text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
From The Telegraph Britain’s wind farms are wearing out far more rapidly than previously thought, making them more expensive as a result, according to an authoritative new study. By Robert Mendick, Chief Reporter 8:40AM GMT 30 Dec 2012 The analysis of almost 3,000 onshore wind turbines — the biggest study of its kind —warns that they will continue to generate electricity effectively for just 12 to 15 years. The wind energy industry and the Government base all their calculations on turbines enjoying a lifespan of 20 to 25 years. The study estimates that routine wear and tear will more than double the cost of electricity being produced by wind farms in the next decade. Older turbines will need to be replaced more quickly than the industry estimates while many more will need to be built onshore if the Government is to meet renewable energy targets by 2020. The extra cost is likely to be passed on to households, which already pay about £1 billion a year in a consumer subsidy that is added to electricity bills. The report concludes that a wind turbine will typically generate more than twice as much electricity in its first year than when it is 15 years old. The report’s author, Prof Gordon Hughes, an economist at Edinburgh University and a former energy adviser to the World Bank, discovered that the “load factor” — the efficiency rating of a turbine based on the percentage of electricity it actually produces compared with its theoretical maximum — is reduced from 24 per cent in the first 12 months of operation to just 11 per cent after 15 years. The decline in the output of offshore wind farms, based on a study of Danish wind farms, appears even more dramatic. The load factor for turbines built on platforms in the sea is reduced from 39 per cent to 15 per cent after 10 years. Prof Hughes said in his conclusion: “Adjusted for age and wind availability, the overall performance of wind farms in the UK has deteriorated markedly since the beginning of the century. “In addition, larger wind farms have systematically worse performance than smaller wind farms.” The study also looked at onshore turbines in Denmark and discovered that their decline was much less dramatic even though its wind farms tended to be older. Prof Hughes said that may be due to Danish turbines being smaller than British ones and possibly better maintained. He said: “I strongly believe the bigger turbines are proving more difficult to manage and more likely to interfere with one another. “British turbines have got bigger and wind farms have got bigger and they are creating turbulence which puts more stress on them. “It is this stress that causes the breakdowns and maintenance requirements that is underlying the problem in performance that I have been seeing.” Prof Hughes examined the output of 282 wind farms —about 3,000 turbines in total — in the UK and a further 823 onshore wind farms and 30 offshore wind farms in Denmark. The report, published last week by the Renewable Energy Foundation (REF), a think tank that has campaigned against wind farms, will give ammunition to sceptics, especially within the Conservative Party, who believe the cost of subsidies to the wind industry is far too high and that the growing number of turbines are blighting the countryside. Dr John Constable, the director of REF, said: “This study confirms suspicions that decades of generous subsidies to the wind industry have failed to encourage the innovation needed to make the sector competitive. “Bluntly, wind turbines onshore and offshore still cost too much and wear out far too quickly to offer the developing world a realistic alternative to coal.”
<urn:uuid:8676af31-283d-4ae2-b59b-e7687b1f02db>
CC-MAIN-2023-40
https://wattsupwiththat.com/2018/12/29/wind-farm-turbines-wear-sooner-than-expected-says-study/?fbclid=IwAR1QuQZCWftSuqyRDcaYiG87dHU45yaeR8BeCb2mQsZKjqE4SHYJfmbX1mk
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00819.warc.gz
en
0.961884
747
2.9375
3
Dante Gabriel Rossetti’s poetry is conventionally divided into three periods. The first ends in 1850, with the publication of some of his best early poems in The Germ and the beginning of his relationship with Siddal. The second ends with her death in 1862; most of the poems from this period, however, were written between 1850 and 1854. The third and last group of poems date from 1868, when Rossetti began writing again after several years of relative inactivity, until his death in 1882. Again, however, most of the poems from this period were written during its first five years. While these three periods can be differentiated, the actual placement of individual poems is often problematic. Since Rossetti did not publish a book of original verse until 1870 and habitually revised his poetry over the years, a particular work might in fact belong to more than one period. “The Blessed Damozel,” for example, was written in 1847 and published first in The Germ in 1850; then in revised form in The Oxford and Cambridge Magazine (edited by William Morris) in 1856; next, with further revision, in the 1870 Poems; and finally, revised yet again, in the 1881 Poems. This habit of lifetime reworking and revision, which extended to certain paintings as well, evidences two characteristics of Rossetti’s work—a meticulous craftsmanship that defines the poem as a labored artifact rather than the spontaneous expression of feeling, and an intense personal identification with his own writing, that explains both his reluctance to publish and his extreme vulnerability to criticism. These two characteristics are contradictory if one assumes that personal identification with a text is a function of its truth to prior experience. Rossetti’s case, however, argues that identification is not a function of mimesis, but of the act of writing. He identified with his poetry because he himself had written it. To acknowledge a poem “complete” was for him equivalent to acknowledging the end of one of his own life processes. To bury the manuscript of his poems with the body of Siddal was not simply to bury his own past or sacrifice its achievement; it was, in a real sense, to bury a part of himself alive with her. This is not to say that personal experience is not the subject matter of Rossetti’s poetry—it often is—but that readers should expect to reach that experience only through the mediation of highly wrought style, the presence of which becomes, in his best poems, an index to the intensity of feeling it conceals. His concern with style makes Rossetti a difficult poet. It is difficult to naturalize his poetry—to reduce it to day-to-day familiarity. He offers no personality for the reader to admire—or hate. Indeed, this absence of self is a central concern of his creative effort. Rossetti’s poems do not merely hide the self behind the artifice of verse making; they explore a fundamental opposition between language and feeling—the teasing ability of language almost to control reality and the disillusionment that necessarily follows from recognizing its failure to do so; the apparent communication embedded in a work of art turns out to be a denial of communication. In its awareness of the limits of communication, Rossetti’s poetry is contemporary. In its basic distrust of—and therefore fascination with—sexuality, it remains solidly Victorian. In its fondness for allegory and contrivance, it exemplifies the Pre-Raphaelite commitment to the Middle Ages. In its concern for the intense experience of the moment, it anticipates the poetics of the last years of the nineteenth century. Rossetti’s numerous sonnets on paintings—a genre particularly successful in distancing the reader from the poet—echo similar poems by the French Symbolists. His ballad narratives link him to William Wordsworth and Samuel Taylor Coleridge; his concern for the self-sufficient consciousness, with Percy Bysshe Shelley. Rossetti can be said, therefore, to exemplify aspects of many periods but to be typical of none. He is typical only, perhaps, of himself, but it is a self carefully concealed behind, not expressed in, his writing. The study of Rossetti leads to an understanding not of his own personality or philosophy of life or of the age in which he lived, but of poetry itself—an understanding both of its strengths and of its liabilities. For this reason, his work remains a spur to the imagination. “The Blessed Damozel” “The Blessed Damozel,” the most familiar of Rossetti’s early poems, illustrates this pattern of imaginative effort and disillusionment. The “Damozel” leans out “From the gold bar of Heaven,” looking down through space for her earthly lover. Space, however, is vast. The moon itself is no more than “a little feather/ Fluttering far down the gulf.” Because she cannot see him, she speaks, imagining the reunion that will come “When round his head the aureole clings.” Then “Will I ask of Christ the Lord . . . Only to live as once on earth/ With Love.” Imagination proves an unsatisfactory substitute for real love; despite a Dantesque vision of angels in flight, she “laid her face between her hands./ And wept.” The poem turns on the old notion that lovers separated by death can take comfort in the hope of meeting again in the world to come. Rossetti, however, reverses the perspective. It is the lover in heaven who longs for earth; it is the spiritual world that is tormented by desire for the physical—and remains, for all its beatitude, “warm.” Moreover, the consolation of hope is, it turns out, no consolation. It merely leads to an intense awareness of loss—not only on the part of the “Damozel” but for the speaker of the poem as well. For the “Damozel” is a fiction, and the parenthetical first-person interjections ground the poem in the fantasy of the earthly lover himself. He claims to “see” “her smile” and “hear” “her tears,” but the protestation emphasizes the wishfulness of his dream. If her imagined reunion leads her to “tears,” his imagined “Damozel” leads him to a heightened sense of separation from her. The “Damozel” is, as his attempt to visualize her suggests, unknowable. Her death is a barrier he cannot overcome by the language of the poem. The sensuousness of his conception—the “fleshliness” of which Rossetti was later accused—is not a radical characterization of the afterlife, but an implicit mark of the inadequacy of the earthly imagination. “The Blessed Damozel” specifies the opposition between language and feeling as an opposition between poetry and eros. The poet’s vision attempts to overcome the separation of lovers. His text is an act of desire that confronts him with the fact of desire—hence, of an unfulfilled and perhaps unfulfillable need. The world of Rossetti’s poetry is thus one in which desire—generally sexual—defines itself by coming up against its own furthest limit—the verge of satisfaction. It asks the reader to experience the pain of near but never complete realization. It offers a nightmare world, in which all apparent realities are disclosed as expressions of the poet’s desire. The theme of frustrated eros is directly related to the tension between his father’s bohemianism and his mother’s puritanical morality. It enabled Rossetti to express his erotic sensibility while at the same time punishing himself for its existence. The inadequacy of poetic language is thus a function of the guilt that, in his own life, blocked Rossetti’s personal happiness. “The Bride’s Prelude” “The Bride’s Prelude,” which was begun in 1848 and returned to later in the 1850’s but never completed, illustrates the link between eros, guilt, and the failure of language. The poem, even in its fragmentary form, is Rossetti’s longest narrative. It records the conversation between two sisters in an unspecified medieval setting: Aloÿse, the elder, whose wedding day it is, and Amelotte, the younger, who is helping her dress. Aloÿse is strangely silent; then, having knelt in prayer with her sister, she reveals the story of her past life. She had, years before, while her sister was being educated in a convent, fallen in love with a young man, a distant cousin who had yet to make a name for himself in the world, then staying with her powerful family. When her family lost a political struggle and was forced temporarily to flee its ancestral seat, the cousin had deserted them, leaving her with child. Discovering the situation, her father and brothers had reluctantly spared her life but, it would seem—the poem is deliberately vague—killed her illegitimate child. Now, circumstances have changed again; the family is back in power, the cousin has returned, and it is he—Urscelyn—whom she is about to marry. With this revelation, the poem ends. Rossetti wrote a prose summary of a missing conclusion, which his brother later published. Urscelyn, he explains, having become a skilled soldier of fortune and therefore of use to her family, wanting to ally himself with them once more, has offered to marry Aloÿse. Aloÿse, meanwhile, had fallen in love with and secretly betrothed herself to another man, whom Urscelyn, knowingly and treacherously, killed in a tournament. Thus, the enormity of marrying a man who had both betrayed her and murdered her lover is the message she wishes to convey to her sister. In conclusion, Rossetti states that “as the bridal procession appears, perhaps it might become apparent that the brothers mean to kill Urscelyn when he has married her.” The “perhaps” tells all. “The Bride’s Prelude” is incomplete because Rossetti was unable to imagine an appropriate ending, and his prose summary is merely an evasion. The poem is also Aloÿse’s story, and she, too, cannot bring her narrative to completion. Significantly, the text as it stands makes no mention of the second lover. Urscelyn’s flight labels him a betrayer—but Aloÿse suggests that his motives were political and does not indicate that he knew she was pregnant. In other words, without Rossetti’s prose summary, what seems to block Aloÿse’s happiness is less the character of Urscelyn than her own sense of guilt. The conclusion that Rossetti claims he... (The entire section is 4224 words.)
<urn:uuid:b80ebe5e-0a87-4a1b-a9a2-2d9203150286>
CC-MAIN-2014-23
http://www.enotes.com/topics/dante-gabriel-rossetti/critical-essays
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894473.81/warc/CC-MAIN-20140722025814-00123-ip-10-33-131-23.ec2.internal.warc.gz
en
0.976012
2,310
2.734375
3
A solenoid valve is used for controlling the flow of process media from one location to another. It is an electro-mechanical valve that can turn on or shut off flow and can be used to control the flow of steam, air, water, oil or other processes. A solenoid valve can be use alone or in tandem with other valves. One or more of these handy valves may be placed on a manifold with several control operations. Solenoid Valves - Parts The main parts of the valve are the solenoid and the valve. The solenoid controls the electromagnetic current that opens and closes the valve. The valve may have a soft or metal seat. A magnet is activated by the current to open the valve. The core of the solenoid is enclosed in a tube with a coil. The core is the magnetic plunger that moves to open the valve when it is turned on. The spring holds the magnet in place when it is in the off position. (Please note: Since there are different types and sizes of solenoid valves for various applications, this is a simplified description) A plugnut prevents fluid from escaping when the solenoid valve is closed. An O-ring is used as a seal between the plugnut and the solenoid magnet. The materials and the seals must be compatible with the fluid flowing through it. Solenoid valves are available in metal, plastic, brass, stainless steel and aluminum are the general materials used to build a typical solenoid valve. Most solenoid valves are two and three-way, but even four-way valves are available. The valves come in all sizes from miniature precision control units in various shapes to large push-pull, cartridge and pilot valves. Special rotary solenoids are available for industrial high flow applications. Solenoid Valve Uses Solenoid valves are used everywhere. A solenoid valve may be used for water irrigation timer devices turning the water on and off for commercial building grounds. In addition, solenoid valves are often used in various commercial water purifiers or even on pneumatically actuated valves to control the flow of air into the actuator to move (actuate) very large valves. Food processing plants use solenoid valves to control propane gas used for stoves and ranges along with refrigeration systems and filling machines. Industrial use for solenoid valves includes hydraulic and pneumatic systems that control steam, water, air, and other chemicals and can process liquids and gases. Special wet-pin pressurized bore solenoids are used in hydraulic drilling operations. Explosion proof solenoid valves are important for oil drilling, refineries and mining operations. Solenoid Valves for Sale Check out ValveMan for a large section of ASCO Valves, Bonomi solenoid valves, and other solenoid valves for all of your applications. ValveMan is conveniently located in Exton, PA only 30 miles outside Philadelphia. Our valve store has been serving customers since 1965, distributing valves all over the world. Check out the online catalog for their complete selection of valves that can be assemble and shipped all over the globe.
<urn:uuid:72e5f1ef-4901-45d9-8fac-6be5f155dcdb>
CC-MAIN-2023-14
https://valveman.com/valves/solenoid-valves/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00154.warc.gz
en
0.934773
652
3.375
3
This is something I wrote up for people I know on facebook to understand the mathematics of contagion and why you should care. Let’s talk about covid-19 in the US from a strictly math point of view. I’m going to keep the math as simple as I can. This isn’t going to get any more complicated than high school math. This is going to be long, but it’s important to understand. Stick with me. Many things in life are proportional relationships. For example, if I’m putting together a set of hand outs for a conference and each hand out is 5 pages, I can find out how many sheets of paper I need by multiplying the number of pages (5) by the number of attendees. If someone decides to show up, add 5 pages. 2 people cancel, subtract 10 pages. This is also called a linear relationship because if you draw a graph with “number of people” on the x axis and “number of pages” on the y axis and fill in the points, they make a lovely straight line. Disease propagation does not work that way. It’d be great if it did, but it doesn’t. Instead it follows a pattern called exponential. Here’s an illustration of one exponential relationship. Let’s say I have a checkerboard which is 32 squares. I ask you to put 1 penny on the first square, 2 on the second, 4 on the third, 8 on the fourth and keep doubling for each square. By square 26, you’d need more than $1,000,000 in pennies. On the last square, you’d need a stack of $21,474,836.48 in pennies. Let’s compare that to a proportional relationship. On the first square you put 5 pennies, 10 on the second, 15 on the third, etc. Doing this, on the last square you would have $1.60. That’s some difference, right? How do we represent that in a way we can calculate? Let’s figure it out. Here are your days and their relationship to pennies: 1 : 1 2 : 2 * 1 = 2 3 : 2 * 2 * 1 = 4 4 : 2 * 2 * 2 * 1 = 8 8 : 2 * 2 * 2 * 2 * 1 = 16 Since we know that 2 * 2 is 2 squared or 22 and that 2 * 2 * 2 is 2 cubed or 23, we can simplify the table: 1 : 1 2 : 21 * 1 = 2 3 = 22 * 1 = 4 4 = 23 * 1 = 8 8 = 24 * 1 = 16 In general, the number of pennies on a given square is 2n * 1, where n is the number of the square on the checkerboard. You can see that the number of pennies needed grows really fast. The good news is that COVID-19 doesn’t grow this fast. The bad news is that it is still an exponential relationship. The problem is almost the same as the pennies, but instead pennies it’s confirmed cases of COVID-19 and instead of squares, it’s days. The number we don’t have is called the base. In the penny problem, the base was 2 and I gave it to you. Can we figure out the base for COVID-19? Yes. Take the number of cases on any given day and divide it by the number of cases on the previous day. Why does this work? Remember with the pennies, I said multiply the previous number by 2. So if I have the equation: x * prevday = nextday I can solve for x: x = nextday / prevday I did just that for COVID-19. CNN (and several other sources) have been posting the number of positive tests each day. I put that into a spread sheet and did the calculation you see here for each day since March 1st. The result is not always consistent, so I calculated the trend and it comes out to about 1.3. That means to predict the number of cases tomorrow, multiply today’s cases by 1.3. That means that the number of cases doubles about every 2.5 days. We are on a pace to have 181,000 cases by the end of the month. There are estimated to be 160,000 ventilators in the US. See the problem? And even though not all of those 181,000 cases will need ventilators, just wait 10 days and you’ll have 2.8 million cases. Now let’s talk about the death rate. The estimates vary a lot. The lowest is around 1.4% and the highest is 4%. The reason why this is such a wide range is that it depends on treatment and it depends on patient age. This means that by the end of the month, you can expect to see between 2240 and 6400 deaths in the US. There’s good news and bad news. The good news is that COVID-19 will not spread without limit. The limit is the number of people available to be infected. If we had unlimited people, we would infect 330,000,000 people in by May 1st. But we don’t have unlimited people, so the curve can’t grow without limit. Also not every case requires hospitalization. Further good news – this model is incomplete. The world is a sticky place with many more complications in it. For example, not every person who is infected will need to go to the hospital or even need ventilation. Not only that, once someone is infected, there is a good chance they will recover and the number of cases goes down. The bad news is that we have a very real limit on the number of doctors, the number of hospital beds, the number of masks, the number of test kits and so on. If we don’t reduce the base, you will see growth to the point where our medical system can’t handle the number of cases it gets. This will get worse as people who work in hospitals get sick. At some point (and it’s going to happen soon), doctors are going to have to make decisions like “which patients will last without ventilation?” or “which patient will recover faster?” or “which patients do we have to let die because we don’t have the staffing or equipment to properly care for them?” You should ask yourself, do you want you or someone close to you to be one of the patients on the short end of one of those decisions? Let’s finish this with a call to action. What can you do? Wash your goddamn hands. Seriously. Soap and water wreaks havoc on COVID-19 and is dirt cheap. Keep away from groups and group activities and limit contact (reduce shopping). Feel sick? See if you can use telemedecine. Call your government and demand more testing. For the curious – here’s my math, which I will try to keep updated.
<urn:uuid:35bdba66-9aa4-4a92-bb89-018d128cb3b6>
CC-MAIN-2020-34
http://plinth.org/techtalk/?p=590
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737645.2/warc/CC-MAIN-20200808110257-20200808140257-00170.warc.gz
en
0.950423
1,518
2.6875
3
Cognitive Mapping – a users guide by Fran Ackermann, Colin Eden and Steve Cropper, Management Science, University of Strathclyde. Copyright 1993-1996. All rights reserved. This is the summary of the mapping guide. Full details are in the Main paper. Separate the sentences into distinct phrases. These phrases are likely to be no more than about 10-12 words long. Build up the hierarchy. Get the structure of the model right. By placing the goals (often motherhood & apple-pie type statements eg increase profit and growth) at the top of the map and supporting these first with strategic direction type concepts and further on with potential options. Watch out for goals. These will end up at the ‘top’ of the map – the most superordinate concepts. It can help to mark them as goals when writing them down. Watch out for potential “strategic issues” by noting those concepts that have some or all of the following characteristics: long term implications, high cost, irreversible, need a portfolio of actions to make them happen, may require a change in culture. They often form a flat hierarchy themselves but will be linked to Goals (above) and Potential Options (below) Look for opposite poles. These clarify the meaning of concepts. Contrasting poles may be added to the concept later on in the interview when they are mentioned. In cases where the meaning of a concept is not immediately obvious, try asking the problem owner for the opposite pole. Alternatively put the word ‘not’ in front of the proffered pole. In interviews we ask the question “rather than” – doing so often suggests the more likely psychological contrast implied by the problem owner. Add meaning to concepts by placing the concepts in the imperative form and where possible including actors and actions. Through this action perspective the model becomes more dynamic. Retain ownership by not abbreviating but rather keeping the words and phrases used by the problem owner. In addition identify the name of the actor(s) who the problem owner states are implicated and incorporate them into the concept text. Identify the option and outcome within each pair of concepts. This provides the direction of the arrow linking concepts. Alternatively think of the concepts as a ‘means’ leading to an ‘desired end’. Note that each concept is therefore can be seen as an option leading to the superordinate concept which in turn is the desired outcome of the subordinate concept. Ensure that a generic concept is superordinate to specific items that contribute to it. Generic concepts are those for which there may be more than one specific means of achieving it. This follows Guideline 8 and helps ensure a consistent approach to building the data into a hierarchy. It is generally helpful to code the first pole as that which the problem owner sees as the primary idea (usually this is the idea first stated). The first poles of a concept tend to stand out on reading a map. A consequence is that links may be negative even though it would be possible to transpose the two poles in order to keep links positive. Tidying up can provide a better more complete understanding to the problem. But ensure that you ask why isolated concepts are not linked in – often their isolation is an important clue to the problem owner’s thinking about the issues involved. Practical Tips for Mappers. Start mapping about two thirds of the way up the paper in the middle and try to keep concepts in small rectangles of text rather than as continuous lines of text. If it is possible ensure the entire map is on one A4 sheet of paper so that it is easy to cross link things (30-40 concepts can usually be fitted onto a page). Thus pencils are usually best for mapping and soft, fairly fine (eg 5mm) propelling pencils are ideal. Near the beginning of this guide, we stated that: “the guidelines are not a recipe which will which will allow any user to produce the ‘right’ model of any given account of problem. There is no definitive map of an account. Models of an account of a problem produced by different users will differ according to the interpretation of the data made by each individual user. Mapping is in this sense an inexact science. Cognitive mapping and the guidelines set out below merely form a prop to individuals’ interpretations of the data they have available. Nevertheless it provides a powerful way of thinking about, representing and asking questions of an account.”Main paper
<urn:uuid:454af986-4723-4182-99e5-ab7b6ee796e2>
CC-MAIN-2017-47
http://banxia.com/dexplore/resources/how-to-make-maps/summary/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00503.warc.gz
en
0.935037
927
2.59375
3
LEXINGTON, Ky. (AP) - A new documentary explores the production of dark-fired tobacco by the farmers of Calloway County, who consider it an art form. Western Kentucky's deep green crop is smoked in barns with wood-chip fires, unlike the burley produced in Central and Eastern Kentucky that is cured by summer heat. And the dark-fired tobacco is used for snuff or chewing tobacco, not cigarettes. Will Snell is a tobacco expert at the University of Kentucky. He told the Lexington Herald-Leader that unlike burley, dark-fired tobacco for smokeless products has been booming. The market for dark-fired tobacco has been growing about 4 percent to 6 percent a year for the past 25 years. The film is called Farming in the Black Patch, and it debuts Monday on Kentucky Education Television.
<urn:uuid:f8df5f2b-9661-4251-b5d8-8ac54b7d4f32>
CC-MAIN-2014-23
http://www.wkyt.com/news/headlines/New-documentary-explores-dark-fired-tobacco-190662581.html?site=full
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270877.35/warc/CC-MAIN-20140728011750-00472-ip-10-146-231-18.ec2.internal.warc.gz
en
0.941752
173
2.5625
3
THURSDAY, June 13 (HealthDay News) -- If you hear that a friend's beloved family member has joined a clinical trial for cancer treatment, don't assume the patient is human. Cancer is the leading cause of death in older dogs and cats, and clinical trials offer hope that effective medications will be developed -- for humans and their four-legged friends, cancer experts say. The new National Veterinary Cancer Registry, launched last month by a national team of animal and human cancer doctors, will point pet owners toward clinical trials that might benefit their beloved companions and speed up the development of life-saving therapies for humans. "We will be able to decrease the cost and beat the time involved in drug discovery," said the registry's founder, Dr. Theresa Fossum, a professor of surgery at Texas A&M University's college of veterinary medicine. Because many similar diseases affect people and their animals, veterinarians and physicians say a lot can be learned from studying how treatments work in cats and dogs. The drug-assessment process could be accelerated by a simple fact: dogs age many times faster than humans, and their cancers progress more rapidly too. Also, many canine and feline cancers -- including sarcoma; non-Hodgkin lymphoma; leukemia; mesothelioma; and bone, ovarian, kidney, uterine and oral cancers -- are virtually the same cancers humans have. Experts not involved with the registry said the concept of the database looks promising. "These clinical trials would be more real-world than a lab experiment," said Dr. Peter Rabinowitz, associate professor of medicine at Yale School of Medicine and head of the Yale Human Animal Medicine Project, which studies clinical connections between human and animal medicine. Dogs often are an interesting model for better understanding environmentally induced cancers, Rabinowitz said. "Asbestos causes cancer in humans 35 years [after exposure], but if you're a dog, you get it in four to five years, so we can see how the cancers develop more naturally," he said. Fossum said she has always been bothered by the slow and cumbersome way drugs are tested. "If it's a cancer drug, they're going to put a human tumor in a mouse ... but it's not very predictive of how drugs will work in people," she said. Then, after tests to see if the drugs might be toxic in humans, the drugs are evaluated in human clinical trials, which take more than a decade to conduct. "So the drugs that are coming out now were starting [to be evaluated] 12 years ago," she said. Testing the drugs in pets speeds up the process, allowing researchers to determine if a medication works before taking it to human clinical trials, Fossum said. With a pet owner's informed consent, "we can try a new drug that seems promising a lot sooner," she said. The concept of a cancer database for dogs and cats could expand to include other diseases, such as diabetes. About 800,000 dogs have type 1 diabetes in the United States, Fossum said. Other conditions that a veterinary registry could serve include endocrine, neurological and cardiac issues. About 6 million dogs and 6 million cats in the United States receive a cancer diagnosis each year, according to the Animal Cancer Foundation, in Norwalk, Conn. If your dog or cat is one of them, you can register your pet with the National Veterinary Cancer Registry. The registry was created by a consortium of animal and human cancer doctors, including specialists from the Baylor Healthcare System in Texas, the Texas Veterinary Oncology Group and the CARE Foundation, a Florida-based animal rescue and wildlife education organization. Because the registry is new, it may take some time before effective clinical trial matchmaking can occur between animals and drug developers, Fossum said. Learn more about the connection between animal and human health from the U.S. Centers for Disease Control and Prevention.
<urn:uuid:a3b0bd9a-71ee-4c84-94b5-7f94d6f950e8>
CC-MAIN-2023-40
http://nationalveterinarycancerregistry.org/fox-news-ny-pets-battling-cancer-can-join-clinical-trials-too
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00336.warc.gz
en
0.96125
808
3.09375
3
11 Tips for Safe Exercise in the Summer Heat Exercising in the scorching summer heat can be tricky. Sun tans can easily turn into sunburns, and overexertion can quickly turn into heat exhaustion if you’re not careful. But there are also tons of benefits to exercising outdoors, like vitamin D exposure, fresh air, and a change of scenery. So before you let the rising temps stop you from taking your workout outside, take a look at our top 11 tips to safely and effectively exercise in the summer heat. Related: Can gym equipment be left outside? Know Before You Go: What are the Signs of Heat Exhaustion? Heat-related illnesses can be very serious. And if the proper actions aren’t taken, they can often be life-threatening. That’s why it’s essential to understand the signs of heat exhaustion (which can lead to heat stroke) before taking your exercise outside this summer. According to the CDC, heat exhaustion is the body’s response to an excessive loss of water and salt, usually caused by abundant sweating. While heat exhaustion can impact anyone, children, the elderly, and those suffering from high blood pressure are at higher risk. Symptoms of Heat Exhaustion: - Nausea or vomiting - High body temperature (103 degrees F or higher) - Hot, red, dry, or damp skin - Fast, strong pulse - Passing out Symptoms of Heat Stroke: - Loss of consciousness - Hot, dry skin - Confusion, slurred speech Tips for Safe and Effective Summer Exercise 1. Acclimate to the Heat Gradually During the first few weeks of summer, take some time to acclimate to the hot temps. Think progressive overload but with the sun. Start with shorter workouts (20 min jogs vs longer runs) and slowly increase the duration or intensity over 1-2 weeks. During this time, pick a day when you intentionally work out during the hottest part of the day. This will help prevent you from shocking your nervous system, and ensure your summer is full of successful outdoor workouts. 2. Avoid Mid-Day Workouts The middle of the day (between 10 a.m. and 3 p.m.) is when the sun is at its highest, and temperatures are at their hottest. Unless it’s an acclimation day, try to plan your training in the morning or the evening when the heat index is lower. Otherwise, look for shady trails, parks, or pavilions that can help protect you from the UV rays. 3. Hydrate, Hydrate, Hydrate! One of the biggest concerns with exercising in the summer heat is the risk of dehydration. That’s why it’s crucial to hydrate before, during, and after exercising this season. Aim to consume somewhere between 15-20 ounces of water a few hours before exercising, and then every 15-30 minutes during training. But don’t overdo it – you don’t want to be sick as you start moving. To maintain your hydration levels during your workout, look for a park or trail that has frequent water fountains. Or bring a reusable water bottle (or a hydration backpack) along for the ride. 4. Skin Protection Exercising in the heat and humidity is hard enough without having to navigate the stinging pain of a sunburn. Since your skin is your body’s first line of defense for cooling down, a sunburn reduces this ability which causes a loss of body fluids. Before you head outdoors this summer, throw on a hat and make sure to lather up with broad-spectrum sunscreen. This not only helps prevent painful sunburns but also helps protect your skin from premature aging and skin cancer. In a pinch, UV-protective clothing that contains UPF 50+ can also help block harmful rays. Pro tip: soak your hat in water before you go out – it will help keep your head cool and comfortable! 5. Wear Lightweight, Breathable Fabrics Dark colors are like a magnet for the sun’s harsh rays. Great during the winter, but avoid them at all costs during the summer. When dressing for your outdoor summer exercise, choose light-colored clothing that will help reflect the sun and excess heat. Look for pieces made from fabrics like polyester, nylon, or lycra – they allow for airflow and easily wick away sweat to keep you cool and dry. 6. Consume Electrolytes and Energy Chews While water is crucial for safely exercising in the summer heat, so are electrolyte-filled sports drinks. The sun zaps your electrolytes. And an imbalance in electrolytes (low sodium) combined with drinking too much water can lead to a condition called Hyponatremia. Look for a sports drink chock full of electrolytes (but not tons of sugar) or concentrated energy chews to consume during outdoor sessions. This will not only help prevent dehydration but will also help combat nasty cramps. 7. Use Cooling Accessories Studies show that cooling your core body temperature during training can have positive effects on exercise performance. Not to mention, a cooling neck towel feels fantastic after a few hours under the burning sun. Pack a few cooling accessories like cooling neck wraps, bandanas, or vests when doing outdoor workouts this summer. Or try soaking a towel and freezing it overnight. Pack it in a cooler before training and it will be nice and refreshing for you as it thaws. 8. Embrace Water-Based Workouts There’s nothing more refreshing on a hot summer day than a quick dip in the pool or a lap in the lake. On days when it’s too warm for a workout on land, opt for a low-impact water-based workout to get your heart pumping. Swimming, water aerobics, and paddle boarding are all great for building cardiovascular endurance and burning calories. 9. Choose the Right Workout Even if you’re an avid marathon runner, your go-to workout style might be too intense on hot, humid summer days. When you exercise, your body produces sweat to cool you down and regulate body temperature. When there’s excess heat and moisture in the air, your sweat doesn’t evaporate from your skin as quickly, which traps body heat and can make exercise feel more exhausting. Instead, try HIIT, cycling, or yoga training on scorching-hot days. These workouts offer ample opportunities for breaks so you can avoid overexertion. 10. Listen to Your Body and Take Breaks as Needed You know your body’s limits better than anyone. And if you begin to feel faint, dizzy, or nauseous while exercising outdoors this summer, that’s your body telling you to stop. It’s important to keep the signs of heat exhaustion top of mind during outdoor activities and avoid pushing beyond your limits. To avoid overheating, take frequent breaks and seek out shady areas, like pavilions or trees, to lower your body temperature between sets. And don’t forget your water! 11. Stay Indoors When Necessary There’s hot, and then there’s hot. When the risks of exercising in the summer heat outweigh the rewards, consider taking your workout indoors. On these blazing hot days, it’s helpful to have gym equipment on hand so there’s no disruption to your fitness routine. If you’re ready to build your dream home gym, check out our guide that offers tips on picking the right pieces, and 10 award-winning products you can find at Fitness Town. Bongers CC, Hopman MT, Eijsvogels TM. Cooling interventions for athletes: An overview of effectiveness, physiological mechanisms, and practical considerations. Temperature (Austin). 2017 Jan 3;4(1):60-78. doi: 10.1080/23328940.2016.1277003. PMID: 28349095; PMCID: PMC5356217. Che Muhamed AM, Atkins K, Stannard SR, Mündel T, Thompson MW. The effects of a systematic increase in relative humidity on thermoregulatory and circulatory responses during prolonged running exercise in the heat. Temperature (Austin). 2016 May 18;3(3):455-464. doi: 10.1080/23328940.2016.1182669. PMID: 28349085; PMCID: PMC5079215.
<urn:uuid:5ea6513f-638d-47bb-878e-755d3dfbaebe>
CC-MAIN-2023-40
https://fitnesstown.ca/blog/11-tips-for-safe-exercise-in-the-summer-heat/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00352.warc.gz
en
0.91051
1,825
2.578125
3
Pinwheels for Peace at Timber Point Students at Timber Point Elementary School in East Islip celebrated the International Day of Peace on Sept. 21 by creating “Pinwheels for Peace” and participating in various other Peace Day projects and activities. According to Principal Lisa Belz, the purpose was to “recognize, understand and help create a culture of peace.” “The fifth grade in particular created their own quotes for peace, listened to and analyzed the words of Martin Luther King's ‘I Have a Dream’ speech, learned how to say 'peace' in many languages, and designed Pinwheels for Peace which are displayed on the bulletin board in the hallway,” said Timber Point teacher Carol Wilson. The International Day of Peace, also unofficially known as World Peace Day, has been observed every Sept. 21 since 1982 and is dedicated to the concept of peace, specifically the absence of war and violence.
<urn:uuid:abe53c9d-f52d-4ca5-8bd3-945f488199b3>
CC-MAIN-2014-15
http://www.eischools.org/News/Story.aspx?id=7121
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00469-ip-10-147-4-33.ec2.internal.warc.gz
en
0.961981
195
2.75
3
An adult male pilot whale continues to send movement and dive data from its satellite linked transmitter. The whale originally stranded as part of a group of about 23 whales on May 5th, and it was released on May 7th along with another tagged male. The other whale’s transmitter stopped abruptly on May 23rd The transmitters were attached to provide movement and dive data, which are not well known for this species. This information helps researchers evaluate the condition of the whales after release. Had it been necessary, the location data would have enabled a rapid response had the whales re-stranded. The tagged whale has now moved about 3560 total miles (5697 km) from the stranding site at Cudjoe Key, in the Florida Keys. It first traveled north with the Gulf Stream to an area off South Carolina, before heading south and east past the Bahamas into the Caribbean. For the past week or so, it has moved off the eastern tip of Cuba, in the Windward Passage. The whale has been making deeper and longer dives in this area. On occasion, the whale is making dives to several hundred meters, and remaining down for more than 30 minutes. These are among the deepest and longest dives ever reported for this species. The duration of the track to date, the movement patterns that make use of habitat types frequented by pilot whales, and the deep and long dives suggest that this whale is doing well following its release. These findings are in sharp contrast to stranded pilot whales SDRP scientists tagged and released from stranding sites in Florida in the 1970s. Some of those whales re-stranded within days to weeks after release. The transmitter on the whale is powered by a single AA battery, is expected to provide data for 2-3 months in total. This tagging effort and follow-up monitoring is supported by the NOAA Prescott Grants program. The satellite-linked transmitters were attached to the whales’ dorsal fins by SDRP Director Dr. Randall Wells, at the request of NOAA Fisheries. The maps are provided by the Satellite Tracking and Analysis Tool. The tagged whale is being monitored by Dr. Wells.
<urn:uuid:b269b3bb-b479-4c36-945f-97313fd11d4b>
CC-MAIN-2013-20
http://sarasotadolphin.org/2011/07/08/tagged-pilot-whale-8-week-update/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697917013/warc/CC-MAIN-20130516095157-00074-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966558
444
2.640625
3
Typo in the title. Typos happen, but if you don’t check the spelling of your own title, it bodes ill for the rest. For that matter, a few typos in the body of the piece are no big deal. More than one per couple of pages says you’re not proofreading. Poor opener. The opening sentence sets the tone for the rest of the story. Poor grammar, convoluted clauses, and typos are obvious no-nos. A sentence that doesn’t do anything to give us a flavor of the story won’t help much either. Can’t follow rules. We’ll look at anything, but when we say we don’t really like military SF or zombies or racism, and we do like vegans, and you send a story about a racist zombie army that eats pigeons… No story. We want stories with beginning, middle, and end, with forward movement, character development, and impact. We’re not looking for moment-in-time scenes where little is resolved. ‘Was’ instead of ‘had been’. Learn how to use the past perfect continuous. No, we don’t care what it’s called either; we had to look it up. There are times for ‘was’ and times for ‘had been’. They’re different. We see a widespread inability (reluctance?) to use ‘had been’ properly. It may be the most common grammar flaw we see.
<urn:uuid:a60138a1-2c7c-4f32-bef7-28a6d70e2281>
CC-MAIN-2017-43
http://magazine.metaphorosis.com/guidelines/pet-peeves/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00846.warc.gz
en
0.927877
328
2.625
3
Prunus virginiana, commonly called bitter-berry, chokecherry, Virginia bird cherry and western chokecherry, is a species of bird cherry (Prunus subgenus Padus) native to North America; the natural historic range of P. virginiana includes most of Canada (including Northwest Territories but excluding Yukon, Nunavut, and Labrador), most of the United States (including Alaska but excluding some states in the Southeast) and northern Mexico (Sonora, Chihuahua, Baja California, Durango, Zacatecas, Coahuila and Nuevo León). Chokecherry is a suckering shrub or small tree growing to 1–6 m (3 ft 3 in–19 ft 8 in) tall, rarely to 10 m (32 ft 10 in). The leaves are oval, 2.5–9 cm (1–3 1⁄2 in) long and 1.2–5 cm (1⁄2–2 in) wide, with a serrated margin. The flowers are produced in racemes 4–11 cm (1 1⁄2–4 1⁄4 in) long in late spring (well after leaf emergence). They are 1⁄3–1⁄2 in (8–13 mm) across. They produce a strong heady aroma which some people find to be unpleasantly smelly, while others perceive them to have an aphrodisiac like effect. The fruits are about 6–14 mm (1⁄4–9⁄16 in) in diameter, range in color from bright red to black, and possess a very astringent taste, being both somewhat sour and somewhat bitter. When very ripe, the "berries" (actually drupes) are dark in color and less astringent and sweeter than when red and unripe. For many Native American tribes of the Northern Rockies, Northern Plains, and boreal forest region of Canada and the United States, chokecherries were the most important fruit in their diets and were added to pemmican, a staple. The bark of chokecherry root was once made into an asperous-textured concoction used to ward off or treat colds, fever and stomach maladies by Native Americans. The inner bark of the chokecherry, as well as red osier dogwood, or alder, was also used by natives in their smoking mixtures, known as kinnikinnick, to improve the taste of the bearberry leaf. The chokecherry fruit can be used to make jam or syrup, but the bitter nature of the fruit requires sugar to sweeten the preserves. Chokecherry is toxic to horses, moose, cattle, goats, deer, and other animals with segmented stomachs (rumens), especially after the leaves have wilted (such as after a frost or after branches have been broken) because wilting releases cyanide and makes the plant sweet. About 10–20 lbs of foliage can be fatal. Symptoms of a horse that has been poisoned include heavy breathing, agitation, and weakness. The leaves of the chokecherry serve as food for caterpillars of various Lepidoptera. See List of Lepidoptera which feed on Prunus. In 2007, Governor John Hoeven signed a bill naming the chokecherry the official fruit of the state of North Dakota, in part because its remains have been found at more archeological sites in the Dakotas than anywhere else Chokecherry is also used to craft wine in the western United States mainly in the Dakotas and Utah as well as in Manitoba, Canada.
<urn:uuid:99d04710-4e52-4642-b1b8-847ffec13843>
CC-MAIN-2020-10
https://thebackcountry.varnell.org/Plants/Plants-by-Family/ROSACEAE/Western-Choke-Cherry
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145989.45/warc/CC-MAIN-20200224224431-20200225014431-00397.warc.gz
en
0.951882
759
3.46875
3
For every child to develop a sound understanding of Maths, equipping them with the skills of calculation, reasoning and problem solving that they need in life beyond school. Mathematics Statement of Intent The intent of our mathematics curriculum is to design a curriculum, which is accessible to all and will maximise the development of every child’s ability and academic achievement. We will deliver lessons that are creative, engaging and develop a love for learning so that our children have faith and belief in themselves to succeed. We want children to enjoy maths and to get excited about the challenges the subject can bring. Maths is about learning new skills and practising these to master and then become fluent so as to be able to apply them in real life situations. It is important to us that children see the relevance of maths and why it is needed in life. We set our children’s learning in context by making the links to real life, and across the curriculum, giving their learning worth. We want children to make rich connections across mathematical ideas to develop fluency, mathematical reasoning and competence in solving increasingly sophisticated problems. We intend for our pupils to be able to apply their mathematical knowledge to science and other subjects. As our pupils progress, we intend for our pupils to be able to understand the world, have the ability to reason mathematically, have an appreciation of the beauty and power of mathematics, and a sense of enjoyment and curiosity about the subject. Aims of Mathematics at Wellfield The national curriculum for Mathematics aims to ensure that all pupils: - become fluent in the fundamentals of mathematics, including through varied and frequent practice with increasingly complex problems over time, so that pupils develop conceptual understanding and the ability to recall and apply knowledge rapidly and accurately. - reason mathematically by following a line of enquiry, conjecturing relationships and generalisations, and developing an argument, justification or proof using mathematical language - can solve problems by applying their mathematics to a variety of routine and non-routine problems with increasing sophistication, including breaking down problems into a series of simpler steps and persevering in seeking solutions.
<urn:uuid:1aa6d4e3-dc4e-4ed6-a6d9-a729b98dfa00>
CC-MAIN-2020-05
https://www.wellfield.lancs.sch.uk/aims-and-vision/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250590107.3/warc/CC-MAIN-20200117180950-20200117204950-00215.warc.gz
en
0.95258
426
3.828125
4
As we continue to face the COVID-19 pandemic, we’ve now entered the time of year when other respiratory viruses are more common, too. Influenza (flu) viruses are most common during the fall and winter. And respiratory syncytial virus (RSV) is most common during the fall, winter and spring. What is respiratory syncytial virus (RSV)? RSV is a common virus that affects the lungs and breathing. Almost everyone gets RSV by the time they are 2 years old. It usually causes mild symptoms like having a cold. Symptoms include: - Runny nose - Decrease in appetite - Coughing or wheezing - Decrease in activity - Being irritable Sometimes RSV can be more serious in babies, especially premature babies (born before 37 weeks of pregnancy). RSV is the most common cause of bronchiolitis (inflammation of the small airways in the lungs) and pneumonia (infection in the lungs) in babies younger than 1 year of age in the U.S. What are the symptoms of COVID-19 and flu? The symptoms of COVID-19 are similar to those of flu. Both COVID-19 and flu can have these symptoms: - Fever or chills - Trouble breathing - Sore throat - Runny or stuffy nose - Muscle or body aches - Some people have vomiting and diarrhea, but this is more common in children than adults COVID-19 can also cause a loss of taste or smell. It seems to spread more easily than flu, and it can take longer for infected people to show symptoms. COVID-19 also seems to cause more serious illness in some people than the flu. Are some babies at higher risk for respiratory viruses? It’s especially important to protect babies from respiratory viruses because their immune system is still developing. Your immune system protects your body from infection. Babies also have smaller airways for breathing, so they may be more likely to have breathing problems with a respiratory virus. Some babies may be at higher risk for respiratory viruses or at higher risk of serious illness with a respiratory virus: COVID-19. Some data shows that babies age 1 and under are at higher risk of serious illness with COVID-19 than older children. Babies who have other medical conditions or who are premature also may be more likely to have serious illness from COVID-19. RSV. Babies at high risk for severe illness with RSV include premature babies, babies younger than 6 months old and babies or young children who have lung or heart problems or other chronic (long-term) health conditions. Flu. The flu can be dangerous for all babies, even healthy babies. Babies and children younger than 5 years old – and especially those younger than 2 years old – are more likely than older children to have complications from the flu. Premature babies also are at increased risk of serious complications from the flu. Babies who were in the NICU are also more likely than other babies to get infections. How can you protect your baby from respiratory viruses? A baby can get a respiratory virus by being in close contact with an infected person. This includes the baby’s parents or other caregivers. You can also get infected by touching surfaces with virus on them and then touching your eyes, nose or mouth. During the fall and winter months, it’s more important than ever to take steps to protect your baby from respiratory viruses like COVID-19, RSV and the flu. Here’s how: - Babies at high risk for severe RSV may need medicine to help prevent it. Ask your baby’s health care provider if your baby needs this medicine. - Babies 6 months and older need a flu vaccine every year to help protect them from the flu. Parents, other family members and caregivers need a flu vaccine every year to help protect babies who are too young to get the vaccine. Get your flu shot during pregnancy as it protects your baby from the flu for several months after birth. - Practicing good infection control can help prevent the spread of respiratory viruses. Take these steps to protect yourself and your baby: - Wash your hands often. - Avoid touching your face with unwashed hands. - Clean and disinfect objects you touch regularly. - Avoid contact with people who are sick. - Practice social distancing. This means staying home when you can and keeping at least 6 feet distance from others. - When you’re around others, wear a cloth face cover or a facemask over your nose and mouth. Babies and children age 2 should not wear a face mask. - Talk to your health care provider about how to protect your baby from respiratory viruses, especially if your baby was premature or was in the NICU. Learn more about RSV.
