areas, and the harm intentional UV exposure poses. Everyone is subjected to UV radiation throughout the day; therefore, constant reminders how to minimize its harmful effects are necessary at every patient encounter. All too often, it is assumed that people know more than they actually do concerning cause and effect of UV rays. The attitude and behaviors of young adults will not only impact them but will also have a direct influence on future generations concerning healthy sun-protective behaviors and attitudes. More research needs to be conducted to determine the best evidence-based techniques and practices for educating the general public to reduce the incidence and prevalence of skin cancer worldwide, especially the young adult population.
Baghianimoghadam M. H., Mohammadi S., Noorbala M. T., Mzloomy-Mahmoodabad S. S. (2011). An intervention based on protection motivation theory in reducing skin cancer risk. Journal of Pakistan Association of Dermatologists 21 (3), 141–148. Retrieved from http://www.jpad.org.pk/Issue-July-September-2011.asp
Boniol M., Autier P., Boyle P., Gandini S. (2012). Cutaneous melanoma attributable to sun bed use: systematic review and meta-analysis. British Medical Journal 345, e475. doi:10.1136/bmj.e4757
Buller D. B., Cokkinides V., Hall H. I., Hartman A. M., Saraiya M., Miller E., Glanz K. (2011). Prevalence of sunburn, sun protection, and indoor tanning among Americans: Review from national surveys and case studies of 3 states. Journal of American Academy of Dermatology 65 (5), S114.e1–11.
Burnett M. E., Wang S. Q. (2011). Current sunscreen controversies: A critical review. Photo dermatology, Photoimmunology & Photomedicine 27, 58–67.
Diao D. Y., Lee T. K. (2013). Sun-protective behaviors in populations at high risk for skin cancer. Psychology Research and Behavior Management 2014 (7), 9–18. doi:http://dx.doi.org/10.2147/PRBM.S40457
Dodd L. J., Forshaw M. J. (2010). Assessing the efficacy of appearance-focused interventions to prevent skin cancer: A systematic review of the literature. Health Psychology Review 4 (2), 93–111. doi:10.1080/17437199.2010.485393
Glanz K., Schoenfeld E. R., Steffen A. (2010). A randomized trial of tailored skin cancer prevention messages for adults: Project SCAPE. American Journal of Public Health 100 (4), 735–741. doi:10.2105/AJPH.2008.155705
Green A. C., Williams G. M., Logan V., Strutton G. M. (2010). Reduced melanoma after regular sunscreen use: Randomized trial follow-up. Journal of Clinical Oncology 29 (3), 257–263. doi:10.1200/JCO.2010.28.7078
Guy G. P. Jr., Ekwueme D. U. (2011). Years of potential life lost and indirect costs of melanoma and non-melanoma skin cancer: A systematic review of the literature. Pharmacoeconomics 2011 (29), 863–874.
Heckman C. J., Manne S. L., Kloss J. D., Bass S. B., Collins B., Lessin S. R. (2011). Beliefs and intentions for skin protection and UV exposure in young adults. American Journal of Health Behavior 35 (6), 699–711.
Hillhouse J., Turrisi R., Stapleton J., Robinson J. (2008). A randomized controlled trial of an appearance-focused intervention to prevent skin cancer. Cancer 113 (11), 3257–3266. doi:10.1002/cncr.23922
Hoffner C., Ye J. (2009). Young adults’ responses to news about sunscreen and skin cancer: The role of framing and social comparison. Health Communications 24 (3), 189–198. doi:10.1080/10410230902804067
Kasparian N. A., McLoone J. K., Meiser B. (2009). Skin cancer-related prevention and screening behaviors: A review of the literature. Journal of Behavioral Medicine 32 (5), 406–428. doi:10.1007/s10865-009-9219-2
Lin J. S., Eder M., Weinmann S. (2011). Behavioral counseling to prevent skin cancer: A systematic review for the U.S. Preventative Services Task Force. Annals of Internal Medicine 154 (3), 190–201. doi:www.annals.org
Linos E., Keiser E., Fu T., Colditz G., Chen S., Tang J. Y. (2011). Hat, shade, long sleeves, or sunscreen? Rethinking US sun protection messages based on their relative effectiveness. Cancer Causes Control 22, 1067–1071. doi:10.1007/s10552-011-9780-1
Ng A. T., Chang A. S., Cockburn M., Peng D. H. (2012). A simple intervention to reinforce awareness of tanning bed use and skin cancer in non-medical skin care professionals in southern California. International Journal of Dermatology 51 (11), 1307–1312.
