text
stringlengths
509
12k
id
stringlengths
47
47
dump
stringclasses
6 values
url
stringlengths
15
1.27k
file_path
stringlengths
125
139
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
1.02k
2.05k
score
float64
2.52
5.06
int_score
int64
3
5
Tips For Gardening In The Northeast The US Department of Agriculture's Plant Hardiness Zone Map, based on the average annual minimum temperature, assigns zones 3 through 7 to the Northeastern United States, with the coldest areas having average winter lows of -30 to -35 degrees Fahrenheit. Included in the Northeastern gardening zone are: - The District of Columbia - New Hampshire - New Jersey - New York - Rhode Island - West Virginia Gardening in the Northeast has its own challenges, mainly the legendary winters. Plants must be able to withstand the severe temperatures, and gardeners must choose plants suitable to the region, or be willing to replace them each spring. The growing season can be as short as April through October, depending on which part of the northeast you live in. By sticking with plants that are hardy in the lowest temperatures, you can easily design and maintain a beautiful garden, regardless of winter storms. Here are some excellent choices in each category of garden greenery that will thrive in your Northeastern garden. By picking roses that tolerate sub-zero temperatures, and protecting them from winter extremes, you can have a beautiful rose garden. Here are five great choices for the Northeast. - Double Delight - A hybrid tea rose with delicate creamy white blooms edged with pinkish red. The strong scent makes it even more delightful. - Knockout - A shrub rose with a low, spreading habit, the Knockout roses are very disease resistant, need little deadheading, and are covered with flowers through the summer. - Gemini - A tall hybrid tea rose, with creamy pink flowers edged with coral orange. Fairly disease resistant. - Fourth of July - A climbing rose with ruffled, red and white streaked flowers. - Julia Child - A floribunda with buttery yellow blooms, and a fragrance reminiscent of licorice. The backbone of your flower garden, perennials bring cheerful color through the spring and summer, die down to the roots over the winter, and return in the spring. Here are five perennials that are tough and hardy enough to survive even the coldest Northeastern winter. - Coral Bells - A wonderful plant for the shade, coral bells come in an amazing variety of colorful foliage. The flowers are small, and held in gently nodding stalks of color above the low mound of round leaves. - Astilbe - The feathery stalks of astilbe look delicate waving above the ferny foliage, but astilbe is actually a tough plant that can tolerate shade, and is not picky about soil. - Bee Balm - Adored by hummingbirds and butterflies, bee balm's shaggy flowers in pink, red or white are an old fashioned addition to your perennial beds. - Garden Phlox - Another old-fashioned favorite, garden phlox requires little maintenance, holds up to wind and cold, and comes in a wide range of pinks, purples, whites and reds. - Yarrow - Tough but delicate in appearance, yarrow attracts butterflies, and spreads rapidly to provide plenty of cut flowers. Colors range from yellow to white to pink, red or purple. For the greenest, lushest, healthiest lawn, a mixture of grass seeds that tolerate cold winters and humid summers will do best. - Kentucky Bluegrass is usually considered the best grass for Northeastern lawns, but can be improved with the addition of red fescue, which is tolerant of extreme weather, and perennial ryegrass, which germinates quickly to fill in bare spots. - Soil in the Northeast tends to be acidic, while grass prefers a neutral pH. The addition of lime in the spring, and again in the fall will help counterbalance the pH, and keep your lawn green. - Fertilize your lawn in the late summer, to encourage strong roots and energy to survive until the next growing season. Shrubs provide the background of your garden, giving form and balance to the yard. Shrubs can be used to screen out unattractive features, provide privacy, unify an area, or act as a focal point. - Bottlebrush buckeye has large white flower spikes in the summer, and bright yellow leaves in the fall. A large shrub that reaches 12 feet tall and wide, deer leave it alone, and it makes a nice specimen plant. - Black chokeberry is a small shrub with pinkish flowers followed by shiny black berries. Red-purple foliage is attractive before falling in autumn. Use chokeberry as a filler or background plant. - Summersweet has fragrant white or pink flowers, and even blooms in the shade. It can reach 8 feet tall, and spreads into a dense clump. Fall color is golden yellow. - Chinese witch hazel has colorful fall foliage, and fragrant yellow flowers on its bare stems in late winter. Spreading to 10 feet, Chinese witch hazel makes a great accent in a woodland setting. - Japanese barberry has arching, spiny branches that color with red berries during the winter. The autumn foliage is brightly colored, and the shrub makes a good hedge or border. - The balsam fir is not only a popular Christmas tree; it is an attractive evergreen addition to your Northeastern yard. Long cones fall from the tree in September, and deer and songbirds will come to enjoy the seeds. - Box elder maple is native to the Northeast. The green and white foliage turns to striking colors of red, yellow and orange in the fall. Box elder makes a nice border to line your driveway or property line. - American white birch is striking with its white bark, punctuated with black markings. The leaves yellow and drop in the fall, leaving the birch to make a dramatic focal point on your lawn. Though the winters may be cold, your Northeastern garden will survive, and return in the spring to provide bright color. Winter is the perfect time to look through gardening catalogs, and decide on annuals to fill your containers and flowerbeds come spring.
<urn:uuid:4c567570-06c2-406d-baf2-b9df8e677c14>
CC-MAIN-2015-11
http://www.idealhomegarden.com/outdoor-living/tips-for-gardening-in-the-northeast/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00140-ip-10-28-5-156.ec2.internal.warc.gz
en
0.912397
1,270
2.84375
3
FOX (Forkhead box) proteins are a family of transcription factors that play important roles in regulating the expression of genes involved in cell growth, proliferation, differentiation, and longevity. Many FOX proteins are important to embryonic development. FOX proteins also have pioneering transcription activity by being able to bind condensed chromatin during cell differentiation processes. The defining feature of FOX proteins is the forkhead box, a sequence of 80 to 100 amino acids forming a motif that binds to DNA. This forkhead motif is also known as the winged helix due to the butterfly-like appearance of the loops in the protein structure of the domain. Forkhead genes are a subgroup of the helix-turn-helix class of proteins. Many genes encoding FOX proteins have been identified. For example, the FOXF2 gene encodes forkhead box F2, one of many human homologues of the Drosophila melanogaster transcription factor forkhead. FOXF2 is expressed in lung and placenta. Some FOX genes are downstream targets of the hedgehog signaling pathway, which plays a role in the development of basal cell carcinomas. Members of the class O regulate metabolism, cellular proliferation, stress tolerance and possibly lifespan. The activity of FoxO is controlled by post-translational modifications, including phosphorylation, acetylation and ubiquitination. The founding member and namesake of the FOX family is the fork head transcription factor in Drosophila, discovered by Detlef Weigel and Herbert Jäckle. Since then a large number of family members have been discovered, especially in vertebrates. Originally they were given vastly different names (such as HFH, FREAC, and fkh), but in 2000 a unified nomenclature was introduced that grouped the FOX proteins into subclasses (FOXA-FOXS) based on sequence conservation. - FOXA1, FOXA2, FOXA3 (See also Hepatocyte nuclear factors) - FOXB1, FOXB2 - FOXC1 (assoc. with Glaucoma), FOXC2 (varicose veins) - FOXD1, FOXD2, FOXD3 (vitelligo), FOXD4, FOXD5, FOXD6 - FOXE1 (thyroid), FOXE2, FOXE3 (lens) - FOXF1 (lung), FOXF2 - FOXG1 (brain) - FOXH1 (widely expressed) - FOXI1 (ear), FOXI2 - FOXJ1 (cilia), FOXJ2 (erythroid), FOXJ3 - FOXK1, FOXK2 (HIV, IL-2, adrenal) - FOXL1 (ovary), FOXL2 - FOXM1 (cell cycle, erythroid, cancer) - FOXN1 (hair, thymus), FOXN2, FOXN3 (cell cycle checkpoints; widely expressed), FOXN4 - FOXO1 (widely expressed: muscle, liver, pancreas), FOXO3 (apoptosis, erythroid, longevity), FOXO4 (widely expressed), FOXO6 - FOXP1 (pluripotency then brain and lung), FOXP2 (widely expressed? brain; language), FOXP3 (T cells), FOXP4 - FOXR1, FOXR2 - Tuteja G, Kaestner KH (September 2007). "SnapShot: forkhead transcription factors I". Cell 130 (6): 1160. doi:10.1016/j.cell.2007.09.005. PMID 17889656. - Tuteja G, Kaestner KH (October 2007). "Forkhead transcription factors II". Cell 131 (1): 192. doi:10.1016/j.cell.2007.09.016. PMID 17923097. - Zaret KS, Carroll JS (November 2011). "Pioneer transcription factors: establishing competence for gene expression". Genes Dev. 25 (21): 2227–41. doi:10.1101/gad.176826.111. PMC 3219227. PMID 22056668. - Lehmann OJ, Sowden JC, Carlsson P, Jordan T, Bhattacharya SS (2003). "Fox's in development and disease". TRENDS in Genetics 19 (6): 339–344. doi:10.1016/S0168-9525(03)00111-2. PMID 12801727. - van der Horst A, Burgering BM (June 2007). "Stressing the role of FoxO proteins in lifespan and disease". Nat. Rev. Mol. Cell Biol. 8 (6): 440–50. doi:10.1038/nrm2190. PMID 17522590. - Weigel D, Jürgens G, Küttner F, Seifert E, Jäckle H (1989). "The homeotic gene fork head encodes a nuclear protein and is expressed in the terminal regions of the Drosophila embryo". Cell 57 (4): 645–658. doi:10.1016/0092-8674(89)90133-5. PMID 2566386. - Weigel D, Jäckle H (1990). "The fork head domain, a novel DNA-binding motif of eucaryotic transcription factors?". Cell 63 (3): 455–456. doi:10.1016/0092-8674(90)90439-L. PMID 2225060. - Kaestner KH, Knochel W, Martinez DE (2000). "Unified nomenclature for the winged helix/forkhead transcription factors". Genes & Development 14 (2): 142–146. doi:10.1101/gad.14.2.142. PMID 10702024.