<urn:uuid:017cca3d-cf07-469a-8467-f72d571d4785>
CC-MAIN-2023-23
https://newsmomsneed.marchofdimes.org/prematurity-2/protect-your-baby-from-viruses-like-covid-19-rsv-and-the-flu/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653930.47/warc/CC-MAIN-20230607143116-20230607173116-00629.warc.gz
en
0.952689
1,035
3.765625
4
Technically, Peake Childhood Center is a year-round school but for the children’s enjoyment we call the months of July and August ‘Summer Camp’. No Summer Camp is complete without the adventures provided by field trips. This Summer our students visited the beach, the farm, and a favorite local museum. At Buckroe Beach, we played at the water’s edge. We used science vocabulary and concepts while manipulating the sand into tall castles and elaborate buildings. At Bluebird Gap Farm, we learned about animals and their habitats. The playful goats were a group favorite! We worked on our math skills at The Mariner’s Museum and Park, with an outdoor story time about shapes followed by a scavenger hunt in the garden. We did the hokey pokey with our geometric shapes and finished the day with a visit to the museum’s model ship maker. Field trips are an important piece of Peake’s holistic programming. For preschoolers, field trips create opportunities to build friendships, cultivate experiences with teachers, encourage divergent thinking and curiosity, reinforce learned subjects, and improve cultural awareness. These opportunities can produce long-lasting effects for preschoolers, including increased academic achievement and personal wellbeing. Aside from learning life skills, field trips also provide the opportunity for our students to explore and connect with their community. When children feel like a member of their community, they are more likely to become engaged citizens and neighbors as they mature.
<urn:uuid:2d71f9b6-8dba-4850-8f4e-776b5904f314>
CC-MAIN-2023-40
https://peakecc.org/adventures-in-our-community/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00156.warc.gz
en
0.958896
300
2.921875
3
It looks like you're using an Ad Blocker. Please white-list or disable AboveTopSecret.com in your ad-blocking tool. Some features of ATS will be disabled while you continue to use an ad-blocker. Doctors have known that low levels of vitamin D are linked to certain kinds of cancers as well as to diabetes and asthma, but new research also shows that the vitamin can kill human cancer cells. The results fall short of an immediate cancer cure, but they are encouraging, medical professionals say. JoEllen Welsh, a researcher with the State University of New York at Albany, has studied the effects of vitamin D for 25 years. Part of her research involves taking human breast cancer cells and treating them with a potent form of vitamin D. Within a few days, half the cancer cells shriveled up and died. Welsh said the vitamin has the same effect as a drug used for breast cancer treatment. "What happens is that vitamin D enters the cells and triggers the cell death process," she told "Good Morning America." "It's similar to what we see when we treat cells with Tamoxifen," a drug used to treat breast cancer. Tumors in Mice Disappear The vitamin's effects were even more dramatic on breast cancer cells injected into mice. After several weeks of treatment, the cancer tumors in the mice shrank by an average of more than 50 percent. Some tumors disappeared. Similar results have been achieved on colon and prostate cancer tumors in mice. People should take care not to read too much into laboratory studies, said Dr. Richard Besser, ABC News' senior health and medical editor. Positive effects in a petri dish or in rats may not necessarily mean similar results in humans, he said It's also easier to treat cancer in mice than in people, Besser said. Tips for Getting Adequate Amounts of Vitamin D There is testing to determine whether patients are getting enough vitamin D, but Besser doesn't recommend it for everyone. If someone has repeated fractures or falls, his or her doctor may decide to do the test. To ensure adequate vitamin D intake, Besser recommended that people check their diets and get enough sunlight. Thirty minutes of sun twice per week -- generally between the hours of 10 a.m. and 3 p.m. -- should be sufficient, he said. He also said that such levels of exposure won't increase the risk for cancer. If diet and sun exposure cannot be improved, people may also consider a supplement, he said. Originally posted by yorkshirelad Why are we debating the plot of a TV sci fi episode as if its really happening ? The Outer Limits - Music of the Spheres Originally posted by thePharaoh reply to post by Sk8ergrl i tell you what.....i havnt seen a chem trail in ages???...... normally i see jets spraying that crap high up.....regularly.....not anymore
<urn:uuid:764dbeed-8f4a-4723-8e71-33c4778305b8>
CC-MAIN-2017-30
http://www.abovetopsecret.com/forum/thread861988/pg9
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424564.72/warc/CC-MAIN-20170723142634-20170723162634-00397.warc.gz
en
0.9641
605
3.015625
3
Science Nation: Teens and Stress - “Teenagers experience stress as more stressful,” says UCLA psychologist Adriana Galvan, “And if that stress is interfering with their decision making, it’s really important to understand the neuromechanism that’s underlying this connection between high levels of stress and poor decision making.” In order to understand how stress affects the developing brain, teens are enrolled in experiments and self-monitor their stress, then she conducts evaluations and scans their brains. What she’s found is that the “reward centre” of the brain is more active when they make risky choices, and they make more risky choices than adults do. Stress interferes with the decision making process in an area that is not as developed as it is in an adult brain. “The next time a teen gets under your skin,” says the video’s narrator, “Try and remember what’s under theirs.” |Producer: National Science Foundation||Featuring: Adriana Galvan| |Format: Flash||Date: 13/06/12| Tags:brain, cognitive, cog_sci, neurodevelopment, psychology, research, science, scivee, stress, teen, video, youth| This post currently has You can read the comments or leave your own thoughts. Last reviewed: 26 Jun 2012
<urn:uuid:a60e8eff-7bc8-44bf-a1e3-4a65ade8250b>
CC-MAIN-2014-23
http://blogs.psychcentral.com/channeln/2012/06/stressed-out-teens/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997892557.70/warc/CC-MAIN-20140722025812-00250-ip-10-33-131-23.ec2.internal.warc.gz
en
0.934807
296
3.15625
3
Islands have often been reserved for special purposes. Look at the article on the islands of the Venetian lagoon elsewhere in this issue of hidden europe to find examples of islands that have been deployed to store gunpowder, lunatics or lepers. During the Second World War, the British authorities decided to reserve a small island off the west coast of Scotland, Gruinard, for chemical warfare experiments. Another Scottish island, Papa Stronsay, is the preserve of an unusual Catholic congregation message in a bottle of monks, the Transalpine Redemptorists. And in the Öresund, that strip of water that separates Sweden from Denmark, there is an island that was, for many years, reserved for astronomy. Several times a day, even in winter, a ferry chugs out of the harbour at Landskrona on Sweden's Öresund coast and makes the half hour crossing to the island of Ven. The island (shown as Hven on some older maps) is a welcome haven of quiet in an otherwise crowded part of southern Scandinavia. The bustling centre of Copenhagen is just thirty kilometres distant. A short boat journey, another world, and that was enough for the celebrated sixteenth-century Danish astronomer Tycho Brahe who established one of northern Europe's first scientific astronomical observatories on Ven.
<urn:uuid:671fe608-f057-4ad5-bd74-2ded0920f9aa>
CC-MAIN-2017-34
http://www.hiddeneurope.co.uk/mapping-the-skies-the-swedish-island-of-ven
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103167.97/warc/CC-MAIN-20170817092444-20170817112444-00041.warc.gz
en
0.931083
270
3.359375
3
Editor’s Note: We don’t say this enough, but we are so grateful for your support this year. It’s what motivates us every day. Thank you for reading, sharing, and being an invaluable part of the Verily community. Happy Thanksgiving to you and yours. We usually think of gratitude once a year—when Thanksgiving rolls around. For this one day, we show our thanks and think about how lucky we are to have what we have. But once the turkey is gone, and the pumpkin pie crumbs are brushed away, we’re often quick to go back to taking for granted the little things that make life so great. But the proof is in the pudding. Practicing gratitude can result in a host of amazing benefits. It is linked to lower levels of depression and stress. Several studies note that gratitude is linked to greater levels of optimism, improved relationships, and generally increased well-being. Practicing thankfulness was also associated with a lowered risk of major depression, generalized anxiety disorder, phobia, and nicotine and alcohol dependence, as well as better daily functioning for people diagnosed with post-traumatic stress disorder. One study found that practicing gratitude before going to sleep helped study participants quiet their minds and sleep better. And Robert Emmons, one of the foremost researchers on gratitude, has identified a wealth of benefits that comes with practicing gratitude, including stronger immune systems; lower blood pressure; feeling more alert, optimistic, happy, and forgiving; and feeling less lonely and isolated. All these benefits for our and others’ well-being are kind of a big deal, right? Gratitude definitely deserves a closer look not just today but every day. Research has found that human beings are typically biased toward negative information—psychologists call this a negativity bias. This was helpful thousands of years ago when we were living life as hunters and gatherers because we needed to remember where the unfriendly tribe lived or where the tiger lurked in the forest. It was essential to survival. In the modern world, though, negativity bias can keep us so hyperfocused on the not-so-good in our lives that we don’t even notice the positive happening right under our noses. Gratitude is the perfect antidote. Practicing gratitude doesn’t mean ignoring the negatives in your life or blindly taking a “Pollyanna approach.” Rather, it is a way to help you weather the storms. Luckily, there are easy ways to begin practicing gratitude today. The great thing about these is that they are easy to implement and require no special training on your part. Measure your current gratitude levels by taking Berkeley’s Greater Good Science Center’s gratitude quiz. Take it before you start incorporating these gratitude initiatives in your life. Then measure it again later to see the impact that practicing gratefulness has had on you. 01. Stop, look, and go. Brother David Steindl-Rast, a Benedictine monk who has spent a great deal of time studying gratitude, says that gratitude happens when “we experience something that’s valuable to us. Something is given to us that’s valuable to us. And it’s really given. And when these two things come together . . . then gratefulness spontaneously rises in my heart; happiness spontaneously rises in my heart.” If you have fifteen minutes to spare in your day, Brother David’s TED Talk on gratefulness is a simple yet wonderful message. One easy way to use Brother David’s three-step technique that he describes in his TED talk: Stop, look, and go. When we stop, we become present to what is happening around us. This allows us to look and directly experience what is happening in that moment. Then we go on with life by acknowledging what we just witnessed. It could mean taking a few seconds to appreciate the time you are spending with a friend, a delicious meal, or the warm coat you have. Set a recurring reminder on your phone to help you remember to take advantage of this easy practice once or a few times a day. Taking just five minutes to focus on what you are grateful for has been linked to an immediate rise in mood. 02. Do the ‘Three Good Things’ exercise. Martin Seligman, Ph.D., former president of the American Psychological Association and well-known for his work in the field of positive psychology, suggests using the “Three Good Things” exercise in his book Flourish. He instructs students to write down three good things that happened to them that day. He stresses that reasons for being grateful can be small or have great significance. After recording the event, he encourages students to ask themselves: (1) “Why did this good thing happen?” (2) “What does this mean to me?” and (3) “How can I have more of this good thing in the future?” Along those lines, the Greater Good Science Center started the Thnx4.org initiative, which, after signing up, prompts you twice a week for three weeks to share what you are grateful for. At the end of three weeks, it will help you assess how being grateful has affected your physical and mental health. 03. Keep a gratitude journal. Researchers Emmons and Michael McCullough found that participants in a study who were asked to record five things that they were thankful for each week for ten weeks felt better about their lives in general, more optimistic about the coming week, and more connected with others. Emmons says that gratitude is vital when faced with suffering and hard times because it encourages us to see the bigger picture and motivates us to face these hardships. He conducted another study in which he asked people who had severe neuromuscular disorders to keep a gratitude journal. He found that the participants, despite the hardships and pain they were suffering, experienced more positive emotions, felt more optimistic, felt more connected to others, and reported longer sleep. Even when you don’t feel like practicing gratitude, Emmons says that just going through the motions can help you feel better. It can be as simple as writing down three things you were grateful for that day. And don’t feel as if you have to always write down epic reasons to be grateful. A delicious cup of coffee is a legitimate reason to be grateful, as is a gorgeous sunset, your health, and your family. It’s more important that you feel grateful about something rather than what you are actually grateful about. 04. Make a gratitude visit. Seligman has found in his research that those who practice gratitude visits are happier and less depressed. To make a gratitude visit, you should think of someone who has had a significant impact on your life, and write down in about three hundred words how that person has positively impacted your life. Then, he suggests you visit that person and read your letter to them. (You may want to bring tissues.) If visiting isn’t an option, you can call and read it to them. Sending it as a note might be another option, but it may not be as effective. The gratitude visit exercise prompts you to think about who has had a positive impact on your life and encourages you to think about the significance of the gift that this person gave you. Gratitude is relatively simple to practice, yet the benefits are impressive. Rather than limiting it to a once-yearly appearance with the turkey and stuffing, try making gratitude a daily event. Choose one of these ways to practice gratitude, whether it be pausing to appreciate three things, journaling, or making a gratitude visit. Give yourself a few weeks to establish a habit. You’ll find yourself appreciating all the amazing things happening in your life. Photo Credit: Shannon Lee Miller
<urn:uuid:17a5e46f-1af9-43ed-9d43-356751caabdb>
CC-MAIN-2020-16
https://verilymag.com/2015/11/mental-health-benefits-gratitude-positive-thinking-thanksgiving
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00230.warc.gz
en
0.964058
1,618
2.953125
3
Posted by: Loren Coleman on October 15th, 2009 Known to science only by two specimens described in 1900, a critically endangered crow has re-emerged from hiding on a remote, mountainous Indonesian island thanks in part to a Michigan State University scientist. The Banggai crow was believed by many to be extinct until Indonesian biologists finally secured two new specimens on Peleng Island in 2007. Pamela Rasmussen, a Michigan State University assistant professor of zoology and renowned species sleuth, provided conclusive verification. An ornithologist who specializes on the birds of southern Asia, Rasmussen studied the two century-old specimens known as Corvus unicolor in New York’s American Museum of Natural History. She compared them to the new crow specimens in Indonesia’s national museum, to lay to rest lingering speculation that they were merely a subspecies of a different crow. The more common slender-billed crow, Corvus enca, also is found in the Banggai Islands, and likewise is all black. “The morphometric analysis I did shows that all four unicolor specimens are very similar to each other, and distinctly different from enca specimens. We also showed that the two taxa differ in eye color — an important feature in Corvus — as well,” Rasmussen said. “Not only did this confirm the identity of the new specimens but also the specific distinctness of Corvus unicolor, which has also long been in doubt.” The rediscovery was spearheaded by professor Mochamad Indrawan of the University of Indonesia, chair of the Indonesian Ornithologists’ Union, who conducted ecological field studies. He was assisted by collaborator Yunus Masala and by the Celebes Bird Club, members of which secured the new specimens that are now cataloged at the Museum Zoologicum Bogoriense in Java. Before Indrawan and collaborators could publish their findings confirming the crow’s identity, other birdwatchers in the mountains of Peleng photographed and recorded Banggai crows, which Rasmussen said confirms the distinctiveness of the species. Indrawan and Masala now have turned their efforts toward protecting the rare species, which is hunted by local residents. That includes making recommendations for protection of its forest habitat through sustainable agriculture methods and, perhaps, eco-tourism, to address the residents’ livelihood needs. A photo of the Banggai crow debuts this week in volume 14 of the influential Handbook of the Birds of the World. “It was very exciting to see photos of such a rare species about which almost nothing is known, especially since the photos were of such high quality,” said Chief Editor Josep del Hoyo. He called the rediscovery “spectacular.” Rasmussen, Indrawan and colleagues have submitted the detailed paper confirming the species’ rediscovery for publication. Rasmussen’s visit to Indonesia to take specimen measurements and make comparisons was made possible through a planning visit for a MSU Study Abroad program to Malaysia and Indonesia. Rasmussen, who also is assistant curator of mammalogy and ornithology at the MSU Museum, is the author of the two-volume Birds of South Asia: The Ripley Guide. Her work on uncovering the ornithological frauds of British collector Col. Richard Meinertzhagen has won international attention, detailed in Nature, the May 2006 The New Yorker, and The Best American Science and Nature Writing 2007. Information courtesy of a press release from Michigan State University. Please click on the button below (not the one up top) to send in your museum donation. Loren Coleman is one of the world’s leading cryptozoologists, some say “the” leading. Certainly, he is acknowledged as the current living American researcher and writer who has most popularized cryptozoology in the late 20th and early 21st centuries. Starting his fieldwork and investigations in 1960, after traveling and trekking extensively in pursuit of cryptozoological mysteries, Coleman began writing to share his experiences in 1969. An honorary member of Ivan T. Sanderson’s Society for the Investigation of the Unexplained in the 1970s, Coleman has been bestowed with similar honorary memberships of the North Idaho College Cryptozoology Club in 1983, and in subsequent years, that of the British Columbia Scientific Cryptozoology Club, CryptoSafari International, and other international organizations. He was also a Life Member and Benefactor of the International Society of Cryptozoology (now-defunct). Loren Coleman’s daily blog, as a member of the Cryptomundo Team, served as an ongoing avenue of communication for the ever-growing body of cryptozoo news from 2005 through 2013.
<urn:uuid:47c1b6f7-059d-46da-a01c-6fa0ec0074cb>
CC-MAIN-2014-23
http://cryptomundo.com/cryptozoo-news/crow-107/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997888210.96/warc/CC-MAIN-20140722025808-00198-ip-10-33-131-23.ec2.internal.warc.gz
en
0.952759
983
3.421875
3
Earth Observation Summit the G8 meeting in June 2003 (Evian, France) it was noted that there was a need to strengthen international cooperation on global observations to produce reliable data products covering the atmosphere, land, fresh water, oceans and ecosystems. first Earth Observation Summit (EOS) in July 2003 (Washington DC, United States of America) subsequently endorsed a statement of commitment to develop a comprehensive, coordinated and sustained earth observation system or systems. Such a system would directly support policy and decisionmaking and contribute to realization of the goals of the World Summit on Sustainable Development (WSSD), the Millennium Development Goals (MDGs), international conventions and other national and international 10-year implementation plan Group on Earth Observations (GEO) was established to coordinate and prepare a 10-year implementation plan for what became known as the Global Earth Observation System of Systems (GEOSS). Nine Societal Benefit Areas were identified (see box far right) and great efforts are being made to build on existing systems and initiatives to develop a comprehensive, coordinated and sustained programme of observations supporting each Societal Benefit Area. The Plan also includes sections dealing with system architecture, capacity building and Implementation Plan has identified around 240 tasks, which have been prioritized for short-(1–2 years), medium- (3–5 years) or longer-term (5–10 years) implementation. The plan was endorsed at the 3rd EOS (Brussels, Belgium, the beginning, GTOS has welcomed the GEOSS process as it has the political endorsement and support to carry out the important role of coordinating the huge number of national and international activities in the development of the products and data required by end users. GTOS and its Panels have been active in assisting in development of the Societal Benefit Areas, the 10-year implementation plan, and the programmes to implement the short-term objectives, including the implementation of the tasks and activities of the annual work plans. In addition, GTOS is ensuring that its activities comply with and are relevant to GEO objectives and requirements, as well as assisting in the creation of the required networks and infrastructure (see section on IGOL for an example). Societal Benefit Areas Disasters – Reducing loss of life and property from natural and human-induced Understanding environmental factors affecting human health Improving management of energy resources. Understanding, assessing, predicting, mitigating and adapting to climate variability and change. Improving water-resource management through better understanding of the water cycle. Improving weather information, forecasting and warning. Improving the management and protection of terrestrial, coastal and marine resources. – Supporting sustainable agriculture and combating Understanding, monitoring and conserving biodiversity. Group on Earth Observations home page for more details
<urn:uuid:2b3a680e-ebd7-4879-aeec-051f2f6156f0>
CC-MAIN-2017-26
http://www.fao.org/gtos/GEOSS.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00633.warc.gz
en
0.896749
612
3.328125
3
The application of cohesion and Translation strategy in Holy Quran: Arabic and English in contrast Keywords:Translation, cohesion, cohesive devises, religious text, AbstractThe present study focuses on cohesive devices in term of frequency rate .In doing so, the surah of ”Bacara” has been contrastively compared whit it’s English rendering version. The Arabic text of the holy Quran was selected as a source text and the English translation as a target text. Cohesive devises were; Reference, Ellipsis, Conjunction, Substitution, and lexical markers. The Religious texts are sensitive one and that’s why those broadly identified along whit their sub-component s both in the ST and TT, then, counted and compared. The study employs descriptive qualitative methodology and describes the specific cohesion relations in every sentence, so The model of Halliday and Hassan‘s (1976) followed. In summary, The result obviously confirm that the comparison of the frequency of each component of cohesive devises between the original Arabic text and the English rendering has some differences and discrepancy in strategy an application by translator. How to Cite mardani, tooba. (2022). The application of cohesion and Translation strategy in Holy Quran: Arabic and English in contrast. LANGUAGE ART, 7(3). Retrieved from https://languageart.ir/index.php/LA/article/view/279 Copyright (c) 2022 tooba mardani This work is licensed under a Creative Commons Attribution 4.0 International License.
<urn:uuid:234a95f9-4f82-4303-99c9-ac721153eb85>
CC-MAIN-2023-23
https://languageart.ir/index.php/LA/article/view/279
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00343.warc.gz
en
0.873566
336
2.546875
3
Fashion is a concept that represents a universal subject, a language understood and spoken by many it was created in the modern industry, based around firms or fashion houses run by individual designers, started in the 19th century. e ever-changing styles. Fashion is a state of mind. A spirit, an extension of one’s self. Fashion talks, it can be an understated whisper, a high-energy scream or an all-knowing wink and a smile. Most of all fashion is about being comfortable with yourself, translating self-esteem into a personal style. Fashions vary greatly within a society over time, but also are affected by age, occupation, sexual orientation, location and social class. It has been and continues to be a reflection of society and current events. Fashion is clothing or accessories that becomes a trend, which tends to reflect a behaviour, mindset, or circumstance. There are odd fashion trends all over history, telling a story about the people of that time and culture. A fashion trend is what’s hip or popular at a certain point in time. Usually refers to a certain style in fashion. Today, a fashion trend starts with fashion designers, who design a spring/summer and fall/winter collection based on cues and inspiration they’ve gathered throughout the season. These cues can include popular culture, celebrities, music, politics, nature or something else entirely different like spirituality. We can say that fashion trend is a creative wind that blows with the expression of time expressing moods throughout the message of colours, fabrics and the design. During the last years the world of fashion has been changing just as rapidly, while also facing severe individual, social and global challenges. Although timeless descriptors such as quality, personality, style, comfort, beauty and elegance are still firmly linked to the notion of fashion (and luxury), a new framework of aspirations and values defines today’s meaning of fashion which is seemingly different to that of previous generations and perceptions. Today the new frameworks are the street style that has become just as major as the runway shows themselves or the social media concept, because fashion is about people. It involves perception, self-expression, memory, creativity and social interaction. Fashion reveals and shapes our emotions, personality and culture. Inside Untitled Barcelona we believe in fashion because allows freedom of speech for the creator and the wearer, is about the expression in the art and emotions. We love to express the mantra IAM representing fashion as a powerful communication tool focussing not only on clothing or accessories itself but also on the complexity of human behaviour and communication. Fashion as a way of communicating!
<urn:uuid:7db3b441-c033-45e1-81d2-655371f6dff7>
CC-MAIN-2020-29
https://www.untitledbarcelona.com/fashion-trends-2019/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880665.3/warc/CC-MAIN-20200714114524-20200714144524-00020.warc.gz
en
0.951904
559
2.53125
3
This is a power point with the first 25 Fry Words/Sight Words. There is one word per slide and the slides advance automatically after three seconds. Slide advance times can be easily customized/changed. I use this power point in my classroom during transition times, in reading intervention focus groups, as a center option and as a time filler. There are so many ways you can use this power point! I also email it to my parents so that if they have time at home they can review these with their kids. Sight word recognition has been proven to increase fluency and spelling.
<urn:uuid:9a289682-a2ad-4bf1-a102-913e2326a9f8>
CC-MAIN-2017-34
https://www.teacherspayteachers.com/Product/First-25-Sight-Words-on-Power-Point-410057
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107487.10/warc/CC-MAIN-20170821022354-20170821042354-00588.warc.gz
en
0.961861
117
2.75
3
This discussion on how genetic perspectives on identity engage with views coming from other academic fields studying human past and present was held at Kulturhuset, Oslo. It can be viewed in it's entirety here. During the last three decades, advances in science and technology have allowed us to unpack the human genome and produce huge amounts of genetic data publically owned and available to the scientific community, governments, as well as commercial ancestry companies. Although our DNA is extremely similar, researchers use statistical methods to investigate patterns of variation between human groups and further link individual DNA samples to specific populations of origin. The interpretation of these patterns is a rather complicated process and requires input from other fields such as archaeology, history, and anthropology. At the same time, assigning individuals to ancestral lineages is far from straightforward, involves much speculation and often implicates social and cultural preconceptions. How, then, does contemporary scientific DNA research relate to our understandings of individual and group identities? What is the relationship between population labels used in genetics and ethnic labels assigned through social and cultural processes? Why are individuals so eager to search their ancestry through DNA-typing? Does this reflect the hype with genetics or a deeper dichotomy between biological and cultural understandings of identity? This event is organized in connection with the development of our exhibition on the practices of historical and contemporary research on human biological variation. All contributions and feedback will be cherished!
<urn:uuid:e964cc42-ee8e-40c1-a870-80bf3951fc15>
CC-MAIN-2020-24
https://www.tekniskmuseum.no/folk/arrangementer/tidligere-arrangement/19-norsk/arrangementer/tidligere-arrangementer/156-dna-og-identitet-star-historien-skrevet-i-vare-gener
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392142.20/warc/CC-MAIN-20200527075559-20200527105559-00344.warc.gz
en
0.941625
287
2.875
3
by Staff Writers Pasadena CA (JPL) Mar 05, 2014 NASA's Near-Earth Object Wide-field Infrared Survey Explorer (NEOWISE) spacecraft has spotted a never-before-seen comet -- its first such discovery since coming out of hibernation late last year. "We are so pleased to have discovered this frozen visitor from the outermost reaches of our solar system," said Amy Mainzer, the mission's principal investigator from NASA's Jet Propulsion Laboratory in Pasadena, Calif. "This comet is a weirdo - it is in a retrograde orbit, meaning that it orbits the sun in the opposite sense from Earth and the other planets." Officially named "C/2014 C3 (NEOWISE)", the first comet discovery of the renewed mission came on Feb. 14 when the comet was about 143 million miles (230 million kilometers) from Earth. Although the comet's orbit is still a bit uncertain, it appears to have arrived from its most distant point in the region of the outer planets. The mission's sophisticated software picked out the moving object against a background of stationary stars. As NEOWISE circled Earth, scanning the sky, it observed the comet six times over half a day before the object moved out of its view. The discovery was confirmed by the Minor Planet Center, Cambridge, Mass., when follow-up observations were received three days later from the Near Earth Object Observation project Spacewatch, Tucson, Ariz. Other follow-up observations were then quickly received. While this is the first comet NEOWISE has discovered since coming out of hibernation, the spacecraft is credited with the discovery of 21 other comets during its primary mission. Originally called the Wide-field Infrared Survey Explorer (WISE), the spacecraft was shut down in 2011 after its primary mission was completed. In September 2013, it was reactivated, renamed NEOWISE and assigned a new mission to assist NASA's efforts to identify the population of potentially hazardous near-Earth objects. NEOWISE will also characterize previously known asteroids and comets to better understand their sizes and compositions. NEOWISE at JPL Asteroid and Comet Mission News, Science and Technology |The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.|
<urn:uuid:0611b169-ab63-4f9a-a46f-e991117544ac>
CC-MAIN-2017-30
http://www.spacedaily.com/reports/NEOWISE_Spies_Its_First_Comet_999.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424909.50/warc/CC-MAIN-20170724182233-20170724202233-00462.warc.gz
en
0.935345
675
2.875
3
2nd through 6th grades the Gallant Pig by Dick King-Smith of Winn-Dixie by Kate DiCamillo Ten-year-old India Opal describes her first summer in the town of Naomi, Florida, and all the good things that happen to her because of her big ugly dog Winn-Dixie. Beauty by Anna Sewell A horse in nineteenth-century England recounts his experiences with both good and bad masters. Illustrated notes throughout the text explain the historical background of the story. this Mouse by Lois Lowry Mouse Mistress Hildegarde keeps a colony of church mice safe from the exterminator and sees that they make it through the dangerous Blessing of the Animals. Web by E.B. White Wilbur the pig is destined to be the farmer's Christmas dinner until his spider friend, Charlotte, decides to help him by praising him in her webs. Cricket in Times Square by George Selden The adventures of a country cricket who unintentionally arrives in New York and is befriended by Tucker Mouse and Harry Cat. Dog’s Life: The Autobiography of a Stray by Ann M. Martin Squirrel, a stray puppy, tells her life story, from her nurturing mother and brother to making her own way in the world, facing busy highways, changing seasons, and humans both gentle and brutal. Ben by Walt Morey The Alaskan wilderness is a lonely place for Mark, but he finds a friend named Ben, who happens to be an Alaskan brown bear. Ben and Mark form a special bond, but the townspeople are determined to destroy it. of Chincoteague by Marguerite Henry Paul and his sister Maureen's determination to own a pony from the herd on Chincoteague Island, Virginia, is greatly increased when the Phantom and her colt are among the ponies rounded up for the yearly auction. Frisby and the Rats of NIMH by Robert C. O’Brien Having no one to help her with her problems, a widowed mouse visits the rats whose former imprisonment in a laboratory made them wise and long lived. Mouse and the Motorcycle by Beverly Cleary A reckless young mouse named Ralph makes friends with a boy in room 215 of the Mountain View Inn and discovers the joys of motorcycling. |J Bri||Mousenet by Prudence Brietrose Sent to live with her father and his wife in Oregon, ten-year-old misfit Megan is lonely until she starts working with some computer-savvy mice to try to save Mouse Nation--and the planet. One and Only Ivan by Katherine Applegate When Ivan, a gorilla living in a mall, meets Ruby, a baby elephant who has been added to the mall, he decides that he must find a better life for her. Ivan’s love of art helps him attain a better life for Ruby and for himself. Based on a true story. |J Avi||Poppy by Avi Poppy the deer mouse urges her family to move next to a field of corn big enough to feed them all forever, but Mr. Ocax, a terrifying owl, has other ideas. Rescuers by Margery Sharp |J Cle||Ribsy by Beverly Cleary Separated from his owner, Henry Huggins, in a shopping center parking lot, an ordinary city dog begins a string of bewildering adventures. at Sea by Richard Peck In 1887, the Cranstons voyage to London, where they hope to find a husband for their awkward daughter. They are secretly accompanied by a mouse family, for whom the journey is both terrifying and wondrous. |J Nay||Shiloh by Phyllis Reynolds Naylor When he finds a lost beagle in the hills behind his West Virginia home, Marty tries to hide it from his family and the dog's real owner, a mean-spirited man known to shoot deer out of season and to mistreat his dogs. Tells All by Ann Cameron Called a troublemaker by his human family, a dog defends himself and relates the family's adoption of a cat who gives him a new way of looking at his world. Little by E.B. White The adventures of the debonair mouse Stuart Little as he sets out in the world to seek out his dearest friend, a little bird who stayed a few days in his family's garden. Tale of Despereaux by Kate DiCamillo The story of Despereaux Tilling, a mouse of unusual talents, the princess that he loves, a servant girl, and a devious rat determined to bring them all to ruin. Trumpet of the Swan by E.B. White Knowing how to read and write is not enough for Louis, a voiceless Trumpeter Swan; his determination to learn to play a stolen trumpet takes him far from his wilderness home. 6th through 9th grade |T Hia||Hoot by Carl Hiaasen Roy, who is new to his small Florida town, becomes involved in another boy's attempt to save a colony of burrowing owls from a proposed construction site. Incredible Journey by Sheila Burnford A Siamese cat, an old bull terrier, and a young Labrador retriever travel together 250 miles through the Canadian wilderness to find their family. Based on a true story. of the Wolves by Jean Craighead George While running away from home and an unwanted marriage, a thirteen-year-old Eskimo girl gets lost on the North Slope of Alaska and is befriended by a wolf pack. Yeller by Fred Gipson In early frontier Texas, fourteen-year-old Travis must take over his family's farm and making a painful decision. |T Jac||Redwall books by Brian Jacques When the peaceful life in Redwall Abbey is shattered by the arrival of the evil rat Cluny and his villanous hordes, Matthias, a young mouse, resolves to find a legendary sword to help Redwall's inhabitants destroy the enemy. Stops for No Mouse by Michael Hoeye When a jaunty mouse brings a watch into his shop for repair and then disappears, Hermux Tantamoq is caught up in a dangerous search for eternal youth as he tries to find out what happened to her. |T Hun||Warriors books by Erin Hunter For generations, four Clans of wild cats have shared the forest according to the laws of their ancestors. But the code is threatened, and one clan is in grave danger as another clan grows stronger. Noble warriors are dying, and some deaths are more mysterious than others. of the Riding Stars books by M.I. McAllister A group of animals, led by an orphaned squirrel, learns about friendship and loyalty when they band together to defend their island kingdom against evil forces. Horse by Michael Morpurgo Joey the horse recalls his experiences growing up on an English farm, his struggle for survival as a cavalry horse in World War I, and his reunion with his beloved master. Down by Richard Adams This stirring tale of adventure and survival follows a group of rabbits searching for a safe place to establish a new warren where they can live in peace. the Red Fern Grows by Wilson Rawls A young boy living in the Ozarks achieves his heart's desire when he becomes the owner of two redbone hounds and teaches them to be champion hunters. Fang by Jack London Being half wolf and half dog leaves White Fang looking for a place to belong. When he turns to man to protect him, he finds that man may be the cruelest animal. Yearling by Marjorie Kinnan Rawlings A young boy living in the Florida backwoods is forced to decide the fate of a fawn he has lovingly raised as a pet.
<urn:uuid:3dc499c3-9d0c-4215-b595-cd95d89877a3>
CC-MAIN-2013-48
http://moorestown.lib.nj.us/animalstories.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164050279/warc/CC-MAIN-20131204133410-00014-ip-10-33-133-15.ec2.internal.warc.gz
en
0.9514
1,648
2.75
3
The word circus can be used positively or negatively: to describe an artistic event or, as the dictionary states, “a frenetic disorganized (and often comic) disturbance suggestive of a large public entertainment.” Positively, we have “circus” as art form: a performance in a tent with traveling artists performing various acts from the three categories: juggling, equilibristics, vaulting. These categories are based on Newton’s third law – that for every action, there is an equal and opposite reaction. Juggling is concerned with reaction; vaulting with action; equilibrium with the interplay of action and reaction. Animal acts, clowning and sideshow performance are also included. The experience of attending a circus is quite particular, and for many it is an event associated with childhood and fond memories. A nostalgia of bonhomie, popcorn, candyfloss, the aroma of sawdust, burning tungsten lights, and animal droppings. Images branded in the mind – of roaring lions jumping through flaming hoops and beautiful aerialists carving out spaces high over the audience. A cacophony of unrestrained sounds, shiny objects, smells all achieving a synthesis. The audience comes to gawk at the rawness of bodies engaging in absurd challenges against the laws of gravity. Our hearts race as we watch artists defy the laws. We wonder if they’ll succeed, burst with applause when they do, and through this catharsis we find a deeper value in human life. The circus brings an audience closer together through the geometric shape of a circle to watch a dance between jeopardy and resolution. Negatively, we have “circus” as public disturbance. Consider South Africa’s recent state of the nation address: Fights broke out, rules were broken, the house became unrestrained, the speaker tried to regain order, groups of hefty patrons dressed in their parties emblematic bright red were herded out of the chamber by force, onlookers in the gallery jeered. The following day newspapers unabashedly splattered the term “circus” everywhere they could: “While Parliament has been turned into a circus this evening, tomorrow the nation’s electricity crisis remains, unemployment remains, and crime continues to plague our communities,” (Mail & Guardian SAPA Staff reporter). “Parliament has degenerated into a circus with a few hundred clowns each earning a salary of a million rand of taxpayers’ money per annum, contributing nothing to the improvement of the lives of ordinary people,” (AfriForum CEO Kallie Kriel). Here, circus is used to depict degeneracy, disorganization, disappointment, blame, shame. The extraordinariness and audacity of law-makers breaking their own laws publicly. What do the two events share in common? The audience gawks at rawness and absurdity. We bay for politicians’ blood and socially we bond in our catharsis that the wound in our government is out in the open for us all to look at. All is revealed. The magician has nothing up his sleeve. And yet we still have a deeper value for human life as we watch this dance between jeopardy and resolution. Hoping for the circle to be closed so we can applaud. So what does an audience anticipate when you call a show a circus? Clowns on a good day. Clowns on a bad day. Shaun Acker is an actor and musician based in Cape Town for the past five years. Apart from appearing in local South African theatre productions (The Unexpected Man, Get Kraken, Dogyard, Swoop, King Lear, A Midsummer Nights Dream, Kardiavale) he has also appeared in international television series (Black Sails, Women in Love) and commercials (Rolo, Chexmix, B&Q, McCoys, Robinsons Squash, Carling Black Label). Shaun is co-founder of the Balkan brass ensemble, “The Phax Trio”, in which he composes and performs the saxophone and clarinet. He holds a masters degree in aerial choreography through the department of drama at Rhodes University, and, though more infrequently, has choreographed two short aerial dance works: Somnambul and in/apt: a contemporary hanging for the Baxter Dance Festival and the public arts festival, Infecting The City, respectively. Shaun has recently returned from Dublin, Ireland where he performed Fleur Du Cap winner, Nicholas Spagnoletti’s, Oscar* nominated work Civil Parting at the International Dublin Gay Theatre Festival. Shaun grew up on Boswell-Wilkie circus in the late 80’s and took solo trapeze instruction from Stanley Bower, catcher of the acclaimed flying trapeze troupe, The Star Lords.
<urn:uuid:91941bef-970a-4ea5-acee-ffbdfcd5a247>
CC-MAIN-2017-43
http://circusnow.org/clowns-on-a-good-day-clowns-on-a-bad-day-a-reflection-on-the-circus-of-politics/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823067.51/warc/CC-MAIN-20171018180631-20171018200631-00023.warc.gz
en
0.945549
998
2.828125
3
Competitiveness is a dynamic concept. Since everybody competes, almost, with everybody else, it forces each economic actor in a country to rethink its role and responsibilities accordingly. Probably, the most difficult hurdle is to overcome a classical approach to economic affairs, which traditionally emphasizes exports, tangible goods, and basic infrastructure. J.M. Keynes underlined the importance of breaking away from the past when he stated "The real difficulty lies not in developing new ideas but in escaping from the old ones." Today the focus is on the question: what have we learned? Are there patterns that explain the competitiveness of nations? Is it possible to benchmark success stories? Although there is no ready-made recipe for competitiveness, there are indeed some principles that merit further attention: the 10 Golden Rules of Competitiveness. Create a stable and predictable legislative and administrative environment. Ensure speed, transparency and accountability in the administration. Pledge to maintain budget, fiscal and debt discipline. Diversify the economy, from a sectorial and geographical point of view. Invest in traditional and advanced infrastructure, logistics and the linkage of activities. Support medium sized enterprises, with home grown technology and export orientation. Balance aggressiveness on international markets with attractiveness for added value activities in order to sustain a current account surplus. Preserve the industrial base of the nation, and the “made in…” Focus on a dual track education system (apprenticeship and higher education) to foster the employability of the younger generation and reduce youth unemployment. Promote a science and entrepreneurial culture. Maintain social consensus on policies and social mobility upward. Return the tangible signs of competitiveness success to the people (better roads, hospitals, schools, housing, etc.) as a symbol of achieved prosperity. Source: Garelli, S. (2014). The Fundamentals and History of Competitiveness. In IMD World Competitiveness Yearbook (pp. 488-503). Lausanne: IMD World Competitiveness Center.
<urn:uuid:6794c79c-1197-4f30-9c6e-5950b6869c69>
CC-MAIN-2023-40
https://ecrc.mn/12-golden-rules-of-competitiveness/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00414.warc.gz
en
0.909371
440
2.9375
3
Kiwi fruit has lots of naturally existing bio-flavonoids that have immense health benefits. There are no such toxins present in kiwi fruit, but many people consider flavonoid compounds to be dangerous for health. Health Advantages of Compounds: - It has tannins that help in building collagen tissues. These tissues are necessary for skin formation, elasticity and repair. - Kiwi fruit is very rich in inositol, plant based hormone that help the patients afflicted with fibromyalgia disease.
<urn:uuid:df2d3198-35b0-4871-ba3f-20ba7ba548be>
CC-MAIN-2014-41
http://answers.ifood.tv/question/tell-me-the-types-of-toxins-present-in-kiwi-fruit-and-how-safe-is-it-to-eat
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657127285.44/warc/CC-MAIN-20140914011207-00047-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.960844
110
2.546875
3
Communist Terror in Greece The Communist Party of Greece was founded in 1918 and later emerged as one of the region's most principled supporters of Soviet Union and the Third International. During the 1930s, the communists attempted to seize power by violent means, but were defeated. Although communist influence was largely subdued, the party continued its activities and, for example, took inspiration from Stalin's decisions to encourage Greek soldiers not to fight the attacks of Fascist Italy and start a civil war. When Greece was occupied by Nazi Germany, communists emerged as a dominant force in the guerilla warfare against the invaders. This helped gain public sympathy, which the communists then used to engage in ruthless conflict with partisans supporting the legitimate Greek government. At the end of World War II, communist partisans attempted to seize all of Greek territory, but were rebuffed by British forces and nationalist partisans. The ensuing truce was short-lived as the communists again headed to overthrow the government. A bloody civil war followed, killing tens of thousands. Communists resorted to overall terror to assert their authority. Their most serious crime was the kidnapping of 30 000 children and deporting them to communist countries. Parents attempting to rescue their children were shot. This crime has been recorded in N. Gage's renowned book „Eleni". Although communist resistance was eventually squashed, the Civil War legacy continued to divide Greek society for a long time.
<urn:uuid:95cb28cb-d200-4e22-8a33-19adb66e1e99>
CC-MAIN-2020-16
http://communistcrimes.org/en/countries/greece
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505550.17/warc/CC-MAIN-20200401065031-20200401095031-00442.warc.gz
en
0.979848
282
3.46875
3
Saw this tweet from Nassim Taleb yesterday: It reminded me of an old and unfortunate mistake from the 1998 Minnesota state high school math contest. Here was that question: You go to visit a friend who has two children. However, you cannot remember the gender of either child. When you arrive at the house, one of those children answers the door. That child is a boy. What is the probability that the other child is a boy. Warning, the answer is not 1/2. And, yes, that warning was part of the original question. We were a little tight for time this morning, so I decided to use these two problems for a quick Family Math project. Here’s my kids taking a look at Taleb’s question: Here’s my version of the second question (without the warning) and the thoughts my kids had thinking through it: Although it isn’t all that difficult to understand the statement of either of these two questions, understanding why the two situations are different is sometimes no so easy. Taleb compares the question in his tweet to the famous Monty Hall problem. Another potentially good comparison – though much harder to understand mathematically – come from a recent Andrew Gelman blog post: So, even though this was a quick little project, it still is both fun and instructive!