Robinson J. K., Kim J., Rosenbaum S., Ortiz S. (2008). Indoor tanning knowledge, attitudes, and behavior among young adults from 1988–2007. Archives of Dermatology 144 (4), 484–488.
Teramura T., Mizuno M., Naito N., Arkane K., Miyachi Y. (2012). Relationship between sun-protection factor and application thickness in high-performance sunscreen: Double application of sunscreen is recommended. Clinical and Experimental Dermatology 37, 904–908. doi:10.1111/j.1365-2230.2012.04388.x
Wehner M. R., Shive M. L., Chren M., Han J., Qureshi A. A., Linos E. (2012). Indoor tanning and non-melanoma skin cancer: Systematic review and meta-analysis. British Medical Journal 345: e5909. doi:10.1136/bmj.e5909
Zhang M., Qureshi A. A., Geller A. C., Frazier L., Hunter D. J., Han J. (2012). Use of tanning beds and incidence of skin cancer. Journal of Clinical Oncology 30 (14), 1588–1593. | <urn:uuid:ff65773e-1a0f-459d-9d95-025b72558e4f> | CC-MAIN-2017-47 | http://journals.lww.com/jdnaonline/Fulltext/2014/07000/Effective_Skin_Cancer_Prevention_Methods_for_Young.2.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805114.42/warc/CC-MAIN-20171118225302-20171119005302-00586.warc.gz | en | 0.884044 | 4,693 | 3.59375 | 4 |
Tuesday, February 28, 2017
Animals in their habitat: Burrowing Owls
Animals in their habitat: 'Burrowing Owls'. These little long-legged owls are fun to watch and don't seem to mind posing for photos and sketches. They like to take over burrows of rodents or just irrigation pipes, so they can be found in the Avra Valley fields where Pima Cotton is grown (hence the uninspired background). But they are versatile and according to literature once lived in all open spaces of the Americas (not in the tundra, though, I'd guess). They are day active b...ut do most of their hunting at dawn and dusk. They perch and swoop or just jump and run after insects, lizards and small rodents, occasionally birds. Supposedly they bring cattle dung to their nest to attract dung beetles. But I know dung beetles: they like it fresh. So I doubt that interpretation of the behavior. Another behavior seems easier to understand: from inside their burrow, incubating females often make hissing and rattling noises very similar to that of a rattle snake. Rattlers also sleep in burrows. So the imitation seems like a good sound-based Batesian mimicry that might keep a badger or coyote from getting too inquisitory. | <urn:uuid:3f318278-5eaa-479d-a8cf-51b3a2738c40> | CC-MAIN-2017-39 | http://arizonabeetlesbugsbirdsandmore.blogspot.com/2017/02/animals-in-their-habitat-burrowing-owls.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685993.12/warc/CC-MAIN-20170919183419-20170919203419-00575.warc.gz | en | 0.966388 | 272 | 2.8125 | 3 |
Banks have a responsibility to act in the best interest of their customers, ensuring fair and ethical treatment while providing transparent and reliable financial services.
Equitable and fair treatment
Banks are expected to treat consumers honestly and fairly in all their interactions, creating a culture that values ethical behavior. Special consideration should be given to older individuals and those with special needs, regardless of gender.
Disclosure and transparency
Financial institutions should regularly provide consumers with clear, accurate, and easily understandable information about their products and services. This includes important terms and features, ensuring accessibility without unnecessary complications.
Consumer education and awareness
It is essential for banks to develop programs and mechanisms that aim to enhance the knowledge, skills, and confidence of consumers in understanding financial risks and opportunities. This will empower them to make informed choices and know where to seek assistance when required.