<urn:uuid:632877b2-c68b-4d29-af6b-188a33bad37f>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/FOX_proteins
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463104.7/warc/CC-MAIN-20150226074103-00075-ip-10-28-5-156.ec2.internal.warc.gz
en
0.711617
1,261
3.390625
3
Kids with severe allergies can be at risk for a sudden, potentially life-threatening allergic reaction called anaphylaxis. This reaction can be frightening — a child may feel like his or her throat is closing or might faint, for example. But the good news is that when treated properly, anaphylaxis can be managed. Anaphylaxis isn't common, but some kids with allergies are more at risk for it. So if your child has allergies, it's important to know about it and be prepared. Signs of Anaphylaxis As with other allergies, anaphylaxis can trigger symptoms in any of these four body systems: - gastrointestinal system - respiratory system - cardiovascular system An allergic reaction might be a medical emergency if it happens in two or more of these systems — for example, hives on the skin together with stomach pain. The most common signs that someone might have anaphylaxis after exposure to an allergen are: - difficulty breathing - tightness in the throat or feeling like the throat or airways are closing - hoarseness or trouble speaking - nasal stuffiness or coughing - nausea, abdominal pain, or vomiting - fast heartbeat or pulse - skin itching, tingling, redness, or swelling Timely Treatment Needed Anaphylaxis requires immediate treatment. It can get worse very quickly. This is why doctors usually want people with life-threatening allergies to carry a medication called epinephrine. Epinephrine enters the bloodstream and works quickly against serious allergy symptoms; for example, it decreases swelling and raises blood pressure. Epinephrine is given as an injection. This isn't as scary as it sounds, though — there's no big needle and plunger involved. Instead, doctors will prescribe an auto injector about the size of a large pen that's easy for parents — and older kids — to carry and use. If your child is prescribed epinephrine, your doctor will show you how to use it. Your doctor also might instruct you to give your child over-the-counter (OTC) antihistamines, too — but they won't work alone. OTC antihistamines are never a replacement for epinephrine in life-threatening reactions. If Your Child Has a Serious Reaction If your child shows signs of a serious allergic reaction, call 911 or seek immediate medical care at a hospital emergency room. And if your child has a known allergy and carries epinephrine, take these steps: Step 1: Give epinephrine right away. If you are alone with your child, administer this medication first, then call 911. If you are not alone with your child, have someone else call 911 while you administer the medication. Step 2: Call 911 or get to the nearest emergency room. After your child receives epinephrine, go to an emergency room immediately. Sometimes a child has a second wave of symptoms (called a biphasic reaction). So the hospital will observe your child for at least 4 hours to be sure he or she is OK and provide additional treatment, if needed. Serious allergies can be alarming. But they're a lot easier to recognize and treat now than in the past, thanks to greater awareness and the availability of epinephrine. Also, make sure that any caregivers, teachers, or coaches know about the allergy and what to do in an emergency. Reviewed by: Sheelagh M. Stewart, RN, MPH Date reviewed: February 2012 |American Academy of Allergy, Asthma, and Immunology The American Academy of Allergy, Asthma, and Immunology offers up-to-date information and a find-an-allergist search tool.| |The Food Allergy and Anaphylaxis Network (FAAN) The FAAN mession is to raise public awareness, provide advocacy and education and to advance research on behavior for all of those affected by food allergies and anaphylaxis.| |All About Allergies Up to 50 million Americans, including millions of kids, have an allergy. Find out how allergies are diagnosed and how to keep them under control.| |First Aid: Allergic Reactions Although most allergic reactions aren't serious, severe reactions can be life-threatening and can require immediate medical attention.| |Food Allergies Food allergies can cause serious and even deadly reactions in kids, so it's important to know how to feed a child with food allergies and to prevent reactions.| |Bug Bites and Stings In most cases, bug bites and stings are just nuisances. But in some cases, they can cause infections and allergic reactions. It's important to know the signs, and when to get medical attention.| |Going to the Emergency Room Knowing what to expect when you need to take your child to the emergency room can help make it a little less stressful.| |Allergy Shots Many kids battle allergies year-round, and some can't control their symptoms with medications. For them, allergy shots (or allergen immunotherapy) can be beneficial.| |First Aid: Insect Stings and Bites Being stung by a bug is often just irritating and doesn't require medical treatment. But kids who are highly allergic to stings may need emergency medical care.| Note: All information is for educational purposes only. For specific medical advice, diagnoses, and treatment, consult your doctor. © 1995-2014 KidsHealth® All rights reserved. Images provided by iStock, Getty Images, Corbis, Veer, Science Photo Library, Science Source Images, Shutterstock, and Clipart.com
<urn:uuid:ea6d659c-bfdd-4635-b610-43bb6363a373>
CC-MAIN-2015-11
http://www.childrensdayton.org/cms/kidshealth/f70100b1e6ddb2ba/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00157-ip-10-28-5-156.ec2.internal.warc.gz
en
0.930586
1,164
3.4375
3
Weddle's Syndicated Content: A Talent for All President John F. Kennedy once said that "all of us should have an equal opportunity to develop our talents." While he was speaking of his civil rights initiative, his words are also applicable to the challenge of finding a job in today's economy. All of us should have a chance to express and experience our talent at work, but many, maybe even most of us don't. Why? Because we've been taught that we don't have talent and, therefore, don't know what our talent is. The hidden message in President Kennedy's words is a repudiation of the notion that talent is only found in a select group of "special people." According to this view, talent is reserved for professional athletes, movie stars and the winners of made-for-TV dance contests. And, as the President noted, that's flat wrong. We are all born with talent. It is an attribute of our species. Talent is the capacity for excellence, and all of us have been endowed with that gift. Like our opposable thumb, it is a characteristic that defines being human. Every single one of us can do superior work. The challenge for job seekers, therefore, is three-fold: - First, you have to make sure you have correctly identified your talent. - Second, you have to make sure you've selected a career field in which you can work successfully with your talent. - And third, you have to acquire the latest skills and knowledge in your career field so that you can actually use your talent to perform at your peak on-the-job. Let's look briefly at each of those issues. First, you have to make sure you have correctly identified your talent. Talent isn't passion. You can love to play tennis, but never be good enough to pursue a career in the sport. Talent, therefore, is the intersection of passion and practicality. It is what you love to do and do well. Some of us are lucky and discover our talent easily. We have "a calling" which points the way. For most of us, however, that voice speaks too softly to hear without some work on our part. We have to invest the time and effort to look around inside ourselves. In The Career Fitness Workbook, I provide three exercises to accomplish this inner search. One explores what most engages you; a second looks into what is most relevant to you; and a third lets you make an unconstrained choice. Your talent lies where those three dynamics overlap. Second, you have to make sure you've selected a career field in which you can work successfully with your talent. Not every talent can be used effectively in every occupation. For example, if a person's talent is communicating complex ideas so that everyone can understand them, they are not likely to be successful in a field which requires the talent of athleticism. They can be a sports writer, perhaps, but not a professional basketball player. Unfortunately, most of us launch off on our careers before we've discovered our talent. As a result, we may become competent or even expert in our profession, craft or trade, but we will never be fulfilled by our work. In fact, more often than not, a lot of us are just plain miserable instead. How can you figure out if your career field is the right place for your talent? Take a look at the tasks you've performed in each of your previous jobs as you've listed them on your resume. How close do they match what you love to do and do well? If it's less than 90 percent, you're looking for a job in the wrong occupation. And third, you have to acquire the latest skills and knowledge in your career field so that you can actually use your talent to perform at your peak on-the-job. Talent is the capacity for excellence, not its achievement. In order to perform at your peak on-the-job, therefore, you have to acquire the skills and knowledge necessary to express your talent fully. You must become expert enough to turn your potential for superior work into reality. A person of talent sees themselves as a "work-in-progress." They are constantly improving their capabilities because each additional increment of expertise enables them to express a greater dimension of their inherent excellence. To put it another way, they are so respectful of their talent they never stop trying to perfect it. They don't wait for their employer to offer training; they seek it out on their own. They don't put personal development on hold because they are in transition; they use ongoing education to plug the employment gap in their resume. President Kennedy had it right. We all deserve "an equal opportunity to develop our talents." And, that includes those of us who are looking for a new or better job. Thanks for reading, Visit my blog at Weddles.com/WorkStrong. © Copyright 2012 WEDDLE’s LLC. All Rights Reserved.
<urn:uuid:7fa8e33b-17b3-485a-8f6f-18a3c7ac1884>
CC-MAIN-2015-11
https://www.aapm.org/careers/jobseekers/resources/weddles/20120919.asp
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463104.7/warc/CC-MAIN-20150226074103-00076-ip-10-28-5-156.ec2.internal.warc.gz
en
0.973584
1,028
2.515625
3
NPL Site Narrative for Rocky Flats Plant (USDOE) ROCKY FLATS PLANT (USDOE) Federal Register Notice: October 04, 1989 Conditions at proposal (October 15, 1984): The Rocky Flats Plant covers approximately 6,550 acres (about 11 square miles) in Jefferson County, near Golden, Colorado. The facility originally covered 2,000 acres, but a 4,550-acre "buffer zone" was added in 1974. The main processing operations are confined to approximately 384 acres within the buffer zone. The plant began operations in 1952 under the direction of the Atomic Energy Commission. The current owner is the U.S. Department of Energy (USDOE). Actual operations at the plant have been performed by contractors. Dow Chemical Co. operated the plant until June 30, 1975, when the current operator, Rockwell International Corp., took over. Since its establishment, the major operation at the plant has been the fabrication and assembly of components for nuclear weapons. These operations use plutonium, uranium, beryllium, stainless steel, and aluminum. The facility also recovers plutonium and separates and performs research on americium. Releases of solvents, pesticides, plutonium, and tritium have contaminated soils, surface water sediments, and ground water at various locations on the facility. Plutonium contamination of soils and sediments has also been documented beyond the boundaries of the Federally owned land. Additionally, three evaporation ponds have contributed to nitrate contamination of ground water. USDOE has completed some remedial work such as capping and removing plutonium-contaminated soils. USDOE is also improving liquid waste treatment systems to reduce discharge of liquid effluents. Approximately 80,000 people live within 3 miles of the facility. Downtown Denver is approximately 16 miles to the southeast, while Golden and Boulder are approximately 8 miles south and north, respectively. Status (July 1985): USDOE continues to conduct remedial work by removing "hot spots" of contamination. A recent court settlement requires USDOE to conduct remedial activities on private land east of the plant as a condition of its sale to local governments. Status (October 4, 1989): On July 31, 1986, EPA, USDOE, and the Colorado Department of Health (CDH) entered into a Federal Facility Compliance Agreement (FFCA). The FFCA defined roles and set schedules for investigation and cleanup of past disposal problems and addressed hazardous and mixed waste compliance issues. Under the FFCA, USDOE started a remedial investigation/feasibility study (RI/FS), identifying 166 on-site and off-site areas and grouping them into 107 high-, medium-, and low-priority areas. EPA and CDH have been reviewing various draft RI/FS documents and Interim Response Action (IRA) proposals. These review activities have focused on the high (Hillside 881) and medium (903 Pad, East Trenches, Mound) priority areas. Hillside 881 is near the Woman Creek drainage, which eventually discharges into Standly Lake, a major drinking water supply reservoir for several Denver suburbs. A September 1988 USDOE report identified Hillside 881 as the most significant potential risk to populations. This preliminary finding will be reassessed during implementation of USDOE's 5-year Environmental Restoration Plan. Other surface drainage concerns at Rocky Flats include surface and subsurface migration through North and South Walnut Creek, which eventually discharges to Great Western Reservoir, a major drinking water source for Broomfield. In July 1989, the city constructed a ditch to divert North and South Walnut Creek around the Reservoir because of concern that past spills and other releases of contaminants to the creek may continue. On May 25, 1989, EPA, CDH, and USDOE started negotiations on an Interagency Agreement (IAG) under CERCLA Section 120. EPA anticipates that the IAG will replace the 1986 FFCA and will establish goals for investigation and cleanup activities at Rocky Flats. EPA also anticipates using the IAG process to define specific roles for EPA, CDH, and USDOE, make decisions regarding potential IRAs, group areas into operable units, and address any areas discovered during the studies. IAG negotiations are scheduled to conclude shortly. Addressing the 166 contaminated areas identified thus far is estimated to take at least 30 years and cost between $400 million and $2 billion. For more information about the hazardous substances identified in this narrative summary, including general information regarding the effects of exposure to these substances on human health, please see the Agency for Toxic Substances and Disease Registry (ATSDR) ToxFAQs. ATSDR ToxFAQs can be found on the Internet at ATSDR - ToxFAQs (http://www.atsdr.cdc.gov/toxfaqs/index.asp) or by telephone at 1-888-42-ATSDR or 1-888-422-8737.
<urn:uuid:5e31ed73-a9c0-4122-8da6-e01c82d41ea0>
CC-MAIN-2015-11
http://www.epa.gov/superfund/sites/npl/nar865.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.93682
1,029
2.75
3
Fielding ground balls is a baseball fundamental that seems simple but takes a lot of practice to perfect. You've got to be on your toes - literally - and ready to react quickly when the ball comes shooting toward you. You need to practice getting in the right position, approaching the ball correctly and rising to throw the ball in one smooth motion. See Step 1 to learn how. Part 1 of 3: Getting in Position 1Assume your "baseball ready" position. Before the pitch is even thrown, you should be standing a ready position. Stand on the balls of your feet with your knees slightly bent and your glove in front of you. Focus on your attention on the batter. As the batter strikes the ball, keep your eye on it the entire time.Ad 2Be ready to move if the ball comes toward you. You'll only have a few seconds to react once the ball is hit, so you've got to be able to reflexively move toward the ball if its yours to field. Some fielders find it helpful to sway from side to side a bit as they wait for the hit. Shifting your weight back and forth can help you feel ready to spring toward the ball quickly. 3Move in front of the ball. When the ball is hit, run as fast as you can to get in front of it. The angle at which you run is dependent on how fast the ball is moving. Here are a few different scenarios: - If it's a slow moving ball, you might want to charge it. This means running toward the ball at an angle that will help you reach it as quickly as possible. - If the ball is hit hard and low, it will respond violently to imperfections on the ground. Reaching the ball as quickly as possible is a good way to prevent it from bouncing away from you or at you in a harmful, unexpected way. - If it's a very fast moving ball, it's more important to run at an angle that will give you time to field the ball with ease, rather than having to dive or stretch your glove at an odd angle. Instead of running toward the ball, run to one side or the other so you can get in position to have the ball coming right at your glove. - With practice, you'll be able to discern what approach is right for what grounder speed. Timing is everything when it comes to fielding grounders. 4Decide to field it on a long hop or a short hop. Grounders can be difficult to field because each hop they take can make them bounce in an unpredictable direction. Your best bet is to try to field a grounder on as long a hop as possible, because you'll know just where to position your glove to catch it. Fielding a grounder on a short hop is more difficult, because you have less time to react to the ball's bounce. If you let it bounce right in front of your glove, it could easily hop over your shoulder or to your left or right, forcing you to fumble. - Try to time your fielding so that the ball won't hop right in front of your glove. Catch it after it has hopped several feet away, so you have time to move toward it and catch it. - If the ball does hop right in front of you, you'll need to have very quick reflexes to catch it. Keep your body in front of the ball. If it skips off your glove, you might be able to stop it with your foot or another body part - anything to keep it from getting past you! 5Angle your body to field it more easily. It's most comfortable to field the ball on the same side of your body as your glove hand. If your right hand is your glove hand, try to position yourself so that the ball is moving slightly toward your right side. If your left hand is your glove hand, position yourself so you can catch it on that side. - You should still be fairly square with the ball, however. Try to not to put yourself in the position of needing to dive or stretch your arm to catch it. - If the ball is traveling extremely fast, you won't always have time to get in the ideal fielding position. You may need to dive, stretch, or backhand it to make the catch. Part 2 of 3: Fielding the Grounder 1Bend your knees and drop your behind to the ground. When the ball is nigh, it's time to get low. If you don't, you stand a very good chance of having it fly between your legs - the most embarrassing fielder's error. Drop into a crouch that'll let you move quickly if you need to catch the ball on a short bounce. 2Extend your glove in front of you. Here's where hand-eye coordination comes into play. Extend your glove toward the ball, keeping your elbow slightly bent. Position your glove so that the ball will roll or hop right into it. 3Keep your other hand close. Make sure it's not in the path of the ball, but it should be close enough that you can easily employ it if need be. Two hands are better than one, so your other hand should be ready to trap the ball when it meets your glove. 4Watch the ball into your glove. The number one rule in baseball, keep your eye on the ball, applies as much to fielding as it does to hitting. Make sure to watch the ball until it's safely nestled in your glove, and be ready to move if it does something unexpected. 5Trap it with your other hand. When the ball is in your glove, close your glove tight and immediately trap the ball with your opposite hand. This puts you in the perfect position to throw the ball where it needs to go as quickly as possible. Part 3 of 3: Transferring and Throwing the Ball 1Transfer the ball to your throwing hand. When the ball is secure, immediately transfer it to your throwing hand. If you used your throwing hand to trap the ball, you can simply grasp the ball using the right grip to quickly throw it. If you fielded the ball with your glove stretched to one side or if you caught it backhanded, bring your glove to your throwing hand and grab the ball. - Practice getting a good grip on the ball. Without looking, practice quickly gripping the ball by the seams. Developing this reflex means your throw will more likely be on-target and easy to catch. - The ball transfer should be done deliberately and quickly. There's still room for fumbling after you've successfully fielded the ball, so the transfer needs to be practiced just as much. Work on your ball transfer. Practice transferring your ball from your glove to your throwing hand. In the dugout when there's nothing to do, or anytime you have a ball handy, practice. 2Rise and move to adjust your footing. Now it's time to quickly get in position to throw the ball. Rise up and step forward with your throwing foot, then with your non-throwing foot, then again with your throwing foot as you throw the ball. Doing these steps quickly results in a quick sequence that looks like skipping. It allows you to get your body in the right position to make an effective throw. 3Throw the ball in one fluid motion. After the flurry of fielding the ball, make sure you stay focused enough to make a good throw. A wild throw will completely negate your good fielding efforts. Throw a solid line drive to the appropriate fielder to make a good play. - You can also practice throwing from a crouched position, for times when you don't have enough time to rise and do a proper through. - In other cases you may need to toss or flick the ball to another fielder. We could really use your help! hand and finger care? - Practice thoroughly. Start with slowly hit or rolled balls so you can better your footwork and develop rhythm and timing. Then, gradually increase the pace. At each practice, work on every type of hit you could receive, and always make sure to transfer and throw the ball so that it becomes second nature. - Try doing some of these drills bare-handed. - To work on short hops have someone stand in front of you and bounce the ball to you on smooth pavement. - Always stretch and warm up before you practice. - Maintain your glove in good condition. Check the laces and tighten them if they're loose--a hard hit ball could get stuck in them or even go through. Check that the pocket is well formed--a floppy pocket might come open on a hard hit ball. The palm of the glove should be as flat and smooth as possible so pound out any bumps, it will help keep the ball from bouncing out. In other languages: Thanks to all authors for creating a page that has been read 13,879 times.