<urn:uuid:41b2a177-c750-4dd8-84ed-c944e7203dfd>
CC-MAIN-2017-34
https://mikesmathpage.wordpress.com/2015/07/18/two-fun-introductory-probability-questions-for-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105086.81/warc/CC-MAIN-20170818175604-20170818195604-00160.warc.gz
en
0.967247
279
2.671875
3
In Mosa Mack's Water Cycle Unit, students solve two water cycle mysteries, travel through the water cycle as a water droplet to experience water's journey, and then apply their knowledge of the water cycle to design a solution to solve a drought crisis. Solve: Polluted Lakes + Water Park Mystery Make: Travel the Water Cycle Engineer: Engineer a Water Conservation Solution - Next Generation Science Standards - Develop a model to describe the cycling of water through Earth's systems driven by energy from the sun and the force of gravity. [Clarification Statement: Emphasis is on the ways water changes its state as it moves through the multiple pathways of the hydrologic cycle. Examples of models can be conceptual or physical.] [Assessment Boundary: A quantitative understanding of the latent heats of vaporization and fusion is not assessed.] - Inquiry Scale - Each lesson in the unit has an Inquiry Scale that provides directions on how to implement the lesson at the level that works best for you and your students. - “Level 1” is the most teacher-driven, and recommended for students in 4th-5th grades. “Level 4” is the most student-driven, and recommended for students in 7th-8th grades. - For differentiation within the same grade or class, use different inquiry levels for different groups of students who may require additional support or an extra challenge. - Common Misconceptions - Students may initially believe that water disappears and reappears. Emphasize that water is conserved in a continual cycle. - Students may think that water comes from one particular source. Encourage them to notice that water flows through the cycle along many continual pathways. - Students tend to believe that water travels through the water cycle in a predictable circular path. Emphasize that the path of water can be complex and is not always the same. - Content Expert - Eric Pyle, PhD Professor, Department of Geology & Environmental Science James Madison University - Eric Pyle, PhD - Leveled Reading * To give our users the most comprehensive science resource, Mosa Mack is piloting a partnership with RocketLit, a provider of leveled science articles. - Your Very Own Pet Water DropIn this article, students read about the basic steps in the water cycle. The article discusses what causes most of the evaporation, how water drops gather together in the sky and why they fall back down to earth. - Water Everywhere!Water falls from the sky, but then what? This article looks at all the different places that students can find water on the surface of the earth and describes how water moves to and from each of these places. - It's Not Magic . . . It's Just a PhaseIn this article, students investigate the concepts of freezing point, boiling point, and melting point through a magic trick. They'll read about how a magician makes water change phase through heating and cooling at each of these temperatures. - Your Very Own Pet Water Drop
<urn:uuid:5a7fdbc4-4234-436d-ac51-30d906463f8c>
CC-MAIN-2020-10
https://mosamack.com/home/water-cycle
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146066.89/warc/CC-MAIN-20200225110721-20200225140721-00048.warc.gz
en
0.903733
620
3.625
4
|Pass rate:||60 %| This Practice Test (quiz) contains randomly selected Multiple Choice Questions from 'History and Sport: The Story of Cricket'. It is based on CBSE Class 9 Social Science (Term 2) syllabus. Take as many times as you like and see how good you are at 'History and Sport: The Story of Cricket'. If you score well, do not forget to challenge your friends to take this test :)
<urn:uuid:d01e595a-c431-426f-b37e-560bb94bd180>
CC-MAIN-2013-20
http://www.cbsenotes.com/notes/history-and-sport-the-story-of-cricket-class-9-social-science-mcqs-free-practice-test
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698080772/warc/CC-MAIN-20130516095440-00092-ip-10-60-113-184.ec2.internal.warc.gz
en
0.833094
94
2.59375
3
What is high-temperature resistant fabric? Heat-resistant fabrics refers to a variety of materials that share a common characteristic: heat insulation. They provide protection against extreme temperatures and are available in many configurations, depending on their application. Different types of heat-resistant fabrics There are many heat resistant fabrics available, each with its own properties and applications. Coated fabric can be used in many industries as a heat-resistant fabric. These fabrics can be used to block heat and protect against damage. The most common coatings are silicone, ceramic, and refractory. These coatings provide extra resistance to abrasion, chemical, and UV damage. These coatings are extremely durable and can be used even in harsh environments. Another heat-resistant fabric is silicone fabrics and textiles. They have a continuous operating temperature at 982o C. Refractory coatings offer high resistance to extreme temperatures. It is one of the most durable technical textiles in the globe, with its high resistance to chemicals, low porosity and excellent abrasion resistance. Components are also manufactured from heat-resistant fabrics, including seals, curtains, and blankets that act as insulation.
<urn:uuid:0a5a29f4-e728-4a3d-a8e0-716dc9a35702>
CC-MAIN-2023-14
https://www.heaterk.com/info-detail/which-cloth-is-highly-fire-and-heat-resistant
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00379.warc.gz
en
0.938809
241
3.453125
3
1920s Video showing the old Oklmulgee City Colored Hospital. Many landmarks in Indian Territory are long forgotten, abandoned and in some cases lost to erosion, time and neglect. But a few still stand, including the old building seen in the above film footage, which was once the Okmulgee City Colored Hospital. I often write about the old schools, and cemeteries, and recently an Oklahoma history colleague who recently assisted me in locating the old Tushka Lusa Academy, he just shared some film footage of the Black hospital of Okmulgee, Oklahoma. The hospital building (located on Wood and 3rd Street) was one of the first in the state of Oklahoma to serve exclusively African American patients. Considering the history of the city of Okmulgee, and the region, chances are that a majority of those served by this hospital were most likely Creek Freedmen. The short video appears to be one of the videos that were made in the early 1920s in Oklahoma, depicting many aspects of life in communities where both Freedmen and "state Negroes" as they were once called, lived in the newly formed state of Oklahoma. This hospital was certainly one of the oldest in the state of Oklahoma. This small facility joined a long list of hospitals that were created to treat African American patients around the nation. (The oldest known hospital was Provident Hospital of Chicago that opened its doors to Black patients in 1891.) However, this structure is significant nevertheless, and seeing the footage taken when it was in its prime as a hospital makes one wonder about the hundreds who must have come through the doors of that hospital. Apparently there are several sites that also document the history of this treatment facility and they have some clear images of the building in various states of abandonment and decay. One website is called AbandonedOK.com which is a website devoted to significant Oklahoma landmarks that are abandoned and no longer in use, and this site has a page devoted to the Oklmulgee Colored Hospital. Also some very sharp clear images taken several years ago reflect the many dimensions of the hospital. Plans have been also underway for many years to make this a multicultural center, although plans appear to have been stalled. Thankfully however, the building still stands and speaks to its legacy as a place one's loved ones could receive care. I became curious and wanted to see how the hospital building looks today. I did not have an exact address and was not sure of where in Okmulgee the old hospital was located, but thanks to Google Street View, and I found it! Image from Google Street View, Okmulgee Oklahoma Corner of 3rd and Wood Street. Corner of 3rd and Wood Street. So many of our landmarks are gone, but when I saw the remarkable footage of the old hospital, shared on Facebook, I realize that this is a piece of the state's segregated past, whose stories are whispered within walls of the building itself. Hopefully more lives were saved than were lost in the hospital, and this place provided a place where they could be treated and in some cases leave this world, in dignity and peace. Many thanks to Eric Standridge, aka the Oklahoma Traveler for sharing the film footage and bringing the history of this building to my attention.
<urn:uuid:ced65e94-3862-4de4-bf2e-fd9996fe4138>
CC-MAIN-2017-47
http://african-nativeamerican.blogspot.mx/2013/04/the-forgotten-black-hospital-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806844.51/warc/CC-MAIN-20171123161612-20171123181612-00367.warc.gz
en
0.984734
680
3.203125
3
While these flat-bodied specimens may look like they are from another planet, stingrays are pretty common in many parts of the world. They're often found in the tropical and subtropical waters of the ocean, as well as rivers and freshwater lakes, so locking eyes with one of these funky little vertebrates at least once in your life, wouldn't be a surprise. Of course, to respect and interact with wildlife, you must understand it. So today, we want to take you through our little guide to stingrays so you can find out what makes these marine animals some of the most important and unique creatures around. Interesting & Fun Facts About Stingrays What Do Stingrays Look Like? Stingrays have flat, wide bodies and long tails with barbs on the end. While they do not have sharp teeth, stingrays are closely related to sharks and are similar in many ways. For example, both sharks and stingrays belong to the cartilaginous fish family, meaning they have cartilage skeletons rather than bones. So yes, rather than a bony skeleton, stingrays are made up of the same material you find in your own ears and nose. Their skin is similar to sharks' too. Plus, both sharks and stingrays use Lorenzini sensors, which pick up the electrical signals from their prey. FUN FACT: The largest species of stingrays can be up to 6.5' feet or longer, weighing up to 800 pounds! How Do Stingrays Get Around? While many stingrays look as if they're flying through the water, most species use undulation to navigate the ocean floor, similar to how a wave moves. Scientific research showed that stingrays in South Africa often moved at around 1.35 kilometers per hour. FUN FACT: Stingrays find prey with electro-sensors on their body, not their eyes. What Color Are Stingrays? Because there are many species of stingray, colors can change depending on the species you are looking at. However, most species of stingray are gray to dark brown on top with pale bellies underneath. Stingray Barb Facts You probably remember the sad day when Steve Irwin, famous Australian wildlife activist, was fatally pierced by the barbed tail of a stingray. Stingrays have long, venomous barbed tails, which can cause humans immense pain. If untreated, this wound can lead to infection. According to the National Capital Poison Control Center, somewhere between 1,500 to 2,000 stingray injuries occur each year. Most stingrays will attack the feet or legs. Stingrays will often use their barbs to protect themselves from predators or stun small fish on the seafloor to eat. FUN FACT: While stingray venom can be painful, it isn't necessarily deadly unless the victim is stung in the abdomen or chest. Ancient Greek dentists used venom extracted from the spines of stingrays as an anesthetic for their patients. Fact: Due to their barb, stingrays are one of the most dangerous sea creatures. Baby Stingray Facts Baby stingrays are born fully formed and ready to swim. They are proportionate, miniature versions of their parents from the moment they enter the world. However, even though they are excellent swimmers from birth, their mothers often stick around for the first three years until they can fend for themselves. A stingray mother will have anywhere from two to six babies per year. In the wild, stingray babies mature into adults who live anywhere from 15 to 25 years. FUN FACT: Stingrays eat mussels, shrimp, and clams! They capture their prey with their bodies before crushing it with their powerful jaws. Stingray Habitat Facts There are more than 220 species of stingrays known to man, which live in different habitats across the globe. From freshwater stingrays in the world's lakes and freshwater rivers, to saltwater stingrays that you can often find at your local shoreline and around the world's oceans, many of these stingrays behave quite differently. One of the ocean's rarest species is the small-eye stingray, which has small eyes, white spots, and a wingspan greater than seven feet long! Most stingrays like swimming around in shallow water, especially in tropical and subtropical regions, as it's much warmer here than in the open ocean. FUN FACT: The main predators for stingrays include large fish, seals, sea lions, and sharks. Are Sting Rays The Same As Manta Rays? While many people lump these two marine creatures into the same category, they are quite different. For example, a stingray's mouth can be found on the underside of its body, while a manta ray's mouth lies at the front of its body. Manta rays do not have a barb or stinger on their tails, and they spend most of their lives in the open water instead of on the sandy ocean bottom. Head over to our Manta Ray vs Stingray article to learn more! FUN FACT: The leathery skin of the Stingray has been used to make belts, boots, jackets, wallets, and exotic shoes. The Japanese will often use stingray skin to make the underside layer of Japanese swords. Stingrays Have Been Around For A Long Time A fossil was discovered by the Institute of Paleontology of the University of Vienna back in 2019. This fossil dated back 50 million years and was, you guessed it, a stingray fossil! Researchers linked the radiation to the aftermath of the Cretaceous extinction event, which wiped out millions of creatures around the globe. Data now suggests that the modern stingray diverged from a similar species that was around 150 million years ago during the Late Jurassic period. So yes, stingrays were around during the same time as the dinosaurs. Do Your Part to Protect Stingrays Stingrays are slowly becoming an endangered species due to habitat loss. One of the best ways to protect stingrays is by purchasing sustainable seafood that supports non-overfishing policies. If you ever see stingrays near the shoreline, it is best to practice the "stingray shuffle" to avoid getting stung. Essentially, rather than walking in shallow waters the same way you would on land, shuffle your feet in the sand to keep from stepping on a stingray. The sand you kick up with your feet alerts them, letting them know you are nearby, so that they won't sting you in an attempt to protect themselves. Not only will you prevent harming wild stingrays by stepping on their bodies, but you'll also protect yourself from getting stung!
<urn:uuid:d729e43d-82e9-48af-a732-272633540401>
CC-MAIN-2023-40
https://centerforsurfresearch.org/stingray-facts/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00112.warc.gz
en
0.954953
1,387
3.21875
3
We are exploring what kinds of transport systems New Zealand might use in the future, with a special focus on energy-efficient transport. This research involves a structured information-gathering method called a ‘Delphi’ to see what experts think are the global innovations that might shape transport of the future, as well as trends and potential shocks that could lead to changes in transport systems. Firstly we ran an International Delphi during 2013 with transport experts from many parts of the globe. They were interviewed about their perspectives, and then they took part in several on-line surveys, designed so that each survey built upon the findings of the one before. We discuss some of the findings in this presentation and journal article . Following the international Delphi, we carried out a similar exercise involving New Zealand transport experts (from the transport sector, councils, government and researchers). Over four surveys we asked about things like their perspectives on trends and shocks that might affect NZ’s transport system, and what NZ’s future transport system might look like. Some of the findings are reported in this presentation and this report. What we’ve found out so far Some highlights from the International Delphi: Transport systems are the interactions of infrastructure, fuels, vehicles and other technologies, and the behaviours and expectations of firms, governments and the public. These interactions can create interdependencies which can be very hard to change. However, there are many new developments occurring internationally which are starting to create changes in transport systems, or are likely to in the near future. These may impact on New Zealand, and include: New trends in travel behaviour, such as - ‘peak car’, where people are starting (on average) to drive less distance - young people getting licenses later, being less likely to own a car, and driving less distance than people of that age did previously - in some cities, people using shared cars rather than owning their own cars Technological innovations, such as - developments in electric vehicles that increase range and lower price - much more efficient internal combustion engines - autonomous or semi-autonomous cars - induction charging of electric buses - 3-D printing Businesses seeing value in efficiency, such as - providing efficiency training for drivers of freight trucks - inland ports which consolidate freight and make multi-modal systems easier - using information technology to design better routes for freight vehicles and matching loads - smart logistics incorporating rail for long-distance, and cargo trams or electric trucks for local delivery In the New Zealand Delphi, we wanted to gain an understanding of expert views on the drivers of change to New Zealand’s transport system. The identified the following trends, innovations and step-changes: Rising fuel prices were identified as the trend most likely to become widespread within 10 years, and to transform the transport system away from BAU in the long term. An ageing population and an increasing percentage of the population in urban areas were also important trends likely to become widespread within 10 years. Urban form that supports active transport (walking and cycling) and public transport (bus and train), and increasing investment in public transport infrastructure were thought to be important trends that would transform the transport system away from BAU. Participants identified ultrafast broadband and high quality videoconferencing as the most likely innovation to become widespread within 10 years. Demand management through road pricing, multi-modal integrated public transport systems and bicycle infrastructure were thought to be the most likely innovations to transform the transport system away from BAU. The likely step changes to become widespread in the next decade were identified as: spikes in the price of liquid fossil fuels, political instability in oil rich countries, and constraints in oil supply. Sustainability becoming a major driver of policy at all levels of NZ government and for business, followed by constrains in oil supply, and political instability in oil rich countries are the step changes deemed most likely to transform New Zealand’s transport system away from BAU in the long term. Participants were also asked to identify the timeframes in which these changes were likely to occur, and the trends, innovations and step changes requiring intervention. These findings and more are available in the published report.
<urn:uuid:98b00b0f-9e20-46b0-bab7-546a079f1907>
CC-MAIN-2017-39
https://energycultures.org/our-work/future-transport-for-new-zealand/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688966.39/warc/CC-MAIN-20170922130934-20170922150934-00396.warc.gz
en
0.963207
868
2.90625
3
Photovoltaic power generation employs solar panels comprising a number of cells containing a photovoltaic material. (PV) is a method of generating electrical power by converting solar radiation into direct current electricity using semiconductors that exhibit the photovoltaic effect. Materials presently used for photovoltaics include mono-crystalline silicon, polycrystalline silicon, amorphous silicon, & cadmium telluride, As of 2010, solar photo-voltaics generate electricity in more than 100 countries worldwide and, is the fastest growing power-generation technology in the world. Motivated by advances in technology and increases in manufacturing scale and sophistication, the cost of photo-voltaics has declined steadily since the first cells were manufactured. The photovoltaic effect is the creation of a voltage (or an electric current) in a material upon exposure to light. Though the photovoltaic effect is directly related to the photoelectric effect, the two processes are different and should be distinguished. In the photoelectric effect, electrons are ejected from a material's surface upon exposure to radiation of sufficient energy. The photovoltaic effect is different in that the generated electrons are transferred between different bands (i.e. from the valence to conduction bands) within the material, resulting in the buildup of a voltage between two electrodes. In most photovoltaic applications the radiation is sunlight and for this reason the devices are known as solar cells. The photovoltaic effect was first observed by Alexandre-Edmond Becquerel in 1839. Photo-voltaics are best known as a method for generating electric power by using solar cells to convert energy from the sun into electricity. The photovoltaic effect refers to photons of light knocking electrons into a higher state of energy to create electricity. The term photovoltaic denotes the unbiased operating mode of a photodiode in which current through the device is entirely due to the transduced light energy. Virtually all photovoltaic devices are some type of photodiode. Solar cells produce direct current electricity from sun light, which can be used to power equipment or to recharge a battery. The first practical application of photovoltaics was to power orbiting satellites and other spacecraft, but today the majority of photovoltaic modules are used for grid connected power generation. In this case an inverter is required to convert the DC to AC. When more power is required than a single cell can deliver, cells are electrically connected together to form photovoltaic modules, or solar panels. For a house or a power plant the modules must be arranged in multiples as arrays. Although the selling price of modules is still too high to compete with grid electricity in most places, significant financial incentives in Japan and then Germany, Italy, Greece and France triggered a huge growth in demand, followed quickly by production. A significant market has emerged in off-grid locations for solar-power-charged storage-battery based solutions. These often provide the only electricity available. |The first commercial installation of this kind was in 1966 on Ogami Island in Japan to convert the Ogami Lighthouse from gas powered-torch to fully self-sufficient electrical power.| Photovoltaic production has been increasing by an average of more than 20 percent each year since 2002, making it the world’s fastest-growing energy technology. By the end of 2010, the cumulative global PV installations surpassed 21,000 megawatts. Germany installed a record 3,800 MW of solar PV in 2009; in contrast, the US installed about 500 MW in 2009. The previous record, 2,600 MW, was set by Spain in 2008. Germany was also the fastest growing major PV market in the world from 2006 to 2007 industry observers speculate that Germany could install more than 4,500 MW in 2010. In 2006 investors began offering free solar panel installation in return for a 25 year contract, or Power Purchase Agreement, to purchase electricity at a fixed price, normally set at or below current electric rates. It is expected that by 2011 over 90% of commercial photovoltaics installed in the United States will be installed using a power purchase agreement. The current market leader in solar panel efficiency (measured by energy conversion ratio) is Sun-Power, a San Jose based company. Sun-Power's cells have a conversion ratio of 24.2%, well above the market average of 12–18%. However, advances past this efficiency mark are being pursued in academia and R&D labs with efficiencies of 42% achieved at the University of Delaware in conjunction with DuPont by means of concentration of light. Photovoltaic Cells in buildings Photovoltaic arrays are often associated with buildings - either integrated into them, mounted on them or mounted nearby on the ground. Arrays are most often retrofitted into existing buildings, usually mounted on top of the existing roof structure or on the existing walls. Alternatively, an array can be located separately from the building but connected by cable to supply power for the building. Building-integrated photovoltaics (BIPV) are increasingly incorporated into new domestic and industrial buildings as a principal or ancillary source of electrical power. Typically, an array is incorporated into the roof or walls of a building. Roof tiles with integrated PV cells are also common. Solar power is pollution-free during use. Production end-wastes and emissions are manageable using existing pollution controls. End-of-use recycling technologies are under development and policies are being produced that encourage recycling from producers. PV installations can operate for many years with little maintenance or intervention after their initial set-up, so after the initial capital cost of building any solar power plant, operating costs are extremely low compared to existing power technologies. Compared to fossil and nuclear energy sources, very little research money has been invested in the development of solar cells, so there is considerable room for improvement. Nevertheless, experimental high efficiency solar cells already have efficiencies of over 40% in case of concentrating photovoltaic cells and efficiencies are rapidly rising while mass-production costs are rapidly falling. Disadvantages of Photovoltaic Energy Photovoltaics are costly to install. While the modules are often guaranteed for 20 years, much of the investment in a home-mounted system may be lost if the home-owner moves and the buyer puts less value on the system than the seller. Solar electricity is seen to be expensive, however, with the UK Feed-In Tariff for green solar energy, Solar PV has been made more accessible to homeowners. Under the scheme, homeowners can generate both free electricity, and a fee per kWh sold to the grid Solar electricity is not produced at night and is much reduced in cloudy conditions. Therefore, a storage or complementary power system is required. Solar electricity production depends on the limited power density of the location. Average daily output of a flat plate collector at optimum latitude tilt in the UK is 2–4 kilowatt·h/m² , and on average slightly higher in Southern Europe. The Micro-Generation Scheme The MCS certificates microgeneration technologies used to produce electricity and heat from renewable sources. MCS has been developed to provide consumers with an assurance that microgeneration products and installation companies meet a robust set of standards. The MCS is also linked to financial incentives such as Feed in Tariffs. The UK is committed to delivering its share of the EU target for 20% of energy from renewable sources by 2020. Achieving those targets could provide £100 billion worth of investment opportunities and up to half a million jobs in the renewable energy sector by 2020. It is clear that 50% of all our energy is used for heating and hot water and 75% of domestic households' energy consumption is for heating and hot water. The UK's renewable energy strategy aims for 12% of heat to come from renewable sources. Currently under 5% of UK electricity comes from renewable sources. It is estimated that 30% of our electricity may be delivered from renewables with 2% from small-scale electricity generation. How does the MCS affect installers ? The MCS is an internationally recognised quality assurance scheme which demonstrates to customers that your company is committed to meeting rigorous and tested standards. Similar to the Gas Safe Register, the MCS gives you a mark of competency and demonstrates to your customers that you can install to the highest quality every time. Installer certification entails assessing the supply, design, installation, set-to-work and commissioning of renewable microgeneration technologies. How does the MCS affect Manufacturers and Suppliers? The MCS is an internationally recognised quality assurance scheme which demonstrates the quality and reliability of approved products by satisfying rigorous and tested standards. It was designed with input from product and installer representatives. Product certification involves type testing of products and an assessment of the manufacturing processes, materials, procedures and staff training. For more information go to : www.microgenerationcertification.org The City & Guilds Photovoltaic Qualification is called the.... C&G 2372 Solar PV Course... Or its full Title – The City & Guilds Certificate in Installing and Testing Domestic Photovoltaic Systems - 2372 Although this course may be difficult to find being run locally , when it is run by Colleges or Training Centres this qualification will allow candidates to be recognised as competent in this new field and play a vital role in the use of renewable energy. We at DJT have run many Sustainable Energy Seminars &Courses, that cover all aspects of sustainable energies, and may in time run the C&G 2372, however at present to demand does not quite equal the set up cost – as is the case with many Training centres. The qualifications cover a range of competences in fitting, installing and testing the system components. The content covers health and safety, knowledge of regulations, PV systems and components, roofing, commissioning, testing and customer care. Solar PV courses are intended for qualified electricians who will be required to install grid connected domestic photovoltaic systems that are either integrated into, or retro onto, a domestic dwelling. It is concerned with domestic systems installation within prescribed specifications and therefore does not cover design or glazed or curtain wall systems. It is expected that candidates entering into these qualifications will be practising electricians and have appropriate qualifications related to electrical installation, knowledge of the IEE Wiring Regulations and an Inspection and Testing qualification. The award is designed to offer specific skills and knowledge to electricians to ensure they are conversant with Regulations and Code of Practice related to PV systems. The Department of Trade and Industry (DTI) supports the recognition of personnel qualified to 2372 standards within this initiative and sees PV systems as an essential part of Government energy policy MCS. General Qualification Structure This award is made of two units. The first unit describes the underpinning knowledge that is required to understand the theory behind PV systems, related Regulations, safety requirements and installation and testing. The second unit is concerned with the application of practical skills in carrying out installation and testing. Course Content Includes: - Health and Safety - The site survey: Solar Radiance - Calculation FIT Estimates - Building Regulations - Solar Photo-voltaic (PV) - how they work - Solar PV panel designs - Grid-connected Systems - Grid Tie Inverters - Appropriate Standards: G83/BS7671:2008 - System Testing - Final Commissioning and System handover For the awarding of a City & Guilds certificate candidates must successfully complete both assessments. - Unit 1 Knowledge of photovoltaic systems 2372-001 Written-short answer - Unit 2 Practical applications 2372-002 Practical assessment Knowledge of photovoltaic systems Written paper of 20 short answer questions and 1 long answer question 1 ½ hours.
<urn:uuid:6f9979e5-a286-4a81-abd3-729ba246f31a>
CC-MAIN-2020-16
https://djtelectricaltraining.co.uk/electricians-help-guides/photovoltaic-energy.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371612531.68/warc/CC-MAIN-20200406004220-20200406034720-00198.warc.gz
en
0.938373
2,464
3.8125
4
25th March 2019 Content supplied by: Merck Millipore ISO 9308-1: Testing for E. coli and Coliforms in Drinking Water On March 22nd, we celebrated world water day, an international observance and an opportunity to learn more about water related issues and take action. Safe and clean drinking water has been recognized by the UN since 2010 as a basic human right. Microbial contamination in drinking water is a constant threat to consumer safety. It is therefore important to carry out routine testing to help maintain water integrity and determine if there could be any contamination. It is not feasible to test for every unique potential pathogen that could be present in water, so the current methodology is to analyze for the presence of indicator organisms. These are organisms which can indicate the probable presence of pathogens and fecal contamination, but they can also be reliably detected at low concentrations, have better survival than the pathogen and be easily analyzed in the laboratory. For these reasons, the standard indicator organisms used for testing the quality of drinking water are E. coli and coliform bacteria, which provide a rapid and cost-effective technique for monitoring contamination. The microbial quality testing of water is regulated by the international organization for standardization though the ISO 9308-1:2014 method, which was amended in 2016. This reference method describes how to test for E. coli and coliform indicator organisms in water with low bioburden, such as drinking water and disinfected pool water, using the membrane filtration method and chromogenic coliform agar (CCA). Dr. Andreas Bubert, Senior Product Manager at the innovation & technology company Merck KGaA, Darmstadt, Germany, will guide you through the method and amendments of ISO 9308-1 and the membrane filtration testing workflow, including the use of CCA media and the oxidase test. Take 14 minutes to find out more and watch his presentation. Date Published: 25th March 2019 Source article link: View Testing for Endotoxins? Don’ Compliant Detection of Listeria monocytogenes
<urn:uuid:d149bc7f-34b1-413e-9255-9de5b6fb2d9b>
CC-MAIN-2023-40
https://www.rapidmicrobiology.com/news/iso-9308-1-testing-for-e-coli-and-coliforms-in-drinking-water
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00273.warc.gz
en
0.929136
439
3.078125
3
Persuading Scandinavian Team Members (Mini-Case Study: 9.2) Q. Analyse the root cause of the problem from two perspectives: verbal communication styles and negotiation styles. The PM didn't realize that low context cultures prefers written information and messages cannot be accepted without a background information. Therefore, verbal communication is how people transfer information by using words, and sounds to listeners. In this case and depending on the listeners culture a different approach should have been adopted to be more excepted. Here, the PM message was meant to convince the team, but his lack use of evidence and effective techniques resulted in a big failure to accomplish a persuasion of this type. Also, the PM was unable to increase his team awareness, and to accept his proposal as well. Hence, a successful message depends on a target that is opened and closed properly, and relies on how the message should be framed and delivered.
<urn:uuid:95035084-8e83-44aa-b7c9-ddb094addb17>
CC-MAIN-2020-16
http://www.businessstudiesqa.com/2017/08/persuading-scandinavian-team-members.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371700247.99/warc/CC-MAIN-20200407085717-20200407120217-00284.warc.gz
en
0.952846
184
2.65625
3
What is a Focus Group? A focus group is a planned interview with no less than three, up to about twelve people, where the moderator encourages participants to discuss a particular topic, starting with the general and getting more specific, or focused, over time. Focus groups are a tool that project planners, managers, and evaluators often use to collect qualitative data related to a project’s planning, implementation, and impact. A moderator goes into a focus group with a line of questioning, and actively leads discussion around a particular issue—starting with the general topic, and then getting more specific, or even controversial, over time. The moderator should be open and non-threatening, so that participants feel at ease, and are comfortable enough to express their opinions and discuss issues. When are Focus Groups the Right Data Collection Tool? Focus groups can be a good way to collect qualitative data in monitoring and evaluation, especially when group interaction might produce insight into a topic. Tracy (2013) explains that within a focus group, there is a cascading effect of conversation, as comments link into each other and participants share what can be rich, emic, qualitative, data with each other and the moderator. Group interaction also helps with recall and gives the researcher rich descriptions of shared experiences. Tracy’s advice stands: If your topic would benefit from group interaction, then a focus group might be an appropriate data collection tool for you to use. Project planners, managers, and evaluators oftentimes use focus groups to collect qualitative data, throughout the lifecycle of a project. Focus groups are not always going to be appropriate though. Krueger and Casey (2010, pp. 385-386) tell us that if you answer yes to any of these questions, then focus groups are not the best method for you: - Do you need statistical data? You are not going to get statistical data from a focus group given the sample population size and the general style of a focus group discussion. Remember that a focus group uses various qualitative interviewing and engagement techniques to facilitate discussion and the collection of rich, emic, qualitative data. - Will harm come to people sharing their ideas? If you have a sensitive topic, that might be embarrassing or even unlawful, then a focus group is not the right option. You cannot guarantee that people are going to keep confidentiality—even if you set ground rules. At the same time, people might not open up about sensitive topics in a focus group setting. - Are people polarized by your topic? You do not want to mediate a debate. A focus group would not be a good choice for you if people are polarized by your topic. How should we populate a focus group? A focus group needs to have a homogeneous element: Some commonality that people can discuss together. But this does not mean that a focus group population itself has to or should be homogenous. We might try to invite people with different perspectives or those from different socio economic or demographic backgrounds. But we are only going to do so if participants will not see this as an opportunity for debate. Krueger and Casey (2010) give some good advice on populating focus groups. The authors tell us that you should first identify the characteristics of the target population, and ask who might have something pertinent or interesting to say about the topic. You should figure out how many different focus groups you might need to accommodate the various population categories, remembering that when various “homogenous” categories meet together, you should be able to facilitate Tracy’s cascading of conversation. You need to define your categories (for example, employment or socio economic status—it all depends on your project and the population and its culture) and then carry out as many focus groups as you need to ensure you get input from people in all of these categories. We usually do not mix categories when this will hinder the cascading of conversation (for example, you would likely not include a male extension officer in a group of female subsistence farmers). How should we conduct a focus group for Monitoring and Evaluation? Moderating a focus group takes practice. Tracy (2013) notes that you need to be able to deal with tangents, know how to control respondents that dominate the conversation, encourage hesitant respondents to participate, and be able to react positively to unexpected circumstances that would otherwise disrupt the flow of the focus group. You should consider using a note taker and a recording device to document the conversation: You will find that focus groups often elicit a lot of qualitative data that is difficult to record if only the moderator is taking notes during the interview. For me, the first step in conducting a focus group is having an evaluation design, and figuring out if a focus group is the right way to collect data towards indicators and objectives. In particular, I use focus groups to collect qualitative data that can help inform a project’s planning, implementation, and evaluation. The second step for me is understanding enough about the project and its theory of change to know who to invite, and how to separate participants into different groups to avoid problems caused by micro-politics. The third step is to develop questions and a questioning route that addresses the Evaluation Statement of Work, while including questions that will produce qualitative data that is useful to project managers and decision makers. I always sequence the questions so that early questions set the stage for the conversation, and make people feel open and comfortable discussing more important or even controversial topics. I craft questions that are conversational, open-ended, and easy for participants to understand. I pilot the questions with members of the local population, so that I can weed out culturally confusing or inappropriate questions. I make sure that I have enough knowledge of the project, the Evaluation Statement of Work, and the local culture so that I understand cultural terms and can devise appropriate follow up questions based on the conversation. Focus groups are often a useful data collection tool for project planners, managers, and evaluators to gather qualitative data. Yet, there is no magic bullet to conducing a good focus group. Knowing your line of questioning, being a good conversationalist that can easily build rapport, and having knowledge of the project, its theory of change, and the local culture, can go a long way in helping you to plan and moderate a focus group that helps you to collect qualitative data relevant to project monitoring and evaluation. Read more in the series. Krueger and Mary Anne Casey. “Focus Group Interviewing,” in Handbook of Practical Program Evaluation, 3rd ed., Joseph Wholey, Harry Hatry and Kathryn Newcomer, eds., San Francisco: Wiley, 2010, pp. 378-403. Krueger, Richard and Mary Anne Casey. Focus Groups: A Practical Guide for Applied Research. 4th ed. Thousand Oaks: SAGE, 2009. Tracy, Sarah. “The Focus Group Interview,” in Qualitative Research Methods: Collecting Evidence, Crafting Analysis, Communicating Impact, San Francisco: Wiley, 2013, pp. 167-173. About the Author Dr. Beverly Peters has more than twenty years of experience teaching, conducting qualitative research, and managing community development, microcredit, infrastructure, and democratization projects in several countries in Africa. As a consultant, Dr. Peters worked on EU and USAID funded infrastructure, education, and microcredit projects in South Africa and Mozambique. She also conceptualized and developed the proposal for Darfur Peace and Development Organization’s women’s crisis center, a center that provides physical and economic assistance to women survivors of violence in the IDP camps in Darfur. Dr. Peters has a Ph.D. from the University of Pittsburgh. Learn more about Dr. Peters. To learn more about American University’s online MS in Measurement and Evaluation or Graduate Certificate in Project Monitoring and Evaluation, request more information or call us toll free at 855-725-7614.
<urn:uuid:ffffb2f8-23c3-4e39-a309-6f2a785109d3>
CC-MAIN-2017-39
http://programs.online.american.edu/msme/resource/how-to-conduct-focus-groups-qualitative-research
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695066.99/warc/CC-MAIN-20170926051558-20170926071558-00653.warc.gz
en
0.927541
1,625
3.578125
4
On Monday, the so-called “synthesis report” was published by the United Nations’ Intergovernmental Panel on Climate Change (IPCC), a body made up of hundreds of international scientists from a dizzying array of disciplines. The new report boils down six previous IPCC reports, published since 2018, which pulled together and analyzed thousands of climate science studies. It amounts to the most clear-eyed, up-to-date assessment of the climate crisis: how it’s affecting all corners of the world and its systems, and how humanity is faring in its attempts to mitigate disasters and adapt to those that are now unavoidable. What is key about the IPCC report is that it’s signed off by national governments to confirm that they accept the scientific findings – and will incorporate them in their response to the climate crisis. That being said the report is clear that if major transformations take place across society to cut planet-heating greenhouse gas emissions this decade, it’s still possible to hold average global temperature to 1.5 degrees Celsius (2.7 degrees Fahrenheit). (The world has warmed 1.1C (2F) since industrialized countries began burning oil, gas and coal 200 years ago.) But so far the pace and scale of emissions cuts have been insufficient, the IPCC warns. What’s more, emissions continue to rise largely due to existing fossil fuel infrastructure – with major projects still being built. At current levels of emissions, humanity will breach 1.5C in the coming decade. Beyond 1.5C – a limit that all countries agreed to under the 2015 Paris Agreement – the threats increase rapidly. The IPCC found that the impacts of global heating are hitting harder and faster than previously expected while countries are swiftly approaching some limits on being able to adapt to extremes. Therefore, every incremental amount of warming avoided will matter immensely, especially to the most vulnerable. “The choices and actions implemented in this decade will have impacts now and for thousands of years,” the IPCC states. The findings, while bleak, remain tinged with resolve. Emissions need to start decreasing now, and be cut roughly in half by the end of the decade. The good news is we already know how to do this. “Multiple, feasible and effective options” exist to slash emissions, and the cost of renewable energy is plummeting, the IPCC says. The report underlines that avoiding worsening outcomes means making rapid cuts in fossil fuels across the board, and no new infrastructure for oil, coal and gas. Yet it will be difficult to get rid of all emissions in areas like agriculture, aviation, shipping, and industry, and these will need to be “counterbalanced” by carbon removal from the atmosphere to achieve net zero. This could be done with natural solutions like planting trees, sequestration of carbon in the soil through peatland restoration, and in ocean and coastal ecosystems. But while the IPCC says that a “substantial reduction” in fossil fuels is the number one priority, there will be a role for technologies around carbon capture and storage which are currently in limited use. “The climate time-bomb is ticking,” UN secretary general Antonio Guterres said. “[The] IPCC report is a how-to guide to defuse the climate time-bomb. “It is a survival guide for humanity.”
<urn:uuid:cda67ab0-dae5-4e5a-ad75-6128eb306291>
CC-MAIN-2023-23
https://earthdive.com/archives/2023/03/24/act-now-to-secure-a-liveable-and-sustainable-future-for-all/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00690.warc.gz
en
0.930951
707
3.40625
3
Social Fortune or Social Fate (ages 10+) The book consists of 10 social scenarios, each one played out through the lens of social fortune or social fate, demonstrating visually how a situation can change quickly based on how someone reacts within it. Each scenario begins with a mini story told through a series of illustrations that lead to a decision-making point. If the decision leads to others feeling good, and ultimately to the character feeling good about him or herself, it is represented as social fortune. However, if the protagonist makes a decision that traps him/her and peers/adults in an uncomfortable or frustrating situation, this leads to social fate. The focus of Social Fortune or Social Fate is to teach individuals about the social-emotional responsibility we all have to those around us as we share space or interact with them. This requires individuals to have social awareness and the social-emotional abilities to carry out that responsibility. For virtual tools to help you reach kids ages 10+ during these emotionally fragile times, check out the free read aloud and downloadable resources below. Frequently bought together Our best-selling curriculum is a powerhouse of social knowledge that introduces Social Thinking Vocabulary and concepts through colorful illustrations and easy-to-understand content. These well-organized books help children become stronger social observers and social problem solvers, and give adults the teaching tools they need to break down and teach complex social concepts.Learn more
<urn:uuid:a06082bf-dbd0-4b97-96c4-647983da940c>
CC-MAIN-2020-24
https://www.socialthinking.com/free-stuff/books-thinksheets/social-fortune-social-fate
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347436466.95/warc/CC-MAIN-20200603210112-20200604000112-00104.warc.gz
en
0.942927
287
3.296875
3
Spencer founded his is explained by continued for a longer time, lead to the augmentation has become the each new type varieties into the conservation provillus propecia versus energy. In contrast that observation shows number of different stiffer stems, but variability which is almost disappear, until, for this kind which has been. In fact the imply that the separate plot he the clue for character must first of wheat and. In the course pure races, of those principles and isolated in this necessary to the and elsewhere in families. The only difference inherited in this common varieties of wheat are mixtures. It was selected considered from the of giving it more decidedly optimistic on the Darwins but I as an organon causes the disappearance intermediates, become distinct species. Uniformity prevailed almost said, only maintains external causes versus a discrepancy, which in a variety were far from. This mixed doing so that progeny of single obtaining a better will successively be. But Professor La Gasca of Madrid, and, after comparison with the parent aberrant ears, and pointed out, that of all possible might be better search for versus causes than to a true understanding to reach its. The first is no serious objection, separate plot he propecia versus provillus provillus is versus Die Verbesserung struggle for life internal with that. The present propecia our own standpoint those small uniform submit to cross or Anlage for apparent, for it because it works not been mixed them. propecia may be were as multiform the life time in a few cases, failure in taken. While the starting point of Spencer was biological or cosmological, versus evolution being conceived as in analogy with he may read with his attention in Germany asking at every instant how the new knowledge can be used in a further advance, starting point in psychical evolution as an original fact and as a type of all evolution, the hypothesis by such a in as a a moving equilibrium. He versus few agriculturists have ear sowing, which these are Patrick form were sufficiently. By sowing provillus method of selection was practised on versus as yet, provillus propecia versus as possible whereas that of species. The specific characters samples of ears a group of thinkers whose starting he applies the. The degree of problems the problem few lots showed for every organ, this breaking asunder, to the accidental. Nilsson, who is a botanist as primrose, or Oenothera agriculturist, discovered that, to be due to one of variety of a studied that new same group, and, types, which find latent this would, propecia versus provillus afford an of Evolution may be developed.
<urn:uuid:d6330411-c912-402d-9c47-81590e130bf3>
CC-MAIN-2014-35
http://www.congresosmexicanos.com/propecia-versus-provillus/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835844.19/warc/CC-MAIN-20140820021355-00404-ip-10-180-136-8.ec2.internal.warc.gz
en
0.967054
539
2.578125
3
Unfortunately, there isn't a standard medical alcoholism test that can be given like a blood test or X-ray that will say "yes you are definitely an alcoholic." Even if an individual has a full evaluation by a competent health care provider, they still don't come away with something in black and white print that is 100% accurate. Alcoholism is a unique condition where the individual inflicted is the one who must make the ultimate diagnosis and arrive at a place where they seek help for themselves. A diagnosis for alcoholism is typically made by filling out questionnaires that address how alcohol is affecting the individual psychologically, physically, financially and socially, etc. It's usually a screening process that measures consumption and analyzes behavior and consequences. Although these types of tests can be helpful to some degree in determining whether one is dealing with alcohol abuse, binging or true addiction, they are vulnerable to a variety of factors that impact reliability and validity. The biggest influence on whether results are solid is that the person filling out the questionnaire needs to be completely honest. Unfortunately, the alcohol addicted don't tend to be honest about their alcohol consumption or its consequences. Even those who do attempt to be honest, often don't see themselves accurately, because their thinking is altered by denial and alcohol, or they may be afraid to face the facts about the reality of the situation. Therefore, results of a standard alcoholism test may not be very accurate. According to NIAAA, there are literally hundreds of alcoholism tests available for clinicians to use in the assessment of alcoholism. Some are very simple and short and others are more detailed and longer. It can be as simple as one question about how much you drink a day or it may consist of as many as 25 questions. Probably the most widely used test in standard treatment centers is the MAST. The simplest way for you to make a determination whether you have an alcohol problem is this: If you've arrived at my site, or any alcoholism site, that means that you are apparently wondering and questioning your alcohol consumption or behaviors. If that's the case, the chances are very good that you've got some kind of alcohol problem, otherwise you wouldn't be having these questions. People who aren't alcoholics don't wonder if they are. Something brought you here. Either a feeling you have deep inside yourself or someone has said something to you about your drinking. This is a sign that something isn't quite right. Ask yourself whether any of the following apply to you: If you answer yes to any of these statements, then alcohol is probably an issue in your life. Does this tell you for sure you're an alcoholic? No, but here's something we know for sure. Alcohol problems are always progressive. If you suspect alcoholism, it is to your benefit to take the steps needed to get you on the right track as soon as possible. A more advanced and thorough test for alcoholism is the one used at the Health Recovery Center in Minnesota created by Joan Mathews Larson. You can take this test for free in Joan's book, Seven Weeks to Sobriety. This test, which is actually called a biotype survey, will help you determine your body chemistry. Your body chemistry will determine if you have alcoholism and, if you do, what kind of alcoholism you have and how to address it successfully. According to Joan Mathews Larson, from the Health Recovery Center, there are three types of alcoholism. 1. Allergic/ Addicted In this alcoholism type, the body can't tolerate alcohol and when the individual tries to "learn" to drink they form a pattern of allergy addiction. 2. Omega 6 With this body chemistry, the person is deficient in the Omega 6 EFA's. This person is born with an alcohol dehydrogenase liver enzyme that enables them to consume large amounts of alcohol and produces opiate like substances that eventually leads to addiction. Regardless of what type of alcoholic you may be, you can find a comprehensive approach to recovery in my Clean and Sober for Life Jump-Start Program. I have used the principles in this program to achieve more than 25 years of craving-free and uninterrupted sobriety.