Banks should establish control systems that are both efficient and effective in safeguarding consumer deposits, savings, and other financial assets from the risks associated with fraud, embezzlement, or misuse.
Banks should establish efficient and transparent complaint handling processes, ensuring consumers have an accessible way to voice their grievances and receive timely responses.
Protection of privacy
Banks are responsible for implementing proper measures to protect the financial and personal information of consumers. Clear definitions should outline the purposes of data collection, processing, retention, usage, and disclosure, with attention to third-party involvement.
Conflict of interest
Banks should develop a documented policy addressing conflicts of interest and take necessary steps to identify potential conflicts. When conflicts arise between the bank and third parties, consumers must be informed about these circumstances.
By fulfilling these responsibilities, consumers can contribute to a secure and smooth banking relationship while protecting their interests and financial well-being.
Understand your obligations
Carefully read and comprehend all information provided by your bank regarding the services or products you are applying for. Ensure that you fully understand your obligations and can comply with them.
Provide accurate information
Consumers must provide truthful and up-to-date information details when filling out any bank documents. Avoid providing false information or omitting important details.
Update personal information
Continuously update your personal information, including contact details, and provide them to the bank upon request. Failure to do so may lead to responsibility issues.
Check all documents
Prior to signing any documents, please take the time to thoroughly review them. This will help avoid any mistakes with account numbers or amounts. Remember, your signature signifies your approval and agreement with the content of the document.
Notifying the bank of changes
If there are any significant changes in your financial situation or personal circumstances that may affect the account, you should inform the bank accordingly.
Understand the complaint process
Familiarize yourself with the procedure for making complaints and know how to escalate an issue to higher levels, if necessary. Your bank will provide you with the necessary details and response timeframe.
Don't hesitate to ask questions if you are unclear about any aspect of your bank's services or conditions. Bank staff will professionally address your inquiries and assist you in making informed decisions.
Adhere to terms and conditions
It is the consumer's responsibility to carefully read and comprehend the terms and conditions associated with the account. This includes information about fees, interest rates, account limitations, and any other relevant policies.
Avoid purchasing products or services that are not suitable for your financial situation. Understand any associated risks, which your bank should clearly explain to you.
Choose appropriate products/services: Apply for products or services that meet your specific needs. Disclose all financial obligations to ensure the decision aligns with your ability to fulfill additional responsibilities.
Monitoring account activity
Regularly monitoring account transactions and statements is essential. It helps consumers detect any unauthorized or suspicious activity and report it to the bank promptly.
Protect your banking information
Never disclose your bank account details or sensitive personal and financial information to any third party.
Verify completed forms
Before signing or initialing any form presented to you, ensure that all required fields and numbers are completed. Never sign empty or partially completed forms.
As a CBI customer, here are a few links that can help you find all the information you need about our products and services. | <urn:uuid:c91a97c2-a85f-4148-9b9a-b279cd357c55> | CC-MAIN-2023-50 | https://www.cbiuae.com/en/personal/consumer-education-awareness/consumer-protection | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00241.warc.gz | en | 0.912438 | 861 | 2.609375 | 3 |
Q & A Forum
Experienced coaches are ready to answer your basketball questions! Visit our forum
Footfire Closeout Drill
Ages: All Ages Youth Middle School High School+
Purpose of the Drill:
The purpose of this drill is to teach players to have active feet at all times on defense, close out properly, and retreat back to a middle closeout.
- Defensive players start in the lane, matched up with their corresponding offensive player.
- When the coach says "GO," the defensive players begin to footfire.
- When the coach says "GO" again, they closeout on their offensive player.
- Each offensive player has a ball. While on the offensive player, the defensive player should shadow the basketball with his hands and continue to have active feet.
- When the coach says "GO" again the defensive player should drop step, pivot, and sprint back to his original spot in the lane.
- Immediately begin to footfire again and be ready to repeat the sequence.
Points of Emphasis:
- Sprint to close out with active feet and active hands.
- Closeout high side to force the offensive players toward the cones (diagram). Do not allow middle penetration.
- Shadow the basketball with your hands.