<urn:uuid:8ee78cfb-1418-41bf-b6bf-0af91fb8a08b>
CC-MAIN-2015-11
http://www.wikihow.com/Field-a-Ground-Ball
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.958676
1,834
3.328125
3
The narrative form is a universal human artifact– every culture has a large body of narratives that serve as origin and creation stories, family genealogies, moral and ethical education. Dr. Clarissa Pinkola-Estés, senior Jungian psychoanalyst and master storyteller, explains it well in her bestseller Women Who Run with the Wolves: “Stories are embedded with instructions which guide us about the complexities of life.” The gods and monsters of myth and religion, the heroes, victims and liminal beings of fairy tales, even the imagery of tarot, astrology, and comic books owe their currency to the power of archetype. Archetypes are simply models or categories, and the concept was first extracted from literature by Carl Jung in his theory of psychology. Later, Joseph Campbell applied the categories to mythology and personal development. Archetypes foster understanding across time and subject matter through common motifs, character roles, and plot structures. Video is becoming the dominant narrative form of the 21st century, recapturing some of the dynamism of live narrative performance. In the 1980s, music videos on cable TV disrupted radio as the means of pop music distribution. Now, many people gain their first exposure to new music through video uploads on Youtube et al. These sites are also the means by which fans can respond to and interact with the official creative product of the pop music industry, with their own uploads. Pop culture has always reinforced the signs and symbols of upper class lifestyles. The sets and stages of their performances, whether film, concert stages, or music videos, exploit the presentation of luxury almost to the point of self-parody. Stars themselves are seen as role models for the confidence and power they project, if only through their material possessions. The fact of the accumulated possessions themselves is seen as proof of merit on some undefined grounds. Monarchies throughout the world have always been fortified by a protocol of symbolism and etiquette meant to distinguish the ruler from the ruled: the golden crown, the ornate throne, velvet and fur, exotic pets (including people), gold jewelry and precious stones. In a democracy, the symbols of wealth attain the aspirational flavor of personal achievement. Cars, houses with swimming pools, cascades of cash, and expensive liquor are the modern, consumer-culture equivalents of monarchical symbols. Both styles of acquisition and prestige are reinforced by hereditary rules. Motifs of luxury and royalty are the tried and true visual language of hip-hop and pop culture in general. The predominant role for women in videos—whether as star or backup dancer—has typically relied on their overt sexual desirability. So when both Beyoncé and Katy Perry appear in elaborately produced advertisements in 2013, in the costume of a vaguely eighteenth-century queen– Beyoncé in blue, Perry in red– it feels disappointingly banal, rather than vicariously empowering or even novel. The two different narratives, although using the same queen archetype, show how the two female stars attempted to reclaim the historically masculine visual language of royalty. Beyoncé has merely done a gender reversal, placing herself in the role of monarch, while maintaining the performance and presentation of (male) power and privilege. She fully embraces all the heavy jewelry and robes of state, barely changing her facial expression as a court jester DJs and her courtiers dance exaggeratedly around her. Perry conspicuously subverts the symbolism of royalty by altering her own gown and walking unattended through the rooms of her castle, suggesting she is not comfortable in the role of monarch, or wants to redefine the role. She wants us to know, by her burlesque wink at her gray-haired male advisors, that she’s not really invested in the monarchical office as defined by men, while she’s simultaneously wearing the crown and holding the scepter, and sitting on the throne, all symbols of male power. Music video production, like fashion, is both art and capitalism. By using visual narrative studded with the power of archetype, aiming for the psychological jugular of their fandom, the pop-star-as-enterprise can manipulate emotion to transact sales of recordings and merchandise. Why do fans invest so much personal time, energy, and funds into celebrity devotion? What’s at stake for them is the worship of a hero, the residual glamour of prestige-by-association, the project of studying, organizing and disseminating exclusive, timely information– a form of worship and appeasement. Celebrities are the modern equivalent of the saints and mystics, and by associating with their image and their merchandise, like relics and totems, we hope some of their jing will rub off on us. Tapping the root of the word “glamour”, the glamorous construct of celebrity is a created illusion, a magical enchantment. And there’s the ethical problem: material goods in excess associated with worth and success; consumption and acquisition offered as acceptable pastimes; autocratic leaders in pretty costumes throwing tantrums– royal symbolism playing to the low-income, high-aspiration citizens of a democracy. (In contrast, see Lorde’s “Royals” or the entire M.I.A. oeuvre.) The material symbols and constructed exclusivity of monarchy are conveniently silent on the fact that they are the spoils of war, oppression, and coercion. Perhaps the royalty and luxury imagery has been denatured by its overuse by male hip-hop stars. Or perhaps it’s just too easy to see through the costuming– we know very well that a female monarch is the exception to the rule, whether she plays by boys’ club rules, or convinces herself she can make up her own. Katy Perry’s cartoonishly rebellious persona remains unburdened by nuance or logic as she takes charge of her own appearance and then inexplicably topples her own throne. The racial implications of Beyoncé in European royal drag are also worth examining. All this glamorous imagery targeting the most sympathetic parts of our psyche is presented without critique or context. Dr. Estés cautions about the power of archetype and story: “In dealing with stories, we are handling archetypal energy, which we could metaphorically describe as being like electricity. This electrical power can animate and enlighten, but in the wrong place, wrong time, wrong teller, wrong story […] like any medicine, it will not have the desired effect, or a deleterious one.” Music videos are sales tools, not instructions for living. But because they explicitly deploy archetypes in a visual narrative form, they tap directly into our emotions, while remaining ethically ambivalent. There are moral and ethical implications to videos that use imagery of high status, and achievement, whether via consumption or heredity. By using the familiar symbols of monarchy, these videos present the message that power, respect, admiration, and self-agency are easily achieved with a costume change and the right props. When Katy Perry and Beyoncé appear as video queens, they are conflating female empowerment with luxury possessions and male employees—an imbalance of power in an equation that is the same old paradigm, written in reverse. There are implications for racial and economic justice as well as for feminism, and the imagery of video should be approached with much the same degree of literacy as the written word. Apkon in his book on visual literacy, The Age of the Image, declares , “The manipulation of video is shortly to become a global language, and its seductive powers will be on display for all to see. But it is morally neutral. It can be used for good and evil and everything in between.” In an age where most everyone has a mobile phone with a camera, the democratization of visual storytelling can place a revealing mirror in front of the hip-hop kings and pop queens.
<urn:uuid:611c6ac4-1390-4085-a3fa-44e2c45699f8>
CC-MAIN-2015-11
http://www.thestylecon.com/2014/07/03/queen-bitch-royalty-meme-pop-music/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00178-ip-10-28-5-156.ec2.internal.warc.gz
en
0.946195
1,622
2.65625
3
What we talk about when we talk about climate change Americans have found it hard to have a rational discussion about global warming since 2006. That’s the year the documentary An Inconvenient Truth hit theaters and kick-started a conversation that has polarized our thoughts about this topic. Thanks, Al Gore. Today, perceptions of climate change tend to leave people concerned, dismissive or uninformed. Vern Grubinger, an Extension professor with the University of Vermont, believes the conversation is important to have nonetheless. "Some farmers, just like some of the general public, are skeptical that climate change is even real," he says. "Others are doubtful it will affect agriculture, and some don’t even want to bring it up for fear it might generate yet another concern about the environmental impact of farming. Others are already acting to prepare for it." Dave Changnon, a climate scientist at Northern Illinois University, agrees. "The problem with climate change is it’s so political," he says. "I’ve almost given up talking about it unless the discussion is focused on the science-based aspects." One thing is clear: Environmental shifts are already subtly affecting crop yields, increasing risks and altering farm management practices. "The scientific evidence leaves little room for doubt that our climate is changing, and that agriculture will be affected," Grubinger says. "To me, it’s not a political issue but a practical one. Farmers should prepare to manage for changes of any type that have a reasonable chance of affecting them." Changnon hopes to steer people away from general climate change discussions. Instead, he focuses on measurable occurrences and outcomes, such as what to do if warmer temperatures spike insect populations, or how increased water vapor could affect Midwestern weather patterns. What’s changing? Corn "knee-high by the Fourth of July" has become laughably out of date in recent years. That’s largely because crop maturity is much further along by July 4 than crops a generation ago. Consider this: According to an Iowa State University study, from 1981 to 2005, the Midwest saw its average corn planting date advance by 0.40 days per year and the average soybean planting date advance by 0.49 days per year. Planting dates have slowly but surely increased at a fairly predictable pace for the past 30 years. Less predictable are what the U.S. Global Change Research Program calls "extreme weather events," which the group has tracked since 1960. These events, which shove yields beneath the trend line, occur at random intervals, although the overall incidence is up. These trends might sound troubling, but public and private researchers alike are striving for new solutions. One good example is the recent introduction of drought-combating corn hybrids, such as DuPont Pioneer’s Optimum AQUAmax and Monsanto’s DroughtGard. Expect big improvements across the industry in agronomic traits, says Bayer CropScience corn trait research manager Brian Vande Berg. "Collectively, I think our understanding of plant biology has increased to the point where we can make some logical approaches into our research pipelines to try and improve yield," he says. "The use of genome sequencing and bioinformatics allows us to understand plant biology in more detail than even five years ago." Shifting pests. With earlier planting dates, crops get a head start. Unfortunately, so do many weeds, insects and diseases that can knock down yields. Insects are cold-blooded animals, notes Abby Seaman, vegetable IPM coordinator with the New York State Integrated Pest Management (IPM) Program at Cornell University. Their body temperature is approximately the same as their environment, and that is an important environmental factor influencing their distribution, development, survival and reproduction, she says. One example of changing pest patterns is the corn earworm in upstate New York. A network of pheromone traps is used to monitor the flights of the major worm pests of sweet corn. When the network was started nearly 20 years ago, corn earworm, a migratory pest that is not known to overwinter in upstate New York, arrived in the area sometime between late July and late August. "Now we are seeing a flight early in the season, either from migration or possibly from overwintering in New York, and farmers are having to apply more insecticides to manage them," Seaman says. The current evidence shows a likelihood of more outbreaks from a wider variety of insects and pathogens, either due to overwintering in new geographies or by migrating from a shorter distance, Seaman explains. "We can’t definitively attribute this to climate change, but whatever the reason, we’re likely to see more unfamiliar pests," she says. "Farmers just need to be vigilant in scouting their fields and keeping records, and current IPM recommendations already play well into that." Lewis Ziska, a plant physiologist with USDA–Agricultural Research Service, offers some additional examples of how rising temperatures affect pest migration. "The current distribution of both Japanese honeysuckle and kudzu is limited by low winter temperatures," he says. "Global warming could extend their northern limits by several hundred miles." Ziska says he hopes research can continue so farmers are not caught unaware by possible shifting pest populations. Whether climate change is man-made or driven by Mother Nature, whether it’s fleeting or here to stay is immaterial. If volatile times are ahead, and if unexpected pests are lurking, farmers who are versatile and adaptable will have the most success. Continued climate change education could even lead to profitable production practices, Grubinger says. "Many actions that address climate change are simply good management practices," he says. "For example, improved irrigation and drainage systems; efficient use of nitrogen fertilizer and manure; greater farm energy efficiency; cover cropping to add carbon to the soil; and development of local markets to reduce packaging, transportation and storage, which all use energy and create greenhouse gases."