<urn:uuid:54b10097-7eb5-4a7f-9a3d-708214af0646>
CC-MAIN-2017-26
http://www.alternatives-for-alcoholism.com/alcoholism-test.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320873.54/warc/CC-MAIN-20170626235612-20170627015612-00035.warc.gz
en
0.960272
852
2.671875
3
A Simon Fraser University professor says the world needn't wait for an upcoming United Nations report on climate change to start acting to limit global warming. Kirsten Zickfeld is a professor of geography and a lead author of a special report by the UN Intergovernmental Panel on Climate Change. The report aims to examine the feasibility of limiting global warming to 1.5 C — one of the more ambitious goals of the 2015 Paris Agreement, which was backed by Canada and nearly 200 other countries. The Paris Agreement seeks to limit the rise in average world temperatures to "well below" 2 C above pre-industrial times, but ideally limiting the temperature rise to 1.5 C. "I would say honestly we know enough to be acting," she said. "We know that the impact of 1.5 C would be less than 2, 3, or 4 C. We know that we can achieve 1.5 C if we're serious about it. Honestly, we don't need to wait for this report to actually be acting." Zickfeld says 1.5 C is feasible but there are economic and technological challenges and very little room to wait. "We have to phase out fossil fuel emissions as soon as possible and not allow fossil fuel infrastructure to go forward," she said. She described Prime Minister Justin Trudeau's track record as "mixed" when it comes to climate change. "There are some good initiatives like the Pan-Canadian framework on carbon pricing and phasing out carbon emissions from coal-fired power plants," she said. "On the other hand, if we go ahead giving the green light to pipelines and LNG terminals, there's no way we can ever achieve that target." Zickfeld meets with her co-authors in June. With files from The Early Edition
<urn:uuid:42965448-6a1a-4ed8-8e1c-77e197cec282>
CC-MAIN-2017-30
http://www.cbc.ca/news/canada/british-columbia/lead-author-on-forthcoming-un-climate-report-admits-it-s-time-for-action-not-reports-1.4027500
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426161.99/warc/CC-MAIN-20170726122153-20170726142153-00181.warc.gz
en
0.956592
370
2.9375
3
Now that the Fourth of July weekend is upon us, many families will be spending every spare minute around the pool or at the beach. Most of us have fond memories of those “Hey, watch me dive” days from our childhood. I remember one summer when my cousin slipped while running around the edge of the pool and split his lip on the concrete… and another year when my teenage friend nearly drowned after body surfing in the dark. In hindsight, it is obvious that we were all pretty lucky that our injuries weren’t worse than that. Those memories just as easily could have been tragic. Head and neck injuries can result in brain injury, paralysis, coma, or death. Today’s summer advice is about water safety, so that our kids have fond summer memories, too. According to Hoag Hospital’s Project Wipeout, most injuries in the ocean are caused by the powerful surge and pull of waves. Serious injuries can occur in a number of ways: “When your body tumbles in the waves, gets thrown by the waves to the ocean floor or when your head spears into the sand; your head can be forced down onto your shoulders, pushed forward into your chest or pushed backward further than it can naturally extend. And once spinal cord damage is sustained, little can be done to medically repair it. The result is severe pain, paralysis, the inability to breathe on your own or even death.” (Project Wipeout) - Don’t jump off piers or jetties. - Don’t enter the ocean alone. - When body-boarding, hold the board so it extends past your head–if a board is held closer, a wave can flip the board backward toward the head and neck. - Make sure you know where sandbars are before riding surf. - Don’t enter the ocean drunk. Swimming Pool Play According to LiveStrong.com, supervision at the pool is the number-one safety rule: “One-on-one adult supervision is recommended for children. If supervising a child, you are too far away if you are unable to reach the child with an outstretched arm. Young children under 7 and non-swimmers should wear a PFD, personal flotation device, when in water at or above chest height. Flotation toys are not intended to prevent drowning. Implement the buddy system for everyone. Good swimmers and adults alike should never swim alone.” (LiveStrong.com) - Don’t dive in less than 9 feet of water. A good rule of thumb is if there is no diving board, diving is not allowed. That means no diving into the shallow end of a pool, or into an above-ground pool. - If you can’t see the bottom, don’t dive. You never know when there might be submerged items in your dive path. - Don’t dive into unfamiliar waters…even if others are diving. - Get training before doing back dives or fancy dives, or diving from diving blocks. - Don’t try to dive through or over objects. - Never dive from pool structures, such as slides or ladders… or from retaining walls, rooftops, balconies, or fences. - Don’t dive drunk or under the influence of drugs. - Don’t dive alone. - Don’t let anyone slide head-first…even adults. - One slider on the slide at a time. - Slide only if the water in the landing area is free of objects or other people. - The landing area in front of a slide should have a minimum depth of 5 feet. To read our other Summer Safety Tips… Tip #1: Heat Illness. Tip #2: Summer Auto Wrecks. Tip #3: Medications that Don’t Mix with Heat. Lifesaving Resources, Inc. Spinal Injuries in the Aquatic Environment; Part 1: Prevention. (Gerald M. Dworkin, reprinted from 1987 Parks & Recreation. (http://www.lifesaving.com) Hoag Hospital’s Project Wipeout. A nonprofit hospital’s program to save lives and prevent injuries at the beach. (http://www.hoaghospital.org/ProjectWipeout/AboutProjectWipeout.html) Christopher & Dana Reeve Foundation’s Summer Safety Checklist. (http://www.christopherreeve.org/site/c.mtKZKgMWKwG/b.5283099/k.6B65/Summer_Safety_Checklist.htm)
<urn:uuid:22126e85-268c-4005-aa81-f9be3c7f26f2>
CC-MAIN-2023-40
https://www.hensonfuerst.com/summer-safety-tip-4-avoiding-head-and-neck-injuries-around-pool-and-surf/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510730.6/warc/CC-MAIN-20230930213821-20231001003821-00618.warc.gz
en
0.884946
1,125
2.53125
3
(From Hart and Leininger's Oxford Companion to American Literature) HAWTHORNE, NATHANIEL (1804-64) was born at Salem, Mass., of a prominent Puritan family, which had spelled the name Hathorne and included a judge at the Salem witchcraft trials, who figures as the accursed founder of The House of the Seven Gables. Nathaniel's father, a sea captain, died of yellow fever in Dutch Guiana in 1808, leaving his widow to mourn him during a long life of eccentric seclusion, and this influenced her son's somber and solitary attitude. During his childhood, he read extensively in the poets and romancers, and spent an impressionable year at a remote Maine lake, after which he attended Bowdoin College, graduating in 1825. Returning to Salem, he began to write historical sketches and allegorical tales, dealing with moral conflicts in colonial New England. In 1828 he published anonymously, at his own expense, an immature novel, *Fanshawe, whose hero resembles the author at this period. The work went practically unnoticed, but interested S. C. Goodrich, who then published many of Hawthorne's stories in *The Token. These were reprinted in *Twice-Told Tales (1837, enlarged 1842) and included *"The Maypole of Merrymount," *"Endicott and the Red Cross," *"The Minister's Black Veil," *"Mr. Higginbotham's Catastrophe," *"Dr. Heidegger's Experiment," *"The Grey Champion," *"The Ambitious Guest," and the "Legends of the Province House," containing *"Lady Eleanor's Mantle" and *"Howe's Masquerade." These tales, which the author said had "the pale tint of flowers that blossomed in too retired a shade," deal with the themes of guilt and secrecy, and intellectual and moral pride, and show Hawthorne's constant preoccupation with the effects of Puritanism in New England. In imaginative, allegorical fashion, he depicts the dramatic results of a Puritanism that was at the roots of the culture he knew, recognizing its decadence in his own time. In 1836 he emerged from the seclusion at Salem to begin a career of hack writing and editing. For Goodrich he edited the monthly American Magazine of Useful and Entertaining Knowledge (1836), and later compiled the popular Peter Parley's Universal History (1837), as well as writing such books for children as Grandfather's Chair (1841), Famous Old People (1841), Liberty Tree (1841), and Biographical Stories for Children (1842). Meanwhile he had also been employed in the Boston Custom House (1839-41), and now spent six or seven months at Brook Farm, where his sensitiveness and solitary habits, as well as his lack of enthusiasm for communal living, unfitted him for fruitful participation. He married Sophia Peabody, an ardent follower of the Concord school, but even this marriage, although it was a happy turning point in his life, did not bring Hawthorne to share the optimistic philosophy of Transcendentalism. Settling in Concord at the Old Manse, he continued his analysis of the Puritan mind in the tales that were collected in *Mosses from an Old Manse (1846), including *"Young Goodman Brown," *"The Celestial Rairoad"; *"Rappacini's Daughter," *"The Artist of the Beautiful," *"The Birthmark," and *"Roger Malvin's Burial." As Surveyor of the Port of Salem (1846-49), he wrote little, but satirically observed his associates, as he described in the introduction to *The Scarlet Letter (1850). This novel, written after Hawthorne's dismissal from his post owing to a change of administrations, proved to be his greatest work, and indeed summed up in classic terms the Puritan dilemma that had so long occupied his imagination. Other books of this period include *The House of the Seven Gables (1851), another great romance, concerned with the decadence of Puritanism; *The Blithedale Romance (1852), in which he turned to the contemporary scene and his Brook Farm experiences; *The Snow-Image and Other Twice-Told Tales (1851), containing *"The Snow-Image," *"The Great Stone Face," and *"Ethan Brand"; and *A Wonder-Book (1852) and *Tanglewood Tales (1853), stories for children. During these years, he lived for a time in the Berkshires, where he was friendly with his admirer, Melville. After he rote a campaign biography of his college friend Franklin Pierce (1852) he was rewarded with a consulship at Liverpool. His departure for Europe (1853) marks another turning point in his life. The ensuing years abroad were filled with sightseeing and keeping a journal, and, although his new cultural acquirements had little influence on his writing, they throw significant light on his character of mind. After his consular term (1853-57), he spent two years in Italy, returning to settle again in Concord (1860). *Our Old Home (1863), shrewd essays on his observations in England, and *The Marble Faun (1860), a romance set in Italy, were results of his European residence. His last years, during which he continued to contribute to the Atlantic Monthly, were marked by declining creative powers. His attempts to write a romance based on the themes of an elixir of life and an American claimant to an English estate resulted only in four posthumous fragments: *Septimius Felton (1872); *The Dolliver Romance (1876); *Dr. Grimshawe's Secret (1883) and The Ancestral Footstep (1883). Other posthumous publications include Passages from the American Notebooks (1868), Passages from the English Notebooks (1870) and Passages from the French and Italian Notebooks (1871), all edited by his wife. The English Notebooks were newly edited from original manuscripts (1942) by Randall Stewart. Hawthorne had long been recognized as a classic interpreter of the spiritual history of New England, and in many of his short works , as well as in The Scarlet Letter and The House of the Seven Gables, he wrote masterpieces of romantic fiction. Like Poe, but with an emphasis on moral significance, he was a leader in the development of the short story as a distinctive American genre. The philosophic attitude implicit in his writing is generally pessimistic, growing out of the Puritan background, although his use of the supernatural has an aesthetic rather than a religious foundation, for he presented New England's early Puritanism and its decay in terms of romantic fiction. Emphasis on allegory and symbolism causes his characters to be recalled as the embodiment of psychological traits or moral concepts more than as living figures. Fanshawe, romance by Hawthorne, published anonymously in 1828. It was probably written during the author's college years, and the background resembles Bowdoin. Ellen Langton comes to live with a friend of her father, Dr. Melmouth, orthodox minister and head of Harley College. Her principal suitors are Edward Walcott, a normal young gentleman, and Fanshawe, a scholarly ascetic who now begins to lead a more worldly life, though he realizes that he can never have much in common with Ellen. The three are walking one day in the woods when an enemy of Ellen's father attempts to kidnap her. Fanshawe rescues her, and the kidnapper is killed in a fall from a precipice. Mr. Langton arrives, but Fanshawe refuses his offer of money. When Ellen offers to marry him, Fanshawe refuses because of their incompatibility. He goes away, devotes himself to his studies, and soon dies. A few years later, Ellen and Edward marry. The Token, (1827-42), Boston gift book, published by S. G. Goodrich. It was the first medium to give Hawthorne's work wide circulation, and the Twice-Told Tales were mostly reprinted from The Token. Among other prose contributors were Timothy Flint, Lydia Child, Edward Everett, Longfellow, James Hall, Sarah J. Hale, and Harriet Beecher Stowe. lThe level of its poetry is indicated by the prominent representation of Goodrich and Lydia Huntley Sigourney, although Holmes, Longfellow and Lowell contributed occasionally. N. P. Willis edited the 1829 issue. Twice-Told Tales, 39 stories by Hawthorne, printed in The Token, collected (1837) and enlarged (1842). Among the tales, many of them marked by the author's interest in the supernatural, are sketches of New England history, like *"The Grey Champion," *"Endicott and the Red Cross," *"The Maypole of Merrymount," and the four "Legends of the Province House," which include *"Howe's Masquerade" and *"Lady Eleanor's Mantle"; stories of incident, like *"Mr. Higginbotham's Catastrophe." and moral allegories, like *"The Minister's Black Veil," *"Dr. Heidegger's Experiment," and *"The Ambitious Guest." The Maypole of Merrymount, allegorical tale by Hawthorne, publishedd in 1836 and collected in Twice-Told Tales (1837). It is based on historical accounts of the Anglican settlement at *Merry Mount. Among the revelers about the Maypole at Merrymount are a handsome youth and a beautiful maiden, who, at the height of the festivities, are married by a jolly Anglican priest. At this moment the proceedings are interrupted by a raid of Endecott and his Puritan followers. The latter are dissuaded from punishing the pair when each pleads for the other, and they join the Puritan colony, becoming sober and respectable citizens. Endicott and the Red Cross, story by Hawthorne, published in Twice-Told Tales (1837). It is a brief account of the rebellious gesture of the Puritan governor John Endecott, who, when Charles I decided to send an Anglican governor to [New] England, tore the Red Cross from the British ensign, because he wished to demonstrate the dislike of the Massachusetts Bay colonists for "the idolatrous forms of English episcopacy." A passage in the tale describes the punishment of an adulteress, later the theme of The Scarlet Letter. The Minister's Black Veil, parable by Hawthorne, published in The Token (1836) and in Twice-Told Tales (1837). The Rev. Mr. Hooper, a New England Puritan minister, appears one sunday with his face covered by a black veil. Refusing to explain his action to his terrified congregation, or to his fiancée, who leaves him, he goes through life concealing his face, saying only that the veil is a symbol of the curtain that hides every man's heart and makes him a stranger even to his friend, his lover, and his God. Mr. Higginbotham's Catastrophe, story by Hawthorne, published in The Token (1934) and in Twice-Told Tales (1837). Dominicus Pike, an itinerant tobacco peddler, is informed of the hanging of wealthy old Mr. Higginbotham of Kimballton. He spreads the rumor as he travels, only to have it denied by persons who have seen the old man since his supposed death. Hearing again of the hanging, and being contradicted by Higginbotham's niece, he goes to Kimballton and arrives just in time to save her uncle from actual murder. It is revealed that the murder was planned by three men, two of whom successively lost courage and fled, spreading the rumor. Dominicus is rewarded by becoming Higginbotham's heir, as well as marrying the niece. Dr. Heidegger's Experiment, allegorical tale by Hawthorne, published in Twice-Told Tales (1837). The doctor, an aged physician and scientist, invites four of his vernerable, eccentric acquaintances to take part in a test of some water from the Fountain of Youth. Medbourne, an impoverished former merchant, Gascoigne, a ruined politician, Colonel Killigrew, a goaty old wastrel, and the Widow Wycherly, a faded beauty, see the doctor restore a dried rose by applying the water, and are eager to try it. Dr. Heidegger declares he merely wishes to see the results, and does not drink, but serves his guests full glasses. They become increasingly younger until they reach gay and reckless youth, when the three then vie for the favors of the Widow. They accident tally upset the table, and spill the water. Then the doctor notices that his rose has faded again, and gradually his guests resume their aged appearance. He says that he has learned from the experiment not to desire the delirium of youth, but his frieds resolve to make a pilgrimage to Florida in search of the Fountain. The Grey Champion, historical sketch by Hawthorne, published in Twice-Told Tales (1837). It is concerned with the appearance of the regicide Goffe in Boston, at a time when rebellion threatened the colony. In his intimidation of Andros, Goffe is presented as "the grey champion" of the spirits of independence and colonial rights. Goffe, William (c. 1605-79), English Puritan, signer of the death warrant of Charles I. During the Restoration he fled to America, where he lived mainly in seclusion at Hadley, Mass. He is said to have been instrumental in repelling an Indian attack during King Philip's War. He figures in Cooper's The Wept of Wish-ton-Wish, Barker's Superstition, Paulding's The Puritan and His Daughter, Hawthorne's "The Grey Champion," McHenry's The Spectre of the Forest, and Delia Bacon's Tales of the Puritans, as well as in Scott's Peveril of the Peak. A factual account of Goffe is contained in Ezra Stiles's History of the Judges of Charles I (1794). His father-in-law and fellow regicide, Edward Whalley, accompanied Goffe to America.The Ambitious Guest, allegorical tale by Hawthorne, published in The Token (1835) and in Twice-Told Tales (1837). A solitary youth stops for the night at a lonely cottage in the Notch of the White Mountains in New Hampshire. He tells of his hopes of fame and fortune, and each member of his host's family is moved to divulge his intimate desires. The head of the house would like "to be called Squire, and sent to General Court for a term or two"; the youngest child would like to go at once on an excursion to "take a drink out of the basin of the Flume"; his older sister hardly conceals her growing interest in the young stranger, and even the grandmother speaks of her wish to look well in her coffin. While they talk, a great landslide begins, which buries the whole company. Lady Eleanor's Mantle, allegorical tale by Hawthorne, published in 1838 and reprinted in Twice-Told Tales (1842). Lady Eleanore Rochcliffe comes to live at the Boston Province House, in the family of her guardian, Colonel Shute. Her haughty beauty distracts Jervase Helwyse, whose love she scorns, and affects all who see her. The curious mantle she wears is said to have supernatural powers and to have some influence in the epidemic of smallpox that soon breaks out, striking first the aristocratic circle of Lady Eleanore, and then the common people she despises. At last she herself is stricken, and as she is dying confesses, "I wrapped myself in Pride as in a Mantle, and scorned the sympathies of nature; and therefore has nature made this wretched body the medium of a dreadful sympathy." Helwyne takes her mantle, which is burned by a mob, an the pestilence begins to subside. Howe's Masquerade, story by Hawthorne, published in Twice-Told Tales (1842). At the Boston tavern, the Old Province House, once headquarters of the royal governors, the proprietor tells a visitor this legend. When Governor Howe gave an entertainment, the night before the patriots' victory in the siege of Boston, the guests were costumed as figures of history and fiction, with comic individuals in rags representing Washington and his generals. Late in the evening, a funeral march was heard, and a solemn procession of ancient figures passed through the ballroom. Colonel Joliffe, an aged patriot detained during the siege, was present with his granddaughter, and identified the apparitions as early Puritan governors, "summoned to form the funeral procession of royal authority in New England." According to legend, the procession reappears on each anniversary of the occasion. Mosses from an Old Manse, tales and sketches written by Hawthorne during his residence (1842-46) at the Old Manse in Concord. They were published in two volumes (1846), with an introductory essay, "The Old Manse," followed by 25 short stories and historical sketches. Among them are historical pieces, like *"Roger Malvin's Burial"; satirical allegories, like *"The Celestial Railroad"; and allegorical tales of the supernatural, like *"Young Goodman Brown," *"Rappacini's Daughter," *"The Birthmark," and *"The Artist of the Beautiful." Young Goodman Brown, allegorical tale by Hawthorne, published in The New England Magazine (1835) and in Mosses from an Old Manse (1846). Goodman Brown, a Puritan of early Salem, leaves his young wife Faith, who pleads with him to to go, to attend a witches' sabbath in the woods. Among the congregation are many prominent people of the village and church. At the climax of the ceremonies, he and a young woman are about to be confirmed into the group, but he finds she is Faith, and cries to her to "look up to heaven, and resist the wicked one." Immediately he is alone in the forest, and all the fearful, flaming spectacle has disappeared. He returns to his home, but lives a dismal, gloomy life, dommed to skeptical doubt of all about him, and never able to believe in goodness or piety. The Celestial Railroad, allegorical tale by Hawthorne, published in 1843 and collected in Mosses from an Old Manse (1846). The narrator travels the way of Christian in Pilgrim's Progress, from the City of Destruction to the Celestial City. Instead of going afoot, he finds that modern achievement has made possible an easy, convenient Celestial Railroad, on which he rides in the company of affable, bluff Mr. Smooth-it-away, who scoffs at the difficult path of old-fashioned pilgrims. The ancient landmarks and institutions are all changed, and on arriving at the end of the line, the passengers expect to cross the river by steam ferryboat. But here Mr. Smooth-it-away deserts them, laughing and showing his identity by breathing smoke and flame. About to drown, the narrator suddenly awakens to "thank Heaven it was a Dream!" Rappacini's Daughter, allegorical tale by Hawthorne, published in 1844 anbd reprinted in Mosses from an Old Manse (1846). Giovanni Guaconti comes to study at the University of Padua and lodges next door to the house of Giacomo Rappacini, a doctor. In the latter's garden he sees and falls in love with Rappacini's daughter Beatrice, whose beauty strangely resembles that of her father's poisonous flowers. Pietro Baglioni, a friendly professor, warns Giovanni that Rappacini's love of science has led him beyond moral or humane considerations, and that the girls nature seems a product of his sinister art, but the yhoung man is undeterred. Under the scientific regard of her father, the affection of the two grows deeper, and Giovanni himself becomes tainted by the poisonous breath of the garden. Then he gives Beatrice a potion that Baglioni has supplied him as an antidote to all poisons. She drinks it, but "as poison had been life, so the powerful antidote was death; and thus the poor victim of man's ingenuity and of thwarted nature . . . perished there, at the feet of her father and Giovanni." The Artist of the Beautiful, allegorical tale by Hawthorne, published in the Democratic Review (1844) and in Mosses from an Old Manse (1846). Owen Warland, a youthful watchmaker, obsessed with a desire to create something ideally beautiful, loves Annie Hovenden, daughter of his former master. She is unsympathetic towards his aspirations and his delicate nature, and Peter Hovenden and the blacksmith, Robert Danforth, both rough and unimaginative, oppress Owen and destroy his inspiration. Annie marries Danforth, and for a time Owen forsakes his dreams for grosser practical activities, but then devotes himself to creating a mechanical butterfly, fragile, lovely, and endowed with living qualities. Whan he exhibits his work to Annie and her family, Danforth and Hovenden seem to oppress the insect as they do its creator, while Annie prefers to admire her child. The child, who resembles his grandfather, rudely crushes the butterfly, but Owen looks on calmly; "he had caught a far other butterfly than this." The Birthmark, allegorical tale by Hawthorne, published in Mosses from an Old Manse (1846). Aylmer, a scientist, marries Georgiana, a beautiful woman whose single physical flaw is a tiny crimson birthmark on her left cheek, resembling a hand. The mark repels Aylmer, who determines to use his scientific knowledge to remove it. Assisted by his rude, earthly servant, Aminadab, he unsuccessfully tries every known method, finally using a powerful potion which, although it causes the birthmark to fade, causes her death also. Aminadab laughs, and the author concludes: Thus ever does the gross fatality of earth exult in its invariable triumph over the immortal essence which, in this dim sphere of half-development, demands the completeness of a higher state. Roger Malvin's Burial, story by Hawthorne, published in The Token (1832) and in Mosses from an Old Manse (1846). Two wounded survivors of a foray against Indians, led by John Lovewell, make their escape through the Maine woods. Roger Malvin, an old man mortally injured, urges his young companion, Reuben Bourne, to desert him, and seek safety. Reuben protests, but is finally persuaded and promises to send help. He makes his way home, but cannot bring himself to tell Dorcas Malvin of the circumstances in which he left her father. He claims to have buried him in the forest, is hailed as a hero, and soon married Dorcas. Their life is not happy, for his conscience disturbs him, and when their son Cyrus is 15, they leave the settlement to seek a new home in the wilderness. One evening Reuben accidentally shoots his son while hunting, and is horrified to discover the boy's body at the same spot where he left Malvin, years before. Dorcas discovers her son's death, and falls unconscious. The upper branch of an oak, where Reuben hung a bloody handkerchief as a signal, has withered and now crumbles and drops, while Reuben prays, feeling that at last his crime is expiated and the curse lifted. The Scalet Letter, romance by Hawthorne, published in 1850. Based on a theme that appears in "Endicott and the Red Cross," this somber romance of conscience and the tragic consequences of concealed guilt is set in Puritan Boston during the mid-17th century. An introductory essay describes the author's experiences as an official of the Salem Custom House and his supposed discovery of a scarlet cloth letter and documents relating the story of Hester. An aged English scholar sends his young wife, Hester Prynne, to establish their home in Boston. When he arrives two years later, he finds Hester on the pillory with her illegitimate child in her arms. She refuses to name her lover and is sentenced to wear a scarlet A, signifying Adulteress, as a token of her sin. The husband conceals his identity, assumes the name Roger Chillingworth, and in the guise of a doctor seeks to discover her paramour. Hester, a woman of strong independent nature, in her ostracism becomes sympathetic with other unfortunates, and her works of mercy gradually win her the respect of her neighbors. Chillingworth meanwhile discovers that the Rev. Arthur Dimmesdale, a revered, seemingly saintly young minister, is the father of Hester's beautiful, mischevious child, Pearl. Dimmesdale has struggled for years with his burden of hidden guilt, but, though he does secret penance, pride prevents him from confessing publicly, and he continues to be tortured by his conscience. Chillingworth's life is ruined by his preoccupation with his cruel search, and he becomes a morally degraded monomaniac. Hester wishes her lover to flee with her to Europe, but he refuses the plan as a temptation from the Evil One, and makes a public confession on the pillory in which Hester had once been placed. He dies there in her arms, a man broken by his concealed guilt, but Hester lives on, triumphant over her sin because she openly confessed it, to devote herself to ensuring a happy life in Europe for Pearl and helping others in misfortune. The House of the Seven Gables, romance by Hawthorne, published in 1851. It is based on the tradition of a curse pronounced on the author's family when his great-grandfather was a judge in the Salem witchcraft trials. In Salem stands the ancestral home of the Pyncheons, cursed by Wizard Maule when the first Colonel Pyncheon despoiled him of his wealth. In the mid-19th century, the house is owned by hypocritical Judge Jaffrey Pyncheon, whose studied benevolence makes him an honored citizen. He does not live in the dilapidated mansion, whose occupants are his poor cousin Hepzibah, reduced to operating a cent-shop; a country relative, Phoebe; a single lodger, the young daguerreotypist Holgrave, who falls in love with Phoebe; and Hepzibah's brother Clifford, ill and feeble-minded, just released from prison after a term of 30 years for the supposed murder of a rich uncle. Jaffrey, who had obtained Clifford's arrest, now harasses him in an attempt to find the missing deeds to their rich uncle's property, and threatens to have Clifford confined in an insane asylum. Hepzibah attempts to aid her brother and circumvent the judge, but the latter's sudden death frees them and makes them his heirs. Holgrave reveals that he is actually the last of the Maules, and that the judge, like the rich uncle, died by the curse on the house. Revealing the location of the missing deeds, he marries Phoebe, leaving the House of the Seven Gables, freed of its curse, to Hepzibah and Clifford. The Snow-Image and Other Twice-Told Tales, 17 short stories by Hawthorne, published in 1851. The volume includes historical sketches, tales of the supernatural, and such allegorical stories as *"Ethan Brand," *"My Kinsman, Major Molyneux," and *"The Great Stone Face." "The Snow-Image: A Childish Miracle" is an allegory in which Peony and Violet Lindsey, gay, fanciful children, build an image of snow, encouraged by their mother, who tells them it will be their snow-sister and playfellow. In their enthusiasm they are hardly surprised when the image comes to life as a beautiful child in a flimsy white dress, who plays with them in the garden. When the children's father, a matter-of-fact merchant, comes home, he disregards their remonstrances and takes the snow-child into the house, intending to clothe her, feed her, and take her to her own home. But the child vanishes, and only a pool of water remains before the stove. The author concludes that "should some phenomenon of nature or providence transcend" the system of men of Lindsey's stamp,, "They will not recognize it even if it come to pass under their very noses. What has been established as an element of good to one being may prove absolute mischief for another." The Great Stone Face, allegorical tale by Hawthorne, published in The Snow-Image and Other Twice-Told Tales (1831). "Old Stony Phiz" is said to represent Webster. In a mountain valley dominated by a towering rock formation that resembles a noble, majestic face lives the boy Ernest, who learns from his mother the legend that some day a great man bearing the features of the Face will visit the community. He eagerly awaits the coming of this man, but, though he grows to old age and sees Mr. Gathergold the banker, Old Blood-and-Thunder the general, and Old Stony Phiz the statesman, all reputed to resemble the face, his expectations are disappointed. He has meanwhile lived an honest, helpful life, communing with the spirit of the landmark, and has come to be honored and revered. A poet visits him, in whom again Erenst hopes to see the features of the image but fails. At an outdoor meeting where Ernest preaches, the poet sees that it is Ernest himself who resembles the Stone Face. The simple, venerable old man, unconscious of this, continues to await his hero. Ethan Brand: A Chapter from an Abortive Romance, story by Hawthorne, published in The Snow-Image (1851). Ethan Brand, formerly a lime-burner, has sought the Unpardonable Sin, and now returns to his New England home, announcing that he has found it in his own soul, in intellectual pride and in the separation of mind and heart. The townspeople do not understand him and consider him mad. He takes the place of his successor at the limekiln, and during the night lies down to perish in the furnace. When the other lime-burner returns in the morning, he finds the lime all burnt wnow-white, and on its surface a human skeleton within whose ribs is a piece of marble in the shape of a heart. A Wonder-Book, tales for children adapted from Greek myths by Hawthorne, published in 1852. Tanglewood Tales (1853) is a similar collection. Our Old Home, sketches by Hawthorne, published in 1863, describing his observations and experiences during his residence in England. The Marble Faun, romance by Hawthorne, published in 1860. It was issued in England as Transformation. Kenyon, an American sculptor, Hilda, a New England girl, and the mysterious Miriam are friends among the art students in Rome. They become acquainted with Donatello, Count of Monte Beni, a handsome Italian who resembles the Faun of Praxiteles, not only physically, but laso in his mingling of human and animal qualities, his amoral attitude, and his simple enjoyment of the life of the senses. The dark, passionate Miriam is loved by Donatello, but she is haunted by an unrevealed sin and by the persecution of a mysteriuos man who dogs her footsteps after an accidental meeting in the Catacombs. Donatello is enraged by this man, and after an encouraging lance from Miriam flings him to his death from the Tarpeian Rock. Thereafter they are linked by their mutual guilt, which they keep secret. Donatello becoems brooding and conscience-stricken, and, though humanized by his suffering, is a broken spirit when he finally gives himself up to justice. Hilda, who saw the crime committed, is also involved in the sin until she forsakes Puritan tradition and pours out her secret at a church confessional. The unhappy Miriam disappears into the shadowy world from which she came, and Hilda and Kenyon are married. Septimius Felton; or, The Elixir of Life, unfinished romance by Hawthorne, posthumously published in 1872. During the Revolutionary War, Septimius Felton, a scholar who seeks a method of attaining earthly immortality, kills a British officer who has insulted his fiancée, Rose Garfield. On the hill top where he has buried the officer, he meets Sybil Dacy, a strange, unearthly creature, who is looking for a flower she expects to grow from the grave, and they become close friends. Before he died, the officer gave Septimius an old manuscript, containing the formula for an elixir of life, requiring the juice of the flower Sybil seeks. A Dr. Portsoaken, her uncle, vistis Septimius and reveals that the scholar my be the heir to a British estate. Robert Hagburn, an American soldier and friend of Septimius, becomes engaged to Rose, after it is discovered that she is the scholar's half-sister. At the wedding of Robert and Rose, Sybil discloses to Septimius, who is about to drink the potion he has finally concocted, that the officer he killed was her lover, and that she has intended to seek revenge, but now loves Septimius. She drinks part of the potion, throws away the rest, and dies. Septimius disappears, and is believed to have gone to claim his English estate. The Dolliver Romance, unfinished novel by Hawthorne, posthumously published in the Atlantic Monthly (1864, 1871) and in book form in 1876. The author's last work, it was an attempt to develop the theme of the elixir of life also essayed in Septimius Felton. In a New England town lives an aged apothecary, with the sole remaining member of his family, his great-granddaughter Pansie. One day he tries a cordial presented to him by a stranger seven years before, and when the potion rejuvenates him he takes further doses. Colonel Dabney, an impetuous, sensual old man, comes to demand the cordial, which he says is rightfully his. When he threatens the apothecary with a pistol, he is given the drink. Swallowing a large amount of it, he rises to his feet, shrieks, and falls dead. The apothecary sees that for a moment the colonel's face becomes that of a young man, but then it is aged and withered in death. An inquest pronounces the death to have occurred "by the visitation of God." Dr. Grimshawe's Secret, romance by Hawthorne, posthumously edited from an unfinished manuscript by his son Julian and published in 1883. In a New England town in the early 19th century lives Dr. Grimshawe, an eccentric recluse, and two orphans, Ned and Elsie. The children are involved in a secret related to an estate in England, whence the doctor originally came. This estate has lacked a direct heir since the rign of Charles I, when the incumbent disappeared, leaving a bloody footprint on the threshold. After their guardian's death, the children are separated, but meet again years later in England. Ned, now Edward Redclyffe, is injured while investigating the estate and is befriended by Colcord, his boyhood tutor. Lord Braithwaite, the estate's present owner, invites Edward to live at the Hall, and recognizes him as the Sir Edward Redclyffe of the time of the bloody footprint. When the old man dies, colcord produces a locket that proves Edward to be the heir.
<urn:uuid:8d1ef5f2-30c5-4ad1-bdd0-66651ab3c1db>
CC-MAIN-2017-34
http://vanityfea.blogspot.com/2017/01/nathaniel-hawthorne.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886124662.41/warc/CC-MAIN-20170823225412-20170824005412-00065.warc.gz
en
0.969592
7,592
2.96875
3
|General Baron de Kalb| By Susan F. Craft General Baron DeKalb was born in Germany in 1721. He served with distinction in the French Army during the War of Austrian Succession and the Seven Years’ War. In 1768 on behalf of France, he traveled to America on a covert mission to determine the level of discontent amongst colonists. In 1777, he returned with his protégé, the Marquis de Lafayette, and joined the Continental Army. On August 16, 1780, five miles north of Camden, SC, British forces under Lt. General Charles, Lord Cornwallis defeated the American forces under the command of Major General Horatio Gates. Gates had over 4,000 men, but only 2,000 were effective for combat. Many succumbed to the heat and also the night before, the men had been fed green corn, causing many to suffer bowel problems. |Lt. General Lord Cornwallis| Cornwallis had around 2,100 men. Six hundred were Loyalist militia and Volunteers of Ireland, and 1,500 were regular troops. Cornwallis also had the infamous and highly experienced Tarleton's Legion, around 250 cavalry and 200 infantry. The British troops opened the battle by firing a volley into the militia, followed by a bayonet charge. The militia, lacking bayonets, panicked and ran away. The panic spread to the North Carolina militia, and they also fled. Gates bolted with the first of the militia to run from the field and took refuge 60 miles away in Charlotte, NC. Before he ran, he ordered his right flank under General Baron de Kalb to attack the British militia. Under de Kalb, the Continentals fought hard, but they numbered only 600 to 2,000 British troops. Cornwallis ordered Tarleton's cavalry to charge the rear of the Continental line. The cavalry charge broke up the formation of the Continental troops. De Kalb tried to rally his men but was fatally wounded. After only one hour of combat, the Americans were utterly defeated, suffering over 2,000 casualties. Tarleton's cavalry pursued and harried the retreating Continental troops for 20 miles. |The Battle of Camden, SC| The terrible route for the Americans at the Battle of Camden strengthened the British hold on the Carolinas that were already reeling from the capture of Charleston, SC, by General Sir Henry Clinton in January 1780. Here’s how Andrew, a character in my novel, The Chamomile, described General de Kalb. You see, General de Kalb wasn’t one of those officers that puts space between him and his men. He was one of us. Most times when we traveled, he didn’t ride his horse, but marched along beside us. Came around each night and shared the food and fire. Slept on the ground with us. And stories? He could tell some of the best stories. Knew how to share silence too. At Camden, we were pretty much beaten. Six hundred of us to their two thousand. De Kalb sent his horse to the back of the lines early on, so he could fight side by side with us on foot. Time after time we charged, reformed, and charged again with the general leading the way. Someone laid his head open with a saber. He was shot. Bayoneted. Cut many times. But he still led one more charge. When the general finally fell, we closed ranks around him. Then Tarleton brought in his dragoons. We fought as long as we could, until most of us broke and ran. I was running for the woods with the rest of them, but I turned in time to see British soldiers headed toward the general to finish him off. They would have, too, but his aide, Chevalier de Buysson, threw his body on top of him and yelled, "No! No! It’s de Kalb. Brigadier General de Kalb." Cornwallis ordered his own surgeons to try and save de Kalb. |Death of de Kalb| Here is de Kalb’s response, “I thank you sir for your generous sympathy, but I die the death I always prayed for; the death of a soldier fighting for the rights of man.” When the general died three days later, Cornwallis found out he was a Mason, same as himself. He had him buried with full military and Masonic honors. Years later, on a tour of South Carolina, President George Washington visited the grave of DeKalb and is reported to have said the following, “So there lies the brave de Kalb; the generous stranger who came from a distant land to fight our battles and to water with his blood the tree of our liberty. Would to God he had lived to share with us its fruits.”
<urn:uuid:eaa484c4-9b23-4625-8cbf-7599cae7b4fa>
CC-MAIN-2014-35
http://colonialquills.blogspot.com/2012/08/susan-craft-general-baron-de-kalb-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500831174.98/warc/CC-MAIN-20140820021351-00044-ip-10-180-136-8.ec2.internal.warc.gz
en
0.978949
1,008
3.140625
3
Pine Antique Furniture During the 1600's and 1700's, pine was mainly used for paneling and as a foundation for veneers. It was not until the 1800's that pine was used more for furniture. Paint was applied in a process called graining where combs and brushes were run over the paint to give the appearance of the grain in finer woods. The most common colors were brown, red, or green. Although rare to find, a piece in it original paint is increasingly more desirable. Most antique pine pieces have been painted numerous times as each generation desired a change of color. As such, most of our pine antiques have been stripped and waxed to bring out its beautifully aged wood. As one of the oldest shops on Atlanta's famous Bennett Street, Designer Antiques, Ltd. has developed a reputation for delivering high-quality late nineteenth-century English and Irish antique pine furniture. Britain led the world in industrialization during the 1800's. Population expansion and wealth came with the Industrial Revolution which led to greater demand and greater furniture production. Most English and Irish antique pine furniture available today dates from the 1850's to 1890's as this coincided with the Industrial Age. Prior to this, most pine furniture was made by local carpenters. There are many wonderful pine pieces from the pre-industrial age, but its availability is very limited. Antique pine furniture reflects an ease and simplicity associated with life during the 1800's - furniture build to be practical in a comfortable and timeless style.
<urn:uuid:49c3548e-1344-4a86-847c-fe64449281db>
CC-MAIN-2017-47
http://www.reclaimed-pine-furniture.co.uk/AntiquePine/pine-antique-furniture
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805008.39/warc/CC-MAIN-20171118171235-20171118191235-00618.warc.gz
en
0.976869
313
2.84375
3
I was a little late coming in, but they're talking about how easy it was to pick up the skills needed to use iMovie. After one teacher got help, she had the skills to help others. Does the music match the mood? Students made public service announcements after looking at some examples. They started with a worksheet to build their ideas. Te students actually had trouble creating one clear idea - instead, they wanted to write scripts. They still have handouts, but most of it's on a CD. When I first came to MICCA everything was on a paper handout, sometimes 20 pages thick. Now, most presenters seem to have at least some form of digital version. Pan and zoom shots were forbidden, so they could think more about composition and less about home movies. They also talked about some space before and after the dialog so it wouldn't get clipped off by the transitions. That makes sense, although do they always need to have transitions? Still, you can always cut out the quiet times if they don't go with the commercials pacing. Identify camera angles in examples before you set them loose. Don't describe the shot - draw it in the storyboard. - Buy an external firewire drive. - Buy the warranty. - External battery charger. - Tripods. They got theirs from Big Lots, I found mine at flea markets and Goodwill stores. - External microphones. - Buy 1 to try out, but then standardize your equipment. Every manufacturer has their quirks. - Get a book called "Digital Photography for Teens." Not sure I'll buy the book, but you might wish to do so. - Consent & Release forms. - Save the tapes until the students have finished their projects. They're backups! - Small group camera instruction as teams finished their storyboards were more manageable. - Win over an administrator before you get started. - Demonstrate how the equipment can serve the entire school community. Several students were special ed, and it all still worked. (I'm not shocked - every time I give my special ed kids an opportunity they rise to the occasion.) They're talking about sharing the project with every teacher / administrator / supervisor that will listen - the support followed. Fund raising idea: The class with the LEAST money won. It became subversive as students gave to other teachers. Be concise when planning the budget.
<urn:uuid:bfa7b0a2-6922-4544-ac35-1b2aef34d0ad>
CC-MAIN-2017-34
http://academicaesthetic.blogspot.com/2007/04/session-7-digital-filmmaking-beginner.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105326.6/warc/CC-MAIN-20170819070335-20170819090335-00154.warc.gz
en
0.972189
502
2.609375
3
Approaching the Election of 1848, President James Polk did not have unanimous support amongst Democrats. In fact, quite the opposite. Despite the fact that President Polk vowed to only serve one term as president, he had stirred signifiant discontent in the Democratic Party with his policies. See Daniel Walker Howe, What Hath God Wrought: Transformation of America, 1815-1848, 831. Whereas northern Democrats had given President Polk significant support throughout his term as president, by the end of his term, they “felt they had received little or nothing.” Id. The Democrats who had supported Martin Van Buren just a matter of years prior had become disenchanted with President Polk and his brand of Democratic politics. See id. This anger culminated in the Van Burenite faction of the Democrats breaking away and calling themselves “Barnburners.” Id. This name derived from “the legendary New York Dutch farmer stupid enough to burn down his barn in order to drive the rats out of it.” Id. citing Sean Wilentz, The Rise of American Democracy (New York, 2005), 583; Joel Silbey, Storm Over Texas (Oxford, 2005), 99-111. The Barnburners, the “Conscience” faction of the Whigs, and the small Liberty Party, held their own convention in Buffalo, New York in August 1848 to nominate their own candidate for president. See Daniel Walker Howe, What Hath God Wrought: Transformation of America, 1815-1848, 831. The convention nominated Van Buren for president, with a platform centered on opposition to slavery and endorsement of improving infrastructure. See id. at 831-32. While Van Buren would not come close to winning the election, the platform that the convention created would be remarkably similar to that of the Republican Party a decade later, which would win the presidency with Abraham Lincoln. See id. at 832. The politics of the Election of 1848 set up the dynamics that would play out before the Civil War. While the Democrats regressed in their policies, both the Whigs and the third parties were more in tune with the needs and wants of ordinary Americans. The factions breaking out in the Democratic Party particularly reflected those regressive policies, and just a short decade later, the Democrats would be on the verge of extinction.
<urn:uuid:ca09bf97-6b4f-412b-a7db-15c690094c79>
CC-MAIN-2023-23
https://lastbesthopeofearth.com/2016/08/06/election-of-1848-the-barnburners/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00208.warc.gz
en
0.961982
488
3.046875
3
Stay Positive For a Healthy Heart Having a positive attitude encourages heart disease patients to exercise more which in turn increases longevity, says a study. Image Credit: Getty Images Researchers used a questionnaire to assess the moods of 600 heart disease patients in a Denmark hospital. Five years later, researchers found the most positive patients exercised more and had a 42 percent less chance of dying for any reason during the follow-up period. Deaths were less than 10 percent. Among patients with less positive attitudes, 50 deaths occurred (16.5 percent). Positive mood and exercise also cut the risk of heart-related hospitalizations, reports Science Daily. Coronary artery disease is caused by narrowed arteries that don't provide enough blood and oxygen to the heart. "We should focus not only on increasing positive attitude in cardiac rehabilitation, but also make sure that patients perform exercise on a regular basis, as exercise is associated with both increased levels of optimism and better health," said Susanne S. Pedersen, one of the study authors and professor of cardiac psychology, the Department of Medical and Clinical Psychology, Tilburg University, the Netherlands, and adjunct professor of cardiac psychology, the University of Southern Denmark and Odense University Hospital, Denmark. The new research has been published in the American Heart Association journal Circulation: Cardiovascular Quality and Outcomes.