- Drop step, pivot, and sprint back to middle closeout. | <urn:uuid:de3e7b30-9798-435d-9143-7ccdc94c8935> | CC-MAIN-2017-26 | https://www.breakthroughbasketball.com/playcreator/view.asp?ID=88&type=drill | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00309.warc.gz | en | 0.946166 | 275 | 2.78125 | 3 |
In Greenland, climate change is causing fish populations to decline, invasive species to find new homes, and sea levels to rapidly rise. Between 2001 and 2011, temperatures on the island were higher than they have been in the last thousand years. Glaciers are melting nearly seven times faster than they did 25 years ago, and since 2000, Greenland has lost 5 trillion tons of ice.
As the ice melts, it may reveal large deposits of valuable minerals, like nickel and cobalt, that can be used in batteries for electric vehicles and phones, and they’re catching the attention of investors like Jeff Bezos and Bill Gates.
But United Nations experts say any mining projects must receive the consent of local communities, particularly the Indigenous Inuit, who make up a majority of Greenland’s population. The United Nations Special Rapporteur on the Rights of Indigenous Peoples, José Francisco Calí Tzay, has called on the governments of Greenland and Denmark to develop a mechanism to obtain the free, prior, and informed consent of communities where new mining and tourism projects are planned. Calí Tzay has also called on the two governments to address the negative impacts of colonialism that translate to “structural and systematic racial discrimination against the Inuit People.”
“I urge Greenland’s government to consult with the Inuit People whose traditional livelihoods will be directly affected by plans to expand mining, tourism and infrastructure,’’ Calí Tzay said.
Many Inuit people rely on ice and water for their livelihoods and culture, making climate change especially hard on communities, and extractive industries, like mining, can harm the environment through toxic waste and ecosystem disruption. In 2021, Greenland imposed a moratorium on uranium mining after international experts raised concerns about human rights violations caused by the mine. However, many Inuit remain open to locally-controlled mining projects that provide income and jobs.
The Inuit, who are the only recognized Indigenous people in Denmark, have called Greenland home for thousands of years, long before it was claimed by Denmark. Today, in Greenland, which has been an autonomous territory of the Kingdom of Denmark since 1953, nearly 90 percent of the roughly 57,000 people are Inuit. About 17,000 Inuit live away from their homelands in Denmark. In 1979, Greenland voted for a more independent government, giving the island control over areas like education and health and in 2009, the Self-Government Act expanded those sovereign powers, leaving only matters like national security and foreign affairs to Denmark. “Greenland’s extensive self-governance is an inspiring example of the implementation of Indigenous self government,” Calí Tzay said.
But Inuit communities continue to experience negative impacts of tourism and U.S. military installations, including leftover toxic waste. In at least one case, Inuit were relocated to make way for a military base and have not been adequately compensated. Inuit suffer from lack of adequate housing and mental health services, high rates of homelessness and suicide, and persistent policies that neglect their rights, including forced birth control and family separations. Calí Tzay also says that both governments need to improve human rights protections and services for the Inuit including reforming adoption and home care services, adding Inuit language, culture, and history to education curricula in both Denmark and Greenland, and creating specific legal processes for consulting with Indigenous communities.
In a statement, the Danish Ministry of Foreign Affairs said, “We attach great importance to the universal human rights and to the important work of the independent experts of the UN and we will look carefully at the final report of the Special Rapporteur and the recommendations therein.”
Request for comment from the government of Greenland was not immediately returned.
Although Calí Tzay gave Denmark credit for supporting international human rights agreements like the United Nations Declaration on the Rights of Indigenous Peoples, he said it has more work to do at home. “I would like to call upon the Government to fully embrace this commitment at the domestic level as well,” he said.
This story has been updated to include comment from the Danish Ministry of Foreign Affairs. | <urn:uuid:9a1b8404-e632-46d3-a3e8-25db9bdcbdd2> | CC-MAIN-2023-40 | https://grist.org/global-indigenous-affairs-desk/the-united-nations-says-denmark-and-greenland-must-address-colonialism/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00443.warc.gz | en | 0.953053 | 849 | 3.375 | 3 |
Subsets and Splits