<urn:uuid:04c79459-5d08-499e-a4aa-3e39b570e9bc>
CC-MAIN-2015-11
http://www.agweb.com/agday/article/mercury_rising/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00189-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945805
1,246
2.90625
3
Formicinae, Formicidae, Hymenoptera, Insecta, Arthropoda, Animalia Additional images: dorsal view of worker from La Selva (reduced, original); worker from Corcovado (reduced, original). Costa Rica: Atlantic and southern Pacific lowlands. Minor worker: Propodeum lacking spines or tubercles of any kind; propodeum somewhat box-like, dorsal and lateral faces flat or nearly flat and meeting at an approximate right angle; dorsal face of propodeum subrectangular; first gastral tergite with very dense, long, bright gold appressed pubescence; abundant gold erect setae cover mesosoma and head; erect setae on first gastral tergite relatively long, intermediate between planatus and brettesi; uniformly dark brown to dark red brown; side of mesosoma densely punctate, not shining; mesosomal profile relatively flat (makes nests of leaves sewn together with silk). Two workers from Corcovado National Park do not have the same mesosomal profile as material from La Selva. The propodeal shape is like brettesi (dorsal face more sloping, meeting posterior face at more obtuse angle), but the strong golden pubescence and pilosity is like La Selva material. Also, the surface sculpture on these two workers is duller than either La Selva textor or brettesi. Image of worker: (reduced, original). Similar species: JTL-045, senex. This species inhabits mature rainforest canopy, where it builds nests by sewing leaves together with larval silk (Forel 1899, 1905, Wheeler 1915, Schremmer 1979, Holldobler and Wilson 1983). This is one of four Camponotus species I know in Costa Rica that exhibit this behavior (see chartifex, JTL-045, nitidior). I have only seen the silk nests once. At La Selva Biological Station there is a large foot bridge that crosses the Rio Puerto Viejo. On each side of the river the bridge goes through the crowns of canopy trees growing on the banks of the river. One of these is an Inga, and for a while it contained nests of textor. From the side of the bridge I could see two or three of the nests, each a cluster of leaves and silk about the size of a baseball. This was in the early 1990's, but in recent years (late 1990's) I have not seen them. The species does not seem very common. The only record of textor in 52 canopy fogging samples at La Selva is one dealate queen, and a worker was collected in one Malaise trap sample. I also collected two workers of textor at Sirena in Corcovado National Park. These two workers were stray workers on tree trunks, not associated with silk nests, and given their differences from La Selva textor (see above) may not be conspecific. In general textor seems to be a low density species in Costa Rica, but may have higher densities elsewhere in the Neotropics. Wheeler (1915) discussed the Camponotus species that build exposed nests of leaves sewn together with silk and use their larvae as a source of silk. He observed that these species tend to have very weak polymorphism. I also have noted the surprising lack of major workers in textor and JTL-045. There is some variation in worker size, but no large major workers. Members of the subgenus Dendromyrmex exhibit no size variation at all. The workers of subgenus Dendromyrmex do not seem at all closely related to C. textor and JTL-045, suggesting that the construction of silk nests and the weak to absent polymorphism have evolved independently in two different lineages. Forel described senex textor based on a Costa Rican collection by Tonduz. It was collected in a silk nest attached to leaves, and the entire nest, with queen, was sent to Forel. The description includes the dense yellow pubescence and abundant long erect pilosity, and I am confident of this determination. I used to call this species C. senex Smith 1858, and literature reports refer to senex as a species that builds silk nests. However, examination of Alex Wild's images of the type of senex (Click here) suggest senex is not the silk nest builder, but instead a widespread species that nests in dead wood. See senex. There is no mention of the nest of senex in Smith's original description nor in Mayr's (1878) redescription. Forel (1879) reviewed the Camponotus species related to senex, and identified a collection from Cordoba, Mexico, as senex. The Mexican collection was from a "paper nest among branches," and Forel noted the similarity of the nest of "senex" with the silk nests of chartifex and nitidior (subgenus Dendromyrmex). Forel later (1905) identified Brazilian material as senex and reported Gldi's observations that the larvae are used to spin silk for the nest. Wheeler (1915) reviewed use of larval silk for nest construction by ants, perpetuating the association of senex with carton nests. This was followed by Wheeler and Wheeler (1953), Schremmer (1979), and Hlldobler and Wilson (1983). I have concluded that all the observations of "Camponotus senex" using larvae to make exposed silk nests are of other species that are not senex. I am using the name textor for these, but auricomus should be looked at as a potential older name. Forel, A. 1879. tudes myrmcologiques en 1879 (deuxime partie [1re partie en 1878]). Bull. Soc. Vaudoise Sci. Nat. 16:53-128. Forel, A. 1899. Biologia Centrali-Americana; or, contributions to the knowledge of the fauna and flora of Mexico and Central America. Insecta. Hymenoptera. 3 (Formicidae). London. 169 pp. Forel, A. 1905. Einige biologische Beobachtungen des Herrn Prof. Dr. E. Gldi an brasilianischen Ameisen. Biol. Centralbl. 25:170-181. Holldobler, B., and E. O. Wilson. 1983. The evolution of communal nest-weaving in ants. American Scientist 71:490-499. Mayr, G. 1878 ("1877"). Formiciden gesammelt in Brasilien von Professor Trail. Verh. K-K. Zool.-Bot. Ges. Wien 27:867-878. Schremmer, F. 1979. Das Nest der neotropischen Weberameise Camponotus (Myrmobrachys) senex Smith (Hymenoptera, Formicidae). Zoologischer Anzeiger 203:273-282. Smith, F. 1858. Catalogue of hymenopterous insects in the collection of the British Museum. Part VI. Formicidae. London: British Museum, 216 pp. Wheeler, G. C., Wheeler, J. 1953. The ant larvae of the subfamily Formicinae. Ann. Entomol. Soc. Am. 46:126-171. Wheeler, W. M. 1915. On the presence and absence of cocoons among ants, the nest-spinning habits of the larvae and the significance of black cocoons among certain Australian species. Ann. Entomol. Soc. Am. 8:323-342. John T. Longino, The Evergreen State College, Olympia WA 98505 [email protected] Go to Ants of Costa Rica Homepage
<urn:uuid:6772d5fe-0b7e-46c5-8a7b-7204f85101ff>
CC-MAIN-2015-11
http://academic.evergreen.edu/projects/ants/genera/camponotus/species/textor/textor.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.871618
1,686
3.046875
3
Featuring developments in Federal highway policies, programs, and research and technology. |This magazine is an archived publication and may contain dated technical, contact, and link information.| |Federal Highway Administration > Publications > Public Roads > Vol. 62· No. 3 > We‚re on the Eve of Construction| We‚re on the Eve of Construction by Mike Jones Visualize the start of construction on a major public project. Men and women with shiny shovels participate in the symbolic ground-breaking. Bulldozers rumble to life. Crews strap on their hard hats, and the project is underway. Forgotten in the excitement of the ceremony and in the dust and noise of the construction is the long and often difficult process that led to this point - in particular, the critical last step before construction. That last step is the acquisition of the necessary land and other property rights by the appropriate government agency. This is a mammoth undertaking. For example, in fiscal year 1997, the acquisition of real property was required in 11,136 transportation projects that received federal-aid funding. For these projects, 53,277 parcels of land were acquired for a total expenditure of almost $1.4 billion, and another $73 million was spent in compensation to the people involved in the 6,487 displacements. These numbers come from statistics provided to the Federal Highway Administration (FHWA) by state departments of transportation. But the total cost cannot be measured in numbers. Highways and other federal projects are built on land - land that often has been in the same family for generations. Small and large businesses, built up with years of hard work, are sometimes displaced. Elderly tenants are forced to move. Farms are cut in half. Homes are demolished. It is a wrenching and often painful experience for those who live or work on this land. But there are protections to cushion the impact and to compensate those who are affected. The most powerful protection is found in the United States Constitution. It is in the Fifth Amendment: " ... nor shall private property be taken for public use without just compensation." This very basic statement served reasonably well until the latter half of the 20th century, when Congress realized that more specific protections were needed for federal land acquisitions. In 1970, Congress enacted what is popularly referred to as the "Uniform Act" (as amended). Like most federal laws, its true name is a real mouthful: The Uniform Relocation Assistance and Real Property Acquisition Policies Act of 1970. Why Is the Uniform Act So Significant? All federal, state, and local public agencies and others receiving federal financial assistance for public programs and projects requiring the acquisition of real property must comply with the policies and provisions set forth in the Uniform Act, its amendments, and the implementing regulations in the Code of Federal Regulations, Title 49, Part 24. The acquisition itself does not need to be federally funded for the rules to apply. If federal funds are used in any phase of the program or project, the rules of the Uniform Act apply. The rules encourage acquiring agencies to negotiate with property owners promptly and amicably to avoid litigation whenever feasible. We're the Lead Agency and We're Here to Help You The mission of FHWA's Office of Real Estate Services (ORES) is to protect the rights of property owners and displaced persons, to promote consistently high-quality program management by public agencies, and to protect the public's interests and investment in real property before and after a project is constructed. The U.S. Department of Transportation (DOT) and 16 other federal agencies are subject to the provisions of the Uniform Act. The Uniform Act amendments of 1987 designated DOT as the federal "lead agency" for the Uniform Act. Duties include the development, issuance, and maintenance of the governmentwide regulation; providing assistance to other federal agencies; and reporting to Congress. This responsibility has been delegated to FHWA and is carried out by ORES. Varied means are used to assist partnering agencies in maintaining Uniform Act compliance and quality assurance. One of the most effective is the provision of technical assistance. Upon request, the ORES staff provides informal training on specific issues relating to real property appraisal, acquisition, and relocation assistance. Additionally, a number of formalized training courses are provided annually by ORES through the National Highway Institute (NHI). 1998 Annual Lead Agency Meeting As part of its role as the lead agency, ORES hosts an annual meeting of all 17 affected federal agencies. These meetings provide a practical and beneficial forum for representatives of all the agencies to network and to tackle problem areas relating to the Uniform Act. Forty-one people representing the 17 agencies attended the last Lead Agency Meeting on June 25, 1998, at the headquarters of DOT in Washington, D.C. "Illegal Aliens Act" This year's dominant issue is a 1997 federal law that generally prohibits the provision of relocation benefits or assistance to known illegal aliens. Public Law 105-117, 111 Stat. 2384, was enacted on Nov. 21, 1997. This law amends the Uniform Act and states that an alien who is not lawfully present in the United States is not eligible for relocation benefits or assistance in accordance with the Uniform Act unless the denial of eligibility would result in an exceptional and extremely unusual hardship to the alien's spouse, parent, or child who is a citizen or is lawfully admitted for permanent residence in the United States. The amendment applies only to the relocation-assistance provisions of the Uniform Act; it does not apply to the acquisition provisions. This amendment was enacted in apparent response to a well-publicized case in California in which an illegal immigrant was provided with a sizeable relocation payment. Review of this case by lawmakers led to the discovery that the Welfare Reform Act of 1996 (whose purpose was to deny government benefits to illegal aliens) did not prohibit provision of benefits under the Uniform Act. Notice of Proposed Rulemaking In compliance with its duty as the lead agency, ORES with the help of the FHWA Office of Chief Counsel prepared a draft regulation to implement the new law. On June 12, 1998, a Notice of Proposed Rulemaking (NPRM) on this matter appeared in the Federal Register. There is a statutory deadline of Nov. 21, 1998, for issuance of the "Final Rule" on this legislation. To meet this deadline, FHWA actively solicited comments on this issue from all agencies that are subject to the provisions of the Uniform Act. The deadline for those comments was Aug. 11. The role of the lead agency is a major component of ORES's mission. This role extends the oversight responsibility of ORES beyond FHWA's traditional partners, including the state departments of transportation. ORES works with state DOTs to reach counties, cities, nonprofit organizations, and developers and other private individuals to ensure that all affected persons are treated fairly and equitably by federal agencies and their state and local counterparts. For more information regarding the Uniform Act or related issues (including technical assistance), see the ORES portion of the FHWA Web site (www.fhwa.dot.gov) or contact the FHWA's Office of Real Estate Services, Room 3221, 400 7th Street SW, Washington, DC 20590. Mike Jones is a realty specialist in FHWA's Office of Real Estate Services (ORES). He is a member of the ORES Real Property Appraisal Team, and he is a certified general real estate appraiser in Maryland. Jones has a bachelor's degree from Towson University. Page Owner: Office of Corporate Research, Technology, and Innovation Management Scheduled Update: Archive - No Update Technical Issues: [email protected]
<urn:uuid:21fae08b-82bc-45ee-816d-63b3d3afa0ef>
CC-MAIN-2015-11
https://www.fhwa.dot.gov/publications/publicroads/98novdec/eve.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00007-ip-10-28-5-156.ec2.internal.warc.gz
en
0.946145
1,583
2.609375
3