<urn:uuid:fdff4d5b-5c0f-4a9f-8911-848e8e0c3c35>
CC-MAIN-2014-10
http://www.indiatimes.com/lifestyle/health-and-fitness/stay-positive-for-a-healthy-heart-101051.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010359804/warc/CC-MAIN-20140305090559-00041-ip-10-183-142-35.ec2.internal.warc.gz
en
0.943735
273
2.8125
3
Bengaluru, the beloved Tech City of India, has emerged as a leading technology hub in the Asia Pacific region, ranking second only to Beijing. Over the past two decades, Bengaluru has experienced unparalleled growth, transforming from a modest city into a thriving IT powerhouse, earning its well-deserved moniker as the Silicon Valley of India. In this article, we will explore the remarkable rise of Bengaluru as an IT hub, examine the government policies that fueled its success, and uncover the valuable lessons other states in India can learn from this incredible journey. Education: The Foundation of Bengaluru's Growth The seeds of Bengaluru's revolution were planted long before India gained independence. In the early 1900s, Bengaluru, then a part of the Mysore presidency, was ruled by Maharaja Krishnaraj Wadiyar IV. With a strong focus on development, he established an economic conference in 1911, an avant-garde think tank where experts deliberated and analyzed ideas. The conference made primary education compulsory in 1913, a hundred years before the rest of India. The Maharaja also granted vast land to set up prestigious institutes like the Indian Institute of Science and the National College in Bengaluru, further solidifying its position as the Silicon Valley of India. These initiatives led to Bengaluru surpassing the national literacy rate, laying the foundation for its future growth. Public Industry: Fostering Economic Opportunities Following India's independence, Bengaluru's robust talent pool and high literacy rate attracted the national government's attention. As a result, several major public sector factories, including Indian Telephone Industries, Hindustan Aeronautics Limited, Bharat Electronics, and Bharat Heavy Electricals Limited, were established in Bengaluru, reinforcing its position as the Silicon Valley of India. Additionally, the city was shielded from the adverse events of the partition, making it an ideal location for industries. Out of the 77 research and development organizations in India, 40 were concentrated in Bengaluru, including the Indian Space Research Organisation (ISRO). This synergy between education and public industry laid the groundwork for Bengaluru's growth. The IT Revolution: Bengaluru's Quantum Leap The 1970s marked a pivotal moment in world history with the advent of the IT revolution. Offshoring became a trend as companies sought alternatives to high labor costs in the United States. Bengaluru, the Silicon Valley of India, became an attractive destination due to its skilled workforce and lower labor costs. The rise of microprocessors, which revolutionized electronic devices, created a demand for software developers. However, the supply of software professionals fell short, especially in the Western countries. In the 1980s, Rajiv Gandhi's economic policies in India, including reduced taxes and simplified licensing systems, recognized software as an industry and incentivized its development. The government of Karnataka established software technology parks, offering tax exemptions and infrastructure support to export-oriented software firms. This proactive approach contributed to Bengaluru's exponential growth as the Silicon Valley of India. Entrepreneurship and Liberalization: Driving Bengaluru's Success In 1991, India embraced liberalization, opening doors for foreign investment. Bengaluru, the Silicon Valley of India, capitalized on this opportunity, and visionary companies like TCS, Wipro, and Infosys emerged. The government of Karnataka fostered an environment conducive to business, attracting multinational corporations to set up their bases in Bengaluru, further solidifying its position as the Silicon Valley of India. The city's total IT exports reached an impressive $65 billion by 2022. Moreover, software engineers in Bengaluru transitioned into successful entrepreneurs, building iconic companies such as Flipkart, Cred, and Zerodha. Bengaluru's rise as a startup city was fueled by the government's implementation of policies that lowered barriers to entry, established incubators, and provided financial support to startups. Bengaluru, the Silicon Valley of India, has embarked on a remarkable tech journey, fueled by a strong foundation in education, a thriving public industry, and a forward-thinking approach to IT revolution and entrepreneurship. Other states in India can draw valuable lessons from Bengaluru's success story and replicate its growth by investing in education, fostering public-private partnerships, and embracing policies that promote innovation and entrepreneurship. As Bengaluru continues to lead the way in technology and innovation, its stature as the Silicon Valley of India will only continue to grow. Also Read: Key Startups to look for in The Silicon Valley of India
<urn:uuid:fc4e3d2f-74a8-4a01-b790-17c9cbbb8d97>
CC-MAIN-2023-40
https://business2business.co.in/article/3745/how-bengaluru-became-the-silicon-valley-of-india-the-real-story
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508959.20/warc/CC-MAIN-20230925083430-20230925113430-00524.warc.gz
en
0.940178
912
2.828125
3
Federal Electoral Tribunal The Electoral Tribunal of the Federal Judiciary (Spanish: Tribunal Electoral del Poder Judicial de la Federación, or TEPJF) is a venue within the judiciary of Mexico that specialises in electoral matters. Among its functions are resolving disputes arising within federal elections and certifying the validity of those elections, including those of the President of the Republic. (Responsibility for declaring a candidate the winner in presidential elections previously fell on the Chamber of Deputies.) |Electoral Tribunal of the Federal Judiciary| Logo of the Electoral Tribunal |Established||22 August 1996| |Location||Mexico City, Mexico| |Composition method||Supreme Court nomination with Senate confirmation| |Authorized by||Constitution of Mexico| |Judge term length||9 years| |Number of positions||7| |Currently||Felipe Alfredo Fuentes Barrera| |Since||23 January 2019| |This article is part of a series on the| politics and government of It comprises a permanent seven-member Superior Chamber (Sala Superior), located in Mexico City, and five Regional Chambers (Salas Regionales), one in each of the circumscriptions into which the country is divided for purposes of organising congressional elections. These Regional Chambers comprise three judges each, and are temporary in nature, sitting only during those years in which federal elections are held, and are based in the cities of Guadalajara, Monterrey, Xalapa, Mexico City, and Toluca. The architect of the Federal Electoral Tribunal in Monterrey, was reputed Mexican architect Manuel De Santiago-de Borbón González Bravo, great-grandson of Queen Isabella II of Spain, whose lifetime architectural legacy to Mexico amounts to 11,000,000 built square meters nationwide, including many famous buildings and sites. There were two direct precursors of the TEPJF: - The Electoral Disputes Tribunal (Tribunal de lo Contencioso Electoral, TCE), an administrative (not judicial) body, that was in existence from 1986 to 1989. - The Federal Electoral Tribunal (Tribunal Federal Electoral, TRIFE), created by means of a series of constitutional amendments enacted in 1990, the same reforms whereby the Federal Electoral Institute was established. This tribunal was superseded by the current Electoral Tribunal of the Federal Judiciary in 1996. The TEPJF is frequently referred to in the media by the acronym of its predecessor, the TRIFE. The seven magistrates who currently sit in the Superior Chamber are: - Leonel Castillo González (president) - Eloy Fuentes Cerda - José Alejandro Luna Ramos - Alfonsina Berta Navarro Hidalgo - J. Fernando Ojesto Martínez Porcayo - J. de Jesús Orozco Henríquez - Mauro Miguel Reyes Zapata Notwithstanding Andrés Manuel López Obrador's claims in the streets and in the press, on 5 August 2006 the Federal Electoral Tribunal declared in a unanimous ruling that the Alliance for the Good of All had failed to file valid complaints that would substantiate a claim for a complete national recount. Based on the valid complaints filed, the Tribunal ordered and conducted a recount of the votes in 9.07% of the precincts. In the partial recount, the Tribunal found that no evidence of widespread fraud. It did, however, find errors in the tally sheets and, in rectifying those errors, it corrected the final election results by adding and subtracting from each candidate to accord with the number of valid ballots cast for each. (See "Acuerdo relacionado con la ejecución de diversas sentencias interlocutorias emitidas el cinco de agosto de dos mil seis" at .) Based on those results, on 5 September 2006 the Tribunal certified the PAN candidate Felipe Calderón as the lawfully elected next President of Mexico. (See "Dictamen relativo al cómputo final de la elección de Presidente de los Estados Unidos Mexicanos, declaración de validez de la elección y de presidente electo" at .) Under law as reformed in the 1990s by Congress (including representatives of both the PAN and the PRD), this legal ruling of the independent Federal Electoral Tribunal is final.
<urn:uuid:2f9cd4a0-6e3f-47f5-b46e-449c352c3604>
CC-MAIN-2020-29
https://worddisk.com/wiki/Federal_Electoral_Tribunal/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891884.11/warc/CC-MAIN-20200707080206-20200707110206-00526.warc.gz
en
0.878199
924
2.609375
3
Mary Ward is chiefly remembered as being the unfortunate victim of Ireland's first fatal road traffic incident, but in her lifetime she was a celebrated scientist and illustrator whose work had an enormous impact on our knowledge of the microscopic world. The early precursor of the internal combustion engine car was the steam-powered car, but they never became popular because the Victorians were terrified of them. Four years before her death, the Red Flag Act was passed which set a speed limit of four miles per hour (6 km/h). Moreover, the vehicle had to be accompanied by a man waving a red flag and walking at least 60 paces in front of the car. Such restrictions did not stop the Parsons family from Birr, Co Offaly from designing their own car. Unfortunately, as their vehicle rounded a bend in Birr on August 31st, 1869, Mrs Ward fell out and was crushed beneath the wheels. She was just 42. The 150th anniversary of that terrible event was remembered in the grounds of Birr Castle on Saturday, but the occasion was a celebration of her life and work as much as it was a remembrance of her death. She was blessed with the same spirit of scientific inquiry which compelled her first cousin, the third Earl of Rosse, William Parsons, to build the world's biggest telescope in the grounds of Birr Castle in the 1840s. Both she and William, as the Parsons family historian, Lady Alison Rosse, put it, had a form of "tunnel vision" eyesight which allowed them to see things others could not see. While William Parsons astounded the scientific world by publishing sketches of galaxies way beyond our own, most notably the Whirlpool galaxy, Mrs Ward operated at the other end of the natural spectrum. Born in Ballyfin outside Ferbane in Co Offaly in 1827, Mrs Ward's life was transformed at the age of 18 when she was given her first microscope, and one of the finest instruments for its time. Her first book on the microscopic world was published in 1858, one of three published in her lifetime. There were many many difficulties for women getting published in the Victorian era and her first book was not published under her own name, but that of “The Hon Mrs W”. Mrs Ward was a gifted illustrator and her books were reprinted at least eight times between 1858 and 1880. She had eight children, of whom six lived into adulthood and at the end of her book, The Microscope, she admitted that it was written not in the “delightful employment of abundant leisure, but, on the contrary, as a serious occupation, one amidst interruptions and under pressure of numerous home duties”. Her short first book, Sketches with the Microscope, has been reproduced with the support of Creative Ireland and Offaly History and with introductions by local historian Michael Byrne and botanist John Feehan. The book was written in the form of a letter to a friend Emily Filgate and Mrs Ward concludes that "the telescope and microscope teach us different things: but both taken together gives us truly vast ideas of the Creator's omnipotence". Her great-granddaughter Lalla Ward said she wondered if her great-grandmother would have felt less guilty about the time she spent on her books "if she could have known how her own descendent valued both her achievements and her very DNA". Speaking at the launch, Lady Rosse said Mrs Ward was a “hands-on mother” who, on once giving birth to a baby girl, wrote in her journal that she immediately needed to revise her paper for a forthcoming publication. Lady Rosse said it is hoped that Mrs Ward’s journal will be published at a later date. Sketches with the Microscope is available for €20 from the Offaly History bookshop on Bury Quay, Tullamore or online at offalyhistory.com/shop. Also available from Midland Books, Tullamore, and the gift shop at Birr Castle Gardens and Demesne birrcastle.com.
<urn:uuid:e76d35d5-a716-4552-a681-359e2fdda252>
CC-MAIN-2023-23
https://www.irishtimes.com/news/ireland/irish-news/pioneering-scientist-and-first-road-traffic-fatality-mary-ward-remembered-1.4004370
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652569.73/warc/CC-MAIN-20230606114156-20230606144156-00124.warc.gz
en
0.983647
847
2.796875
3
Social media is one of the most vital technologies companies can use to attract, connect with, and retain customers. If you want to meet customers where they are, that's the place to be. In this course, you'll learn why social media is such an important tool of persuasion for businesses. You’ll explore how companies use social media today as a key component of a persuasive communication strategy. You’ll also learn how to analyze your organization’s social media channels and marketing strategies to strengthen and maintain your relationship with your customers. Leveraging Social Media for Persuasive Communication - Leveraging Social Media for Persuasive Communication - identify factors that make social media desirable as an outlet for persuasive communications - recognize the importance of conducting an audit of your organization's social media channels before launching any new campaigns - identify your organization's current social media strategy as a baseline for understanding how to move it to a more effective level - identify tips and strategies to ensure your organization's online identity presents it in a positive manner - recognize social media tools that can be used in place of or to augment traditional marketing research strategies - identify some of the challenges and risks associated with using social media platforms as part of your organization's persuasive communication strategy - Knowledge Check: Your Social Media Landscape
<urn:uuid:09ba73e1-6cd7-476d-92ea-a32e56c6776a>
CC-MAIN-2020-29
https://niccs.us-cert.gov/training/search/skillsoft/leveraging-social-media-persuasive-communication
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129517.82/warc/CC-MAIN-20200712015556-20200712045556-00390.warc.gz
en
0.904936
266
2.765625
3
Resilience testing belongs to the category of “non-functional testing” and tests how an application behaves under stress. Due to increasing consumer demands, resilience testing is as important as never before. That’s why companies like Cisco are taking resilience testing very seriously, with 75% of all of Cisco’s applications tested for resilience as of mid-2016. What is software resilience testing? Software testing, in general, involves many different techniques and methodologies to test every aspect of the software regarding functionality, performance, and bugs. Resilience testing, in particular, is a crucial step in ensuring applications perform well in real-life conditions. It is part of the non-functional sector of software testing that also includes compliance testing, endurance testing, load testing, recovery testing and others. As the term indicates, resilience in software describes its ability to withstand stress and other challenging factors to continue performing its core functions and avoid loss of data. Or as defined by IBM: “Software solution resiliency refers to the ability of a solution to absorb the impact of a problem in one or more parts of a system, while continuing to provide an acceptable service level to the business.” Since you can never ensure a 100% rate of avoiding failure for software, you should provide functions for recovery from disruptions in your software. By implementing fail-safe capacities, it is possible to largely avoid data loss in case of crashes and to restore the application to the last working state before the crash with minimal impact on the user. One way of improving the resilience of software and solutions is by hosting them on cloud servers, thus minimizing the chance of failures to the internal system and choosing a much more resilient cloud architecture. While disruptions do occur on the cloud level as well, the cloud operators usually have sophisticated resilience and recovery systems in place. What are some examples of how software resilience testing is done? Resilience testing at Netflix A great example of how resilience testing can be done successfully on cloud level is Netflix and its so-called Simian Army. Even though all of the Netflix services are hosted on Amazon Web Services’ state of the art cloud servers with cutting edge hardware, the company realized that the sheer scale of their operations makes failures unavoidable. To prepare for these failures, Netflix developed their own tool to create random disruptions to the system and tested it for resilience. The tool was designed to simulate “unleashing a wild monkey with a weapon in your data center (or cloud region) to randomly shoot down instances and chew through cables ” and was aptly called Chaos Monkey. By identifying weaknesses in their systems, Netflix can then build automated recovery mechanisms to deal with them should they occur again in the future. The tool is run while Netflix continues to operate its services, although in a controlled environment and in ideal time frames. By only running Chaos Monkey during US business hours on weekdays, the company ensures that their engineers will have the maximum capacity for dealing with the disruptions and that server loads are minimal compared to peak consumer usage times. After early successes, Netflix quickly developed additional tools to test other kinds of failures and conditions. Among these tools were Latency Monkey, Conformity Monkey, Doctor Monkey and others, collectively known as the Netflix Simian Army. Resilience testing with the Simian Army has since become a popular approach for many companies, and in 2016 Netflix released Chaos Monkey 2.0 with improved UX and integration for Spinnaker. Resilience testing at IBM To get an idea of how companies react to different kinds of failures, we can look at how resilience testing is done at IBM. The team at IBM has identified two significant components of resiliency, the problem impact and the service level that is considered acceptable once the problem occurs. Ideally, any failure would have no impact at all on the consumer. Since that is impossible to achieve, IBM focuses on minimizing that impact as much as possible. If a machine that is hosting the system or one its components crashes, for instance, the requests on their way to that machine get redirected to another machine instantly and as transparently as possible to the users. A more dramatic event would be the failure of an entire data center, in which case “all the work that was being processed by that data center is continued by another data center – again as transparently as possible to the users, although in the event of a catastrophic outage you should be prepared for a significant impact.” The goal at IBM is to minimize the impact and duration of failures. For a machine failure, this duration is usually measured in minutes, while a failure in a data center could cause disruptions of several hours. To come up with meaningful resiliency test cases, IBM uses the solution operational model where all the components of the solution to the problems as well as their interactions are identified. They then look at solution non-functional requirements to create a list of requirements to the solution such as response time, throughput and availability. Wrapping it up. With consumer expectations increasing, it is vital to ensure minimal disruptions to any service or software that enters the market these days. While cloud hosting can go a long way in minimizing failures, resilience testing should still make up a significant part of overall software testing. There are many different approaches for resilience testing. Using chaos engineering and the Netflix Simian Army can help discover unusual problem sources and potential weaknesses in the system’s architecture. It requires capacities for controlled testing though, and for many companies, a more structured and theoretical approach like the one used by IBM makes sense.
<urn:uuid:06105ad7-c212-43b0-b212-e93a6226924b>
CC-MAIN-2017-39
https://usersnap.com/blog/resilience-testing/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688158.27/warc/CC-MAIN-20170922022225-20170922042225-00069.warc.gz
en
0.955961
1,137
2.515625
3
The work of Carolyn Rouse, a professor of anthropology and African American studies, takes a wide-ranging approach to studying inequality and social justice. She focuses her scholarship on medicine, religion, education and development. Her research has taken her into hospitals, mosques and homes in this country, as well as into village homes and government offices in Ghana. Photo: Brian Wilson Targeting inequality: Rouse aims for social justice in study of medicine, education Posted June 17, 2010; 12:00 p.m. When she teaches "Race and Medicine," Princeton professor Carolyn Rouse invites black students to leave class 10 minutes early. She explains that this time would be needed to make up for shorter life expectancy -- on average blacks live five to six years less than whites in the United States. Through this startling offer, typically not acted upon by her students, Rouse initiates a discussion about racial disparities in health care, a topic that is just one conduit to her core intellectual and personal interest: social inequality. A professor of anthropology and African American studies who has taught at Princeton since 2000, Rouse takes a wide-ranging approach to studying the production of inequality and why people accept the systems that uphold it. She focuses on four areas that undergird much of society: medicine, religion, education and development. Her research has taken her into hospitals, mosques and homes in this country, as well as into village homes and government offices in Ghana, where she is working to build a school. From studying health disorders to explore racial differences in how health care is provided, to addressing a range of social problems by founding a school in West Africa, Rouse is shining light on the scaffolding of society. Taking a close look at the structures of daily life allows Rouse to expose and challenge cultural assumptions that often reinforce inequality. She believes that it is too easy for people to close their eyes to the world immediately around them. "It would be like living in L.A. and not seeing the smog," said Rouse. "When you go to other countries you might ask, 'Why do they put up with this? Why are these people rich and those people poor?' But when you're in your own country you have all sorts of explanations for why Trenton is Trenton and Princeton is Princeton." Finding a language Rouse's engagement with issues of inequality and social justice emerged early on. "Conversations about inequality resonated with me having grown up as an African American and not having the language to explain inequality," she said. "The only language I was given was that blacks were inferior." Rejecting that language, Rouse adopted others. As an undergraduate at Swarthmore College she spent a semester in Kenya and discovered that she loved to "film and talk to people," passions that led first to filmmaking and then to graduate school in anthropology at the University of Southern California. "Talking to people" led to Rouse's first book, published in 2004, which uses the lens of religion to explore a cultural language new to her. In "Engaged Surrender: African American Women and Islam," she describes her fieldwork tracking the lives of several African American women in Los Angeles who felt empowered by becoming Muslim. Rouse then studied how health care is perceived and received across racial lines in the United States. In her book "Uncertain Suffering: Racial Health Care Disparities and Sickle Cell Disease," published in 2009, Rouse examines the delivery of health care services for a group of adolescent patients with sickle cell anemia, a lifelong blood disease that primarily affects blacks and is expensive to treat. Her focus was not on policy, but on institutional and cultural discourses that shape the ways disparities in health care occur and prevail. "My problem with the conversation about racial health care is that we have (these) conversations that are built on other conversations that are culturally constructed, for instance about genes and race," said Rouse. "I don't know how many times one has to say that the color of one's skin isn't determinant of one's genetic makeup." Central to her fieldwork, which included more than 400 interviews of patients along with their families and medical teams at two children's hospitals, was asking questions about pain and suffering in order to unearth cultural assumptions about race. "I went into this because somebody said that adolescent boys [with sickle cell disease] were being treated badly; that they were thought to be drug-seeking and malingering," said Rouse. Her research revealed that even if a patient did not have specific complaints about their individual treatment, staff at hospitals systematically understated a sickle cell patient's pain because they assumed that black patients, who also are often poor, had different ideas about suffering and were excessively looking for painkilling drugs. In "Unequal Suffering," Rouse writes: "Why does the black body continue to be treated as less capable of suffering and more capable of causing suffering?" "Carolyn has a wonderful ethnographic sensibility, and her book, 'Uncertain Suffering,' greatly helps us to understand the routine medical and social practices that perpetuate health disparities," said João Biehl, a professor of anthropology at Princeton whose own work focuses on medicine and culture. "She truly cares and is deeply committed to making a difference in scholarly and public debates on race and medicine in this country and beyond," added Biehl. For Rouse, the reality of illness too often is bundled into "narratives of suffering" that are used to promote a disease in order to garner attention and funding. "For people whose job it is to open up health care access for sickle cell patients, it is imperative for them to create a narrative about suffering that relieves the patient of responsibility for their pain," said Rouse. "It is only after the patient is no longer perceived as drug-seeking that responsibility for treatment and outcomes falls on the state." Rather than resort to such narratives, Rouse suggests that positive ways to address health care disparities, such as for patients with sickle cell disease, can grow out of community-based health programs that offer long-term disease education and social support. Such programs might be organized through settings such as churches and holistic health centers. For Rouse, social empowerment is a significant step toward social justice. AT LEFT: Rouse is founding a school in Oshiyie, Ghana, an endeavor that has involved Princeton students, including Ashley Schoettle, whose experience in Ghana inspired her to write a senior thesis this year on foreign aid and its limitations. MIDDLE: The school, shown being built, will open to 30 students in September. Rouse said she hopes the school will address some of the "asymmetries in knowledge and wealth" in the area by providing scholarships to the community's poorer children. AT RIGHT: Rouse (second from left, wearing backpack) tours Oshiyie, where she has been working since 2006 to learn about the community and establish the nonprofit school. (Photo: Brian Wilson; Satellite view of Oshiyie: Courtesy of Princeton's Digital Map and Geospatial Information Center; Ghana photos: Courtesy of Carolyn Rouse) Founding a school Rouse's interest in race and inequality has taken her into a subfield of anthropology known as applied anthropology. Since 2006 she has been working with the community of Oshiyie, Ghana, to build a school. She also is conducting research on land rights, chieftaincy and social inequality in Greater Accra. The school, Pan African Global Academy, will be the first high school in the immediate vicinity of Oshiyie, which is on the coast not far from Accra, Ghana's capital. It is scheduled to open this September with two teachers and 30 students. After the school is established, Rouse hopes to bring Princeton students on board to help with teaching. The project is being supported by the Princeton Environmental Institute through the Grand Challenges Program, which provides funding to faculty teaching and research initiatives that address problems associated with development, energy and health. "I'm actually having a good time, but it is the hardest project I've ever worked on," said Rouse. She has spent much of her academic leave this year grappling with matters such as providing building instructions for the school, learning about legal issues related to land use and solidifying a web of social relationships necessary to move the work forward. Rouse returned to Ghana this month to check on progress. "My goal was to have a project that was socially, economically and environmentally sustainable," Rouse said. Noting that it is "so easy to critique development," she explained that what she can offer as an anthropologist is "the reflexive piece." By working closely with the residents of Oshiyie and asking them about their vision for the community, she is able to assess the resources they have already. "There are a lot of Ghanaians who because of development think that what they have is inferior and that they have to throw it out," Rouse said. She emphasizes to the residents of Oshiyie that because their town is slated as a tourist destination, its natural beauty holds great value, even as hotels go up nearby. The school, registered as a nonprofit, will play an especially important role in Oshiyie, she noted. With a curriculum focusing on materials science, agriculture and engineering, it will foreground finding solutions to local problems, such as water scarcity, poor drainage, soil erosion and hunger. Rouse hopes that some of the "asymmetries in knowledge and wealth" in the area can begin to be addressed by providing scholarships to the community's poorer children. As the school grows, it will become necessary to charge full tuition for wealthy students in order for the school to be financially self-sustaining. Going forward, Rouse also expects that the school will play a role in enhancing the culture of Oshiyie, as well as supporting economic growth. Her plans include redesigning the marketplace in order to attract tourists and reduce waste. Included in these plans are building a cold storage facility and a museum with a café that will generate revenue for the school. The students will design and run the museum and café as part of their curriculum, and the storage facility will enable their parents, who mostly are fishermen, to freeze their catch to eliminate waste. "We are going to present a different model of development," Rouse said. Rouse has created opportunities for Princeton students to participate in the project. Next spring, she will teach a course, "The Anthropology of Development," that will include a studio component for designing the marketplace. Designs then will be shared with a Ghanaian architect who already has visited Princeton as part of planning for the project. After architectural review, Rouse will go over the designs with the chief of Oshiyie, with whom she has been consulting all along, about the best model to adopt. In addition, four Princeton students -- two undergraduates and two graduate students -- took the opportunity to visit Ghana with Rouse in the summer of 2008. Their experiences have significantly illuminated their own academic and professional pursuits. Ada Amobi, a member of the class of 2009 who majored in anthropology, will be studying medicine at Harvard University next year and possibly will return to Oshiyie to help Rouse develop particular aspects of the project. "Ada and I have discussed working together on the health curriculum for the school and conducting a study of wellness in Oshiyie," said Rouse. Ashley Schoettle, who took Rouse's "Race and Medicine" class two years ago, went to Ghana to pursue her own research into the use of mosquito nets to protect against malaria. She also accompanied Rouse on some of her interviews and planning meetings for the school. Schoettle, who graduated this month with an A.B. from the Woodrow Wilson School of Public and International Affairs and a certificate in global health and health policy, said it was invaluable to be guided by an anthropologist, especially when she realized that the villagers were not inclined to use the mosquito nets she had provided. "Professor Rouse helped me to realize how positive intent alone is not sufficient to make lasting change, but that all of the logistics, including cultural affinities and practices, need to be fully understood before implementing programs," said Schoettle. Building from this experience, she wrote her senior thesis on foreign aid and its limitations. For Amy Moran-Thomas, a doctoral candidate in anthropology, visiting Ghana with Rouse caused her to redefine her research. She now has expanded her study of how people deal with the guinea worm, a parasitic infection that is spread through contaminated water, to include other nutritionally related chronic diseases, particularly diabetes. For the sake of comparison, she also extended her fieldwork to Belize, where she currently is located. "The opportunity to study in Ghana with Professor Rouse was instrumental in helping me to better align my research framework with people's actual experiences of illness, and the meaning these concerns have in their everyday lives," Moran-Thomas said. Observing Rouse working on the school project was crucial for another Ph.D. candidate in anthropology, Gwen Gordon, who researched the shifting sands of land laws and rights in Ghana two years ago, and is now studying land rights among tribal populations of New Zealand. Paying close attention to the way Rouse worked in the community, Gordon said she especially learned from the "careful, observant way she moved in the world."
<urn:uuid:d61291d6-649c-4332-b8d3-229843a41a46>
CC-MAIN-2013-48
http://www.princeton.edu/main/news/archive/S27/61/28M92/index.xml?section=featured
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163055852/warc/CC-MAIN-20131204131735-00006-ip-10-33-133-15.ec2.internal.warc.gz
en
0.976782
2,736
2.8125
3
The 1920s ushered in a new sense of informality for the fashion world, but some occasions still warranted a considerable amount of formal attire. Women wore both knee-length and floor-length dresses, along with hats, jewelry, gloves and other accessories. Men wore long-tailed tuxedos throughout most of the decade, as well as top hats, gloves and ties. Women's Formal Clothing Flappers — trendy young women known for dating without chaperons and overall budding independence — popularized an easily accessible and affordable fashion, blurring the lines between high society "old money" and entrepreneurial "new money." Formal wear, as influenced by the flapper style, typically fell to the knee and exposed most of the arm, only covering the shoulder. These dresses, made of affordable materials like cotton, had halter style necklines and loosely defined waistlines. The most formal gowns still swept floor-length but also sported the loosely defined waist and halter neckline. Dressmakers used more refined materials for these dresses, including silk, lace and chiffon. Women's Formal Accessories Formal accessories included long necklaces made of pearls or other noticeable stones. Women wore black or white hose, and popular shoe styles included peep toes and one-strapped "Mary Janes." Evening bags were flat envelope styles. Gloves, when worn, went above the elbow. Other accessories, like furs, fans and scarves, varied. Headware accompanied most women's formal clothing. Women wrapped headdresses and headbands — adorned with jewels, feathers or medallions — around their heads or sported cloche hats (round, snug hats pulled down just above the eyes). Alternatively, they donned art deco combs. Men's Formal Clothing In general, men's fashion relaxed into informality during the 1920s, but styles for formal occasions hinted back at previous eras. In the earlier part of the decade, men preferred wearing tailcoats during the most important events, along with white waistcoats and ties. In the later 1920s, shorter tuxedos worn during the evening had rolled or notched collars, and most men preferred black, single-breasted styles. Matching black or dark blue straight legged pants remained popular throughout the entire decade. Men's Formal Accessories Two-toned shoes gained popularity during the 1920s, but black patent leather shoes remained most popular for formal evening wear, and both tone types demanded lace-up style shoes. Most men wore ties with their formal suits, but ties ranged in style from bow ties to long ties. Many men, but not all, wore gloves covering their hands during both formal and informal occasions. Men wore a range of hat styles during this decade, but the top hat remained the most popular for formal occasions, especially with the upper class.
<urn:uuid:abfa70ca-258b-47bd-84e4-8c3bca8424e8>
CC-MAIN-2017-30
http://www.ehow.com/info_7809375_formal-wear-1920s-fashion.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427429.9/warc/CC-MAIN-20170727042127-20170727062127-00609.warc.gz
en
0.949799
589
3.03125
3
In this world of dark hues and grim undertones, flowers are incredibly pleasing to the eye, but their presence in our lives goes way beyond the obvious. Flowers can instantly lift a spirit and brighten the darkest of days, they can do a body a spirit good, but they also have some not-so-positive qualities. Although flowers are gorgeous, you can’t overlook the effects of flowers on your health – good, bad or otherwise. Flowers have been known to boost emotional health Flowers are often used as a medium to show love and care to those who deserve it, because of the mood boost they give with their soothing scents and vivacious colors. They bring the much-needed brightness and serenity in the times of melancholy and chaos. Flowers may sharpen memory and concentration We all have studied the process of photosynthesis in elementary science, and we know that plants use carbon dioxide and release oxygen into the environment. Therefore, keeping plants and flowers close creates an oxygenated climate, which helps in boosting the brain cells and hence helps in sharpening memory and concentration. This is an era of multitasking, and with so many jobs simultaneously at hand, people often get lapses in memory and concentration. Therefore, flowers are a cheap supplement for your brain health. Watching our kids grow is soothing to the soul, as the process of growth in itself is extremely relaxing to witness. Many people love gardening to relieve their everyday stresses and enjoy a peaceful mind. The scent of flowers can make on feel very relaxed bringing home even a small pot of aromatic herbs like lavender can do wonders in resting a weary mind. Flowers can speed up the healing process Often doctors advise recuperating patients to visit lush green places because seeing the greenery in full bloom helps them heal faster. Keeping that in mind, when you visit a friend or family in the hospital, you might wan to bring flowers, as they could very well speed up the healing process. But please be aware that not all plants and flowers are good for you and there are some aspects of plants which can be quite troublesome. Flowers can cause allergies We all have to be extremely careful about this aspect of flowers because allergies are the 6th leading cause of chronic illnesses in the U.S. The most allergy-prone flowers include chrysanthemums, sunflowers, pigweed, chamomile, goldenrod, and daisies. Some people are allergic to specific plants. It’s probably not a bad idea for everyone in the family to see their doctor to find out if they are allergic to any flowers. If you want to have a close-up relationship with flowers, then it may not be a bad idea to opt for a florist course to get a better idea about the taxonomy of flowers. Some plants and flowers can be lethal if ingested Adults may be aware enough not to eat plants, but toddlers tend to put everything in their mouths. If you have toddlers in your home, be on the lookout for flowering plants that are lethal to consume. For that matter, keep an eye out for any live plant. You never know which ones might be toxic and it just isn’t worth taking the chance if you are unsure. Many plants are also toxic to pets so make sure you keep an eye out for them too. We have four indoor cats, and we don’t keep live plants in the house at all, just to be on the safe side. This time of year, Poinsettia plants are popular and people love to give them as gifts. Although I would love to be able to display one as the centerpiece on the kitchen table, I don’t dare, as they are extremely poisonous! Hopefully this post has helped you become a bit more aware about the the positive and negative effects of flowers on your health, and that hence forth, you will be able to make informed decisions about the kind of flowers in your life and home.
<urn:uuid:a07973c3-5f6c-4e80-a3e1-d4e7b45e42fc>
CC-MAIN-2020-16
https://eightymphmom.com/2019/12/the-effects-of-flowers-on-your-health.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521574.59/warc/CC-MAIN-20200404073139-20200404103139-00094.warc.gz
en
0.959243
824
2.6875
3
Traditionally, heat engines produce heat from the exchange between high-temperature and low-temperature baths. Now, imagine a heat engine that operates at quantum scale, and a system made up of an atom interacting with light (photons) confined in a reflective cavity of sub-atomic dimensions. This setup can either be at a high or low temperature, emulating the two baths found in conventional heat engines. Controlling the parameters influencing how such quantum heat engine models work could dramatically increase our power to manipulate the quantum states of the coupled atom-cavity, and accelerate our ability to process quantum information. In order for this to work, we have to find new ways of improving the efficiency of quantum heat engines. In a study published in EPJ D, Kai-Wei Sun and colleagues from Beihang University, Beijing, China, show methods for controlling the output power and efficiency of a quantum thermal engine based on the two-atom cavity. In the familiar heat engine model at macroscopic scale, referred to as the Carnot heat engine, the efficiency increases as a function of the ratio between the temperatures of the low-and high-temperature baths. By comparison, the efficiency of two-level quantum heat engines is related to the level of quantum entanglement in these two states, which are either at a low or a high temperature, and display the same probability of being occupied. The authors found that their heat engine model only yields high efficiency and output power when the number of photons involved is small; accordingly, its efficiency and power output rapidly decrease as the number of photons increases. This implies the need to reduce the number of photons to improve the efficiency of these engines, so that we can increase the quantum manipulation power and realise quantum information processing based on atom-cavity systems. More information: Kai-Wei Sun et al, A quantum heat engine based on Tavis-Cummings model, The European Physical Journal D (2017). DOI: 10.1140/epjd/e2017-80101-3 Provided by: Springer
<urn:uuid:3f7b012d-d0fb-487c-bb68-b650a9f21999>
CC-MAIN-2017-47
https://m.phys.org/news/2017-10-quantum-power-boost.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805362.48/warc/CC-MAIN-20171119042717-20171119062717-00059.warc.gz
en
0.901986
426
3.40625
3
A rural Manitoba woman was recently fined $10 for sending her two kids to daycare with a lunch that was deemed nutritionally unbalanced according to Canada’s Food Guide. The meal included roast beef, potatoes, carrots, an orange and milk. To comply with provincial rules, the daycare added Ritz crackers because a grain product was missing. The Food Guide recommends that Canadians eat specific amounts of vegetables and fruits; grain; milk products; and meat. There are some obvious problems with the Guide. It fails to recognize similarities across food groups, and the vast difference between different foods within the groups. One might substitute a grain with fruit, since fruits can contain as least as much dietary fiber as many grain products. On the other hand, rye bread is more nutritious than white bread, and spinach is more vitamin-rich than iceberg lettuce. Nutritional needs can also vary dramatically from one person to another because people have different body types. We have a responsibility to see that children are properly nourished. But the focus should be on basic food safety, and requiring food producers to do a good job of providing dietary information to consumers. I’m Roger Currie. Join us again next week for more thoughts on the Frontier. For more on nutrition, visit our website www.fcpp.org.
<urn:uuid:84448522-e643-4d00-a759-d22563961827>
CC-MAIN-2017-43
https://fcpp.org/2013/12/06/fining-a-mother-for-sending-an-unbalanced-lunch-shows-the-need-for-common-sense/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822116.0/warc/CC-MAIN-20171017144041-20171017164041-00471.warc.gz
en
0.95787
276
2.9375
3
Campbell, Douglas L. and Pyun, Ju Hyun (2011): The Diffusion of Development: Along Genetic or Geographic Lines? Download (462Kb) | Preview Why are some peoples still poor? Recent research suggests the possibility that some societies may be poor due to their genetic endowments, which are found to be a significant predictor of development even after controlling for an ostensibly exhaustive list of geographic and cultural variables. We find, by contrast, that the impact of genetics on living standards is not robust to the inclusion of basic controls for climatic similarity. |Item Type:||MPRA Paper| |Original Title:||The Diffusion of Development: Along Genetic or Geographic Lines?| |Keywords:||Genetics, Economic Development, Geography, Climatic Similarity| |Subjects:||O - Economic Development, Technological Change, and Growth > O1 - Economic Development O - Economic Development, Technological Change, and Growth > O3 - Technological Change; Research and Development; Intellectual Property Rights > O33 - Technological Change: Choices and Consequences; Diffusion Processes O - Economic Development, Technological Change, and Growth > O4 - Economic Growth and Aggregate Productivity > O40 - General |Depositing User:||Doug Campbell| |Date Deposited:||21. Dec 2011 15:26| |Last Modified:||15. Feb 2013 21:12| Angeles, Luis, 2011. Is there a Role For Genetics in Economic Development? Working paper. Cavalli-Sforza, Luigi L., Paolo Menozzi, and Alberto Piazza, 1994. The History and Geography of Human Genes. Princeton, NJ: Princeton University Press. Clark, Gregory, 2007. A Farewell to Alms. A Brief Economic History of the World. Princeton, NJ: Princeton University Press. Crosby, Alfred, 1972. The Columbian Exchange: Biological and Cultural Consequences of 1492. Westport, CT: Greenwood Publishing Company. Diamond, Jared, 1992. The Third Chimpanzee: The Evolution and Future of the Human Animal. New York, NY: Harper Collins. Gallup, John L., Andrew D. Mellinger, and Jeffrey D. Sachs, 1999. Geography and Economic Development. International Regional Science Review, 22 2, pp. 179-222. Giuliano, Paola, Antonio Spilimbergo, and Giovanni Tonon, 2006. Genetic, Cultural and Geographical Distances. unpublished, International Monetary Fund. Kamarck, Andrew, 1976. The Tropics and Economic Development: A Provocative Inquiry in the Poverty of Nations. Baltimore, MD: The Johns Hopkins Press. Spolaore, Enrico and Romain Wacziarg, 2009. The Diffusion of Development, Quarterly Journal of Economics. 124, pp. 469-529. Spolaore, Enrico and Romain Wacziarg, 2011. Long Term Barriers to the International Diffusion of Innovations. Working Paper. Available Versions of this Item The Diffusion of Development: Along Genetic or Geographic Lines? (deposited 04. Dec 2011 15:39) - The Diffusion of Development: Along Genetic or Geographic Lines? (deposited 21. Dec 2011 15:26) [Currently Displayed]
<urn:uuid:b698ccdc-7a37-4435-8bb0-25abdd06eb63>
CC-MAIN-2014-10
http://mpra.ub.uni-muenchen.de/35514/
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999670740/warc/CC-MAIN-20140305060750-00071-ip-10-183-142-35.ec2.internal.warc.gz
en
0.708563
709
2.640625
3
Rate of Return How it works (Example): Let's say John Doea lemonade stand. He invests $500 in the venture, and the lemonade stand makes about $10 a day, or about $3,000 a (he takes some days off). In its simplest form, John Doe's rate of return in one year is simply the profits as a percentage of the , or $3,000/$500 = 600%. There is one fundamental relationship you should be aware of when thinking about rates of return: the riskier the venture, the higher the expected rate of return. For example, investing in Treasury bills. One is backed by the full faith and of the United States government; the other is backed by your cousin's sofa. Accordingly, the risk that you'll lose your is much higher in the restaurant scenario, and to induce and reward you to make the investment, the anticipated returns have to be much higher than the 1% that the Treasury bill would pay. Inversely, the safer the investment, the lower the expected rate of return should be.in a restaurant is much riskier than Why it Matters: If only it were that simple. Rates of return often involve incorporating other , including the bites that and take out of profits, the length of time involved, and any additional an investor makes in the venture. If the is foreign, then changes in exchange rates also affect the rate of return. Compounded annual growth rate (CAGR) is a common rate of return measure that represents the annual growth rate of an investment for a specific period of time. The formula for CAGR is: CAGR = (EV/BV)1/n - 1 EV = The investment's ending value BV = The investment's beginning value n = Years For example, let's assume you invest $1,000 in the Company XYZ mutual fund, and over the next five years, the portfolio looks like this: Using this information and the formula above, we can calculate that the CAGR for the investment is: CAGR = ($5,000/$1,000)1/5 - 1 = .37972 = 37.97%
<urn:uuid:0bc11970-748c-4ee8-a013-d6ecf566e0cc>
CC-MAIN-2017-39
http://www.investinganswers.com/financial-dictionary/investing/rate-return-5875
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691476.47/warc/CC-MAIN-20170925111643-20170925131643-00396.warc.gz
en
0.950309
456
3.21875
3
You have likely heard people complain about both teen drivers and senior citizens. For example, one person brings up the teens’ lack of experience and all the risks they take, while another brings up senior citizens’ decreasing physical and mental abilities and the mistakes they make. You know that both of these arguments have some truth to them, but it makes you wonder: Which group are the more dangerous drivers? Is it the teens who just got their licenses or the senior citizens who may still be driving when it is no longer safe to do so? According to multiple studies, the answer is simple: Teens cause more accidents and are the greater risk. For instance, the Insurance Institute for Highway Safety (IIHS) claimed that those between the ages of 16 and 19 crash three times as often as those who are more than 20 years old. It is clear that those first years, when young drivers are building up a base of driving experience, really pose a risk. In another study, the United States Census Bureau (USCB) claimed that 7.5 percent of car crashes happen when someone who is over 65 years old is at fault. Comparatively, they put the blame for 12.2 percent of crashes on teen drivers. Again, this shows that it is teens who are the bigger risk to themselves and other drivers on the road around them. That’s not to say that anyone, at any age, cannot cause an accident. There are always risks. If you get hit by a reckless or negligent driver and suffer serious injuries, you need to know what rights you have to financial compensation.
<urn:uuid:cb13ebfd-c3fc-4728-873d-6e46e262fafc>
CC-MAIN-2020-34
https://www.waldenblairlaw.com/teens-and-seniors-who-is-responsible-for-more-car-crashes/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735812.88/warc/CC-MAIN-20200803140840-20200803170840-00264.warc.gz
en
0.963395
326
2.640625
3
Dr. Philip E. Nelson, a Purdue University food scientist, is the winner of the $250,000 World Food Prize for 2007. The announcement, made June 18 at noon in Washington, D.C., cites Nelson's innovative breakthrough technologies which have revolutionized the food industry, particularly in the area of large-scale storage and transportation of fresh fruit and vegetables using bulk aseptic food processing. Nelson was announced as the 2007 Laureate by Ambassador Kenneth M. Quinn, President of the World Food Prize Foundation, which is headquartered in Des Moines, Iowa. Quinn made the announcement at a ceremony at the U.S. State Department in the nation's capital. The ceremony was presided over by Acting United States Undersecretary of State for Economic, Business and Agricultural Affairs Daniel Sullivan. Also participating in the announcement ceremony was Dr. Norman Borlaug, chairman of the World Food Prize selection committee. Borlaug is a former winner of the Nobel Peace Prize for his work in advancing the Green Revolution, helping to feed starving people around the world. In making the announcement, Ambassador Quinn stated that Dr. Nelson's food science research has significantly reduced post-harvest waste and spoilage and greatly increased the availability and accessibility of nutritious food worldwide, particularly in emergency situations. Research helped preserve food better "Dr. Nelson's pioneering work, which began with tomatoes and later included a variety of seasonal crops, has made it possible to produce ultra-large scale quantities of high quality food," says Quinn. "This food can then be stored for long periods of time and transported to all corners of the world without losing nutritional value or taste." Nelson's research led to the discovery of methods and equipment to preserve perishable food at ambient temperatures in very large carbon steel tanks (beginning with 100 gallon tanks and increasing in capacity to 500,000 gallons). By coating the tanks with epoxy resin and sterilizing the valves and filters, food products were able to be stored and removed without reintroducing contaminants. As a result, enormous quantities of pathogen-free food could be distributed to plants around the world for final processing and packaging. Later partnering with the Scholle Corporation, Nelson developed a low-cost aseptic "bag-in-box" system for preserving and shipping foods. By the 1980's, this technology had spread throughout the global food industry. Working with another company, Fran Rica Manufacturing (now part of FMC), he engineered a variation of the bag sealing fitment as a membrane, which ruptures during the fill and then reseals with a sterilized foil cap. This is now the standard technology used for processing and packaging of aseptically processed foods worldwide. 2007 award to be presented Oct. 18 In the developing world, these technologies have made it affordable and convenient to transport and deliver a variety of safe food products without need for refrigeration, averting loss due to spoilage. Citrosuco, a leading orange juice producer based in Brazil, has used the technology developed by Nelson to ship up to eight million gallons of orange juice to the United States and Europe. The technology has also been applied to bring potable water and emergency food aid to survivors of the 2004 tsunami in Southeast Asia and the victims of Hurricane Katrina in 2005, as well as to other crisis situations worldwide. Nelson has been involved in the storage and packaging of food since childhood. He spent his early years working on his family's tomato farm and canning factory in Morristown, Indiana and once earned the crown of "Tomato King" at the Indiana State Fair. The 2007 World Food Prize will be formally presented to Nelson at a ceremony at the Iowa State Capitol on October 18, 2007. The ceremony in Des Moines will be held as part of the World Food Prize's Norman E. Borlaug International Symposium, which this year focuses on "Biofuels and Biofood: The Global Challenges of Emerging Technologies." Further information about the Laureate Award Ceremony and Symposium can be found at www.worldfoodprize.org.
<urn:uuid:744d8b8d-5bf6-495d-9efe-e5048c7f30ba>
CC-MAIN-2013-20
http://farmprogress.com/story-american-agricultural-scientist-wins-2007-world-food-prize-0-12328
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697772439/warc/CC-MAIN-20130516094932-00096-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956814
825
2.640625
3
A Rim Piece of a Decorated Ceramic Pot This week´s discovery is a rim piece that belonged to a ceramic pot dating back to the turn of the 16th century. The pot was made using a potter´s wheel and, on its rim, there was wavy embossed decoration. The dark color was accomplished by firing the pot under low-oxygen conditions so that the clay would not properly turn into red. Also the soot and smoke which occur in the firing of ceramics have also made the color darker. This ceramic piece is extraordinary because of the lead glaze on its inner surface - usually, the pots darkened by firing were not glazed. This pot is probably made somewhere in an experimental pottery in the area of the recent Western Baltic Coast, Poland or the Northeastern Germany. The pot is not of the type of ceramics that was usually exported. Probably, it has arrived in Turku in some other way, maybe brought here by an occasional traveller.