"Bloody Sunday" refers to the March 7, 1965, civil rights march that was supposed to go from Selma to the capitol in Montgomery to protest the shooting death of activist Jimmy Lee Jackson. The roughly 600 marchers were violently driven back by Alabama State Troopers, Dallas County Sheriff's deputies, and a horse‑mounted posse after they crossed the Edmund Pettus Bridge. The state and county officers beat and gassed the unarmed marchers in an attack, and media coverage of the event shocked the nation and led ultimately to the passage of the Voting Rights Act of 1965. The descriptive term appeared in relation to the events within days in the national media. The catalyst for the march was the death of 26‑year‑old Jimmy Lee Jackson on February 26. He was shot in the stomach on February 18, 1965, by Alabama State Trooper James Fowler while the troopers were breaking up a peaceful protest in Marion, Perry County. Jackson was then taken the 50 miles to Selma's Good Samaritan Hospital for treatment, where he died eight days later. At a memorial service for Jackson on February 28, Rev. James Bevel of the Southern Christian Leadership Conference (SCLC) called for blacks to follow the example of the biblical Queen Esther, who risked her life by going to the king of Persia to appeal for her people. Bevel stated that the activists must similarly march to Montgomery to demand protection from Gov. George C. Wallace. Two days later, civil rights leader Martin Luther King Jr. offered the support of the SCLC to head up a march from Selma to Montgomery on Sunday, March 7, to protest Jackson's death and to push for voting rights. The members of the Student Nonviolent Coordinating Committee (SNCC) refused to support the march, however, because they believed that the objectives of the march did not justify the danger. But its leaders agreed to let SNCC president John Lewis take part as an individual. Governor Wallace, who had hesitated over whether or not to permit the march, finally decided to direct the Alabama State Troopers to stop the marchers once they had left the city limits of Selma by crossing the Edmund Pettus Bridge. Wallace asked for the city police and county police to assist the troopers. Selma's public safety director Wilson Baker, who was in charge of the city police, refused to let his men join the troopers in what he feared would become a brutal attack on the marchers. He begged Selma mayor Joe Smitherman to let him head off such a clash by arresting the marchers before they crossed the bridge. Smitherman, who had complete faith in Wallace's promise to disperse the marchers without undue violence, refused. On Sunday, March 7, the state troopers, under the command of Maj. John Cloud, along with Sheriff Jim Clark's deputies and mounted posse, were assembled at the end of the Edmund Pettus Bridge by noon. The march did not begin on time, however, because King had not returned from Atlanta, and there was a good deal of confusion about whether or not to postpone the march. Finally King was reached by phone and gave permission to proceed in his absence. When the marchers first left Brown Chapel AME Church at 1:40 p.m. they were stopped by Wilson Baker, who ordered them to follow the usual rules for suche events: marching two‑by‑two, five feet apart. The demonstrators went to a nearby playground to regroup and set out once again at 2:18 p.m. Under the leadership of Hosea Williams of SCLC and John Lewis of SNCC, they marched south on Sylvan Street (now Dr. Martin Luther King Jr. Boulevard) to Alabama Avenue, then west on Alabama to Broad Street, and finally south on Broad across the Edmund Pettus Bridge. Major Cloud announced that the governor had forbidden the march and gave the marchers two minutes to turn back. When the marchers did not obey promptly, he ordered the troopers to advance. At first, the troopers simply shoved the marchers back with billy clubs held at both ends, but soon they began lashing out. They deployed 40 canisters of tear gas, 12 cans of smoke, and 8 cans of nausea gas, and began chasing the marchers back across the bridge. (Major Cloud later claimed that Sheriff Clark set off the first canister of tear gas by mistake.) The troopers and the mounted posse pursued the fleeing marchers all the way back to Brown Chapel, beating people as they went. Wilson Baker then confronted Clark and told him to take control of his men and leave the area. (Baker would be remembered in a positive light for his actions. He defeated Clark in the 1966 race for sheriff with the support of newly enfranchised blacks.) Clark reluctantly withdrew his forces, making it possible for ambulances to pick up the injured and race them to Selma's two black hospitals, Good Samaritan and Burwell Infirmary. Fifty-six patients were treated at the two hospitals, with 18 being admitted overnight, including John Lewis, who had a fractured skull. The television coverage of the violence shocked the nation. It provoked an outpouring of support for the voting rights movement from whites throughout the country: priests, ministers, nuns, rabbis, labor leaders, students, and ordinary citizens poured into Selma to stand with the marchers. An estimated 800 volunteers from 22 states arrived in Selma in the days after Bloody Sunday. President Lyndon Johnson and key members of Congress who had been dubious about the need for a voting rights bill now committed themselves to its passage. Governor Wallace announced that the violence was not supposed to happen and rebuked Mayor Smitherman and Sheriff Clark for allowing it. On Tuesday, March 9, the marchers made a second attempt, led by King, but turned back at the end of the bridge, earning the day the nickname "Turnaround Tuesday." A third and successful attempt began under the protection of the Alabama National Guard (which had been placed under federal control by President Johnson) on Sunday, March 21, two weeks after the initial effort. The marchers finally reached Montgomery on Thursday, March 25. The Voting Rights Bill that King, Lewis, and so many other civil rights leaders had sought was signed into law August 6, 1965. Fager, Charles. Selma 1965: The March That Changed the South . Boston: Beacon Press, 1975. Thorton, J. Mills III. Dividing Lines, Municipal Politics and the Struggle for Civil Rights in Montgomery, Birmingham, and Selma . Tuscaloosa: University of Alabama Press, 2002. Welcome to your free, online resource on Alabama history, culture, geography, and natural environment. This site offers articles on Alabama's famous people, historic events, sports, art, literature, industry, government, plant and animal life, agriculture, recreation, and so much more.
<urn:uuid:72cc2d5f-487e-419f-bb47-b67eb71fcc48>
CC-MAIN-2015-11
http://www.encyclopediaofalabama.org/article/h-1876
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00029-ip-10-28-5-156.ec2.internal.warc.gz
en
0.969918
1,409
3.546875
4
Picture books are one of my favorite things in the world. There can be so much magic inside those 32 illustrated pages, where the words and the images work together to tell stories in a way no other medium can. But holding that tidy, finished book in your hands disguises all the hard work that went into the making of it. Even after decades of studying the process of illustrating picture books, I didn’t truly understand the process until I was hired to illustrate my first book. Hopefully, I can give you a peek into how a picture book can be made, but as I have said before, the key to illustrative success is to get to work! Here are the steps to follow for successfully making a picture book dummy. Step 1: Begin working from a manuscript When I make books, long before I begin finished art, I am constantly switching from designing characters to writing the story to layouts to art experiments and back to story and characters and so on. Some illustrations appear in my head fully-formed before I’ve even thought up the main character. Sometimes a character keeps showing up in my sketches before I know what story she belongs to. And sometimes the text is clear and beautiful and gives me no ideas about its visual companion until hours of labor and reams of paper have been spent. Whether you are working on a story of your own, like me, or illustrating the work of another author, the manuscript allows you to navigate through the period of being lost in a sea of nebulous bits of images and / or snippets of unattached text. Once you have the finished story in writing, begin by reading it aloud several times to feel the rhythm of it. I like to mark up the manuscript with pencil, dividing up the story into spreads (everywhere two pages face each other is called a spread), deciding where to put all those critical page turns, which are the secret to a picture book’s magic. As I read, in my mind I am picturing the page layouts in broad strokes — a mountain here, the moon up there, the main character creeping through the bushes over there, etc. — all in an effort to plan out the way the book works. The process here is the same as when you are illustrating a story written by someone else. When I’m done, the text is all marked up with ideas and notes and sketches, too. Step 2: Fitting it to the physical world At the first pass, just try to feel out the most instinctual page turns, but after you get a loose sense of it, you need to make sure it is going to fit into the traditional picture book lengths of 32 pages or 40 pages*. Keep in mind that you need to leave space for the title page and the copyright and dedication page. There are ways to fudge it, but there are basically two conventions: The “end matter” as these pages are collectively called, can go in the front, taking up three pages, usually, or they can be divided to the front and back, and then they will take up two pages. However, there are always exceptions. *Note: All books must have pages in multiples of four — this is because the pages are made by folding a sheet of paper in half, which creates a first page outside the fold, two facing pages inside the fold, and then a fourth page on the back. With the particular book I’m writing, I ended up with seventeen spreads after my first pass. That’s too many for a 32-page book, but not quite enough for 40 pages. I went back through the story and looked for places the story could compress or stretch, and since a 32-page layout felt too cramped, I settled on a 40-page layout, with nineteen spreads and the end matter divided front and back. In the books I’ve illustrated for others, the editor and I usually agree up-front how many page the book will have, so our job is to fit it all in properly. Step 3: Move on to storyboarding Now that you’ve gotten the feel for the story, and you’ve figured out how to fit it to a physical book layout, you need to plan out each page and spread. As is common to most visual storytelling, like film, animation, and comics, I use a storyboard to work out these details. My storyboards are iterative. I start with a template of small rectangles where I can try out broad ideas. I have a template that works for a vertical page layout, and another for a horizontal layout. As I work out the general page designs and the lights and darks of each spread, I begin to work larger and larger, usually going through the entire story at least three times, adding detail and refining the image at each larger stage. Some pages are easier to figure out than others. Some take a dozen drafts or more. But all that planning is worth it. All along the way, you’ll be able to get a real sense for exactly how the theoretical book will function once it becomes a real object. You can edit out the parts that aren’t needed and quickly try out details to see if they make the story more clear. In the end, it means that you won’t spend hours or days on a piece of final art that doesn’t work in the finished book. Step 4: The dummy! After all the initial planning, you should be ready to make something to show an editor or agent. Also called a “mock-up”, the picture book dummy is the thing you will send off to see if they think your book is publishable. Typically, a dummy is made up of the story’s full text, and pencil sketches for the majority of the images. Finished art for one to three pages (leaning towards three) gives the recipient a clear idea of what you intend the book’s illustrations to look like. Historically, the dummy would be a physical object, sent in the mail and at least printed out at full-size, if not hand-bound, so it feels and acts like a real picture book. These days, dummies can be sent as PDFs as an email attachment, and most editors and agents can get a good enough sense of things from that digital document. If you send the dummy directly to an editor, s/he may or may not see it as a good fit for his/her publishing house. If you guess well, the right editor at the right publisher might agree that this is a book s/he can publish, and after that editor gets approval from his/her publishing house, we can make a deal and begin making it into a real book. If you guess poorly, you may have to wait until that editor tells you he can’t use it before you send it off to someone else, and that can take as long as six months or longer. If you have an agent, his/her job (after giving me his/her best-guess “yea” or “nay” as to the book’s “publishability”) is to help you pitch it to just the right editor at just the right publishing house. A good agent knows the market well enough to show it to the most likely editors and has a friendly relationship with those editors, so they won’t slam the door in your face. The trade off, of course, is that s/he will take a cut if the book sells. But I’m happy for them to get paid for saving me all that time and waiting, especially if the agent then negotiates a good contract for the book. While an agent is not technically required (there are a few publishers who still maintain a “slush pile“), it is increasingly difficult to get a book made without one. In the best of worlds, a good agent can help an illustrator stay focused on the creative work, while takeing care of the business side of things. As always, once I get this story put together and into someone else’s hands, it’s time to start working on the next idea. So I’ll start over at the beginning of the process, and do it all again! After all, “If you want to have good ideas you must have many ideas.” – Linus Pauling Stop talking about wanting to do it, and just get to work! Write it down and start drawing!
<urn:uuid:294be2b9-3baf-44b6-b588-503da6016765>
CC-MAIN-2015-11
http://www.craftsy.com/blog/2014/08/how-to-make-a-picture-book-dummy/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00244-ip-10-28-5-156.ec2.internal.warc.gz
en
0.953317
1,769
3.015625
3
Patents can be signs of things to come. Of course, all large companies file patents on a regular basis, and they don't always indicate upcoming products. Sometimes those patents simply show ideas that the company researchers had and that they want to protect in case they ever turn out to be good. But sometimes, patents can show what is about to be implemented, and this might just be the case in a new McAfee patent called "Detect and prevent illegal consumption of content on the internet." As the name suggests, it describes a method that the anti-malware giant may implement to help fight online piracy, and what makes it more credible than a lot of other patents is the use of dialog mockups which could well be part of its current security suite. The patent itself describes a way that a security software could scan URLs as they are entered by the user into a web browser, email client, or anywhere on their system. These addresses would be sent to a central database server and compared with lists of suspected pirate sites, and if they are a match, then the addresses could be handled in a number of ways. One way would be to simply block access, displaying a message saying the address is not available. Another way would be to offer a warning about copyright infringement, and allow an option for the user to keep going anyway. A final method would be to instead offer legal alternatives to buy content. This type of blocking system is hardly new, with parental software or services like OpenDNS, but up until now the copyright policy has mostly been handled by the RIAA, and MPAA along with these types of industry groups, and those companies have been pushing on Internet providers to implement checks and blocks at the ISP level. But with solutions like this, the Internet censorship could now be done at the user level instead. Obviously, this would require McAfee to be installed, but it already is one of the most popular security solutions out there. It is unlikely that this patent would be implemented as a new product; instead, it would become part of the existing solution. While a computer owner may be able to turn off this system, there are many cases when a user may not be able to do so, whether it is a minor who does not have administrative access to his computer, a school setting, public wi-fi, or any business environment which typically deploys anti-malware solutions from a central server, and employees have no access to modify behavior. Of course, the question then becomes whether or not this is a good thing. There is no question that many parties out there would like the Internet to become a more walled off garden. Networks and traditional content creators would prefer the Internet to work like cable TV; portal sites and social networks want their users to stay in their own environments; governments want the ability to track and monitor everyone; and so on. The main issue with any type of spying or content filtering at the ISP level is that encryption such as using a VPN or Tor makes it impossible for illegal content to be detected. So having the ability to do this filtering right on the user's computer can be a useful thing. Administrators already use various solutions to do filtering as well, but typically this is done as an added solution. By implementing this feature in something like an anti-malware suite that is as popular as McAfee is, this then allows the concept to become much more widespread. By presenting alternate URLs in a friendly way, it may become an accepted method by the general public as well. The critics on the other hand will point at the invasion of privacy, since all URLs have to be sent off to a remote server in order for this type of blocking to work. Also, content filtering never works perfectly. There are false positives, and the web changes far too quickly for any list to be always up to date. The Internet was started as an open, free and liberating platform. But as money and powers came into the equation, it has become more walled off every year, whether that is to catch criminals, monitor suspected terrorists, make more money, or prevent copyright infringement. I believe it is only a matter of time before all commercial anti-malware solutions have these types of filtering built-in. If you want to use the core features of the product, you may even one day have to leave this turned on. This would certainly please Hollywood studios. Whether this is something you should be looking into as a business admin or IT pro is too early to say; it depends how it is implemented. But someday we may no longer need extra software to do packet filtering, should clients ask for it. This may become a well known and accepted feature of any security suite. Patrick Lambert has been working in the tech industry for over 15 years, both as an online freelancer and in companies around Montreal, Canada. A fan of Star Wars, gaming, technology, and art, he writes for several sites including the art news community TideArt. He's always at the forefront of the latest happening in the world of technology. You can find him online at http://dendory.net or on Twitter at @dendory.
<urn:uuid:6ede489d-ecd9-4c47-b839-487e4d1c2be4>
CC-MAIN-2015-11
http://www.techrepublic.com/blog/it-security/new-mcafee-patent-hints-at-a-more-walled-off-online-world/?count=25&view=expanded
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.965029
1,046
2.5625
3
Holy King Vakhtang Gorgasali (†502) Commemorated November 30/December 13 Memory 30 November (13 December) After his coronation, the young King Vakhtang summoned his court and addressed his dedicated servants with great wisdom. He said that the sorrowful circumstances in which the nation had found itself were a manifestation of God’s anger at the sins of the king and the people. He called upon everyone to struggle in unity and selflessness on behalf of the Faith and motherland. King Vakhtang led a victorious campaign against the Ossetians, freed the captive princess (his older sister), and signed several treaties with the Caucasian mountain tribes to secure their cooperation in the struggle against foreign conquerors. Then he carried out another campaign in western Georgia, freed that region from the Byzantines, reinforced the authority of KingGubaz, and returned in triumph to Kartli. King Vakhtang was remarkable in faith, wisdom, grace, virtue, and appearance (he towered above all others at a stately seven feet ten inches). He spent many nights in prayer and distributed alms to the poor, in this way dedicating his life to God. King Vakhtang could fight tirelessly in battle. Vested in armor and fully armed, he could carry a war-horse on his shoulders and climb from Mtskheta to the Armazi Fortress in the mountains outside the city. On foot he could outrun a deer. The holy king was judicious in politics, displayed great composure, and preserved a sense of calm even when critical decisions needed to be made. On the brow of Vakhtang’s military helmet was depicted a wolf, and on the back, a lion. Catching a glimpse of the helmet with the wolf and lion, the Persians would cry out to one another: “Dar’ az gurgsar!” (“Beware of the wolf ’s head!”) This was the source of King Vakhtang’s appellation “Gorgasali.” During King Vakhtang’s reign the Georgian Church was first recognized as autocephalous. When the holy king banished the pagan fire-worshippers from Georgia, he also sent a certain Bishop Mikael — who was inclined to the Monophysite heresy, which had been planted in Georgia by the Persians — to Constantinople to be tried by the patriarch. The bishop had disgracefully cursed the king and his army for rising up against the Monophysites. In fact, he was so infuriated that when King Vakhtang approached him to receive his blessing, he kicked him in the mouth and broke several of his teeth. The patriarch of Constantinople subsequently defrocked Bishop Mikael and sent him to a monastery to repent. More importantly perhaps, the patriarch and the Byzantine emperor then sent to the patriarch of Antioch several clergymen whom King Vakhtang had chosen for consecration. In Antioch the patriarch consecrated twelve of these clergymen as bishops and enthroned a certain Petre as the first Catholicos of Georgia. Vakhtang fulfilled the will of Holy King Mirian by founding the Georgian Holy CrossMonastery in Jerusalem. In addition, he replaced a wooden church that had been built in Mtskheta at the time of St. Nino with a church made of stone. During his reign several new dioceses were founded. King Vakhtang built a cathedral in Nikozi (Inner Kartli) and established a new diocese there, to which he translated the holy relics of the Protomartyr Razhden. King Vakhtang built fortresses at Tukhari, Artanuji, and Akhiza; founded monasteries in Klarjeti at Artanuji, Mere, Shindobi, and Akhiza; and established many other strongholds, churches, and monasteries as well. He built a new royal residence in Ujarma and laid the foundations of the new Georgian capital, Tbilisi. His political creed consisted of three parts: an equal union of the Georgian Church with the Byzantine Church, national independence, and the unity of the Church and nation. In the year 502 the sixty-year-old King Vakhtang was obliged to defend his country for the last time. In a battle with the Persians he was fatally wounded when a poisoned arrow pierced him under the arm. Before he died, King Vakhtang summoned the clergy, his family and his court and urged them to be strong in the Faith and to seek death for Christ’s sake in order to gain eternal glory. All of Georgia mourned the passing of the king. His body was moved from the royal residence in Ujarma to Mtskheta, to Svetitskhoveli Cathedral, which he had himself built. There he was buried with great honor. Some fifteen centuries later, with the blessing of Catholicos-Patriarch Ilia II, an addition was built onto the Sioni Patriarchal Cathedral in Holy King Vakhtang Gorgasali’s name, and a cathedral in his honor was founded in the city of Rustavi. O Holy and Right-believing Vakhtang Gorgasali, pray to our merciful God to grant remission of our sins and have mercy on our souls! For further information on the book THE LIVES OF THE GEORGIAN SAINTS by Archpriest Zakaria Machitadze contact St. Herman Press: St. Herman Press, P.O. Box 70, Platina, CA 96076 17 / 12 / 2007 Also here you can read St. Lawrence of Chernigov: Some Prophecies and Statements on the Ukrainian Situation Venerable Werburgh of Mercia, Patroness of Chester Homily On The Meeting Of The Lord The Meeting of the Lord in Icons and Frescoes Sermon on the Day of the Russian New-Martyrs Venerable Cadoc, Abbot of Llancarfan in Wales A Miracle of St. Xenia the Fool-for-Christ in France “I have seen a holy man.” On the Repose Day of Archimandrite John (Krestiankin) On Actuality and Reality (for the commemoration of St. Anthony the Great) Venerable Ita of Limerick, “Foster-mother of the Irish Saints” The Interrogation Before Death Lasted 16 Days and Nights
<urn:uuid:c919c3d1-7eb7-4081-91fe-32f20596c36b>
CC-MAIN-2015-11
http://www.pravoslavie.ru/english/7367.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463460.96/warc/CC-MAIN-20150226074103-00185-ip-10-28-5-156.ec2.internal.warc.gz
en
0.962646
1,382
2.921875
3
The back and forth brawl between studies suggesting that cell phones do and don't cause cancer just took a bold step toward the former camp today, with the World Health Organisation classifying cellphones as potential links to brain cancer. The study, conducted by the WHO's International Agency for Research on Cancer, stops far short of saying phones cause cancer. Rather, the agency's grouped regular cellphone usage (defined as 30 minutes of talk-time per day) as a "possible" cause of glioma, a malignant form of brain cancer—up to a 40% increased chance, according to one cited study. As one researcher puts it, "There could be some risk, and therefore we need to keep a close watch for a link between cell phones and cancer risk." This might sound insignificant—the study says chance, as opposed to causation, can't be ruled out—but it's unprecedented. The WHO is a global authority on medicine, and its findings mark the most comprehensive statement on cellular radiation danger. By classifying cellphone usage as a possible, or "Class 2B" carcinogen, your iPhone or Android's now on the same list as DDT, burning coal, herpes, and working in a print factory (among hundreds of other potential carcinogens). The IARC defines 2B classification—the zone between a definitive cancer cause and inconclusive murk—thusly: This category is used for agents for which there is limited evidence of carcinogenicity in humans and less than sufficient evidence of carcinogenicity in experimental animals. It may also be used when there is inadequate evidence of carcinogenicity in humans but there is sufficient evidence of carcinogenicity in experimental animals. In some instances, an agent for which there is inadequate evidence of carcinogenicity in humans and less than sufficient evidence of carcinogenicity in experimental animals together with supporting evidence from mechanistic and other relevant data may be placed in this group. An agent may be classified in this category solely on the basis of strong evidence from mechanistic and other relevant data. So it's not a definitive danger. But cellphone use is officially a risk. Luckily, we're decreasingly using them to actually talk into—smartphones might be helping us dodge brain cancer. [via Telegraph, Photo: Shutterstock/Aleksandr Markin] The IARC's release can be read in full below: IARC CLASSIFIES RADIOFREQUENCY ELECTROMAGNETIC FIELDS AS POSSIBLY CARCINOGENIC TO HUMANS Lyon, France, May 31, 2011 ‐‐ The WHO/International Agency for Research on Cancer (IARC) has classified radiofrequency electromagnetic fields as possibly carcinogenic to humans (Group 2B), based on an increased risk for glioma, a malignant type of brain cancer1, associated with wireless phone use. Over the last few years, there has been mounting concern about the possibility of adverse health effects resulting from exposure to radiofrequency electromagnetic fields, such as those emitted by wireless communication devices. The number of mobile phone subscriptions is estimated at 5 billion globally. From May 24–31 2011, a Working Group of 31 scientists from 14 countries has been meeting at IARC in Lyon, France, to assess the potential carcinogenic hazards from exposure to radiofrequency electromagnetic fields. These assessments will be published as Volume 102 of the IARC Monographs, which will be the fifth volume in this series to focus on physical agents, after Volume 55 (Solar Radiation), Volume 75 and Volume 78 on ionizing radiation (X‐rays, gamma‐rays, neutrons, radio‐nuclides), and Volume 80 on non‐ionizing radiation (extremely low‐frequency electromagnetic fields). The IARC Monograph Working Group discussed the possibility that these exposures might induce long‐term health effects, in particular an increased risk for cancer. This has relevance for public health, particularly for users of mobile phones, as the number of users is large and growing, particularly among young adults and children. The IARC Monograph Working Group discussed and evaluated the available literature on the following exposure categories involving radiofrequency electromagnetic fields: ␣ occupational exposures to radar and to microwaves; ␣ environmental exposures associated with transmission of signals for radio, television and wireless telecommunication; and ␣ personal exposures associated with the use of wireless telephones. International experts shared the complex task of tackling the exposure data, the studies of cancer in humans, the studies of cancer in experimental animals, and the mechanistic and other relevant data. The evidence was reviewed critically, and overall evaluated as being limited2 among users of wireless telephones for glioma and acoustic neuroma, and inadequate3 to draw conclusions for other types of cancers. The evidence from the occupational and environmental exposures mentioned above was similarly judged inadequate. The Working Group did not quantitate the risk; however, one study of past cell phone use (up to the year 2004), showed a 40% increased risk for gliomas in the highest category of heavy users (reported average: 30 minutes per day over a 10‐year period). Dr Jonathan Samet (University of Southern California, USA), overall Chairman of the Working Group, indicated that "the evidence, while still accumulating, is strong enough to support a conclusion and the 2B classification. The conclusion means that there could be some risk, and therefore we need to keep a close watch for a link between cell phones and cancer risk." "Given the potential consequences for public health of this classification and findings," said IARC Director Christopher Wild, "it is important that additional research be conducted into the long‐ term, heavy use of mobile phones. Pending the availability of such information, it is important to take pragmatic measures to reduce exposure such as hands‐free devices or texting. " The Working Group considered hundreds of scientific articles; the complete list will be published in the Monograph. It is noteworthy to mention that several recent in‐press scientific articles4 resulting from the Interphone study were made available to the working group shortly before it was due to convene, reflecting their acceptance for publication at that time, and were included in the evaluation. A concise report summarizing the main conclusions of the IARC Working Group and the evaluations of the carcinogenic hazard from radiofrequency electromagnetic fields (including the use of mobile telephones) will be published in The Lancet Oncology in its July 1 issue, and in a few days online. For more information, please contact Dr Kurt Straif, IARC Monographs Section, at +33 472 738 511, or [email protected]; Dr Robert Baan, IARC Monographs Section, at +33 472 738 659, or [email protected]; or Nicolas Gaudin, IARC Communications Group, at [email protected] (+33 472 738 478) Link to the audio file posted shortly after the briefing: http://terrance.who.int/mediacentre/audio/press_briefings/
<urn:uuid:2d8009c4-f899-493a-8d50-3f2a38873687>
CC-MAIN-2015-11
http://gizmodo.com/5807049/cellphones-deemed-possibly-carcinogenic-by-worlds-leading-cancer-experts?tag=cellphones
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463444.94/warc/CC-MAIN-20150226074103-00163-ip-10-28-5-156.ec2.internal.warc.gz
en
0.92837
1,448
3.484375
3
Conservationists and park officials have managed to protect the Virunga population of highly endangered mountain gorillas despite protracted conflict in and around their habitat, the mountains where Congo-Kinshasa meets Rwanda and Uganda. The population of this group, one of two groups left in the world, has increased by at least 11 percent since the last full count in 1989. The group grew from 320 to 355 individuals, based on monitoring data from the International Gorilla Conservation Programme (IGCP), a joint initiative by the African Wildlife Foundation (AWF), Fauna and Flora International and the World Wide Fund for Nature (International), and the Dian Fossey Gorilla Fund International (DFGF-I). IGCP monitors the entire range of the mountain gorillas (both populations). DFGF monitors the research groups of gorillas in Rwanda. Together, these data show that the population has been slowly increasing, despite the war and conflict in the region, and the enormous threats on the habitat. The Virunga population represents more than half the total world population of mountain gorillas. The only other population lives in the Bwindi Impenetrable National Park in Uganda. "This success proves that even in a region hammered by conflict and crises, there is hope," says Annette Lanjouw, Director of the International Gorilla Conservation Programme. "There is a future for both people and wildlife, when people work together despite political differences." R. Michael Wright, President of AWF, agrees. "The increase in the mountain gorilla's population is indeed a tremendous accomplishment, and African Wildlife Foundation is proud of our role in conservation in the Virunga Heartland," says Wright. "IGCP was the only conservation organization that continuously maintained operations during political and social unrest, and this commitment has certainly proved successful." Civil unrest, armed conflict and genocide have plagued the Great Lakes region for the last 10 years. The Virunga volcanoes range, the habitat of one of the two populations of mountain gorillas has been in the centre of the fighting and the instability in the region. This forest, straddling the borders between Rwanda, Uganda and the Democratic Republic of Congo, has been repeatedly used by various armed groups, including the infamous Interahamwe, as a transit corridor and a rear base for their military activities. Over the years, thousands of civilians have sought refuge in the Virungas, and many of them remained in the volcanic forest for long periods of time, relying on hunting for bush meat and small scale farming for their survival. About 15 gorillas are known to have been killed as a direct consequence of this war. Military and militia movements through the forest have certainly affected many of them, and have had a negative impact on the habitat as a whole. A census of the Virunga population of mountain gorillas, conducted in 1989 by a number of national and international conservation organisations, showed the population to number 320 individuals. From the daily