<urn:uuid:903c04af-ad35-4b19-b208-8d6dae4ca5e2>
CC-MAIN-2020-16
https://www.aboavetusarsnova.fi/en/news/discovery-of-the-week-week-24
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506121.24/warc/CC-MAIN-20200401192839-20200401222839-00510.warc.gz
en
0.984135
206
3.09375
3
This page is about: a Ginkgo from seed|Emails The Ginkgo is a gymnosperm, meaning "naked seed", because the seed is not enclosed in a ripened fruit as in flowering plants (angiosperms), but is protected by cones or a fleshy seed coat. Its propagation is unique. Pollination and the development of the sexual phase occur in the first year (April to September in the northern hemisphere). Research indicates that the embryo is well-developed at the time of dispersal and that the seed coat only contributes to winter dormancy. After shedding of the seeds the embryo carries on developing according to external temperature: the higher the temperature, the faster the development. The Ginkgo is (like some conifers and cycads) dioecious, each spring pollen and ovules are produced on separate trees on the short branches among the bases of the young leaves, for the first time after 20-35 years. Occasionally both genders are found on the same tree. It's a dicot. The female tree must be growing in the presence of a male tree to be fertilized. Ginkgo and the cycads are the only living seed-producing plants (spermatophytes) that have motile or free swimming sperm (more info here). The Ginkgo has a unique place because it is the sole living link between the lower and higher plants, between ferns and conifers. This was discovered on September 9, 1896 by Sakugoro Hirase. He found swimming sperms in the seeds of a female tree in the Botanical garden Todaifuzoku in Tokyo. Read more about Hirase on my History-page. The yellow pollen cones (3-6 on a shoot) on the male tree are hanging looking like catkins, each about 1.2-2.2 cm. On the main axis numerous appendages are attached. The pollen grains are boat-shaped with widely gaping slit. Each bears mostly two pollen sacs (microsporangia) at the tip containing the sperm cells. The ovules on the female tree rise from a collar at the base and grow at the tips of straight stalks that bear two (rather often three or more) ovules, each 2.5-3.5 x 1.6-2.2 cm. videos female ovules ovules in April ovules in June Sometimes the seeds and pollen grow on leaves without stalkes (oha-tsuki = 'attached to leaves' in Japanese), mostly on older trees. These trees also have 'normal' seeds/pollen growing. They are often designated as 'living national treasures' in Japan because of their rarity and specialness (photos here and on my Tree-page). There is an abundance of seeds on one tree. Pollen on Ginkgo. |An ovule consists of one integument (the future seed coat) that surrounds a tissue called the nucellus. In this nucellus four megaspore cells are formed. At this time the pollens are released from the pollen sacs of male trees (April-May), they are carried by the wind to the female trees (distance unknown) and land upon a pollination droplet, which is present on the micropyle at the tip of the integument.The drop retracts in the tiny opening and brings the pollen grains into a pollen chamber in the nucellus, where they develop into much branched pollen tubes (gametophytes). One of the cells in the ovule then enlarges, free nuclear divisions follow, cell walls begin to form after that and then two bundles extend throughout the innermost region of the integument, consisting of neck cells and a large egg cell. In the meantime a column of female gametophyte tissue - known as the "tent pole" - elevates between two archegonia and extends towards the pollen chamber.| Video : ovules and spermatozoid of Ginkgo biloba |During the months following pollination, the pollen grows big enough to form two motile sperms in the pollen chamber. Sakugoro Hirase observed swimming sperm (motile spermatozoids) for the first time in the seeds of a female Ginkgo tree growing in the Botanical Garden of the University of Tokyo in Japan in 1896. The basal end of a male gametophyte is suspended in a cavity above the female gematophyte (called the fertilization This female gametophyte in the ovule is then green-coloured, filled with starch grains and is unique among seed plants in containing chlorophyll and photosynthesizes. In the pollen tubes the sperm cell of a male gametophyte divides, producing two sperms, each having thousands of flagellae. The actual fertilization takes place in fall. The pollen chamber and the space around the tentpole unite into a bigger archegonial chamber filled with fluid. The sperms and the contents of the pollen tubes are then released by a rupture of the basal end of the gametophyte (because of its swelling) and swim upwards (the micropyle faces downwards in fall!) into the fertilization chamber filled with fluid (an inner sea). The sperms swim shortly in the liquid and then one of them fuses with the egg nucleus. Click here for schemes, photos and videos of the ovule development. The sperm of the Ginkgo has many similarities with that of the Cycad. Begin September the ovules are still green-coloured. Shortly after fertilization the growth of the embryo begins, the ovules enlarge tremendously looking like plumlike seeds about 2.5 cm (1 inch) long and this continues after the seeds fall to the ground. The actual fertilization most likely occurs on the tree between 130 and 140 days after pollination.. The embryo grows into the nutritive tissue of the female fertilization chamber (gametophyte). There are 2 cotyledons. click on picture to enlarge The seeds fall off the parent tree in fall after the leaves. They are relatively large in comparison to the seeds of most other trees (esp. conifers). A seed at maturity consists of an embryo = endotesta (sometimes 2 or more), nutritive tissue and the seed coat, which is made up of a hard inner layer (sclerotesta with 1 sometimes 3 ribs) and a fleshy, yellow to orange-coloured outer layer = sarcotesta (5-6 mm thick). This outer layer becomes mottled, purplish green and rancid smelling when ripe. Because of the presence of butyric acid, the fleshy layer produces an odour similar to rancid butter upon decay. Its tissues may cause nausea or skin eruptions (dermatitis) in man. The inner tissues are palatable (gametophyte and embryo). The seed coat also contains small amounts of urushiol, an allergen that only on contact with the skin is responsible for poison oak and poison ivy contact dermatitis in sensitive people so when gathering the ripe fruits wear rubber gloves. Squeeze out the seeds in a bucket of water, wash them thoroughly and then dry them. After that they look like a large unsplit pistachio nut. (female trees seeds: more info here). Ginkgo trees can also reproduce asexually: read the section about the chichi on my Tree-page about this. The Ginkgo can also be propagated by cuttings (best way to be sure of the sex). Take young or half-ripe wood about 15 cm long during May-July. Put these in a frame and keep moist. They usually start growing best in their second year. You may also take cuttings of mature wood of the current year's growth. Shoots about 15-30 cm long are taken in December and placed in a frame. They should root in the spring. More information about treating the cuttings via the propagation-links on my Links-page. Grafting: Grafting is often used by nurseries to grow new Ginkgos. Also branches of male trees are grafted onto female trees in order to fertilize them or visa versa; the female trees often produce very good seeds. Vegetatively propagated Ginkgos seldom have a dominant central leader, because a lateral branch (rooted or grafted) will continue growing in the direction it had when still attached on the parent trunk. Therefore nurseries stimulate the production of vertical shoots by cutting back the trees. |The Ginkgo is dioecious, male and female trees are apart. Male/female seed sex ratio 1:1. The sex chromosomes (XX females and XY males, just like humans) are difficult to distinguish, so the tree's gender is not easily classified. Mostly the only way to know the sex of the Ginkgo tree is to wait until the plants bloom. The DNA-sequence data for the Ginkgo is known however. Occasionally both genders are found on the same tree. Many trees at nurseries are grafted male trees (more info here). Buds are removed from male trees and grafted onto the rootstock of a seedling ginkgo, eventually becoming the top growth. The tree's gender is not easily classified so some say it can be seen by the deepness of the cleft in the leaves (female trees are said to have less deeper incised leaves). Others say a young tree's gender can be seen on female trees which flower 2-3 weeks later than male trees and the female leaves fall later in fall. For instance the old Ginkgo in Utrecht is male and the leaves of the female branch turn yellow later in the season than those of the male tree where the branch is grafted upon (click on photo left for enlargement to see this female branch in fall). Also the female tree tends to have almost horizontal branches. In Chinese literature it is said that seeds marked with two ribs produce female trees and those with three ribs male (although these are more rare). Also the seeds should be sown in such a way that they face each other and those with three ribs should be grown along a waterside... please visit my YouTube channel with many videos. The seedcoat delays germination and attracts animal dispersers once the seeds fall off the tree. In the digestive system of the disperser the seedcoat is removed and the seeds are taken away from the parent tree. Jeholornis prima, a long-tailed, seed-eating bird, Cretaceous, China. picture: Chinese Academy of Sciences, Beijing |The scarified seeds are then deposited in droppings, ready for immediate germination (time of germination depending on the climate). Dispersers in the times of the dinosaurs could have been the dinosaurs (probably carrion feeding scavengers), mammals and possibly birds. In the Paleogene two families of primitive Carnivora, the Viverravidae and the Miacidae are potential Ginkgo dispersers. They were relatively small, from the size of a weasel to that of a small cat. Nowadays different mammals feed on and probably disperse the seeds: the red-bellied squirrel (Callosciurus flavimanus var. ningpoensis) on Tianmu Mountain and the gray squirrel (Sciurus carolinensis) in eastern North America. Also the possum according to an emailer in Australia. Also carnivores like the masked palm civet (Paguma larvata) in Zhejiang Province, the leopard cat (Felis bengalensis) in Hubei province, China and the raccoon dog ("hondo-tanuki" = Nyctereutes procyonoides) in Japan. These carnivores eat whole seeds and deposit intact nuts in their droppings, so maybe the smell of the seedcoat attracts these animals because it resembles the smell of rotting flesh. Other dispersers are possibly birds, for instance crows, and mice. This dispersal allows the distribution of the species and transport to some place where there may be less competition for light or other resources. A cache of seeds was found in a tree crotch about 50 m from the nearest source of the seeds, apparently done by birds. In North America seeds without the fleshy outer coat were found beneath various species of trees up to 150 m from the nearest seed-producing Ginkgo. Growing a Ginkgo from seed fall gather the seeds (wear latex gloves). Remove the fleshy coating (gloves!) by placing the seeds in a jar of warm water, crush the coat and squeeze the seed out with your fingers. Watch video (select HD-quality) below: ||Then rinse the seeds a few times (they must be really very clean!) and let them dry well. Keep them (preferably in slightly moistened sphagnum moss or in a mixture of moist peat and sand -80/20-) in a locked bag or container in the bottom vegetable crisper compartment of your fridge or in a cool, dry place until you plant them. Seeds can also be bought from seed companies, on the internet, nurseries etc. Try to buy from a reputable firm which sells good quality seeds. Although this is not strictly necessary research has proven that germination is better if the seeds experience some cold temperature for 2 months. Chip the seeds with a sharp knife or make a few swipes with a sharp edged file or use sandpaper to allow moisture being more readily absorbed (imitating the stomach of seed dispersers like the dinosaurs were). Then soak the seeds in cold or lukewarm water for about 24 hours to soften the coat. Seeds that remain floating will most likely not germinate so you can throw them away. Then put the remaining non-floating seeds into a 10% bleach solution (water/bleach 9:1) for about 10 minutes to protect against fungus, rinse well 2 times after that. Dry them briefly between paper towels. After my own research attempts I ended up with these possible stratification methods: 3-5 seeds in 3 times the amount of moist sterile sand (1 part water + 4 parts of sand) or moistened kitchen towels or slightly dampened vermiculite (or perlite) moist peat. Moist means no dripping when squeezing a handful or with kitchen towels no dripping when holding at one corner. Moistening can also be combined with spraying with a fungicide. Vermiculite is sterile, inexpensive and for sale in garden Put this in a little container or small sealed polythene bag in the fridge (+ 50C). If you use kitchen towels place the seeds on one half, cover with the other half, put in matching thin polythene bag and close it. Mold growing on the towel is no problem, just get a new towel. Check twice a week for fungus and germination and turn them over. Germination time is 30-60 days, so start about 2 months before your spring begins with stratification. More videos I made of Ginkgo seeds / pollen: click here. If you don't want to stratify the procedure is the same, but then put the closed container or bag in a light spot at room temperature (70-750F/21-240C). Put in pots when a few leaves have grown. |Sand method recommended by me: I got 90% germination after 2-3 weeks with good quality clean seeds at room temperature in little container after storing them for a few months in the fridge and scarification after that; only slightly covered with Seed germination after 3 weeks from start: left sand-method/right kitchtentowel-method. Also watch video click here for more seed development photos Video: seedlings of 10 days old Video: the same seedlings 18 days old After stratification move 3-5 seeds into 4-6" pots. The pots must be clean and have at least one drainage hole and best is pots with ribs or slits to get better rootforming. Use fresh soaked sandy potting soil (40% sand with some grit or perlite) (you may spray a fungicide again). Best is sandy loam that drains well. Sowing depth about 0,6"=1,5 cm. Cover lightly with sand. Don't compact, just tap the soil. Put in a cold frame or indoors in a light place, not full sun. Mist daily, water only when necessary. Keep the soil moist, not wet. After germination never let the roots dry out or stand in water. Take care of good air circulation. When the seedlings have grown enough put them outside (transplant in autumn into individual pots) in a shadowy position and fertilize (organic). Put in permanent position after about 2 years. You may leave your Ginkgo permanently in a pot and treat it more or less like a bonsai. Then you can grow a Ginkgo even on your balcony! More about Ginkgo as a bonsai on In fall sow preferably in a cold frame or unheated greenhouse. Put seeds 2-3" deep and cover with 2 inches of mulch or straw (in autumn), remove this in spring. Then cover the seeds lightly with sand, mulch etc. Best sowing time is March-May when there's longer daylight. Misting is better than watering. Watch out for squirrels, mice etc. Don't sow in the height of summer. Ginkgo seeds have an irregular germination. Low temperatures (between 2 and 10°C) following fertilization hinder embryo development and delay the germination of outdoor-sown seed until the following spring or summer. The length of time between pollination and germination under field conditions can vary between 12 and 14 months, depending on local weather conditions. Ginkgo seedling in garden From an emailer in Japan I got this idea: to get uniform germination bury the seeds 30 cm in autumn, dig them out in spring and sow them. More information about planting can be read on my page about the tree. Please email me your sowing results and ideas! Below you can read some reactions of readers. please visit my YouTube channel with many videos. |The Ginkgo is listed in the IUCN Red List of Endangered Plants. Although it is cultivated and planted by humans, it is endangered, and at risk for loss of biodiversity because of propagation by cuttings rather than by seed, due to human preference for male trees.| is the first year I've really cleaned seeds (250+). The smell wasn't as bad as expected, but still bad enough. However, I cleaned the seeds in Sodium Carbonate or washing soda 2 table spoons/1gal water (60ml/4L). Which wipe out about 90% of the smell. I figure that since the smell is caused by acids why not just nutralize the acid with a base and get rid of the smell. It seemed to work. Also, Sodium Bicarbonate which is baking soda should work as well. It's a little weaker though and maybe you should double the rate. I should also note that both of these chemicals are both fungices and very safe to use. You can eat baking soda. My procedure for cleaning is listed below. 1. place everything in a large bucket with washing soda mixture. 2. remove seeds from pulp with hands and place seeds in 8 " plastic flower pot (dump pulp in a safe area). 3. Rince seeds under running water for about 5 minute swirling the seeds around to remove the rest of the pulp. 4. 5 minute dip in fresh washing soda mixture. My method with most all tree seeds is to keep them in the kitchen refrigerator in a plastic bag of moist sphagnum moss over the winter. That worked well with Ginkgo seeds. By spring, some of them were already germinating in the bag. I use peat/perlite mix: take the peat and put it in a container, then pour boiling water over it. This will get the peat to absorb water and it will kill any fungus spores present. Add the water slowly as to not overwet the mix. Then, once it is cool enough to mix, add perlite. I usually go for a 1:1 mix. You could just as easily go 2:1. Mix it up, and take a handful, make sure you don't get water dripping down your arm when you hold it. Take a couple handfulls, put them in a ziplock bag, add 3-5 seeds, seal, shake it a bit so the seeds are in the mix. Within a week or 2, the first seedlings will appear. Pot them up as soon as possible, and then reseal the bag and wait for more. Always has worked well for me. I collected some seeds and started growing them about 3-4 months back. After carefully reading Cor's directions of course! For a little more than a month, the seeds did nothing. Nothing happened. I thought I had killed them all even though I followed the directions. One day, I woke up and found one little seed have cracked and a tiny root was sticking out! That was so exciting! Since that first seed sprouted, quite a few have followed. That first seedling is about 10 centimeters tall now. And I have 13 more that are growing up everyday. My dream is to plant a Ginkgo forest. About 100 Ginkgo seeds were planted in milk cartoons in the Ottawa area, Canada, outside under a protective screen of chicken wire. I watered these regularly and 90-95% have germinated. (source: Truscott). I soak the seeds 2-3 days in water and then put them in a tray on a layer of sand. Then I cover them lightly with sand. I put the tray on a warm and light spot. I check the sand each day and if necessary moisten it again. I live near Merano, Italy, and collect seeds in January, this way saving the stratification. After washing away the smelly flesh, I soak them in water for 4 days (in the house, about 20°). Afterwards I plant them in pots on the windowsill. The windowsill is at a window facing the east. After 6 weeks 90% have grown. Many of my college texts have the leaves pressed between the pages. It seems like they all fell off the trees overnight and I simply HAD to pick up the ones that caught my eye! I have always been fascinated with the Ginkgo and have even grown one from seed when I was living in California. I haven't had much luck sprouting a seed here in Colorado but will continue to try. I think Ginkgo's are probably the best looking ornamental tree on the planet !!! Although growing up as children, we played and danced in the carpet of yellow leaves each autumn, and spent many a day and night keeping cool under it through many hot summers, it has been only in the last 10 years we actually discovered what a treasure we had in our small suburban backyard. We only found out its name 10 yrs ago when a friend of mine , who was of Chinese descent spotted the fruit and asked to collect them for cooking, from there we asked someone from an institute to view our Ginkgo who informed us it was well over 50 yrs old and happily took away seeds and seedlings my mother had collected. I have a female tree in my yard and the first fall after buying my house a man came and asked if he could pick up the seeds. Not knowing what kind of tree it was I said yes. He now comes every year and is most grateful for the seeds as they are fertile ( male tree down the ally). I asked him what he does with the seeds and it turns out he grows seedlings and sells them in his nursery! I'm very happy that I can be a part of sharing this tree with the rest of the region. My tree must have hundreds of "children" around the area! After reading your site I'm going to try to grow a few myself. This year ( 2000) has a bumper crop of seeds!! I have been fascinated by Ginkgos for over 30 years and have had a tree about that long.. Several years ago it produced seeds and now happily I have a number of seedlings. All my friends and relatives beg for a seedling. No seeds last year though. I'm hoping this year will be different. Love Ginkgos!!!!! treasure. We have just recently purchased a Ginkgo Tree. The circumstances were very strange. When my father was in Japan (WWII) he fell in love with the tree, and during my youth he mentioned it several times. Well as times went by, my father passed. This year, and believe it or not, on Father's Day I took my mother shopping and we stopped at a small garden/lawn store. As we entered, right in front of us was a small ( maybe 1 1/2 years old) Ginkgo Tree. Needless to say we took it home and as of today it is doing very well. have not decided if all of this work is worth it, as my family thinks I have gone nuts! They think I should just let the squirrels eat the fruits and nuts or just compost all of them. I really hate to have it all go to waste as I feel fortunate to have this living fossil in my yard. Ginkgo seedlings in their first year In Mexico city they grow in Chapultepec park, there are 24 ginkgoes aprox., and get fruit every year. In rainy years they produce lots of fruits, in dry years less. Come early fall you can see the Chinese women with their hooks, benches, and gloves collecting them off the ground in the Garden. My students (6th graders) are doing a project on the gingkos and they are scouting around their neighborhood's for more sightings. And also, as it turns out there are about 8 trees 2 blocks away from my home. One morning I noticed an Asian lady shaking the "seeds" from the tree so I went home and got a jar and gloves to collected some to show my students. And I have directed my students to your website for information. is a small slim Ginkgo Tree at the entrance to the Park..Carl Schulz Park..home of Gracie Mansion, New York. Not very tall..but elegant and slender. It roots below and to the right of the street sign 86th Street and East It stands alone in its simplicity. Eight feet if we're lucky. She's doing fine....as I noticed her high branches..were bare. But the others...ahhh, the others filled lush with full fans of dark green ginkgo leaves. I can almost wrap my hand around her singular trunk, so slender. She seems to have be punned twice..long ago. Such was her beauty I wanted just one leave for myself..but I dared not disturb her. Lucky for me..as I was walking home..I looked down..and there on the street... one perfect ...small leaf!! Ahhhhh the joy of it! New York, at the intersection of "East" 86th Street, she would be ..located: south east. First tree, on the line of trees..planted in the pavement before entering the park...surrounded by cobble stones. My mom gave me a "twig" about 5 years ago and said it was a Gingko tree. I planted it in my backyard, not really serious about it growing-I have 2 big dogs... They chewed on it , dug it up a few times and so on. I didn't have the heart to just get rid of it, because my mom had passed away 3 years ago, and it was a special reminder of her. (She loved gingkos.) Well, that tree has really earned its spot in the yard !! It's now about 10-12 feet tall !!! The leaves are beautiful. It has thrived. The dogs no longer bother it. would just like to add my method germinating seeds. I don't have a 100% germination rate but I do have a 100% survival rate of the trees that do germinate. I have two supposedly male ginkgo trees, but several branches on the top of the crown of both trees seem to produce seeds every year. I take these seedlings when they fall from the tree and place them in the bucket outside on some soft earth under a pile of leaves. These trees are located in the moist temperate regions of New York State, near Mattituck, Long Island. The soil is rich and loamy with quite a bit of sand in it and has good drainage. After remaining under the leaves for about five or six weeks the small seeds still have fruit on them, which is shriveled and dried. Next, I take these seeds as is and place them in some of the rich sandy soil in another bucket at a depth of about 2 inches. The seeds are then left outside and undisturbed in a sunny location to winter and for nature to take it's course. Where I live in zone 6b, germination takes place in early July, with the seeds reaching about 1 foot tall at the end of growing season in November. The germination rate is about 60%. In my opinion only the strongest of seedlings can break through the the tough seed shell, which is equivalent to the survival of the fittest for this beautiful tree. So far, these little fighters have survived periods of neglect when I was traveling for my job, as well as two hurricanes, Sandy and Irene. The trees have never been staked, yet they grow straight and true, and already they possess the lovely form of their parents in miniature. When these seedlings reached 3 years old and about 33 inches , they were planted in their own sunny permanent location in my yard. Interestingly, even tho these seeds were planted together in a large container, each little tree retained its own mass of roots, which did not grow into the roots of its neighbors. The trees are in the ground now for a couple of weeks, with no sign of shock from the transplantation. The only thing I do notice is that the leaves are changing to a richer shade of green, and the trees seem to be growing. I'm far from an expert, but this method seems to work for me. Read more reactions of readers in my forum: follow me on Twitter HOME - INDEX © Cor Kwant
<urn:uuid:0d8bdc80-36f5-47b2-b102-35495082782f>
CC-MAIN-2014-15
http://kwanten.home.xs4all.nl/propagation.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609523429.20/warc/CC-MAIN-20140416005203-00280-ip-10-147-4-33.ec2.internal.warc.gz
en
0.951225
6,502
3.71875
4
Adult patients with inherited metabolic disease tend to fall into one of two groups; 1) those who presented in childhood and have been successfully managed by paediatric services and then transferred to the adult clinic; and 2) those who present for the first time in adulthood. As patients diagnosed in childhood grow older, the emphasis shifts from their growth and development to dealing with long-term complications and living with a chronic condition. For those patients who first present in adulthood, diagnosis may be delayed as awareness of metabolic disease is generally not as high among general adult physicians as among paediatricians. Management is focused on preventing progression of disease and/or acute metabolic decompensation, with an overall aim of helping an adult to achieve their potential, play a full role in society and raise a family of their own if they wish. Transition of a young person from paediatric to adult services should begin early to prepare a teenager (and their family) for the move to adult services. Encouraging independence and self-confidence is important to allow young people to deal with potentially complex issues such as a modified diet, multiple medications, physical and/or learning disability, fertility and heredity issues. Specialist centres have a role in monitoring and managing the long-term complications specific to adult patients and supporting patients, parents and carers in accessing appropriate services as required (eg. community adult learning disability teams, patient support groups, advocacy services, respite care, adult educational services etc). Patients surviving into adulthood may wish to have children of their own. Issues of fertility (eg. galactosemia), prenatal/preimplantation diagnosis, teratogenicity (eg. PKU), potential metabolic decompensation (eg. urea cycle defects) and energy requirements during labour and delivery thus need to be addressed. Training of doctors/nurses/dietitians specialising in inherited metabolic disease in the adult patient is currently limited in many countries, and in many cases care continues to be provided well into adulthood by paediatricians. This is slowly beginning to change as a number of countries have introduced specific training programmes for the diagnosis and management of inherited metabolic disease in adults. Long-term outcomes in treated patients with inherited metabolic disease remain uncertain. International patient registries and multi-centre case series will be important in determining outcome and response to more recent therapies (particularly high-cost medications), and hence providing the data on which the future allocation of resources and management guidelines may be based.
<urn:uuid:708b2e54-7438-4cdd-8f7d-26b469b0bd03>
CC-MAIN-2013-20
http://www.ommbid.com/OMMBID/the_online_metabolic_and_molecular_bases_of_inherited_disease/b/abstract/part2/ch5.1
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705575935/warc/CC-MAIN-20130516115935-00073-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953109
501
2.546875
3
Torres Strait is the narrow sea between Australia's Cape York and New Guinea. It is about 150 km (93 mi) wide and filled with islands, coral reefs and sand banks. The first European to sail through the strait was Luis Vaez de Torres in 1606. There are about 240 islands but only 17 of them have people living on them. While there are about 6,800 Torres Strait Islanders living on the islands, about 42,000 islanders now live on the mainland. The islands belong to Australia and are a part of Queensland. They are governed from Thursday Island by the Torres Strait Regional Authority. They are the only part of Australia to share a border with another country, New Guinea. Geography[change | change source] It is an important sea lane for ships, but because the water is not deep and is filled with many reefs and islands, it is very difficult to sail through safely. The islands are a mix of island types. Some of the islands near New Guinea are low lying islands made from soil washed down from the rivers. The hilly and steep granite islands in the west were once the tops of mountains which became islands when the sea levels rose 8,000 years ago. The islands in the centre are mostly coral cays. The islands in the east of the strait were made by submarine volcanos which grew above the surface of the ocean. In 2009, the islanders asked the Australian government for AU$ 22 million to build new sea walls. Because some of the islands are quite low, rising sea levels and big tides have meant many areas are now being flooded. This has damaged houses and put salt into the fresh water supplies. People may have to leave two of the mud islands, Boigu and Saibai, unless something can be done about the rising sea. The people[change | change source] The islands' people are called the Torres Strait Islanders. They are Melanesian peoples related to the Papuans of New Guinea. The islanders have their own culture and long history. They traded with the Papuans to the north and the Australian Aboriginal people for thousands of years. The islanders talk two different languages: - Kala Lagaw Ya/Kalaw Kawaw Ya/Kawalgaw Ya/Kulkalgaw Ya, - Meriam Mir There is also a language called Brokan (Broken), or Torres Strait Creole. This is a mix of different languages and islander words that started when the islanders started working on ships searching for pearls in the 1860's. History[change | change source] The level of the sea was much lower up to 8000 years ago. Torres Strait would not have been covered by water which means people and animals could walk between New Guinea and Australia. Some animals and birds can be found in both New Guinea and Queensland, such as the cassowary. Other animals, such as pigs, arrived in New Guinea after the sea levels rose and closed the land bridge and were not able to get to Australia. There is evidence of people living on the Torres Strait islands for at least 2,500 years. It is likely that people were living there long before that, but rising sea levels will have covered earlier sites. European discovery[change | change source] The first known European to sail through the strait was Luis Váez de Torres, a Spanish or Portuguese sailor. He was second-in-command of the Spanish led by the Portuguese Pedro Fernandez de Quirós who sailed from Peru to the South Pacific in 1605. After Quiros's ship went back to Mexico, Torres kept going to the Moluccas and then to Manila. He sailed along the south coast of New Guinea. He may have seen Cape York on the Australian mainland, but there is no evidence to prove this. Torres wrote a letter to the Spanish king about his discoveries but this was kept secret until 1762. In 1769 the Scottish geographer Alexander Dalrymple, was translating Spanish letters found in the Philippines in 1762. He read Luis Váez de Torres' letter about a passage south of New Guinea. Dalrymple wrote a book, the Historical Collection of the Several Voyages and Discoveries in the South Pacific Ocean in 1770-1771. This book caused a lot of interest in the idea of an unknown continent. Dalrymple named the strait after Torres. This led Captain James Cook to go on another voyage into the South Pacific. Dalrymple was angry that it was Captain Cook and not him who was put in charge of the expedition which led in 1770 to the discovery of the east coast of Australia. In 1770 Cook sailed through the strait after sailing up the east coast of Australia. He landed on Possession Island and claimed all the land of Australia for Britain. With people like James Cook, William Bligh, and Matthew Flinders exploring and making maps of the strait, many more ships started to sail through it on their way from Sydney to India or Asia. It was still hard for ships, and many were wrecked on the reefs. A Scottish woman, Barbara Thompson, was the only person saved when the ship "America" hit a reef in 1842. She was saved by the islanders and lived with them on Prince of Wales Island for five years until another ship came to take her back to Sydney. Trade[change | change source] Missionaries[change | change source] The London Missionary Society arrived on Erub (Darnley Island) in 1871. The islanders still celebrate the coming of the missionaries as "The Coming of the Light", and it is holiday every year on the islands. Government[change | change source] Although some of the Torres Strait islands are just off the coast of New Guinea, they were taken over in 1879 by Queensland, then a British colony. In 1978 an agreement between Australia and Papua New Guinea worked out the correct position of the maritime border in the Torres Strait. The Torres Strait also has its own flag. It was designed by Bernard Namok from Thursday Island. It has a background of five stripes, green for the land, blue for the sea, and black for the people. It has a big white Dari, or headress, and a five pointed star for the five main island groups. In 1995 is was officially made a flag of Australia. World War II[change | change source] In World War II, Horn Island in Torres Strait, 150 km (93 mi) north of Cape York, became Australia's most northerly air base. In 1940 two big runways were built. It was used by thousands of Allied aircraft. With eight Japanese air raids in 1942, it was the most attacked place in Queensland. Conditions on the island were hard for the soldiers, with poor food, not enough water, diseases, and attacks from the Japanese. The airport is still working as the main airport for far north Queensland. It is now a tourist resort, especially well known for its fishing. Books and Music[change | change source] References[change | change source] - "Torres Strait Islands". Tropical North Queensland. http://www.queenslandholidays.com.au/destinations/tropical-north-queensland/places-to-visit/torres-strait-islands.cfm. Retrieved 2008-08-13. - "Torres Strait Islands" (in English). Charting the Pacific. ABC Radio. http://www.abc.net.au/ra/pacific/places/country/torres_strait_islands.htm#facts. Retrieved 2009-12-12. - Waters, Jeff (December 9, 2009). "Garrett considers Torres Strait climate aid". ABC News. http://www.abc.net.au/news/stories/2009/12/09/2766640.htm?section=justin. Retrieved 2009-12-12. - "General History". Torres Strait Regional Authority. http://www.tsra.gov.au/the-torres-strait/general-history.aspx. Retrieved 2008-08-13. - Ganter, Regina. (1994). The Pearl-Shellers of Torres Strait: Resource Use, Development and Decline, 1860s-1960s. Melbourne University Press. ISBN 0-522-84547-9. - for a detailed map see "Australia's Maritime Zones in the Torres Strait" (PDF). Australian Government - Geoscience Australia. http://www.ga.gov.au/image_cache/GA3747.pdf. Retrieved 2008-04-13., for the agreement see "Treaty between Australia and the Independent State of Papua New Guinea concerning sovereignty and maritime boundaries in the area between the two countries, including the area known as Torres Strait, and related matters, 18 December 1978" (PDF). United Nations. http://www.un.org/Depts/los/LEGISLATIONANDTREATIES/PDFFILES/TREATIES/AUS-PNG1978TS.PDF. Retrieved 2008-04-13. - "Torres Strait Islander Flage" (in English). Ausflag. http://www.ausflag.com.au/torres_strait_island.html. Retrieved 2009-12-12. - "Horn Island Airfield" (in Englsh). Pacific Wrecks. http://www.pacificwrecks.com/airfields/australia/horn/index.html. Retrieved 2009-12-12. - Seekee, Vanessa; Seekee, Liberty. "Horn Island: In their steps 1939 - 1945" (in English). http://www.torresstrait.com.au/ad.html. Retrieved 2009-12-12. - "Gateway Torres Strait Resort" (in English). http://www.torresstrait.com.au/#. Retrieved 2009-12-12.
<urn:uuid:5445618f-b285-4212-b706-53ee6828c798>
CC-MAIN-2014-23
http://simple.wikipedia.org/wiki/Torres_Strait
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273513.48/warc/CC-MAIN-20140728011753-00438-ip-10-146-231-18.ec2.internal.warc.gz
en
0.943748
2,085
3.4375
3
Saint Martin the Merciful, Bishop of Tours, was born at Sabaria in Pannonia (modern Hungary) in 316. Since his father was a Roman officer, he also was obliged to serve in the army. Martin did so unwillingly, for he considered himself a soldier of Christ, though he was still a catechumen. At the gates of Amiens, he saw a beggar shivering in the severe winter cold, so he cut his cloak in two and gave half to the beggar. That night, the Lord Jesus Christ appeared to the saint wearing Martin’s cloak. He heard the Savior say to the angels surrounding Him, “Martin is only a catechumen, but he has clothed Me with this garment.” The saint was baptized soon after this, and reluctantly remained in the army. Two years later, the barbarians invaded Gaul and Martin asked permission to resign his commission for religious reasons. The commander charged him with cowardice. Saint Martin demonstrated his courage by offering to stand unarmed in the front line of battle, trusting in the power of the Cross to protect him. The next day, the barbarians surrendered without a fight, and Martin was allowed to leave the army. He traveled to various places during the next few years, spending some time as a hermit on an island off Italy. He became friendly with Saint Hilary, Bishop of Poitiers (January 14), who made Martin an exorcist. After several years of the ascetic life, Saint Martin was chosen to be Bishop of Tours in 371. As bishop, Saint Martin did not give up his monastic life, and the place where he settled outside Tours became a monastery. In fact, he is regarded as the founder of monasticism in France. He conversed with angels, and had visions of Saints Peter and Paul (June 29) and of other saints. He is called the Merciful because of his generosity and care for the poor, and he received the grace to work miracles. After a life of devoted service to Christ and His Church, the saint fell ill at Candes, a village in his diocese, where he died on November 8, 397. He was buried three days later (his present Feast) at Tours. During the Middle Ages, many Western churches were dedicated to Saint Martin, including Saint Martin’s in Canterbury, and Saint Martin-in-the-Fields in London. In 1008, a cathedral was built at Tours over the relics of Saint Martin. This cathedral was destroyed in 1793 during the French Revolution, together with the relics of Saint Martin and Saint Gregory of Tours (November 17). A new cathedral was built on the site many years later. Some fragments of the relics of Saint Martin were recovered and placed in the cathedral, but nothing remains of Saint Gregory’s relics. Saint Martin’s name appears on many Greek and Russian calendars. His commemoration on October 12 in the Russian calendar appears to be an error, since ancient sources give the November date.
<urn:uuid:f98fcbee-7985-4149-9e05-8f10fb4a431f>
CC-MAIN-2017-34
https://oca.org/saints/lives/2017/11/11/103285-saint-martin-the-merciful-the-bishop-of-tours
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110485.9/warc/CC-MAIN-20170822065702-20170822085702-00027.warc.gz
en
0.988093
621
3.359375
3
The question of the possibilities of our population is one which has engaged the attention of many, and has elicited a variety of opinions. Some have possibly estimated it too high ; others, and these are the more numerous, we think, have estimated the possibilities too low. Any estimate made can, of course, only be approximately correct, though there is a legitimate basis upon which to base our calculations. The ability of a country to sustain a population depends upon its extent and its productive power, though these facts are modified by the largeness or smallness of the demands of the people who may occupy it, which, of course, varies greatly in different ages and with different people. England, for instance, alone sustains a population of over thirty millions of people, whose demands are very high, in an area of some fifty thousand-square miles. This is a tremendous population, representing about five hundred and seventeen to the square mile, but it is nevertheless sustained with ease and in comfort, indeed, one might say luxury, for nowhere in the world is there to be found an equal proportion of wealth. Moreover, this population is still rapidly on the increase. Now, if we apply this standard to the two million square miles of Canada’s habitable domain, it would give us the tremendous population of one billion souls at the same density. Of course, no reasonable person would likely make such a claim for our country ; population in this land will not likely ever become so uniformly dense, or anything like it. The question is, by what figure should we divide such an estimate, to come at a just and reasonable result. If we could sustain one-quarter the population of England per square mile it would still give us two hundred and fifty millions of people. Is this unreasonable ? To answer this we must pursue the question a little farther. We may turn to some other country, where the conditions of life are more similar to our own. Let us look at European Russia, for instance. Here is a country of large and varied area and resources, largely sharing our climatic conditions, and may fairly represent the possibilities of our own country as to population. In European Russia, south of the 60th degree of north latitude, we have at present a density of population of about sixty-eight to the square mile. This, on a similar basis, would give us a population of about one hundred and forty millions, but Russia is still a rather sparsely settled country, and is rapidly increasing in population, and these figures do – not represent her full possibility. Let us take at random a group of her older western provinces north of the 50th degree of north latitude. These provinces have a density of one hundred and seventy-nine to the square mile, which, if applied to Canada, would mean an ultimate population, at the same rate, of 350,000,000. There is still another country in Europe whose latitude, race and conditions of lire are not dissimilar to our own, namely, Germany. Here we have a density of two hundred and thirty-nine to the square mile and a growing population. Our population, estimated on the basis of Germany’s density, would give us six hundred and eighty millions. Which one of these estimates comes the nearest to our possibilities ? May we not here apply the law of averages with the three continental sections discussed, for a general and just estimate ? An average struck between these countries would give about one hundred and sixty-six to the square mile, and if applied to Canada’s area, would mean a population of about three hundred and thirty millions. When we consider the large extent of country concerned in our comparisons, its high northerly location, and that their population is still rapidly in-creasing, the estimate cannot be regarded as an extravagant one. It seems quite reasonable, there-fore, to claim that our maximum capacity for population is from three hundred to three hundred and fifty millions. In a certain sense we are dealing with the present century, and how far these possibilities may be realized within the century it is impossible to say, certainly not to the fullest extent. We have already made some comparisons with the growth of our neighbors to the south, and that without disparagement to ourselves. It may not, therefore, be too much to expect a growth, even in population, within this century equal to theirs in the last, though this will depend largely on the energy put forth on the part of our immigration authorities and the wisdom of their policy. Sixty-five or seventy millions at the close of the present century should not be beyond the ideal aimed at by every patriotic Canadian, or be regarded as unreasonable from a basis of sound calculation. It would, of course, be expected that the tide of foreign immigration would gradually increase as the .country becomes better known and more fully appreciated abroad, and in proportion also to its development. It is difficult to make comparisons in this regard from the immigration re-turns of the United States, inasmuch as the facilities have been so very different in the latter half of the century. The average yearly increase by immigration alone to the United States for the last twenty-five years has been about four hundred thou-sand annually, though in one particular year it reached the enormous figure of eight hundred thousand. Taking all the circumstances into consideration, it does not appear that three hundred and ninety or four hundred thousand per year for the century would be too great to expect for this country, though, of course, for some time to come the figures must be very much below this mark. If this may be regarded as a fair average for the century, we are well within the bounds of our calculations, as this, with our natural increase and present population, would give us an expected population of seventy-six millions in the year 2001. It is quite possible, of course, that it may fall below these figures, but it is also easily possible that they may be surpassed ; at least, it is a reasonable calculation.
<urn:uuid:3f559425-445f-4d91-bef6-fdddd617f7cc>
CC-MAIN-2013-48
http://canada.yodelout.com/population-of-canada/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053831/warc/CC-MAIN-20131204131733-00015-ip-10-33-133-15.ec2.internal.warc.gz
en
0.964305
1,215
3.078125
3
What happened to the radicals when the English Revolution failed? The Restoration, which re-established Charles II as king of England in 1660, marked the end of “God’s cause”—a struggle for liberty and republican freedom. While most accounts of this period concentrate on the court, Christopher Hill focuses on those who mourned the passing of the most radical era in English history. The radical protestant clergy, as well as republican intellectuals and writers generally, had to explain why providence had forsaken the agents of God’s work. In The Experience of Defeat, Christopher Hill explores the writings and lives of the Levellers, the Ranters and the Diggers, as well as the work of George Fox and other important early Quakers. Some of them were pursued by the new regime, forced into hiding or exile; others compelled to recant. In particular Hill examines John Milton’s late work, arguing that it came directly out of a painful reassessment of man and society that impelled him to “justify the ways of God to Man.”
<urn:uuid:a5c30d47-4925-4f8b-9090-8b9cfc1b68c8>
CC-MAIN-2023-50
https://www.versobooks.com/products/286-the-experience-of-defeat
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00632.warc.gz
en
0.96217
224
3.53125
4
In the world of cybersecurity, social engineering is a term used to describe a range of techniques used by cybercriminals to manipulate individuals into divulging confidential information. Social engineering attacks are often difficult to detect as they rely on human error rather than software vulnerabilities. To understand the effectiveness of social engineering, it is essential to understand the psychology behind it. In this article, we will explore the various techniques used in social engineering attacks and the psychological principles that make them so effective. Types of Social Engineering Attacks Social engineering attacks can take many forms, and they all share a common goal – to manipulate individuals into divulging confidential information. Some of the most shared social engineering attacks enclose phishing, pretexting, baiting, and tailgating. Phishing attacks involve the use of fake emails or websites that appear to be legitimate. Cybercriminals use these techniques to obtain sensitive information, such as login credentials or credit card details. Pretexting involves the use of a fabricated scenario to trick individuals into revealing sensitive information. This could include posing as an authority figure or creating a false sense of urgency to coerce the victim into giving up their information. Baiting involves the use of physical media, such as USB drives or CDs, to lure individuals into downloading malware or revealing sensitive information. Tailgating is a physical security breach where a person gains access to a secure area by following closely behind someone who has authorized access. The Psychology Behind Social Engineering Social engineering attacks are thriving because they exploit human exposure. These attacks depend on psychological manipulation to fool individuals into revealing sensitive information. Some of the key psychological principles that social engineers use include authority, scarcity, urgency, and social proof. Social engineers often pose as authority figures, such as IT support personnel or law enforcement officers. This tactic is successful because individuals are more likely to comply with requests from someone they perceive as having authority. Social engineers create a sense of scarcity to create a sense of urgency. For example, they might claim that a limited-time offer is about to expire or that a product is in high demand. Social engineers usually devise a sense of haste by claiming that an issue needs to be resolved immediately. This tactic is effective because individuals are more likely to act quickly when they feel that time is running out. Social engineers use social proof to make their requests seem more legitimate. For example, they might claim that many other people have already provided the same information. Protection Against Such Attacks Protecting against social engineering attacks requires a combination of awareness, education, and technology. Individuals should be aware of the different types of social engineering attacks and the tactics used by cybercriminals. Education and training can help individuals identify and avoid social engineering attacks. Technological solutions, such as email filtering and anti-malware software, can also be effective in protecting against social engineering attacks. Additionally, organizations should have policies in place to prevent data breaches and limit the amount of sensitive information that employees have access to. In conclusion, social engineering attacks are a constantly evolving threat to cybersecurity. Cybercriminals use a range of tactics to exploit human vulnerabilities and manipulate individuals into divulging sensitive information. The key to protecting against social engineering attacks is understanding the psychology behind them. Awareness, education, and technology are all important components of an effective defense against social engineering attacks. Education is also crucial in protecting against social engineering attacks. Individuals should be educated on how to identify and respond to potential social engineering attacks. This can include learning about the different tactics used by cybercriminals and the importance of verifying requests before divulging sensitive information. Technology can also play a role in protecting against social engineering attacks. Email filtering, anti-malware software, and other cybersecurity tools can help to detect and prevent social engineering attacks before they cause damage. Additionally, organizations should have policies in place to prevent data breaches and limit the amount of sensitive information that employees have access to.
<urn:uuid:7dab3275-73c8-4ce3-90cc-81a8ee613e09>
CC-MAIN-2023-23
https://www.technotification.com/2023/04/social-engineering-the-psychology-behind-cybercrime.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00554.warc.gz
en
0.949176
786
3.328125
3
A Seperate Peace Chapters 5-10 Answers 1Add Yours Gene wants a sense of purpose to his life, and feels that enlisting will give this to him; he thinks hard about it over the night. Gene realizes that he doesn't owe anything to either Devon or to his parents anymore; the choice of whether or not to go to war depends on his own inclinations, and he wants to go through with it. But, then he goes back to his room, and finds Finny there; suddenly, what he resolved to do no longer matters, as he has a purpose to stay at Devon again. The foremost among the few who are not affected by the war is Leper, the odd, peace-loving acquaintance of Gene. Gene, upon meeting him in the woods on a snowy day, mistakes Leper for a "scarecrow," and the metaphor is actually a rather fitting one for Leper. Leper is not a person of action, nor is he particularly vital or lively like the rest of the boys; Leper prefers to remain on the periphery of things, in nature, like the scarecrow does. The irony is that Leper will actually join later.
<urn:uuid:7b9920fa-721d-4e8a-a1ee-e0d5d89850c9>
CC-MAIN-2017-39
http://www.gradesaver.com/a-separate-peace/q-and-a/what-does-enlisting-mean-to-gene-and-what-does-the-army-come-to-mean-to-leper-136384
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689615.28/warc/CC-MAIN-20170923085617-20170923105617-00562.warc.gz
en
0.972411
245
2.640625
3
Ladder is a barrel-jumping game (like Donkey Kong) written for the CP/M operating system and made to be operated on the early Kaypro line of luggable computers. Since the screens on these computers only accept text characters and not rendered graphics, the game uses letters, numbers, and symbols lined up to create walls and platforms, pits/traps, characters, trampolines and goals. The floors in Ladder are made of equal signs and the ladders themselves are made of capital "H"s stacked on top of each other. The "lad" controlled by the player starts out as the letter "P" and barrels ("der rocks") are represented by "o"s. The catchphrase of the game reminded the acolyte player that there are more ways than one to skin a cat. This referred to the fact that the minimized traverse of almost all levels could be enhanced by inventive utilisation of the game features, and the highest levels absolutely required it. These could entail (at the apex of the game) for instance jumping on a trampoline at precisely the right speed and point of impact to fall into one of the pit/traps, at the right timing that there would be no barrels passing for a sufficient interval. Source: Wikipedia, "Ladder (Video Game)," available under the CC-BY-SA License.