monitoring of the research and tourism gorilla groups, and the sightings of wild groups, it appears that the current population stands at a minimum of 355 known gorillas. This figure is most likely an underestimate, with more individuals to be counted, and it represents a significant increase from the 1989 census. An analysis, currently in preparation by IGCP, DFGF-I, the Institute of Tropical Forest Conservation (ITFC) and the Max Planck Institute will describe in more detail the population increase observed. Conservationists stress that the increase can be directly traced to the sheer dedication of field staff operating on the ground. Park rangers and trackers, many of whom have been killed or wounded while on duty in Rwanda and DR Congo, have been patrolling the forest continuously throughout the years of civil unrest. This dedicated work has limited the damage to the habitat and the population of gorillas. The park authorities of the three countries - the Institut Congolais pour la Conservation de la Nature (ICCN), the Office Rwandais du Tourisme et des Parcs Nationaux (ORTPN) and the Uganda Wildlife Authority (UWA) - and their governments, have never relinquished their pledge to protect this endangered and unique subspecies of gorilla. The regional collaboration and monitoring of the forest and gorillas is one of the central activities of these institutions. The national parks authorities have benefited from the continued support of the above-mentioned international conservation organisations. These organisations have been working together, demonstrating the value of collaborative efforts. The plight of the mountain gorilla is not over, however. The crisis in the Great Lakes region continues, and threats to the forests, the wildlife and people of this region are becoming increasingly acute. Continued commitment will have to be ensured in order to secure the long-term protection of these forests, and the gorillas. Widespread poverty and continued violence, as well as habitat encroachment, poaching, and lack of resources for conservation are still tangible threats. Conservation groups estimate that there are approximately 650 mountain gorillas in the world, all of which are in the Great Lakes Region of Africa. They are divided into two populations. One population, in the Bwindi Impenetrable Forest of Uganda, numbers approximately 300 individuals. The second population, in the Virunga forest, straddling the borders of Rwanda, DRC and Uganda, numbers at least 350 individuals. The mountain gorilla is one of the rarest of the gorilla subspecies. Gorillas are one of human's closest relatives, living in stable family groups. Their primary threats are from humans, through poaching, habitat destruction, disease transmission and war/conflict. 1400 16th St NW Suite 120 Washington DC, USA 1400 16th St NW Suite 120 Washington DC, USA
<urn:uuid:89e872d2-ba18-4563-bf09-cb54ce845c46>
CC-MAIN-2015-11
http://www.awf.org/news/mountain-gorilla-group-grows-despite-decade-armed-conflict
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00141-ip-10-28-5-156.ec2.internal.warc.gz
en
0.928401
1,167
3.546875
4
March 10, 1999 Listed below are story ideas from Johns Hopkins Medical Institutions. ADULT MONO DIFFICULT TO DIAGNOSE Men suffering mid-life crises sometimes act like teenagers, zooming around in sports cars, staying out late, and -- coming down with "mono"? Upwards of 10 percent of adults may be susceptible to the enervating "kissing sickness," and diagnosing it can be tricky, says Paul Auwaerter, M.D., Johns Hopkins infectious disease specialist. While in teenagers infectious mononucleosis, or "mono," typically begins with fatigue, fever, sore throat and swollen lymph nodes, symptoms in adults vary widely. "When people get in their 30s and older, it no longer resembles typical mono," says Auwaerter. "They usually get the fever but not the other symptoms typical in teenagers. It can masquerade as other syndromes." That's exactly what happened with a 42-year-old man who had a persistent fever and a series of other ailments, including pneumonia. The man made several trips to the clinic, leaving doctors puzzled when tests for hepatitis and other diseases were negative. When Auwaerter was called in on the case, he inspected the patient's blood and found twisted, deformed white cells -- a telltale sign of mono. A sensitive antibody test confirmed the diagnosis. Eighty years before Auwaerter solved that minor mystery, when mono was not yet known, two Hopkins pathologists confronted a similar puzzle. After examining the blood of six young patients with the typical symptoms of mono, the physicians saw the misshapen cells. They feared the worst: leukemia. But in a matter of weeks, the six patients recovered without treatment, leading the doctors to conclude an acute, unknown infection was the culprit. They wrote a thorough description of the case -- possibly the first -- and published it in a 1920 issue of the now-defunct Johns Hopkins Hospital Bulletin. Today, scientists know infectious mononucleosis is caused by the Epstein-Barr virus (which also has been linked to some cancers) and is often spread via saliva. Like chicken pox virus, Epstein-Barr exposure inoculates against further infection, making it uncommon in adults. A description of Auwaerter's case can be found in the Feb. 3 Journal of the American Medical Association. For more information on infectious mononucleosis, visit http://www.intelihealth.com. UNLOCKING HEARING'S BIOCHEMICAL BASIS New research from Johns Hopkins shows that hearing is a biochemical process, not simply a mechanical vibration of the organs of the inner ear. By explaining how tiny hair cells inside the ear respond to different pitches at the molecular level, the work also provides a target for further studies into causes of and cures for hearing loss. Led by Paul Fuchs, Ph.D., professor of otolaryngology-head and neck surgery, the Hopkins team identified and cloned genes for certain proteins in hair cells, which lie along the spiral-shaped cochlea. One of the proteins, dubbed the beta chain, is spread along the cochlea in a gradient that suggests it is crucial for hearing low frequencies. The cochlear proteins build small channels that allow potassium ions to flow into and out of the hair cells. Previous work showed that the speed with which these potassium channels open and close is related to the frequency of sound: Lower sound means slower potassium. Fuchs set out to discover why, at the molecular level, this was so. His team found that one of the channel-building proteins, the alpha chain, occurs in several forms and is distributed evenly across the cochlea. But whenever a beta chain was added to an alpha-chain channel, potassium currents slowed down, "as though the beta chain ought to occur in low frequency hair cells," says Fuchs. Further work showed that the beta chain does indeed bunch up at the wide, floppy end of the organ, the region where low frequency sounds are perceived. Knowing the structure and genetics of the ion channels is of particular interest because the channels regulate calcium flow into the hair cells. Too much calcium kills the cells, which are essential for hearing. "We'd like to look at gene products like these potassium channels in the context of aging, to see if they might be involved in age-related hearing loss," said Fuchs. Along with co-authors Krishnan Ramanathan, Timothy H. Michael, Guo-Jian Jiang and Hakim Hiel, Fuchs published the study in the January 8, 1999, issue of Science. PREVENT ILLNESS WHEN TRAVELING THIS SPRING You wouldn't leave home without your suitcase, tickets and itinerary, yet many people travel without another essential -- a medical check-up. Experts at Johns Hopkins Travel Medicine and Immunization Service, one of the oldest travel clinics in the country, say a pre-departure consultation is the key to decreasing the risk of illness and injury while traveling abroad. "We practice 100 percent preventative medicine," says Judy Baker, M.P.H., the clinic's assistant director. Bradley Sack, M.D., Baker and the rest of the clinic staff have all lived and worked abroad extensively, offering their hands-on expertise to travelers for 13 years. The Hopkins clinic offers up-to-date information tailored to each traveler's health past and travel future. Individual, family and group consultations, vaccinations, prescriptions, and reference materials are available, as are post-travel diagnosis and treatment. Baker says of the clinic's 4,000 annual visits, only 5 percent are for post-travel illness. The clinic continues to prepare all types of travelers, including adventure seekers, disaster relief workers, and a growing number of couples headed abroad to adopt. The clinic's experts offer these healthy travel tips: Get immunized -- Diseases that are virtually unknown in northern climes are more common in popular tropical destinations. Vaccines for hepatitis A and B, yellow fever, typhoid and other diseases are available. In addition, medicine to prevent malaria can be prescribed. Prevent diarrhea -- Bacteria, viruses and parasites can all cause this unwelcome annoyance, which can leave travelers dehydrated and exhausted. Most cases are transmitted through tainted food or water, so drink only bottled or boiled water. Also beware of unpasteurized dairy and uncooked or unpeeled foods. Over-the-counter preparations can counteract symptoms but do not cure diarrhea. Oral rehydration solution and a short course of antibiotics are prescribed for severe cases. Combat jet lag -- Melatonin, a sleep-regulating hormone sold over-the-counter, can readjust your biological clock when taken at the right times. On the day of departure, take one three to five mg tablet one hour before your destination's bedtime. Then take one tablet for three to five nights, before bedtime, upon arrival. Plan -- Keep medications in your carry-on luggage, take along a medicine kit, and know where to find help in case of emergencies. Practice safe sex and pack sunscreen. To schedule an appointment at the clinic, call 410-955-8931. More information on travel medicine is available on the Internet at www.hopkins-id.edu. Click on "Travel Medicine" at the top of the page. To arrange an interview with the clinic staff or its traveling patients, call Brian Vastag at (410) 955-8665 or e-mail [email protected].
<urn:uuid:21b5dcc5-4685-4c89-a28a-f532169c6af0>
CC-MAIN-2015-11
http://esgweb1.nts.jhu.edu/press/1999/MARCH/990310.HTM
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.933055
1,571
2.90625
3
On this President’s Day I was thinking about what makes someone a good President of the United States? Is it the age he (or hopefully someday she) was born into? Would Abraham Lincoln have been a less effective chief executive had he governed at the turn of century rather than during the Civil War? Or is it something inherently presidential in the person? Is it just predestined for this one to be a sequoia while another one is kindling wood? Sometimes I think it is perception. Someone like Harry Truman could say “The Buck Stops Here” and make it sound absolutely presidential; someone like George H. Bush could say “Read my lips” and slip into infamy faster than Charlie Sheen on a bender. I guess it could be the times and world events that shape a presidency, or it may just be that one guy is just better than the other. I look at presidents and think of accomplishments; I also think family influences us a great deal in thinking about them as well. For example, my uncle always kept a beautiful picture of a young John F. Kennedy on his office wall. I was greatly moved every time I saw that picture, and my uncle’s feelings about the man were also told in stories. While I don’t remember JFK as being president, I know of his legacy from history but also have strong positive feelings about him from family. I have also heard very negative things from family members about presidents. So growing up and hearing negative things about Herbert Hoover and positive stories about Franklin Delano Roosevelt would probably slant my feelings in a certain way. Also, as a student of history, I was certainly taught very positive things about FDR while the thing that stands clear in my mind about Hoover is the Hoovervilles: the many homeless shantytowns that sprung up all over the nation due to the Great Depression under his watch. I am very conscious now of how I speak about presidents to my children. Since I remember Watergate vividly, it is hard for me to say anything positive about Richard Nixon, yet I still manage to say something like “he opened the door to China” and even of Jimmy Carter “he brought Israel and Egypt together in the peace process.” While I may personally think of both men as kindling more than presidential timber, I am not going to let those thoughts warp my kids’ perceptions of these men: they’ll get enough of that in school someday. I have always thought of the great presidents as being larger than life, and those faces on Mount Rushmore provide clear evidence that many other people agree in reference to those four faces etched in stone in South Dakota. Is that monument in and of itself a greater influence than history? Well, many of us grow up with these thoughts: George Washington – Father of Our Country! Thomas Jefferson – Author of the Declaration of Independence! Theodore Roosevelt- Speak softly and carry a big stick! Abraham Lincoln – The Great Emancipator! Surely, these four men stand out as exemplary presidential timber, yet they were not perfect. Of the four, I have always held Lincoln in the highest regard. Perhaps it was because he kept a divided nation from falling apart, or maybe it was that “Gettysburg Address” I memorized in fifth grade. Without question he has always been the one I have held other presidents up against, and many of them fail to make the cut. I think JFK may have made his presidency legendary in his Inaugural Address. He uttered one of the greatest lines ever spoken by a president: “Ask not what your country can do for you; ask what you can do for your country!” Man, that still gives me the shivers as I think about the power of those words. They remain a shining example of what it means to lead and to do so with distinction. The fact that he was cut down by an assassin just as Lincoln was doesn’t hurt our perceptions either, making us feel they were both martyrs for their country. Our last two presidents – George W. Bush and Barack Obama – have had war become the thing that frames their presidencies. Bush had a relatively quiet first year until 9/11 shook everyone’s world, and nothing (including the presidency) would ever be the same. Bush’s reaction to that event shaped his presidency, forcing him to almost have to recant his campaign slogan “I’m a uniter not a divider” and become the hunter of evildoers. How history will see this man is debatable, but many felt he focused too much on foreign concerns and forgot about the people at home – most notably during the Hurricane Katrina debacle. Obama had to walk into a wartime presidency. One could say that he knew what he was getting into, but I don’t think anyone knows what it will be like until he has to sit in the Oval Office everyday. Obama has been tough – the strong sequoia against the battering winds – but we have to hope he can stay strong amidst the onslaught of all the negativity that is out there. As we witness the fall of governments in the Middle East (some of which have been staunch allies for the US in the region), you have to wonder what beasts will eventually slouch toward Bethlehem, and how ready Mr. Obama will be for a new world order that could include wars on a large scale across that region. It seems it is going to get a lot harder for Mr. Obama before it gets better. So what makes outstanding presidential timber? I think it is something innate, some kind of genetic ability to stand tall and strong. Lincoln had it, and in my opinion so did Jefferson, Andrew Jackson, Teddy Roosevelt, FDR, Truman, JFK, and Ronald Reagan. Whether I liked or disliked what they did in office, I am able to see them as standing above the rest, the tall sequoia trees above a birch forest. Barack Obama may one day join that group because I think he has that same innate strength, but he will have to be able to withstand the many axes (both foreign and domestic) that are ready to be plunged against his trunk in the years ahead. Only then will we know if he stays standing or becomes kindling wood for history. Photo Credit: travelkat.comPowered by Sidelines