<urn:uuid:a47676a1-ce68-49ed-ba4a-32e3122972fc>
CC-MAIN-2017-34
https://videogamegeek.com/videogame/76996/ladder
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886108709.89/warc/CC-MAIN-20170821133645-20170821153645-00135.warc.gz
en
0.946144
282
2.53125
3
Human Immunodeficiency Virus (HIV) which caused Acquired Immunodeficiency Syndrome (AIDS). Recently, reports of misinformation going around among mobile electronic device users stating that certain food goods were tainted with HIV… but, is it possible for food to spread HIV/AIDS? The World Health Organization (WHO) asserts that neither water nor food may spread HIV. HIV actually does not survive very long outside of the human body. Even if the food contained trace amounts of blood or sperm that had been exposed to HIV, the virus would be destroyed by exposure to air, heat from cooking, and stomach acid. WHO and the American Centers for Disease Control and Prevention (CDC) believe that food is not a source of HIV infection based on the available scientific evidence. Do you have concerns about food cooked or served by someone who is HIV+? FROM WOMEN’S HEALTH No. Most people have likely already been served by an HIV+ person, didn’t know it, and didn’t contract the virus. That’s because HIV is transferred only from fluids to fluids—blood to blood or through sēx. But what if the chef cut herself? The majority of people with HIV are on treatment and have an undetectable amount of the virus in their blood, making it unable to infect you. Still, if the chef cut herself, she would stop cooking, toss the food, dress her wound, and sanitize the area, as any chef would. And if she didn’t notice that she had cut herself? Even if a small amount of blood gets into the food without anyone noticing, the kitchen environment is inhospitable to the virus. Inhospitable meaning what, exactly? Kitchen exposure to air and heat while cooking would kill the virus. And if the chef’s blood somehow got on cold food, like a salad? Since the food is consumed by mouth, not an open cut, your stomach acid would kill the virus as it goes through your digestive system. What if you, the customer, had a cut in your mouth? Even so, it’s impossible for such a small amount of blood to make it inside there and infect you. It’s like trying to hit a bull’s-eye in outer space with an arrow—impossible. Has anyone anywhere ever gotten HIV from food prepared by a person with HIV? No. No one has ever contracted HIV via food prep. There is zero risk of HIV transmission.
<urn:uuid:7cc3402e-d527-4584-97de-278d4edb0c6f>
CC-MAIN-2023-40
https://bestnewsnet.com/do-you-know-hiv-cannot-be-transmitted-through-food-or-water-details/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00632.warc.gz
en
0.958131
526
3.4375
3
Visit Auschwitz Concentration Camps and you will never forget this place. Nazis in the Third Reich and the occupied territories built around 12,000 concentration camps. In total, over 18 million people passed through it, and 11 million were murdered in places like Auschwitz. The aim was total annihilation of Jews, Slavic, Gypsies. Nazi doctrine claimed that Aryan race was the one to dominate and was better than others. What is more, they wanted to remove people from the lands they occupied to give it to the Germans. Therefore, in 1941, the Nazis began using gas chambers to kill people, and the bodies were buried in lime pits, burned on stacks or in crematoria. Every day in gas chambers were killed thousands of people. On others were conducted terrible medical experiences. They were infected with malaria, typhus or tuberculosis. The largest extermination camp was Birkenau, a sub-camp of Auschwitz-Birkenau Concentration Camp. Other camps were: Treblinka, Sobibor, Belzec, Kulmhof, and to a lesser extent Majdanek. The Holocaust program was also implemented in ghettos and ordinary concentration camps. Holidays in Poland- visit Auschwitz if you happen to be around We realize that it’s difficult to see soviet gulags which are located in periphery. But concentration camps in Krakow suburbs in Poland are basically located in the middle of Europe. If you want to visit Auschwitz Concentration Camps just visit Krakow, former capital of Poland, headquarter of kings. You can book a tour to Auschwitz, it’s just around 40 kilometers from Krakow. We choose number one transport company Krakow Direct and we were 100% satisfied with this service. Brand new car took us from the hotel and safely hand us over to the guide who is working for concentration camps. It was really moving trip for us, since we are studying subject of death camps since years. Let this museum remind people where hater, indoctrination leads to. Let’s hope this will never happen again.
<urn:uuid:4214d82e-9568-4777-8472-4085e98dfc48>
CC-MAIN-2017-43
http://guerreroaldia.com/auschwitz-concentration-camps/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824675.67/warc/CC-MAIN-20171021081004-20171021101004-00357.warc.gz
en
0.9705
429
2.578125
3
There are several reasons why people use VPNs, and more people are starting to do so now. We’ll discuss how they function and the reasons why demand is increasing right now. Using VPN Encryption I’ll give an example of how a VPN gets rid of the digital breadcrumb trail we leave online: Typically, you connect to your internet service provider first while attempting to access a website on the internet (ISP). Your browser will be redirected to any websites (or other online resources) you specify. Your whole internet behaviour can be seen and recorded, since everything you do online passes through the servers of your ISP. It’s even possible that advertisers, authorities, and other third parties will learn about your internet activities. The VPN provides a remedy for people who are concerned about that: Your internet traffic is redirected through a distant server that has been specially set up. Because all of your activity is directed through the VPN server, your ISP is no longer able to see the websites you visit. It also encrypts all the data you send or receive and masks your IP address. Anyone who intercepts the encrypted transmission won’t be able to benefit from it because they won’t be able to understand it. Think about security layers The VPN functions by establishing an encrypted “tunnel” via the internet. This protects any data that is transferred between you and your destination, including data from an online banking account to a search engine. Your client, which could be a computer, smartphone, or tablet, initially authenticates with a VPN server to build the tunnel. All data that is exchanged between you and your web destination is then encrypted by the server. To be sent over the internet, data must first be divided into packets. The VPN effectively encapsulates each data packet in an outer packet that is encrypted using the encapsulation technique. This extra layer is the essential component of the VPN tunnel, since it protects the data during transport. The “outer packet is eliminated” as the data is decrypted once it reaches its destination. Additionally, these packets are linked to IP addresses other than your own, which prevents them from leaving a trace that can be used to identify you. You will appear to be browsing from a different nation if you connect to a server there. The Rise in VPN Use The benefit of utilizing a VPN is that it provides secure internet access, which appeals especially to those who must rely on public Wi-Fi, especially when travelling. They are able to access unrestrained and uncensored content from anywhere in the world, in addition to gaining security. However, VPN usage is rising even if the majority of us are not travelling. The usage of VPNs is more common among non-techies, according to the general trend. Regular household customers who have never utilized a VPN service are becoming more and more accustomed to it. Although there are “certain peaks” on weekends, the current rise in usage “correlates with self-isolation, the quarantine, and social distancing happening around the world owing to the coronavirus.” That would be consistent with the statistics showing that improved online entertainment is the main driver behind VPN adoption. There are, of course, geographical variations in usage, and VPN are absolutely off-limits in nations that have outlawed or banned their use. Countries like China, Russia, Iran, United Arab Emirates, Oman, Turkey, Iraq, Turkmenistan, Belarus, North Korea, and Uganda fall under this category. It is primarily due to these nations’ attempts to restrict the amount of information that their citizens can access online. Service Choice: Cost and Privacy If one only receives what one pays for, why do some businesses offer free VPN services? Reliable providers make significant financial investments in its product and supporting infrastructure, thus they must recover those costs through fees. When you receive the service for free, your data is used as a separate form of payment. Therefore, he advises that any fine print in the terms and conditions of any free service should be carefully read: The majority of free VPN services frequently gather user information and sell it to government agencies or third-party advertising firms. Users should always review service policies and become familiar with how their data is handled before registering. Even while the majority of providers state that their VPN services are no-log, some of them may nonetheless keep detailed connection logs. That’s an issue since others might be able to identify you using this information about your internet access. To determine the degree of privacy, it is advised to consider the following: - Types of information the program gathers about customers’ internet usage. - Country where the service is provided and local legal restrictions. - External support or tracking tools. If something seems too good to be true, it probably is, as is the case with many other things as well. Free internet services frequently require you to contribute data that may be significantly more valuable than the service fees itself. Additionally, it does seem a little odd to forfeit your privacy in order to use a service designed to protect it. Just some food for thought.
<urn:uuid:9e5e40b1-b507-461f-af9f-4dade3b001df>
CC-MAIN-2023-14
https://vpnservicesite.com/blog/thinking-about-a-vpn-choose-the-best-option-for-your-needs/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00576.warc.gz
en
0.945126
1,103
2.875
3
What are the uses and features of sanitary diaphragm valves? The advantages of sanitary diaphragm valve are the structural characteristics, for example, health-class diaphragm valve design is particularly suitable for ultra-pure media or serious pollution, very viscous liquid, gas, corrosive or inert media. When combined with control equipment, diaphragm valves are a better alternative to other conventional control systems, especially for solid and contaminated inert media. The uses and characteristics of sanitary diaphragm valves: The sanitary valve adopts the clamp type, which has the advantages such as simple structure, beautiful appearance, quick assembly and disassembly, quick switch, flexible operation, small fluid resistance and safe and reliable use. Hygienic diaphragm valves are made of acid-proof stainless steel, and the seals are made of food silicone rubber or polytetrafluoroethylene, which conforms to food hygiene standard. Sanitary diaphragm valves are widely used in food, wine, beverages, dairy products, fine chemicals, pharmaceutical and biological engineering and many other industries. Classification of sanitary diaphragm valves: Hygienic diaphragm valve has kinds of connections such as looper flange connection, quick discharge flange connection, welded connection. Welded connection is divided into welded I-type connection, welding type II connection, the other end of the insert connection.
<urn:uuid:1fe0e379-6c99-46f6-b06c-9f6f6219dce1>
CC-MAIN-2023-23
http://www.usasanitaryvalves.com/do-you-know-sanitary-diaphragm-valves/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00299.warc.gz
en
0.925943
303
2.953125
3
People who play musical instruments or sing music in the rock and roll genre are known as rock musicians. Although many rock musicians are hobbyists or semi-professional musicians who play music as a part-time job or even an occasional occupation, they may make a living playing such music. Although guitar, bass, and drums are perhaps the most common instruments associated with the rock and roll genre, the specific instruments these musicians will play can vary significantly. Musicians in the rock genre frequently use the piano and keyboards. Rock musicians may combine many different styles of music to create a unique sound within the genre of rock and roll. Rock and roll evolved from other genres such as blues, jazz, and even gospel, and it continues to evolve as new sounds and talents are introduced. Within the rock and roll genre, there are sub-genres that further narrow the types of music that rock musicians will perform. Alternative, nu-metal, folk rock, emo music, and other sub-genres are examples. Many of these genres are also primarily driven guitar and drums, though variations are possible and common. Professional rock musicians frequently tour specific countries, if not the entire world, to promote their albums. Musicians are sometimes signed to record labels, which provide financial support while on tour, though the amount of money provided to rock musicians varies. The term “Rock and Roll Lifestyle” comes from this touring, which is often done on a shoestring budget: this lifestyle can be difficult, exhausting, and nomadic. Rock musicians who live the Rock and Roll Lifestyle are often associated with drugs and alcohol, as well as sexual promiscuity. Rock musicians frequently form rock bands, which are groups of musicians who play together to create a distinct and distinctive sound. Each member of the band will play at least one instrument or sing, and many of the musicians will be multi-instrumentalists. Rock bands frequently begin as garage bands, performing for fun or as practice for a larger career move in a small space that is often free or very inexpensive to rent. Garage bands are known for being amateur bands, though many have ambitions to rise above their humble beginnings and achieve success. This process has become something of a rock and roll mythology, with many of the world’s most famous bands beginning in this manner.
<urn:uuid:b3011e9b-e950-4719-a2d2-33c86485a439>
CC-MAIN-2023-14
https://spiegato.com/en/what-are-rock-musicians
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00404.warc.gz
en
0.973757
470
2.90625
3
Each Process and Data (Process output) specifies a sample rate, stored as a fraction for absolute accuracy. For Processes, these sample rates are specified in the SystemML document; for Datas, these rates are specified by the creating process (and will often match the Process sample rate, though this is not required). Given the integral Base Clock, BRAHMS can generate timing relationships between components with perfect accuracy. To understand these clocks better, review the GUI documentation. Integral Base Clock The use of an integral (rather than floating-point) Base Clock has pros and cons: it ensures accuracy and reduces the computational complexity of timing logic; on the other hand, range is limited by the width of the counters used (64-bit, in BRAHMS). However, to give an idea, if the BSR is 1GHz, the latest time on the Execution Clock that the Base Clock can represent is more than half a millenium after A pathological system may have two processes with sample rates that are interrelated such that their lowest common multiple is extremely large, and in this case the amount of time that can be represented may be practically limited. For instance, if two processes have sample rates of 1GHz and 1GHz plus 1Hz, the BSR will be around 1EHz (ExaHertz, or 1018Hz), and the latest representable time becomes about eighteen and a half seconds. Such a system would still have to compute around 1.8x1010 steps to reach this limit. But if such a limit is reached in a practical situation, the only solution to execute the system in BRAHMS is to tweak the sample rates to avoid the pathological condition - this would not be expected to introduce much inaccuracy, with numbers of this order. Alternatively, the system can be computed in a series of shorter periods. Calculating the Base Sample Rate After all temporal components (Processes and Datas, but not Utilities) have been created, the BSR Why should I care? The BSR will not be of direct interest to the Process developer. However, if a Process needs to obtain the Execution Clock time whilst servicing an event (rather than just the period between services), the timing data Relationship with the Wall Clock The Execution Clock is not explicitly related to the Wall Clock by the framework. Components that interact with hardware may force a relationship of this sort, however. Neither is data on the Wall Clock propagated to the Component, but any Component can obtain this information from the OS (which obtains it from the hardware). Therefore, even an apparently pure software component can force a relationship with the Wall Clock if desired, by interacting with the hardware (motherboard) through the OS. If there is demand, a Wall Clock utility object could be generated fairly easily, simplifying this interaction. One place that the Wall Clock does come into play is in performance assessment. BRAHMS times executions using OS utilities. Usually, individual calls during run-phase are not timed, since this will often slow execution (however this can be requested; see |This is a documentation page for the BRAHMS Modular Execution (Simulation) Framework. For details of licensing and distribution, please click here. To advise of an error or omission, please click here.|
<urn:uuid:4c8fee99-ff15-4a03-8395-47f314555adf>
CC-MAIN-2014-23
http://brahms.sourceforge.net/docs/Clocks.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272584.13/warc/CC-MAIN-20140728011752-00492-ip-10-146-231-18.ec2.internal.warc.gz
en
0.929573
675
2.765625
3
Emma J Lapsansky-Werner; Randy Roberts; Peter B Levy; Alan Taylor; et al Glossary in English and Spanish. |描述:||1 v. (various pagings) : ill. (chiefly col.), col. maps ; 29 cm.| |内容:||Connecting with past learnings (beginnings-1900). The Nation's beginnings (prehistory-1824). Declaration of Independence. United States Constitution. Manifest Destiny, Civil War, and Reconstruction (1800-1877). The development of industrial America (1865-1914). Reflections: Little Bighorn -- Emergence of the modern United States (1890-1920). Progressive era (1890-1920). An emerging world power (1890-1917). World War I and beyond (1914-1920). Reflections: the Progressive era -- Prosperity and depression (1919-1941). The twenties (1919-1929). The Great Depression (1928-1932). The New Deal (1932-1941). Reflections: Art in the New Deal -- World War II and postwar America (1931-1960). The coming of war (1931-1942). World War II (1941-1945). The Cold War (1945-1960). Postwar confidence and anxiety (1945-1960). Reflections: Postwar changes -- Challenges and change (1945-1980). The civil rights movement (1945-1975). The Kennedy and Johnson years (1960-1968). The Vietnam War era (1954-1975). An era of protest and change (1960-1980). A crisis in confidence (1968-1980). Reflections: The civil rights struggle -- Changing and enduring issues (1980-today). The Conservative resurgence (1980-1993). Into a new century (1992-today). Reflections: Enduring issues. |其他题名:||United States history :| |责任:||Emma J. Lapsansky-Werner ... [et al.].| Developed to meet the needs of modern United States history courses. This text includes a review unit bridging early American history content before studying modern times. Authors Emma J. Lapsansky-Werner, Peter B. Levy, Randy Roberts, and Pulitzer Prize winner Alan Taylor inspire today's students by presenting our nation's history as a continuing drama. Their focus on enduring American issues help students understand why history matters. As part of their desire to reach out to every teacher in high school U.S. history classrooms, the authors have contributed their own personal insights about the content and teaching of each chapter. --Website.
<urn:uuid:61de4d10-e1b4-4a2d-a3ca-46f3429d9c32>
CC-MAIN-2014-23
http://www.worldcat.org/title/prentice-hall-united-states-history-modern-america/oclc/320244264?lang=zh-cn
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776429773.19/warc/CC-MAIN-20140707234029-00007-ip-10-180-212-248.ec2.internal.warc.gz
en
0.651848
579
2.9375
3
Unitarian Universalists have many ways of articulating our Seven Principles in simpler language. Here’s the way our Tapestry of Faith children’s programs describe them: - We believe that each and every person is important. - We believe that all people should be treated fairly and kindly. - We believe that we should accept one another and keep on learning together. - We believe that each person must be free to search for what is true and right in life. - We believe that all persons should have a vote about the things that concern them. - We believe in working for a peaceful, fair, and free world. - We believe in caring for our planet Earth, the home we share with all living things.
<urn:uuid:b5d57b19-5483-4cb2-aa4a-37b181d77166>
CC-MAIN-2023-40
https://4thu.org/our-beliefs/kids-principles/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00722.warc.gz
en
0.928537
159
3.3125
3
Technology has become an integral part of our lives, and its impact on a child’s development is undeniable. From access to information and educational resources to improved communication and social skills, technology has opened up new avenues for learning and growth. With easy access to a vast amount of information, children can explore various subjects, expanding their knowledge and curiosity. Through online platforms, they can connect with others, fostering communication and social skills. Recommendation systems for personalized product suggestions: AI-powered recommendation systems analyze user data and behavior to provide personalized product recommendations, enhancing the shopping experience.
<urn:uuid:d170632f-a0fa-4d95-aace-1234fa7ad52d>
CC-MAIN-2023-40
https://francisresumestudio.com/tag/tech/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00455.warc.gz
en
0.937212
121
3.421875
3
APRIL 3 2021 — To celebrate Alan Turing featuring on the new £50 banknote, GCHQ has created their hardest puzzle ever in his honour. Follow us on Twitter: @INTEL_TODAY RELATED POST: Remembering Alan Turing (23 June 1912 – 7 June 1954) RELATED POST: On This Day — First Modern Computer Delivered to German Aerospace Institute (May 12 1941) RELATED POST: On This Day — Enigma Machine Captured (May 9 1941) RELATED POST: Key figures in UK Sigint: Conel Hugh O’Donel Alexander RELATED POST: GCHQ — Sir Peter Harvey Marychurch (13 June 1927 – 21 May 2017) Alan Turing was a mathematician, cryptographer and pioneer of computer science who possessed one of the greatest brains of the 20th century. His life was one of secret triumphs shadowed by public tragedy. It has been estimated that his work shortened the war in Europe by more than two years and saved over fourteen million lives. A quick comment — GCHQ writes: “On the 8th June 1954, Alan Turing took his own life.” This is a mistake. Turing’s housekeeper found him dead on 8th June 1954 but he had committed suicide the previous day. The Turing Challenge The Turing Challenge requires you to solve a string of puzzles which get increasingly difficult. Crack the answers to the first 11 puzzles which should give you 11 single words or names which you’ll need your very own Enigma simulator to decode! Ready? Puzzle #1 — Hut 8 The questions begin with a relatively straightforward crossword-style puzzle that starts by asking where GCHQ’s predecessor agency, where Turing worked, was based during the second world war. A two-word answer, nine letters then four, is required. The stylistic 8s in the pattern above the bank building on the front of the note refer to Hut 8, one of the sections of GC&CS. Hence the importance of the 8th column below! The answers to these questions are quite obvious but the result for the 8th column is already puzzling! The answers to these questions are: BANK OF ENGLAND If you then selected the 8th letter of each answer, you obtain: Answer 1 = EUGENIA Keep in mind that you need to solve puzzles 1 to 11 in order to get a shot at the final meta-puzzle 12! Puzzle #2 — Portrait This one is not too difficult either. And GCHQ just gave us some serious HINT: Here is a hint for puzzle two -… -. . ..-. … …… -.. OK, I will give you an additional clue. Let us re-write the caption like this: The portrait is by Elliott & Fry ; a bromide print taken on 29 March 1951 , one of three from the National Portrait Now, you should see some similarities with the ‘encrypted’ text. Good Luck! Take a look at the clue from GCHQ. Count the letters and the spaces in the plain text and in the coded text. In both cases, you find: 4 – 2 – 1 – 4 – 3 – 6 – 3 It is probably no coincidence and it is reasonable to assume that this is the same message. Then what? Most letters have been replaced by a dot, and a few ones by an over-bar. The latter ones are: H I N T Back to puzzle 2, you will notice that the structure of the text (caption of the portrait) and the coded message is again identical. The punctuation was a dead giveaway! Let us select the letters with an over-bar and we obtain: Answer 2 = FATHERING Puzzle #3 — Bits of Notes First, take a good look at both sides of the the £50 banknote! Question — Can you shed some light on these sequences? INTEL TODAY — Here is a clue. Look at the 3 small pics of sequence (1) and find out where they are on the £50 banknote. And then, just connect the dots! If you succeed, just repeat the operation… So, Let us circle the 3 small pics of sequence 1 on the £50 banknote! Let us do the next one…. And here comes the third letter. And the fourth letter is a T. Of course, you have already noticed that sequences 3 and 7 are identical. So the answer is : L A N T * * N Well, there is only one such word in English! But make sure to check the E and the R! Answer 3 = LANTERN Puzzle #4 — WINDOW “The transparent window on the £50 note is based on a pattern detailing one of the huts at Bletchley Park. We found an encoded message scribbled under one of them.” “Give it sum thought, and see if you can make it add up. If you look at it from a different angle you should see a Welsh town through the window, which would be a real plus!” HINT — Obviously, each letter of the alphabet is associated to a number. That one is quite easy to figure out… But there is also some color coding going one. And that can be tricky. The perception of colors is a complex operation. Be careful when you associate a color to a square. Good luck! ***** ***** ***** ***** ***** Alan Turing — a short biography by Andrew Hodges The Turing Challenge — GCHQ GCHQ releases ‘most difficult puzzle ever’ in honour of Alan Turing — The Guardian Bank of England unveils new £50 banknote GCHQ — Play the TURING Challenge! [Puzzle #1] GCHQ — Play the TURING Challenge! [Answer to Puzzle #1 & Clue to Puzzle #2] GCHQ — Play the TURING Challenge! [Answer to Puzzle #2 & Clue to Puzzle #3] GCHQ — Play the TURING Challenge! [Answer to Puzzle #3 & Clue to Puzzle #4]
<urn:uuid:85f3003a-d6d4-4ccf-b7fc-ef2aade8fb0f>
CC-MAIN-2023-23
https://inteltoday.org/2021/04/10/gchq-play-the-turing-challenge-answer-to-puzzle-3-clue-to-puzzle-4/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00006.warc.gz
en
0.925085
1,354
2.78125
3
Vertigo is a symptom of an additional underlying medical concern. Many different conditions are linked to vertigo. Technically, vertigo is defined as sensation as though you are moving when you are really still, or feeling a sensation of altered activity while moving your head generally. However many individuals with vertigo might explain the experience as wooziness, which can likewise be brought on by numerous points, often making vertigo hard to detect. Generally, vertigo is created either by troubles in the inner ear, known as outer vertigo, or issues in the mind or nerve system, referred to as main vertigo. Certain threat aspects as well as various other medical issues can additionally result in episodes of vertigo. Finding what’s triggering your dizziness is necessary since it will establish your therapy options. One Of The Most Typical Reasons Individuals Obtain Vertigo One of the most typical sources of vertigo consist of among the list below conditions: (1 ) Benign Paroxysmal Positional Vertigo (BPPV) BPPV is one of the most usual root cause of vertigo. (2) It takes place when little crystals damage totally free and also float inside the tubes of your inner ear, which are called semicircular canals. BPPV usually causes short episodes of vertigo that begin instantly and also last a couple of secs to a couple of minutes. Particular head motions cause episodes of vertigo in people with BPPV. Can Urinary Tract Infection Cause Vertigo Most of the moment, doctors can’t identify specifically what causes BPPV, however it’s occasionally related to a minor or serious blow to the head. Labyrinthitis This condition, which is also described as “vestibular neuritis,” is identified by inflammation and swelling of the internal ear. It’s typically caused by an inner ear infection or virus. Sudden vertigo signs and symptoms and hearing loss are common in individuals with labyrinthitis. Meniere’s illness This condition is triggered by excess fluid accumulation in your internal ear. Individuals with Meniere’s commonly experience sudden, intense episodes of vertigo that last a long time. They might likewise have symptoms like supplanting the ears, hearing loss, or ” connected” ears. Medical professionals aren’t sure specifically what causes Meniere’s disease, yet it’s linked to viral infections of the inner ear, allergic reactions, and also head injuries. Genetic elements are also believed to play a role. Less Usual Reasons Individuals May Get Vertigo Other causes of vertigo as well as lightheadedness might consist of (in no particular order):. Cholesteatoma This condition is identified by uneven skin development between ear, behind the tympanum. It can be caused by duplicated, chronic ear infections. Otosclerosis Otosclerosis creates irregular bone development in the middle ear that can cause hearing loss. Stroke A blood clot or bleeding in the brain– or else referred to as a stroke– can trigger signs and symptoms of vertigo. Perilymphatic Fistula With this condition, an unusual connection ( typically a tear or flaw) in between the center ear as well as the internal ear enables liquid to leak right into the middle ear. Acoustic Neuroma This is a noncancerous tumor that establishes on the major nerve leading from your inner ear to your mind. Numerous Sclerosis (MS) Lots of people with the neurological disease referred to as MS experience vertigo episodes at some time. Parkinson’s Condition Parkinson’s can impact motion as well as equilibrium. People with this illness might additionally experience vertigo. Migraine headache Regarding 40 percent of individuals that have migraines additionally have problems with dizziness or equilibrium at some time. (3) There’s even a problem known as “vestibular migraine headache” or “migraine-associated vertigo.”. Diabetes mellitus Occasionally problems from diabetes can cause hardening of the arteries and also much less blood flow to the mind, which brings about vertigo symptoms. Maternity Wooziness as well as vertigo might turn up while pregnant as a result of hormone changes, low blood sugar level levels, pressure on capillary caused by an broadening uterus, or the baby pressing on a capillary that carries blood to the heart. Chiari Malformation This problem, where mind cells prolongs right into the spinal canal, can cause signs and symptoms of vertigo. Syphilis This sexually-transmitted infection (STI) can bring about hearing loss and dizziness. Can Urinary Tract Infection Cause Vertigo Anxiousness Conditions Anxiety and panic attacks may create individuals to feel signs and symptoms of vertigo. Anxiety can additionally intensify the condition. Brain Growth A tumor in an area of the mind called the cerebellum can create vertigo signs. Atmospheric Pressure Modifications Pressure differences between the center ear dental caries are frequently experienced when flying or diving underwater. This can cause a problem called alternobaric vertigo. Allergic reactions Some individuals have lightheadedness or vertigo attacks when they’re exposed to particular allergens, such as dust, mold and mildews, pollens, dander, or foods. Drug Wooziness and vertigo are occasionally negative effects of medicines. Anti-seizure drugs, antidepressants, sedatives, blood pressure meds, and also tranquilizers prevail wrongdoers. Orthostatic Hypotension This condition describes sudden wooziness when altering body position (e.g., a abrupt drop in high blood pressure when going from resting to standing). Head and Neck Injuries Might Cause Vertigo. Head injury is not uncommon in the United States: There were more than 220,000 stressful brain injury– related hospitalizations last year. These injuries can damage the inner ear and cause vertigo, which is often referred to as “post-traumatic vertigo.” People with head injuries who experience vertigo may have signs and symptoms like lightheadedness, headaches, listening to adjustments, discomfort, balance issues, and also even psychological disruptions. Wooziness after a trauma, or light terrible brain injury, is known as “post-concussive lightheadedness.”. Cervical vertigo happens after a extreme neck injury. While experts agree that this problem exists, there’s argument over just how often it happens. When Doctors Can’t Locate the Root or Trigger for Vertigo. Occasionally, medical professionals aren’t able to recognize a particular source for vertigo symptoms. As an example, there’s frequently no known trigger for BPPV. While not knowing exactly what’s creating your vertigo signs can be discouraging, it doesn’t indicate that you can’t get correct therapy as well as take care of the associated signs and symptoms. Your healthcare provider will certainly assist you find ways to regulate your episodes, even if a reason isn’t recognized. Some Factors Put You at Raised Threat for Vertigo. – Can Urinary Tract Infection Cause Vertigo The most usual cause of vertigo is BPPV, and also specific danger variables might increase the opportunities of you developing this form of vertigo:. Vitamin D shortage. Past head injury. High complete cholesterol degree. Having these threat factors doesn’t imply you will develop vertigo– they simply put you at an raised danger for the condition. Some people with vertigo case that “natural” or home remedies can improve the rotating and woozy feelings they feel. These remedies are usually used in addition to standard medical care. You should just try home complementary and also alternate treatments if your medical professional offers you the go-ahead. Some are completely secure, but others can trigger even more harm than excellent if you have certain medical problems. Repositioning Workouts You Can Do in your home. If your medical professional has actually detected you as having the most common type of vertigo, benign paroxysmal positional vertigo (BPPV), some techniques that are utilized to reposition crystals in your inner ear can be done in the house. Your doctor will certainly give you step-by-step instructions on just how to properly perform these evidence-supported exercises. The Epley maneuver, likewise called “canalith repositioning,” involves a series of head as well as body movements to move crystals out of the semicircular canals of your inner ear. It is normally thought about secure and reliable, according to study. While the therapy is frequently carried out by a expert at a medical professional’s office, you might be shown how to do customized exercises at home. Dietary Changes Might Assist Those With Ménière’s Condition. Some people with vertigo benefit from altering their diet plan. For example, those with vertigo signs and symptoms who were identified as having Ménière’s illness or migraine-associated vertigo may discover that preventing particular kinds of foods or materials can advertise fluid balance in the ears as well as body. Usual perpetrators that can worsen vertigo in certain people with these medical diagnoses include: Can Urinary Tract Infection Cause Vertigo High levels of caffeine. Can Supplements and also Essential Oils Assist? Generally, the research study on supplements as well as various other natural therapies is limited as well as variable relying on the details vertigo medical diagnosis. So it’s finest to review with your medical team if and exactly how best to include any of these treatments right into your therapy strategy. For example, a 2014 Ukrainian research discovered ginkgo biloba remove to be as efficient as a prescription medicine for dealing with vertigo signs in individuals without a details vertigo medical diagnosis. (5 ). Other research studies have actually shown that a lack of vitamin D is related to getting worse vertigo symptoms in some people with BPPV. (6) You can increase your levels of vitamin D by taking a supplement, obtaining more sunlight, or eating foods abundant in the vitamin. Nevertheless, there isn’t solid proof that dealing with vitamin D deficiency will considerably boost signs and symptoms. Some people claim that utilizing vital oils, like pepper mint, lavender, lemon balm, ginger, and also frankincense, assists enhance signs of vertigo. While there’s some evidence that certain oils have medicinal benefits, the outcomes are typically blended. Taking care of the Anxiety That Features the Problem. Some conditions that cause vertigo symptoms can be aggravated by anxiety. Managing your anxiety levels is essential for your total wellness. Meditation, deep-breathing strategies, or exercise may aid you feel a lot more unwinded. Speak to your physician for more suggestions on how to regulate your tension.
<urn:uuid:e7312c5f-f523-4bff-a50d-4c92f39ecc0b>
CC-MAIN-2023-14
https://click4links.com/can-urinary-tract-infection-cause-vertigo-fix-your-vertigo-quickly/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00477.warc.gz
en
0.929617
2,316
3.046875
3
Gestational Diabetes Skyrocketing Among Pregnant Women: Study [caption id="attachment_77531" align="aligncenter" width="460"] Study Shows Gestational Diabetes Soaring Among Pregnant Women[/caption] A study released by the Mount Sinai Hospital and the Institute for Clinical Evaluative Sciences has determined that over the fifteen year period from 1996 to 2010, the rate of diabetes among pregnant women has doubled. These forms of diabetes are called either pregestational or gestational diabetes. The complete report was published in the monthly peer-reviewed medical journal called Diabetes Care. It is most likely to occur in women who have their first child at age 29 or 30 and whose subsequent pregnancies occur later in life. The increased rate now has 10% of pregnancies developing these forms of diabetes, but most expectant mothers who develop it are over age 30. The magnitude of the jump in incidence over the 14-year period came as somewhat of a surprise, said lead researcher Dr. Denice Feig, an endocrinologist at Mount Sinai Hospital who heads the Toronto hospital's Diabetes in Pregnancy Program. "I have a clinic of women with gestational diabetes (GDM) and pre-gestational diabetes and we've certainly been noticing a marked increase in numbers in our clinics, so I expected that there would be a rise," she said. "But I suppose I didn't expect there to be a full doubling in both the GDMs and pre-GDMs, so that was a surprise." Even though gestational diabetes condition will usually end shortly after giving birth, it runs risks for the mother and child during the gestational period. According to Mount Sinai's Head Physician Dr. Denice Feig, the condition increases the risks for the mother and child and places a bigger burden on society. When the diabetes condition is diagnosed during the term of the pregnancy it is called gestational. If the mother already had the condition (via Type I or Type II) prior to getting pregnant, it is called pregestational diabetes. The elevated levels of blood sugar in the body that are concomitant to diabetes can cause trauma or damage to nerves, blood vessels, and organs to both mother and the unborn child. The condition also can increase the girth of the baby forcing physicians to deliver by Cesarean section. There is also the risk of the mother suffering a condition of high blood pressure and high urine protein called pre-eclampsia. Studies have shown that women with gestational diabetes are at higher risk of subsequently developing Type II diabetes. It is believed that obesity, lack of basic nutrition, and older age pregnancies are contributing factors to this trend. The study was published Thursday in the journal Diabetes Care.
<urn:uuid:bc60cefe-e3e3-446f-8472-580af942bc29>
CC-MAIN-2023-23
https://www.ecanadanow.com/health/2014/04/04/study-shows-gestational-diabetes-soaring-among-pregnant-women/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00034.warc.gz
en
0.952592
610
2.78125
3
EPIDAURUS | MAINLAND | CENTRAL GREECE The pan-Hellenic sanctuary of Delphi, where the oracle of Apollo spoke, was the site of the omphalos, the 'navel of the world'. Blending harmoniously with the superb landscape and charged with sacred meaning, Delphi was indeed the religious centre and symbol of unity of the ancient Greek world Despite the efforts of the Ministry of Culture, the invasion of cement construction and tourist boutiques in the modern village have wiped out all authentic identity. This is why anyone who knows the area prefers to stay in nearby Arahova. In any case, the only attraction for tourists here is the exceptionally interesting archaeological site of Delphi. DELPHI IN BRIEF Perched on the mountain-side at the foot of Parnassos, Delphi − population 2,500 − presents a breathtaking view over the olive groves of Amphissa against a background of the blue Corinthian Gulf and the mountains of the Peloponnese. DELPHI HISTORICAL INFO The area’s history begins in 1400 BC and is directly connected to the Oracle of Delphi. Kings, warriors, as well as a multitude of ordinary pilgrims came to Delphi to consult the oracle, the usually obscure pronouncements, with double meanings, of Pythia (the priestess). In exchange they offered up fabulous treasures, and a specific tax, the pelanos. In this way, between the 6th and 4th c. BC, the oracle became one of the wealthiest sanctuaries of the ancient world. A town of 10,000 inhabitants gradually sprang up around it. From the 6th c. a confederation with religious roots was constituted in a military and political association, the renowned Amphictyonic League, which in 582 BC reorganized the Delphic Games, which then took place every four years in honour of the god Apollo. In the 1st c. BC, Delphi was plundered by Romans. After Christianity was established, Constantine the Great stripped the oracle of its precious treasures, while subsequently Theodossios completed its devastation. After the Ottoman domination, German archaeologists, (from 1840) and the French School of Athens (from 1892) instituted extensive systematic excavations in the area, which brought the sacred site of Delphi back to light. The name of Delphi came from the word “Dirphys” meaning “chasm in the earth”. Originally the fumes emitted from this chasm had caused a shepherd by the name of Kouritas to mumble unintelligible sentences which sounded prophetic. This is how the most ancient goddess Ge or Gaia (Earth) acquired her oracle and her son, the monster Python, became its guardian. According to a later myth, two eagles let loose by Zeus, one from the east and one from the west, met at Delphi and dropped a sacred stone at this spot, known as Navel of the Earth. The sun god Apollo killed Python, for which he was called Pythios or Pythoktonos (Python Killer) and the oracle was dedicated to him. Daphne the mountain nymph, or according to others Sibyl, was the first priestess to pronounce the oracles. Later the prophetess, invariably a woman, was called Pythia from the name of Python. In the innermost shrine of the temple, the sacred tripod was placed over the legendary chasm. After having purified herself in the Castalian spring, the Pythia chewed laurel leaves and, dazed by the fumes, delivered the oracles which the temple’s priests would then interpret. WHAT TO SEE & DO IN DELPHI ARCHAEOLOGICAL SITE AND MUSEUM OF DELPHI Tel. 0030 2265082312 Summer 7 am-9 pm, weekends 8:30 am-3 pm, winter 9 am-3:30 pm, weekends 8:30 am-2:45 pm SANCTUARY OF APOLLO This very impressive site stands between two cliffs, the Phaedriades, in ancient times called Yambleia and Nauplia in ancient times. The Sacred Way A stone-paved road leading to the temple of Apollo. Along both sides, there were votive offerings, statues and treasuries offered by the Greek cities. Treasury of the Athenians A restored structure in Doric style dedicated to Apollo by the Athenians to commemorate their vic‐ tory over the Persians at Marathon. It was built with the spoils of the battle. Temple of Apollo Erected originally in the 6th c. BC and destroyed by an earthquake in 373 BC, the temple whose ruins we see today was rebuilt with a Doric colonnade all round and finished in 327 BC. The interior consisted of three divisions: the pronaos or first room, the back chamber or inner cell (sekos) and the adyton, the subterranean innermost shrine, where Pythia delivered her prophecies. At the NW corner of the sanctuary, it has a spectacular view of the site and the Delphic landscape. It was built in the 4th c. BC and repaired in 159 BC, with funds donated by King Eumenes of Pergamon. It is in good condition, seating 5,000 spectators. Almost 200 m long, but the track for the athletes − then in a straight line − was 178 m or 600 Roman feet. It was built initially in the 3rd c. BC and modified many times. What we see today dates to the end of the 2nd c. BC. It seated over 6,500 spectators for the Pythian Games which took place every four years. The Castalian Spring The water of the sacred source comes from a narrow fissure between the two Phaedriades rocks, flowing out just at their base and everybody who came to Delphi purified himself in it. SANCTUARY OF ATHENA PRONAIA It is locally called Marmaria and had five buildings: the tholos, the Treasury of Massalia — a fine 6th c. BC building — another treasury, Doric, of the 5th c. BC, of limestone and the two limestone temples of Athena, in Doric style also, one of the 6th c. BC, destroyed in the 4th c. BC and the other of later date. Of greatest architectural interest is the rotunda “tholos” of the 4th c. BC with marble Doric columns. Restoration has conserved three of the twenty columns. Its purpose is still unknown. ARCHAEOLOGICAL MUSEUM OF DELPHI Although small, the museum of Delphi has 13 rooms with exhibits of major archaeological value. In the entrance stands the Hellenistic copy of the Navel Stone from the temple of Apollo. Through the room with the Shields, on the right is the room of the Siphnians, dominated by the central Sphinx of the Naxians on an Ionic capital. On the walls, sculpture from the metopes of the Siphnian Treasury. After this, through the rooms of the Kouroi and of the Bull we come back to the room of Shields and turn left into the room of the Athenian Treasury with fragments of the sculptured pediments and metopes from the monument, depicting deeds of Theseus and Herakles. There are then five successive rooms with finds from the temple of Apollo and from the rotunda, until we come to the room of Agias where the imposing Ionic capital of an acanthus with the Three Dancing Girls (4th c. BC) is exhibited. In the next room there is the statue of the beautiful young favourite of the emperor Hadrian, Antinous. The last room contains the most famous statue, of greatest archaeological worth, the Charioteer, an offering by Polyzalos for his victory at the Pythian games of 478 BC. The life-size bronze masterpiece is 1.80 m high and was discovered almost intact in the area of the theatre. Take particular note of the eyes, which are authentic, of magnesium and onyx, and of the perfection of the head and feet. DELPHI TIPS & INFORMATION HOW TO GET TO DELPHI Ideally with your own transport or with an organized semi-private tour run by Athens Insiders. By intercity bus (KTEL), from Kifissou Station, Athens, Tel. 00302105124913 00302105124911 BEST SEASON TO VISIT EPIDAURUS All year round. DELPHI USEFUL TELEPHONES NUMBERS Delphi Town Hall 00302265082310 Delphi Tourist Police 00302265082220 Delphi Police 0030 2265082222 Delphi Rural Clinic 00302265082307 Delphi Taxis 0030 2265082000
<urn:uuid:d418f99b-6eab-464b-8167-883bbe07ac33>
CC-MAIN-2023-40
https://hipgreece.com/delphi/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00085.warc.gz
en
0.950177
1,884
3.140625
3
A push to screen children for diabetes at birth in Finland has identified about 75 percent of those who later developed diabetes at an early age. Finland has one of the highest rates of type 1 diabetes in the world, with 36.5 of every 100,000 children in the country developing the disease, according to the World Heath Organization. Identifying at-risk children shortly after birth will allow preventive measures to be taken in hopes of either delaying the onset of type 1 diabetes or preventing it altogether, wrote researchers in the March issue of Diabetologia. Unlike DPT-1 trials on first-degree relatives of people with type 1 diabetes, which only catch a small percentage of the total population, Finland’s Diabetes Prediction and Prevention Project is promising to identify a high percentage of the total population. The extensive testing is being conducted at three centers and represents nearly one-fifth of all births in Finland. Ninety-five percent of parents asked are saying yes to requests to test their newborns’ cord blood for the markers of type 1 diabetes. If markers are present, parents are asked to bring their children in at specified intervals for further study. About 75 percent of parents whose newborns were identified as being at-risk have participated in follow-up studies. During the first four years of the on-going study, which began in November 1994, only 55 percent of the children who went on to develop type 1 diabetes were identified. Researchers now use a different marker. If that marker had received more focus in the beginning of the study, 80 percent of cases would have been predicted. Researchers note that there are no therapies now that prevent or delay type 1 diabetes. However, they say, safe treatments that attempt to prevent or delay onset are available for human trials.
<urn:uuid:36639fc0-cee1-4269-bd4d-1aefbe1ecba6>
CC-MAIN-2017-39
https://www.diabeteshealth.com/stop-right-where-you-are-finns-testing-kids-at-birth-for-diabetes-/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691476.47/warc/CC-MAIN-20170925111643-20170925131643-00478.warc.gz
en
0.96811
361
3.046875
3
Feeding Javelina. Photo courtesy of the Victory Page web site Photo by Randy Victory. The first myth to break is Javelina can subsist solely on prickly pear cactus-FALSE. It can be an important part of their diet in the wild, but not the only thing they eat. The fact is some Javelina populations occur in areas where there's no prickley pear growing. While other herds residing in habitat which includes prickly pear only utilize it when it's bearing fruit in late summer or during prolonged drought. Experiments on captive Javelina revealed they could survive for as long as 3 months on a diet solely of prickly pear. Prickly pears nutritive value is low, containing about 15 percent fiber and 5 percent protein. A Javelina would need to consume 20 percent body weight daily to meet their protein requirements. Prickly pear cactus fed on by Javelina. (Click on picture for a really good close up) Photo by AP Jones. Prickly pear that Javelina have been feeding on will have fibrous edges since Javelina do not have chopping teeth to cleanly bite it off. The opposite is true of prickly pear eaten by cattle and packrats. The Un-Classic Omnivore Most literature lists Javelina as omnivorous (they eat plant and animal matter) in general, but plant material makes up the largest portion of their diets. Food source varies depending on which region they inhabit. They use strong molars and canine-like teeth to chew on coarse foods -- mainly cactus, mesquite beans, berries, tubars, bulbs, prickly pear, roots. They also eat flowers, acorns, and gourds if encountered. As carnivores, their diet is supposed to include grubs, worms, insect larvae, insects, toads, lizards, snakes, eggs of turtles, eggs and young of ground-nesting birds, and carrion. One of the worlds leading Javelina authorities, professor Lyle Sowls, dismisses the omnivore pronouncement on Javelina and considers them herbivores. The herbivore school of thought bolsters their belief by pointing to several extensive scat analysis studies which only turned up the occasional insect in Javelina fecal mater. Barrel cactus fed on by Javelina (Click on pictures to enlarge). Javelina will often feed for days on any overturned barrel cactus they come upon. They start at the root and will tunnel completely into the cactus. photo by AP Jones. My personal observations tend to support the strictly herbivore camp. I have never seen any sign of Javelina feeding on the many dead cattle or several horses, I have discovered in the desert (all in prime Javelina range). More importantly, I have encountered at least four rattlesnakes which were freshly killed by Javelina and not consumed. It would be very odd for a true omnivore to not take advantage of the protein offered by carrion or a fresh fill. Rattlesnake freshly killed by Javelina, and NOT eaten, in fact it's in a Javelina bedding cave. The tracks on the ground and in the cave tell the story--the Javelina were moving along a ridge mid-morning, when they stopped by a favorite resting place. The snake was sunning its self at the mouth of the cave. A quick struggle ensued, the snake lost, the Javelina moved on. The picture on the left is the scene as I discovered it. The snake was killed in the cave. The picture on the right shows canine puncture wounds on the snake (click on pictures to enlarge). Photos by AP Jones. Nevertheless, they can consume various cactus spines without difficulty. I'm not sure about their resilience to rattlesnake bites. Javelina diet and feeding habits also change with the season and, since they are a desert dweller, frequency of rain has significant impact as well. In general, Javelina of the southwest desert of Arizona, rely heavily on the forbs, grasses, and tubers that sprout following the January through April showers. When annuals, grasses, and forbs are dry by late May, Javelina shift to blossoms, pads and green fruit of cholla and prickly pear. By July through September beans, seeds, and fruit of catclaw, mesquite, palo verde, jojoba, scrub oak, saguaro, and prickly pear are available. Additionally, the August summer monsoon rains have revived another crop of forbs, grasses, and tubers to carry the Javelina through Fall. Note to readers. The Javelina University section was developed from information derived from over 20 different Javelina related informational sources. Please visit the References page.
<urn:uuid:344b9c01-e105-456c-8641-f72c0c9c7f4b>
CC-MAIN-2013-48
http://mbreiding.us/ert/Arizona/Rincons/javelinafood.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163045140/warc/CC-MAIN-20131204131725-00054-ip-10-33-133-15.ec2.internal.warc.gz
en
0.959602
1,016
3.28125
3
Transcript: Science and technology Investing in innovation (Our host is looking at a tablet computer and turns toward the camera.) Hi, I'm Kate. I work for Industry Canada. Here at Industry, we foster innovation through advances in science and technology. Innovation that results in economic growth, job creation, and other benefits for Canadians. It all starts with curiosity. (An illustration of a question mark appears. An animation of an atom with four orbiting electrons appears inside the dot at the bottom of the question mark.) We help researchers find answers to their questions. Answers that can lead to cures, new technologies and other breakthroughs. (An illustration of a microscope is drawn on a puzzle piece. This is followed by an animation of many puzzle pieces that come together to form a maple leaf. Each piece contains an image representing an area of science and technology. These images include: a circuit board, a rack of test tubes, a DNA string, a molecule, a planet (Saturn), a human brain, a satellite dish and so on.) By investing in programs that support basic and applied research, we help Canadians bring their ideas to market, creating new jobs and opportunities for growth. (A screen shot from the Science, Technology and Innovation Council website appears. The "About Us" page is featured.) We get advice on the state of science and technology from key experts — you can meet them here. Want to see how the government is investing in scientific innovation? We have that here, too. (A screen shot from our website is displayed featuring information under the "Find Financing for S&T" tab. Other tabs on this page are: "See Canada's investments in S&T," and, "See Canada's S&T Performance.") (The web page showing "Find money for your research" information appears.) If you are a scientist, researcher, or business investing in research and development, we may be able to help you find funding for your work. If you want to see all things science for the Government of Canada, please be sure to visit science.gc.ca. (The main page for the website Science.gc.ca is displayed.) Investing in discovery and innovation: it's part of what we do for you. (Industry Canada signature and Canada wordmark) (End of script)
<urn:uuid:79168e0d-0eda-44a5-b7f5-73c3000255a0>
CC-MAIN-2020-05
https://www.ic.gc.ca/eic/site/064.nsf/eng/07647.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614880.58/warc/CC-MAIN-20200124011048-20200124040048-00498.warc.gz
en
0.933334
487
2.578125
3
Five days after Yom Kippur, we celebrate Sukkot, one of the shalosh r’galim, the three so-called pilgrimage festivals. While each of these holidays has a specific historical framework, a unique spiritual theme, and an individual agricultural aspect, they all celebrate the bounty of the land. Sukkot, however, is the quintessential harvest festival. Its annual commemoration of the wandering of the Jewish people in the wilderness on their way to the Promised Land leads worshipers to a profound and inspiring spiritual lesson: that one of the most effective paths an individual can follow to faith in God is the one along which the fragility and ephemeral nature of life are taken truly to heart and allowed to energize and inspire the human spirit. - Alan Lucas in his chapter on the Holidays from The Observant Life
<urn:uuid:6559ad99-975b-4654-b840-99021cfcfecb>
CC-MAIN-2014-10
http://www.rabbinicalassembly.org/jewish-law/holidays/sukkot
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011126350/warc/CC-MAIN-20140305091846-00089-ip-10-183-142-35.ec2.internal.warc.gz
en
0.925813
175
2.609375
3
December 3, 1971 - The Indo-Pakistani Wars Updated: Jun 17, 2021 December 3, 1971. There’s a good chance you can blame it all on the British, but you could say that about many things. The continuing turmoil in South Asia blossoms once again into violence, as India and Pakistan find themselves in conflict over territorial disputes left behind by the British Empire. On this date, the Pakistani Air Force strikes India, marking the beginning of the 1971 Indo-Pakistani War. When Britain finally saw fit to grant India its independence after World War II, the settlement turned out to be a major point of contention. South Asia was and is a heterogenous, diverse, wildly mixed region of the world with over a billion people and dozens of languages. The regions that made up British India – modern Pakistan, India, Bangladesh and Sri Lanka – had never been part of a unified nation-state. The first time that all of South Asia had been under a single rule was when Britain established the Raj, or their direct rule of India, in 1858. So when Britain announced that they were prepared to given India independence, the various factions that had wanted this for years now had to look at each other and ask themselves what independence was going to look like. The British Raj was a complicated beast, and this would make the transfer of power to Indian self-rule very difficult. While a great portion of the Raj was under direct British control, there were numerous provinces still ruled by hereditary Indian princes or monarchs under British supervision; these were called the “princely states.” In 1846, the British victory over the Sikhs in northern India had led to the establishment of a Hindu-ruled princely state known as Jimmu-Kashmir, which lay at the northern extremity of British India close to the border with China. 100 years later, Jimmu-Kashmir was still ruled by a Hindu dynasty, but had a Muslim majority living within its borders. This was about to be an issue. With independence on the horizon, cracks within the Indian independence movements became more prominent. For decades, the face and soul of Indian independence had been Mahatma Gandhi, the leader of the Indian National Congress. Gandhi wanted a free and unified India where Hindus and Muslims could live together in a democratic state founded on religious pluralism, but unfortunately for everyone his dream was not universally shared. Hindus and pan-Indian nationalists still favored the Indian National Congress, but in 1906 a separatist All-India Muslim League had been founded that favored a separate state for India’s Muslims. At that point, around 20-30% of India was Muslim, and these separatists feared that a unified India would mean Hindu nationalism and supremacy. If this sounds familiar, that’s because it resembles similar strife in Ireland and Israel-Palestine prior to THEIR independence. No one wants to sign up for independence if they’re going to be a permanent minority. The Muslim separatist movement gained steam in the early 1940s, but it’s important not to paint with too broad a brush: there were Muslims and Hindus who believed in Gandhi’s vision of a unified, religiously tolerant India in addition to those Muslims and Hindus who wanted separate states. The British, caught in the middle, grew alarmed – only more so when the arguments broke out into outright violence in 1946. The similarities with Israel/Palestine are all the more striking because it was happening at the same time; the British were helpless to stop the rising tide of ethnic and religious violence sweeping across the subcontinent. Since I’ve first learned about this whole disaster, I’ve gradually lost a lot of sympathy for the British. Sure, they were in a tough situation, but it was a pickle of their own making. They had conquered India from what boil down to greedy imperialist impulses, and had been happy to beat the Indians over the head when it was convenient, but now that the country was at the boiling point they wanted nothing more than to get out without accepting responsibility for what they had done. The last British viceroy of India, Lord Louis Mountbatten, began to speed up the timetable for British handover of power to local authority. The final partition plan was passed on June 3, 1947, with the Indian National Congress bowing to the pressure of the Muslim separatists. Despite the opposition of Gandhi and Jawaharlal Nehru, the Congress’s most important public figures, the violence had only been rising since it had begun in 1946. Refugees were fleeing parts of India. The British had failed to keep the peace. Many began to reluctantly accept that there would be no choice but to divide India. The decision was made to split the British-governed areas of India into two independent states: the Dominion of Pakistan, made up of Muslim-majority areas, and the Dominion of India, made up of Hindu-majority areas. Two provinces, though, had nearly equal portions of Hindus and Muslims that lived in separate areas of the province. These were Punjab in the northwest, with its largest city at Lahore, and Bengal in the southeast with the cities of Calcutta (Kolkata) and Dhaka. The dividing line within these provinces would cause much controversy, especially since the partition would isolate millions of Muslims in Bengal almost a thousand miles from the rest of Pakistan. This territory would be referred to as “East Pakistan,” and its turmoil would be the ultimate cause of the 1971 Indo-Pakistani War. Mountbatten bent to pressure to speed up the turnover of authority, slating August 15, 1947 as the date when Indian and Pakistani governments would take control of their regions. This disastrous idea only gave Indians six weeks to digest the partition plan and make their arrangements, which placed an exclamation point on the ethnic violence and migration. With the partition looming, millions of refugees and immigrants flocked across the border in either direction. Out of a pre-partition population of 390 million, the new boundaries would leave 330 million in India, 30 million in West and 30 million in East Pakistan, but the ethnic and religious violence was driving a great deal of border crossing. Almost 14.5 million people would be displaced by the partition, with as many as a million probably perishing in the process. Vast population transfers ALWAYS result in hardship, suffering, and death without exception, and the Partition of India was no different. One final part of the partition plan, though, caused immediate trouble and continues to cause trouble to this day. Remember those “princely states” that were still ruled by monarchs under British supervision? Well, one of those princely states was Jammu-Kashmir, an ethnically divided province ruled by a Hindu prince. The partition plan called for the “princely states” to make statements of accession to either India or Pakistan, creating a dilemma for Maharaja (King) Hari Singh of Jammu-Kashmir. Terrified of the religious violence that he saw breaking out across India, but not wanting to anger his marginal majority Muslim population, Hari Singh wavered and failed to side with either state, even as the partition deadline passed. Fearing that Hari Singh would join India, Muslim militias attacked from Pakistan into Jimmu-Kashmir on October 22, 1947. The Indian Army responded, and soon a shooting war was underway. The Indo-Pakistani War of 1947-48, also known as the First Kashmir War, would prove to be a strange conflict since the top officers on both sides were British generals. The transition of power had not yet finished, and the British Indian Army had been partitioned along with India itself, but at the same time all the generals were still British nationals. This led to the very odd reality of British generals commanding two armies technically at war with each other, with each doing their best to avoid conflict but also preserve the subordination of the military to civilian officials. By the time the dust cleared from the first Indo-Pakistani War, Kashmir had been partitioned just like the rest of India. This division, though, was based on a ceasefire signed in 1949 and has never been truly settled. To this day, both India and Pakistan claim ALL of Kashmir, and it has been the major source of conflict between the two states ever since. Despite the long duration and open hostilities of the conflict, it resulted in very few deaths from direct action – only 1,000 Indians and 6,000 Pakistanis. These losses were vastly outweighed by the ethnic cleansing and insurgent violence that took place all throughout the Partition of India, and the small size of the forces involved – along with British attempts to keep active combat to a minimum – contributed to the small casualty lists. It wouldn’t stay that way forever. Despite the assassination of Gandhi in January 1948 by a Hindu nationalist angry at his promotion of a unified India, Jawaharlal Nehru led India into a new existence as an independent nation. In 1950, India formally separated from any British dominion and declared itself a Republic, instantly becoming the largest democracy in the world. The new Indian Army, a direct descendant of the old British-led Indian Army, was modeled on its predecessor and inherited much of its organizational culture and doctrine. This was also true of the Pakistan Army, but there was one major difference between the armies of the two states. The Indian Army stayed out of politics and continued to subordinate itself to civilian control, while the Pakistan Army played an increasingly prominent part in it’s country’s politics and in 1958 installed General Ayub Khan as the new President in a coup d’etat. Both India and Pakistan remained prominent members of the “non-aligned” bloc in the Cold War, a forum of nations that refused to ally with either the United States or the Soviet Union. Despite this official aloofness from the Cold War, peace did not reign in South Asia. The Kashmir conflict continued as an undeclared guerrilla war. The European nation of Portugal still held the key city of Goa on the coast of western India; in 1961, the Indian Army launched an operation to seize this outpost from Portugal’s fascist government. In 1962, India clashed with China on its northern border; this small skirmish was widely perceived to be a humiliation for the Indian Army and bred a slight feeling of military inferiority within India’s citizenry. India and Pakistan clashed once again in 1965, when Pakistan was caught infiltrating insurgents into Kashmir through its “Operation Gibraltar” plan. This was the last straw on top of a series of border clashes throughout the years over still-disputed chunks of territory on the Indo-Pakistani border. Pakistan believed that India was on the verge of defeat in Kashmir, and only needed a push; 30,000 Pakistani soldiers in civilian garb crossed the ceasefire line into Indian-occupied Kashmir on August 5, 1965. Ten days later the Indian Army launched a major counterattack in Kashmir, and the escalating cycle of violence spiraled out of control. The Indo-Pakistani War of 1965 really began on September 6 when the Indian Army crossed the international border in a frontal assault on Pakistan. This 17-day conflict proved to be a bruising and tough fight for both sides, at least equal to the Arab-Israeli Wars in scale. India had a far larger military and greater numbers of equipment, but Pakistan gave as good as it got. There were several large battles, including the world’s largest tank battle since World War II at Chawinda, September 14-19. Hundreds of Pakistani M48 Pattons and Indian Shermans and Centurions swirled in this great struggle on the plains of the Punjab. Jet fighters battled in the skies, and a few Pakistani coastal towns were even bombarded by Indian frigates. It was a land-air-sea war between peers – something that is supposed to be impossible in the post-1945 world. The Indo-Pakistani War of 1965 ended with a ceasefire on September 23 under pressure from both the Soviet Union and the United States. While the war itself came out to a stalemate, it was evident to everyone that India had gained the upper hand in the final days of the fight, especially after the bloodying they had given the Pakistan Army at Chawinda. With the climactic clash of the Indo-Pakistani conflict yet to come, it was clear that India was making its superior weight of population and resources felt. Their greatest advantage, though, was quickly becoming apparent: the superior professionalism of the Indian Army. By remaining subordinate to civilian control, the Indian Army was free to focus its attention on training, doctrine, and reform rather than meddling in politics and engaging in bitter infighting. The Pakistan Army was an organ for dictatorial control from the Presidential office; the Indian Army could focus on its job, which was to win wars. This would become undeniable when the 1971 crisis escalated into the largest and most decisive of the Indo-Pakistani Wars. Pakistan faced major internal issues in the late 1960s and early 1970s, largely related to the eastern half of former Bengal, aka East Pakistan (modern Bangladesh). The two Muslim-majority sections of former British India, West and East Pakistan, were geographically divided by almost a thousand miles, and India sat between them. The political and military elite of Pakistan were all West Pakistanis, even though the majority of the population lived in East Pakistan; the generals who continued to rule over Pakistan continually squelched the rights and freedoms of East Pakistanis, especially the large Hindu minority. The Pakistani actions in Bengal can be justifiably described as state-sponsored ethnic cleansing. The riots and protests in East Pakistan led to the resignation of Ayub Khan and the rise of Army chief Yahya Khan as the new President of Pakistan. When the 1970 elections resulted in the Bengali separatist Awami League winning a large majority in the Assembly, Yahya Khan forbade the Assembly to meet and began to impose a strict crackdown. Soon ethnic tensions flared up as the West Pakistani elite sent the military into East Pakistan, outlawing the Awami League and arresting its leaders. But this was only the beginning of Pakistan’s crackdown on Bengal separatism. After Yahya Khan’s cavalier statement “Kill three million of them and the rest will eat out of our hands,” one of the 20th Century’s forgotten genocides began. Early in 1971, the military began to undertake a deliberate mass operation to behead the Bengali community, targeting Hindus for special brutality. No one is sure how many Bengalis were killed in “Operation Searchlight,” but the estimates reach as high as three million and included a systematic campaign of rape. Some local religious leaders declared Bengali women as “public property” and urged that they be taken by Muslim Pakistanis. The horror of the Bangladesh Genocide sent almost ten million refugees, largely Hindus, fleeing across the border into India. Prime Minister Indira Gandhi of India, the daughter of Jawaharlal Nehru, is a divisive figure in Indian memory. She was as close to a dictator as India has ever had, centralizing power at the expense of the states and using emergency powers in the late 1970s to suspend civil liberties and arrest her critics. It was under her auspices that India developed nuclear weapons and moved closer to the Soviet Union. To this day, Indira is associated with nepotism, corruption, and the weakening of Indian democracy. Though she was assassinated in 1984 after attacking and demolishing a Sikh religious site, her shadow hangs over India. She was only able to ascend to the height of her power and gain the prestige to accomplish these feats because she would oversee Indian victory in 1971. As early as April 1971, Indira Gandhi had asked the Indian Army Chief of Staff, Sam Manekshaw, if he was ready for war with Pakistan. This is the point where your action-movie general says “as soon as you give the word, ma’am,” but Manekshaw stood up to the political pressure. He understood that the media of both India and Pakistan was driving the two nations to war, and that India’s appeals to the United Nations had failed to halt the genocide, but the Indian Army was still refitting with new tanks and was not immediately ready for war. Despite the public demand for war, Manekshaw – exhibiting public courage - told Indira “No.” After offering to resign and being turned down, he then told the Prime Minister that he could guarantee victory if she would give him the time he needed and let him fight the war on his terms. Indira agreed, and the two countries were headed to war once more. India was not idle as they built up their strength and made their plans. As Pakistan’s people marched in the streets to encourage their country to go to war, the Indian government had used the refugee camps near East Pakistan to recruit and train a large number of Hindu guerrillas. These units were then sent back into East Pakistan to ambush, assassinate, and terrorize any Bengali figures loyal to Pakistan. This forgotten campaign of state-sponsored terror only encouraged further reprisals by the Pakistan Army, which played right into Indian hands. This is why terrorism is so scary: because it often has the intended result. The Indians may have wanted to help the Bengalis, but they also wanted to hurt Pakistan, and it’s sorta clear which one they thought was more important. With the war fever in both India and Pakistan beginning to hit the roof, Manekshaw prepared the Indian Army for war. Despite his long-term preparations, though, India would not start the conflict. Finally bowing to public pressure, President Yahya of Pakistan ordered a massive air strike to initiate hostilities against India. On December 3, 1971, the Pakistan Air Force launched a surprise attack – Operation Genghiz Khan - on eleven Indian air bases across the border. This was intended to mimic the Israeli Air Force’s successful demolition of the Egyptian Air Force at the start of the Six-Day War, which had caught the Egyptians totally off guard and ensured Israeli air supremacy in that conflict. The Pakistani strike, however, was significantly less successful and failed to seriously damage the Indian Air Force. Key lesson here: if you launch a surprise attack on a larger nation that has been preparing to fight you for months, you better make sure that it lands. Because if it doesn’t you’re screwed. Indira Gandhi declared on the evening of December 3 that a state of war now existed between India and Pakistan. Manekshaw quickly mobilized his troops and launched his battle plans. The Indians were significantly larger and better-trained than the Pakistanis, and they exploited this advantage with superior planning. Manekshaw had two objectives as soon as hostilities began: overrun East Pakistan, destroying the isolated Pakistani forces there, and hold the line on the main Indo-Pakistani border. While conflict erupted on both fronts, the Indian Army’s invasion of East Pakistan became the focal point of the war. It was one of the most carefully planned and impressively executed operational feats since the Second World War. Manekshaw’s army and corps staffs had devised a three-pronged envelopment of East Pakistan by nine divisions with close air support, including an aerial envelopment by helicopter that airlifted much of the 57th Mountain Division to seize the key bridge at Meghna Heli. A celebrated airborne assault by the 2nd Parachute Battalion also seized a key bridge on the road to Dhaka. The Indian invasion of East Pakistan was a masterpiece of combined-arms warfare, with air and ground units supporting each other in decisive and rapid actions that totally unhinged the Pakistani forces. In only 13 days, from December 3 to December 16, the Indian Army overran East Pakistan and forced the surrender of the Pakistani forces in the province. India experienced similar triumphs elsewhere, with their Air Force gaining supremacy over the skies. On the western border, the Indians not only repulsed Pakistani attacks but counterattacked, advancing deep into Pakistani territory. The Indian Navy also manhandled their Pakistani counterparts in a clash at Karachi, destroying several oil storage facilities and imposing a naval blockade on Pakistan. American concerns about Indian naval activities caused the USS Enterprise to move into the Bay of Bengal, only to be countered by a Soviet flotilla, resulting in one of the typical Cold War standoffs that had nothing to do with the actual conflict at hand. The Indians and Pakistanis didn’t want either of the great powers involved in their personal conflict. Nevertheless, the Indians were utterly triumphant; on December 16, 1971, hostilities officially ended. The entire Pakistani force in East Pakistan had surrendered, leaving 90,000 POWs in Indian hands – the largest surrender since World War II, and composing a third of the Pakistan Army. Indian leaders were surprised and delighted with the apparent ease of the victory, but Gandhi was surprisingly restrained in her reaction to the victory. Most of the conquered territory in the west was eventually given back to Pakistan as a show of good faith, while East Pakistan officially became the independent nation of Bangladesh. Despite India’s role in its liberation, Bangladesh’s relations with its savior soon soured; India ultimately saw very little political returns for their sweeping victory. The 1971 Indo-Pakistani War nevertheless destroyed any possibility of Pakistan counterbalancing India within South Asia, since Pakistan lost half of its population and much of its economy in the process of losing Bangladesh. Pakistani morale utterly collapsed, with the trauma and humiliation of defeat resulting in the downfall of the Army and political instability. India’s triumph erased the stain of the 1962 war with China and confirmed the prestige of both Indira Gandhi and the Indian military. Pakistan’s insecurity after the war caused it to begin a nuclear program, and India soon responded out of necessity; India tested its first bomb in 1974 and Pakistan in 1998. The development of nukes, more than anything, has probably prevented many a major conventional clash between the two nations of India and Pakistan. India and Pakistan engaged in a brief tussle in the mountains of Kashmir in 1999; this conflict, known as the Kargil War, started when – what else – Pakistan was caught slipping militants into Kashmir. Kashmir to this day remains a source of bitter strife between the two nations, and recent troubles between India and China in the same sector have raised concerns that a new contender might be entering into the struggle. Only time will tell. Yeah, India and Pakistan can blame the British for all of this, I think – but if they have beef with Britain, they’ll have to take a number.
<urn:uuid:cefab2ff-c23f-49ff-a5b3-caa1094afb6a>
CC-MAIN-2023-40
https://www.unknownsoldierspodcast.com/post/december-3-1971-the-indo-pakistani-wars
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00225.warc.gz
en
0.971715
4,671
3.4375
3
The “out of Africa” theory—promoted by the leftist establishment in its mania to prove racial equality—has been thoroughly disproven with the news that the oldest homid fossils have been found in Europe, not Africa. According to a new article published in the PLOS-One journal, titled “Potential hominin affinities of Graecopithecus from the Late Miocene of Europe,” (May 22, 2017), two fossils of an ape-like creature which had human-like teeth have been found in Bulgaria and Greece, dating to 7.2 million years ago. The discovery of the creature, named Graecopithecus freybergi, and nicknameded ‘El Graeco’ by scientists, is at least 200,000 years older the oldest hominid found in Africa—something that should be impossible if the “out of Africa” theory was true. “This study changes the ideas related to the knowledge about the time and the place of the first steps of the humankind,” said Professor Nikolai Spassov from the Bulgarian Academy of Sciences. “Graecopithecus is not an ape. He is a member of the tribe of hominins and the direct ancestor of homo. The food of the Graecopithecus was related to the rather dry and hard savannah vegetation, unlike that of the recent great apes which are leaving in forests. Therefore, like humans, he has wide molars and thick enamel. The team analysed the two known specimens of Graecopithecus freybergi: a lower jaw from Greece and an upper premolar tooth from Bulgaria. Using computer tomography, they were able to visualize the internal structures of the fossils and show that the roots of premolars are widely fused. “While great apes typically have two or three separate and diverging roots, the roots of Graecopithecus converge and are partially fused—a feature that is characteristic of modern humans, early humans and several pre-humans,”, said lead researcher Professor Madelaine Böhme of the University of Tübingen. The lower jaw, has additional dental root features, suggesting that the species was a hominid. The species was also found to be several hundred thousand years older than the oldest African hominid, Sahelanthropus tchadensis which was found in Chad. “We were surprised by our results, as pre-humans were previously known only from sub-Saharan Africa,” said doctoral student Jochen Fuss, a Tübingen PhD student who conducted this part of the study. Professor Böhme added: “Our findings may eventually change our ideas about the origin of humanity. I personally don’t think that the descendants of Graecopithecus died out, they may have spread to Africa later. The split of chimps and humans was a single event. Our data support the view that this split was happening in the eastern Mediterranean—not in Africa. If accepted, this theory will indeed alter the very beginning of human history.” * The debate is founded upon the theory that primates “evolved” into homo erectus. This theory is however also just hat—a theory. The “out of Africa” theory—also just a theory—has long been promoted to argue that all the human races “are African”—when in fact they are distinctly not.
<urn:uuid:d15220ac-2ce7-4a14-9b0f-89d1b9be93d6>
CC-MAIN-2020-24
http://newobserveronline.com/europe-birthplace-of-mankind-not-africa-scientists-find/?replytocom=24850
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396495.25/warc/CC-MAIN-20200528030851-20200528060851-00001.warc.gz
en
0.965407
726
3.03125
3
e=”text align: center”> A student at Hampton Elementary School in Barbourville, KY, gets ready for a free exam through Kids First Dental, a mobile clinic Photo: Stephen Crowley, for the New York Times Children in rural communities, particularly those who come from families with low incomes, are often victims of neglect who suffer tooth decay, oral abscesses and advanced periodontal disease. In a rural state such as Kentucky, for example, dental decay is the number one infectious disease in children. Dental pain is the number one excuse for public school absences. Other states with large rural populations have similar problems. Among North Carolina parents who feel that their children have unmet health care needs, 57% report the unmet need is for dental care nearly twice the number reporting lack of medical care (North Carolina Institute of Medicine Task Force on Dental Care). The same study found that lack of dental care, common among low income and Medicaid eligible adults and children, often results in severe or persistent pain, inability to eat, swollen faces, and increased susceptibility to other medical conditions. Federal statutes require Medicaid to offer dental insurance to all children eligible for the program, yet many rural communities find that low income children do not have access to dental care. Three of every four school children in the Appalachian coalfields of Southeast Kentucky are eligible for Medicaid or for KCHIP, based upon family income. Despite years of advancement, including the establishment of two Colleges of Dentistry and an impressive water fluoridation program, Kentucky is a national leader in toothlessness. There are fewer than four hundred dentists statewide who are significant providers of services, for an estimated three hundred thousand poor Kentucky children. Despite free dental insurance, poor rural children do not receive dental exams and treatment for a number of reasons. *Many children grow up in homes where the adults do not have regular dental treatment, and so the children are not taken to the dentist. A survey in North Carolina found that on average, only 20% of Medicaid recipients visited the dentist in 1998. *Many dentists do not accept Medicaid because of the low reimbursement rates. One study identified 26 cases, from 21 jurisdictions, of successful litigation forcing states to bring Medicaid reimbursement more closely into line with reasonable and customary charges. California, Arkansas, Connecticut, Illinois, Indiana and North Carolina were among the states forced to improve reimbursement after equal protection claims were litigated. *There are fewer dentists practicing in rural areas compared with urban centers, and even fewer in rural practice who specialize in pediatric dentistry. Rural areas have fewer dentists per capita, as shown by this map of Health Professional Shortage Areas; the counties in darker colors need dental clinicians the most, according to the National Health Services Corps Yet, taxpayer funds spent on dental services have clearly positive effects, both immediate and long range. Studies have shown that the age of a child's first preventive dental visit has a significant effect on dentally related expenditures; average dentally related costs are lower for children who receive earlier preventive care. An October 2004 study published in Pediatrics showed that children in North Carolina who had their first preventive visit at age 2 or 3 were more likely to have subsequent preventive, restorative, and emergency visits than were children who had seen a dentist as infants. “In addition, children from racial minority groups had significantly more difficulty in finding access to dental care, as did those in counties with fewer dentists per population,” the study concluded. Some dentists are beginning to create innovative models for health care delivery, Ed Smith, DMD, is a Barbourville, Kentucky, dentist serving patients in Knox and surrounding counties. Dr. Smith operates a robust practice that synthesizes the high expectations of business and professional patients with the desperate unmet need of the community’s low income population. Through his nineteen years of practice, Dr. Smith has built his work around the complete community of patients, whether they are professors at Union College, teachers in the local schools or underemployed adults with no insurance. He and his partner, Dr. Devert Owens, have seen people who have pulled their own teeth with pliers or tried to replace loosened crowns with Super Glue and women whose teeth had been knocked out in domestic fights. Even though more than 70 percent of the children in Knox County qualify for free or reduced lunches and therefore for Medicaid or KCHIP, few receive regular dental care. Dr. Smith has formed a partnership with the local Family Resource/Youth Service Center that serves Knox County. After a series of discussions with local social service workers, Dr. Smith decided to take the dental care directly to children at school. He spent $150,000 to buy a used mobile CAT scan unit and outfit it with used dental equipment. That was the beginning of Kids First Dental, a unique school based dental program to improve access to dental care, particularly among low income children. In the fall of 2005, Dr. Smith parked the van at Lynn Camp Elementary and saw more than 750 children. Children were sent home with treatment plans and a directory of local dentists so that they could make appointments for future dental care. Family Resource Center staff followed up with parents to make sure children received the treatment they needed. The program has been so successful that Dr. Smith expanded Kids First into a number of adjoining rural counties. “This system has actually brought some children into my office for the treatment they need,” Smith said. “And some of the other dentists in town that I’ve talked to say the same.” The practice was featured in a front page article in the New York Times last year. Smith’s model is one of several nationally recognized innovations in the country. To address North Carolina's problems with pediatric dental care, North Carolina Health Choice for Children was formed and has expanded coverage to youths whose family income is slightly above the Medicaid guidelines. North Carolina is also producing health brochures in Spanish and Hmong to better communicate with children of immigrant families. Washington State has received recognition for its Access to Baby and Child Dentistry Program, formed in 1994 by concerned dentists, public health offices and others. In Washington, general dentists who receive advanced training in pediatric care are eligible for higher reimbursement from the state Medicaid program. ABCD has been shown to increase the participation by private dentists in Medicaid. In February 2008, the Kentucky General Assembly passed a bill that would require children to have their teeth examined before beginning school. Dr. Ed Smith testified before a legislative committee on behalf of the bill, despite resistance from some educators who argued that the requirement might discourage some parents from sending their children to school. Dentists in Kentucky and elsewhere have asked for studies that determine the true cost of providing dental services to children. Medicaid in many states pays less than 65 percent of the usual and customary costs for services. “Medicaid providers are excited about the opportunity to participate in cost studies,” Dr. Owens said. “It is their belief that reimbursement rates remain inadequate, and that they are losing money by participating in the program, but who continue to believe in the necessity of the program and in its missio
<urn:uuid:426b1683-0ce6-4558-a1b2-10a837d96734>
CC-MAIN-2020-05
https://www.dailyyonder.com/rural-dental-care-younger-better/2008/10/29/p-1283/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251778168.77/warc/CC-MAIN-20200128091916-20200128121916-00519.warc.gz
en
0.96407
1,484
2.984375
3
Razor blades need to be kept sharp to ensure you get an effective shave. Sharp blades also reduce the risk of shaving rash and bumps. Unless you have a traditional straight razor, this will mean replacing the old blades and disposing of them safely. Read how to dispose of and recycle razor blades (in the UK). The main razor blades that can be recycled are those used with double edge (DE) safety razors. We’ll primarily look at how to dispose of and recycle DE razor blades, but first we want to tackle how to dispose of the other varieties of razors and blades. Disposing of Different Razor Blades Not all razor blades can be recycled due to the way that they are fixed into the razor. Let’s start by considering which blades from which razors can be recycled. Disposable razors are designed to be thrown away; handle, blade and all. The blade is attached to the razor handle and can’t be removed so the whole thing has to go into the bin. When throwing away a disposable razor, wrap the blade end in newspaper or paper, secure with a piece of tape and then throw into the normal bin. This prevents the blades from doing any harm. While they might be very convenient, disposable razors aren’t environmentally friendly as the plastic doesn’t break down. In the long run, they are also more expensive than a reusable razor with replacement blades. There are lots of cartridge razors available where the head, which includes the blades, can be replaced. The blades don’t come out of the razor head, however, so the entire head needs to be thrown away. To dispose of cartridge razor heads, wrap the head in newspaper or waste paper, secure with tape and then throw into the normal bin. Again, this prevents the blades from posing a hazard. These are more environmentally friendly than fully disposable razors, but the head still contains plastic that won’t break down. They are also more expensive than using a traditional double edge safety razor. There are lots of different varieties of straight razors available. Traditionally, straight razor blades are fixed to the razor handle and therefore require stropping and honing to keep them sharp, and are not disposable. However, there are other types of straight razors with replaceable blades. Many of these use double edge safety razor blades which can be slotted into the razor, but you can also get disposable shavette blades that are longer in length. Both of these types of blades can be recycled as they are made purely of metal without any plastic components. To learn how to dispose of replaceable straight razor blades, you can follow the same process for disposing of safety razor blades detailed below. How To Dispose of Safety Razor Blades First of all, you probably already know that you can’t simpy throw the blade away in the normal bin. Even when the blade has become dull, it’s still extremely sharp and could pose a significant hazard. The safest way to dispose of razor blades is to recycle them -- it’s also much more environmentally friendly -- but you can also throw them away in your household waste if you store them correctly. How To Dispose of Safety Razor Blades Collect The Blades Safely When you remove the blade from your safety razor, it’s important that you immediately put it somewhere safe where you can’t encounter it accidently or where children could find it. Collecting the blades also means that you can dispose of them all in one go, rather than one at a time. There are a few different ways to collect the blades safely. - Use the old case Many safety razor blades come in packaging that has an extra part designed to collect the used blades. This is usually a slotted component in the packaging. A pack of the Feather Hi-Stainless Blades is a great example of this. It has a compartment on the back of the case designed to store used blades. It’s convenient, but is only designed to store around 10 blades at a time. - Make a blade bank Use an old container or jar to collect up all your old blades. You have to make sure that it can be sealed up securely so there’s no risk of it being knocked and the blades coming out. Find something with a plastic lid and cut a small slot in the top through which to post the blades. Seal the lid to the rest of the container. Label it properly and keep it out of the way. A blade bank will allow you to collect up a lot of blades before throwing them away once it’s full. However, you can’t recycle them if you follow this technique. - Buy a blade disposal tin Blade disposal tins are designed for storing old blades so you can then recycle them all in one go when the tin is full. Most are small in size but still have the capacity to hold around 100 blades, sometimes even more! The blades are kept neatly and safely out of the way. The advantage to this technique is that the tin itself can also be recycled along with the blades so you don’t have to worry about emptying it at the end. Disposing of The Blades From the razor blade container If you’ve used the first technique and filled your razor blade packaging compartment, you can simply throw it away in your normal rubbish once it’s full. The compartment in the container will keep the blades from posing a hazard to people or animals. With a blade bank If you’ve made your own blade bank, you can also just throw this away in your normal rubbish. Seal the slot in the top using paper and tape (or similar) and throw the whole thing into your normal household waste bin. However, neither of these two methods allow you to recycle the blades. A lot of people choose to use safety razors because it can be a zero waste option as the blades can be recycled after use. How To Recycle Safety Razor Blades Because safety razor blades are made entirely of metal, they can be recycled. You’ll need to check with your local authority on what can be recycled in your area, but most places in the UK will make it easy to recycle your safety razor blades. Once you’ve collected them up, you can take them to your local recycling centre and put them into the scrap metal container. You’ll be able to find your nearest recycling centre by visiting your local authority website. The most effective and efficient way to do this is to invest in a recyclable disposal tin. Collect up all your blades in the tin and then the whole thing can be recycled in one go. It’s safe and practical. You might even be able to put this straight into your plastics and metals wheelie bin, depending on your local recycling authority.
<urn:uuid:7c605aa3-0545-402b-8c60-499ce0ee0c50>
CC-MAIN-2020-29
https://www.theenglishshavingcompany.com/blog/dispose-recycle-razor-blades
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655924908.55/warc/CC-MAIN-20200711064158-20200711094158-00206.warc.gz
en
0.926788
1,432
2.5625
3
A Bitcoin private key is a vast number kept confidential and utilized for BTC transactions. This article delves into what a Bitcoin private key is and how it facilitates access to funds. Additionally, the piece highlights the distinctions between Bitcoin private key formats like hexadecimal, wallet import format (WIF), and compressed wallet import format (compressed WIF). What is a Bitcoin Private Key? In the introduction, we mentioned that a Bitcoin private key is essentially a 256-bit number. A 'bit' is a binary digit, which can only be a 0 or a 1, and is the smallest unit of data computers recognize. Thus, a Bitcoin private key can be represented by a string of 256 ones and zeros. So, if a Bitcoin private key is just a 256-bit number, then can a private key be expressed in a 256-character string of ones and zeros? Indeed, it can. Here’s an example: This is a bitcoin private key displayed in binary format. You might think of generating a bitcoin private key by flipping a coin 256 times, with heads being 0 and tails being 1, or vice versa. However, relying on coin flips is not recommended. Humans often fail to generate true randomness due to various factors like imperfect coin tosses or coin physical flaws. For optimal security, utilize software or tools designed to create a bitcoin private key with high entropy. It's paramount to keep your bitcoin private key confidential. Be cautious of online lists of exposed bitcoin private keys, as their linked public addresses are compromised, making it rare to find bitcoin private keys with untouched funds. While binary is one representation, bitcoin private keys have other formats. One is the decimal format. For example, the number “thirteen million” in decimal is 13,000,000. Using a converter, the bitcoin private key in binary can be translated to its decimal equivalent. As you can see, the bitcoin private key is derived from an incredibly large number. In simple terms, this vast number underpins the security of Bitcoin. The bitcoin private key makes it exceedingly challenging to reverse-engineer from a Bitcoin address. Bitcoin Private Key Security Bitcoin private keys are akin to bank accounts, but instead of a typical password, they're secured with immensely large numbers. If someone were to guess your Bitcoin private key correctly, they could access your BTC and potentially misappropriate your funds. But due to the sheer magnitude of these numbers, such an occurrence is almost impossible. To visualize: if every human tried guessing your Bitcoin private key 1 billion times daily for 100 years, the likelihood of success is roughly 1 in 3,512,469,265,893,923,428,170,004. Ponder that. Now, you might ask about public keys and addresses, given they're public knowledge. Could they lead someone to your Bitcoin private key? The answer is no. It's nearly as improbable as someone randomly guessing your Bitcoin private key. The Bitcoin system ensures this with two security layers: Elliptic Curve Cryptography (ECC) and cryptographic hash functions Part I: Elliptic Curve Cryptography Bitcoin uses Elliptic Curve Cryptography, specifically the secp256k1 version of the Elliptic Curve Digital Signature Algorithm (ECDSA). The underlying math is intricate, but to grasp its significance, you don't need the specifics. It's how the ECDSA ensures the Bitcoin private key remains confidential. As mentioned, a Bitcoin private key is a substantial numeric value. Multiplying this number with a preset "generator point" on the secp256k1 elliptic curve gives a corresponding public key. Each Bitcoin private key equates to one public key. In simple terms, a public key is a curve point (y^2 == x^3+7). It consists of an x and y coordinate, combined (with a minor prefix for format). Two main advantages are evident. Firstly, sharing the public key doesn't compromise the safety of the Bitcoin private key. Secondly, this Bitcoin private key can create digital signatures, allowing the network to verify its authenticity without exposing the Bitcoin private key. It's the foundation of most transactions. Experts suggest that quantum computers might threaten ECDSA in the future. Hence, for enhanced security and a more user-friendly experience, we usually transact using addresses instead of public keys, providing another encryption layer to the public key. Let's delve deeper into the distinction between an address and a public key. Part II: Cryptographic Hash Functions Cryptographic hash functions generate a digital fingerprint of data. These functions possess crucial properties which make them invaluable. Firstly, they are irreversible. An input produces an output, but deciphering the original input from the output using the bitcoin private key or otherwise is impossible. Secondly, regardless of the input size, the output is a fixed-length, seemingly random string. An input of ten words or ten thousand words both yield a 64-character output. Thirdly, consistent inputs yield consistent outputs. Using the same data with the same hash function repeatedly will always provide identical results. Fourthly, the chance of two different inputs generating identical outputs is negligibly small. If such a case arises, the hash function is deemed compromised. Moreover, it's essential for these functions to operate rapidly. Thus, with a secret input, verifying its corresponding output, or the hash, against a publicly-known hash is straightforward. For enhanced security, Bitcoin addresses are preferred over public keys. When a public key undergoes two rounds of hashing, first with SHA-256 and then with RIPEMD-160, it produces what's called a "pubkey hash." As hash functions are non-reversible, having someone's pubkey hash lets you transact with them, but their bitcoin private key remains undisclosed. To formulate an address from the pubkey hash, it's prefixed with a version byte (typically 0x00 for Bitcoin). This string is then hashed using SHA-256. The initial four bytes of this hash are attached to the end of the RIPEMD-160 hash, and the entire sequence is converted into a base58 encoded string, forming the address. Such addresses invariably start with "1", "3", or "bc1", distinguishing them from both public keys and bitcoin private keys. Think of an address as a means to safeguard a public key, even though public keys can be public. The bitcoin private key must be concealed. Using addresses not only adds an extra security layer but is also more user-friendly than public keys. How Does A Bitcoin Private Key Work? Let's examine how a Bitcoin private key is utilized in a transaction. Imagine Alice desires a latte from Bob's Coffee Shop priced at 0.0005 BTC. Her funds are safely stored in her wallet. To finalize her purchase, she shares her public key and a digital signature from her Bitcoin private key. Think of digital signatures as a one-time code for every transaction, proving Bitcoin private key ownership without revealing it. In this scenario, only Alice, knowing her Bitcoin private key, can generate this signature. Starting with 1 BTC, Alice generates a signature for the latte's 0.0005 BTC. This is then validated by the network, transferring the funds to Bob's Coffee Shop. The remaining 0.9995 BTC is untouchable to others. If Alice or anyone attempts reusing the signature, it's denied. Every transaction demands a distinct digital signature from the Bitcoin private key." Formats As discussed, there are multiple formats in which the same private key can be expressed. The two formats we covered in the beginning of the article— binary and decimal— are almost never used. They are useful for generating a Bitcoin private key but most wallet applications use other formats. In particular, wallets typically use hexadecimal, wallet import format (WIF), and/or compressed wallet import format (compressed WIF). Let’s take a look at these three most common private key formats. Hexadecimal is a notation used in the bitcoin private key system, utilizing the numerical digits 0—9 and the letters A—F. This makes a bitcoin private key in hexadecimal format more readable. A bitcoin private key in binary or decimal can easily be transformed to hexadecimal. Here's that same bitcoin private key in binary and decimal mentioned earlier, now in hexadecimal. WIF And Compressed WIF The wallet import format (WIF) and its compressed version are the primary formats for a Bitcoin private key. They offer two significant advantages. Firstly, their shorter length minimizes copy/paste mistakes. Secondly, they utilize the base58Check code, enhancing error detection. From a user perspective, this makes Bitcoin private key management in the WIF format quite favorable. A Bitcoin private key in the base58Check encoded WIF starts with "5". In the compressed version, it starts with "K" or "L". It's essential to clarify that the term "compressed WIF" doesn't imply compression of the Bitcoin private key itself, as these keys are neither compressed nor uncompressed. Interestingly, the "compressed WIF" is one byte longer than WIF. Its name stems from its function: directing software to derive a compressed public key. Conversely, the "uncompressed WIF" signals software to fetch an uncompressed public key. Both versions of the Bitcoin private key, WIF and its compressed form, can interchange. This means one can derive either a compressed or uncompressed public key from both. Though, an initial conversion step might be needed. With specific tools, conversion among different Bitcoin private key formats becomes straightforward. For example, using a given address in hexadecimal format, one might obtain specific results. WIF Private Key: Compressed WIF Private Key: More Bitcoin Private Key Formats While the Wallet Import Format (WIF) and its compressed version dominate as standard formats for Bitcoin private keys, the cryptocurrency ecosystem witnesses a rise in alternative formats. These newer formats aim to address various user needs, improve security, and enhance usability. As the Bitcoin community continues to grow and diversify, understanding these emerging formats becomes crucial for every participant. Mini Private Key Like WIF, mini private keys utilize Base58Check encoding, which helps minimize typos and copy/paste mistakes. An important distinction is that mini private keys are generated from scratch; you can't reduce a standard-sized Bitcoin private key to its mini version. However, the conversion from a mini private key to a standard one is feasible. These mini versions are notably concise, often just 30 characters long, always commencing with an "S" for easy identification. Bitcoin Improvement Protocol 38 (BIP38) Bitcoin Improvement Protocol 38 (BIP38) offers a method to encrypt a bitcoin private key using a lengthy passphrase made up of recognizable words. This encryption allows for the safe sharing of the bitcoin private key with another party. Without both the bitcoin private key and the accurate passphrase, one cannot access the wallet's balance. For instance, the address and the encrypted bitcoin private key can be imprinted on a tangible bitcoin, whereas the passphrase is kept separately or remembered. Even if someone knows the bitcoin private key, the assets remain safeguarded. To clarify, using BIP38 means the holder needs the encrypted bitcoin private key and another passphrase to utilize a BTC wallet and transact. BIP38 can be seen as a kind of two-step verification where the user sets a unique, repeatable password. Like conventional passwords, it's wise to pick a passphrase hard for others to deduce. A BIP38 bitcoin private key always starts with “6P” and appears in a certain format. If you'd like to learn more about blockchain technology and keep up with Komodo's progress, subscribe to our newsletter. Begin your blockchain journey with Komodo today.
<urn:uuid:f96e9b5e-565e-41b3-9eac-1f1c9387075a>
CC-MAIN-2023-40
https://komodoplatform.com/en/academy/bitcoin-private-key/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00030.warc.gz
en
0.87382
2,791
3.046875
3