<urn:uuid:831866c7-9779-462a-a19c-c22ca6e7b086>
CC-MAIN-2015-11
http://blogcritics.org/what-makes-someone-presidential-timber-or/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.982504
1,311
2.59375
3
Adventist Youth Honors Answer Book/Arts and Crafts/Thatching |Arts and Crafts East Africa Division |Skill Level Unknown| |Year of Introduction: Unknown| The Thatching Honor is a component of the Artisan Master Award . - 1 1. Make a list of the various tools needed for thatching, stating their uses, and show a "dekspaan" and a "needle" you have made. - 2 2. State what materials are needed in erecting the framework of a roof ready for thatching. Tell briefly how you go about erecting the framework of a rondavel. - 3 3. Name the various materials required for thatching, including several kinds of thatching "grasses" and thatching "threads". Show samples of these. - 4 4. Answer the following questions on the preparation of thatching material: - 5 5. a. Can any shape of roof be thatched? - 6 5. b. Which is the easiest roof to thatch? - 7 5. c. What are some of the advantages of a thatched roof? - 8 5. d. What are some of the things that damage thatch? How would you protect a thatched roof against such? - 9 6. Have some practical knowledge on how to thatch and demonstrate ability in laying a few short rows of thatch. - 10 7. a. How many workers are needed in thatching a rondavel? - 11 7. b. Describe how you would start thatching a rondavel? - 12 7. c. Tell, if possible demonstrate, how you would finish off: (1) a round roof (2) a gabled roof - 13 References 1. Make a list of the various tools needed for thatching, stating their uses, and show a "dekspaan" and a "needle" you have made. - Thatch comb - Also called a leggatt, idekspan, grasdekspan or a thatching spade. - Straight needle - Curved needle - Climbing hooks - Shearing hook - Eaves knife - Side rake - Sheep shears - Spar knife 2. State what materials are needed in erecting the framework of a roof ready for thatching. Tell briefly how you go about erecting the framework of a rondavel. 3. Name the various materials required for thatching, including several kinds of thatching "grasses" and thatching "threads". Show samples of these. 4. Answer the following questions on the preparation of thatching material: a. When is the grass cut and how is it stacked for storing? Grass is cut after it has gone to seed and most of the seed has been dispersed. This is usually after the first frost (in areas where frost occurs), which also stops active growth of the grass. Grass should be bundled as soon as it is harvested and stacked off the ground and under cover. It needs to be protected from the elements while it cures. b. How is the grass "combed" and made ready for thatching? A sickle is run through the bundles to remove any leaves and to straighten the thatch. This will help it to be tightly packed, which is necessary if it is to be water proof and resist fire. c. How is thatching rope made? What raw materials are used in your locality? 5. a. Can any shape of roof be thatched? No. A roof needs to have a pitch of at least 45° or steeper, or it is not suited to thatching. Thatched roofs should be as simple as possible, though complex roofs are frequently thatched. Dormers, multiple ridges, and valleys should be avoided, though they can be accommodated. 5. b. Which is the easiest roof to thatch? A conical roof is easiest to thatch because the thatcher simply starts at the bottom and goes around until he has circled the entire structure. Then the next layer is added. With a conical roof, there are no tricky corners or transitions to worry about except at the peak which is a single point. 5. c. What are some of the advantages of a thatched roof? Thatched roofs use native materials which avoids the cost and expense of manufacture and transport. Thatch is also a cheap and usually abundant building material which blends well with the house's surrounding environment. Thatched roofs are not uncommon among luxury homes (especially in the U.K.) because of the aesthetic charm. A well-thatched roof which is well cared for can be expected have a lifespan exceeding 50 years. By comparison, asphalt shingled roofs have an expected lifespan of only 20 to 30 years. 5. d. What are some of the things that damage thatch? How would you protect a thatched roof against such? The greatest disadvantage of thatch is that when it catches on fire, it is extremely difficult to extinguish. Thatch roofs do not catch on fire any more frequently than other types of combustible roofs, but when they do ignite, damage is extensive. Some insurance companies will not insure a building with a thatched roof because of this, and also because skilled thatchers are sometimes very expensive to hire. Fire can be abated by treating thatch with a fire retardant. A law was passed in London, England in 1212 requiring all existing thatched roofs to be whitewashed with plaster daub. The construction of the thatched roof also plays a key role in its susceptibility to fire. Thatch should be densely packed, between 35 to 50 kg/m2, and at least 175 mm thick. Wire should not be used in the construction of a thatched building, as it is a conductor of lightning. Rather, natural materials should be used to bind the thatch, such as sisal twine. The building should also be equipped with proper lightning protection. No wiring should enter the building through the thatch (including electrical, telephone, cable TV, etc.). Rather, it should enter either underground through a conduit, or through a non-thatched wall. Antennas should never be mounted on a thatched roof. The roof should be regularly groomed so that loose straws (which are easily ignited) are removed. Thatch is obviously an organic material, and as such, it is susceptible to decay. To protect against this, the thatch should not be harvested until after the first frost has ended its growing season. After it is harvested, it should be stored off the ground and under cover. Leaves should not be allowed to accumulate on the roof of a thatched building, and the roof should be steep - at least 45° - to facilitate the rapid runoff of water. The growth of vegetation on a thatched roof inhibits runoff, so it should be removed quickly if it takes hold. Thatch may be attacked by all manner of vermin, though their numbers are usually held quite low. Any number of poisons can be sprayed on the thatch to eliminate this problem. 6. Have some practical knowledge on how to thatch and demonstrate ability in laying a few short rows of thatch. 7. a. How many workers are needed in thatching a rondavel? A rondavel is usually thatched by a team of four people. The first worker passes the bundles of thatch up to the workers on the roof. Before doing this, he will butt the end of the bundle on a flat surface. This blunts the ends of the straws and lines them up. Two more people work on top of the roof, and a fourth person works from the inside.
<urn:uuid:c53e69fb-19d3-4292-ae31-4adf27a17c2f>
CC-MAIN-2015-11
http://en.wikibooks.org/wiki/Adventist_Youth_Honors_Answer_Book/Arts_and_Crafts/Thatching
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.955927
1,624
3.34375
3
But at a community workshop Tuesday evening about how the road could be made safer for bicyclists, several dozen residents saw a different color: green. Green bike lanes are rapidly becoming part of Palo Alto's urban roadscape. The rubbery-looking surface marks out a defined bike lane that is hard to miss, even when in the middle of the road, as on Park Boulevard south of California Avenue, residents at the meeting said. Although some residents said they think the green color is ugly, bicyclists said it is a vast safety improvement over traditional single white-line-striped bike lanes at the road edge or "sharrows" (arrows directing bikers and motorists to share the lane) stenciled with a bike symbol. Most at the meeting agreed the city should improve Arastradero Road with additions that would change human behavior — whether to slow traffic, make motorists more mindful of pedestrians or reduce student bicyclists' urges to travel in packs instead of single file. Parent Jessica Rothberg has seen how green bike lanes alter how people act. With her teenage daughter behind the wheel, Rothberg watched in horror as three girls precariously rode their bikes three abreast across El Camino around a pork-chop-shaped cement island in the road. Common teen etiquette would not leave one girl behind when riding in odd numbers, she said. But when the girls approached a green bike lane near El Camino Way, they switched to safer riding behavior. Two rode side by side and the third rode behind, all staying within the lane, she said. Elizabeth Bonnet, another parent, also feels the green lanes are safer and more visible. "It's so much more comfortable. I feel like the green lane is a safe place, like along Park Boulevard," she said. Stenciled sharrows are confusing, though, the parents agreed. Transportation studies have found that green lanes shift a substantial percentage of bicyclists away from the "door zone," where they are often struck by opening car doors of parked cars. The changes in behavior were more pronounced than those found in studies of sharrows without the green pavement. Green-lane experiments in Long Beach and Minneapolis documented corresponding decreases in auto-bicycle collision rates, according to a report by the City of Oakland. Another road feature, green "bike boxes," enable cyclists to move from the right-hand bike lane to a painted green rectangle located directly in front of a vehicle at stop lights. The vividly marked space allows drivers to see the bike; cyclists can easily make left turns without entering the roadway from the driver's blind side, said Penny Ellson, traffic safety representative for Gunn High School. The Charleston-Arastradero corridor serves 11 schools of all grades. The busy road is an east-west connector between U.S. Highway 101 and Interstate 280. It is the largest arterial in the city's south, serving multiple modes of transportation, from buses and cars to bikes and pedestrians, Ellson said. And it is a dangerous stretch of roadway for ever-increasing student traffic. At Gunn High School alone, 871 students rode their bikes to school during peak hours, according to an October 2013 count, she said. And more kids on bikes are expected to flock to school. Terman Middle School is adding about 200 new bike racks, she said. "We've learned that when you build it, they come," Ellson said of the anticipated bike traffic. The city's consultants and engineers are considering multiple roadway changes, including creating a "cycle track" that is separated from traffic by an island or curb. With streets, driveways, turning lanes, stop lights and lanes that narrow from four to two in places, however, the task is not as simple as adding green paint. Ellson and others offered other suggestions Tuesday. For instance, a landscaped median island would slow traffic and raise awareness, Ellson said. "Studies have shown that when you put objects close to peripheral vision, people start scanning for pedestrians, and when they do that, they release pressure from their gas pedals and slow down," she said. Others suggested that existing "pork chop" islands at El Camino Real and Arastradero, which residents said obstruct the view for drivers and cause a squeeze for bicyclists who must compete with turning cars, be removed. Jimmy Sims, project engineer for consultant Mark Thomas & Company, Inc., said the firm is currently working on aerial mapping and counting traffic. Various plans will be presented to the public in August, with a review by the city boards in the fall. A finalized plan will be developed by fall or winter 2015, followed by an environmental review. A construction design is scheduled to be completed in winter 2016. The plan will include left-turn refinements, bulb-out improvements, bike boxes, enhanced crosswalks, widened sidewalks and improved vehicle-traffic flow. But the actual work could take until 2018 or beyond to complete, Holly Boyd, city senior engineer, said. The city has a $450,000 grant for work on Charleston Road between Alma Street and Middlefield Road; a $1 million grant would cover work on Arastradero between Gunn High School and Georgia Avenue. The remainder would not start until there is funding, she said. That isn't necessarily a bad thing, considering the confusion and traffic snarls that have been the corridor's legacy in recent years. "It would not be feasible to construct the entire corridor at one time. That would be a nightmare," she said. More information and updates on the project are available at cityofpaloalto.org/cacorridor.
<urn:uuid:c7971fe8-9cdc-4ce1-ad77-3664e848a6c4>
CC-MAIN-2015-11
http://www.paloaltoonline.com/print/story/2014/05/23/residents-seeing-green-over-charleston-arastradero-bike-boulevard
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00119-ip-10-28-5-156.ec2.internal.warc.gz
en
0.961749
1,169
2.53125
3
A 3D laser scanner is a high tech device that has the ability to accurately capture the surface of objects and provide real 3D data back to the user. A 3D laser scanner works because of the principle of laser triangulation. By making a triangle between the scanner lens, laser, and object being scanned accurate 3D data can be obtained. The distance between the scanner lens and laser (parallax base) is known and with the angle of the laser given by the galvanometer, all information is provided to obtain x, y, z coordinates of the objects surface. The laser is swept across the object by the galvanometer, which rotates a small mirror that reflects the laser. The surface of the object is then focused through the lens and captured by the CCD inside the scanner. A dense point cloud is then produced through our software. We Choose Specifics Based On Your Application 3D imagers are complicated imaging systems and their performance cannot be summed up with a single characteristic. 3D Digital Corp. is one of the few companies that provides a detailed description of the 3D scanner performance and thus allow a user to select a scanner that is ideally suited to their application and to know with high confidence that the scanner will be able to meet their requirements. 3D Laser Scanner Performance Factors The performance of the 3d laser scanner is determined by a large number of factors. We describe the performance in terms of the following properties: - Co-ordinate System - Resolution: the smallest discernible feature on the target. Alternatively, an equivalent definition is the minimum separation between two target features where the two features are distinguishable in the image. - Accuracy: the standard deviation of the range measurement. This is often referred to as the ‘error’ in the range measurement. - Point density: The distance between neighboring range measurement points. - Depth of field: This describes the range over which the 3d laser scanner can obtain an accurate image. - Field of view: This determines how large a target can be imaged in a single scan. 3D Laser Scanner Co-ordinate System We define a right handed co-ordinate system with an origin at the center of the 3d laser scanner imaging lens. The x-axis is parallel to the long axis of the scanner front plate (this is horizontal in the usual scanning geometry). The y-axis is parallel to the short axis of the 3d laser scanner front plate (vertical in the usual scanning geometry), and the z-axis is the range, or the distance perpendicular to the scanner front plate. The co-ordinate system is illustrated in the following figure. 3D Laser Scanner Resolution The resolution of the 3d laser scanner refers to the ability of an imaging system to measure the angular separation between two objects (or object features) that are close together. The resolution is a limitation of the scanner in the x-y dimensions. For example if a target has embossed lettering, and the font size is smaller than the resolution of the scanner then the text will not be legible in the scanned image, regardless of the height (z-depth) of the lettering. The resolution is determined by three major factors: the laser stripe width, the lens focal length, and the CCD resolution. The resolution is dependent on the target distance and generally gets worse with increasing range. Accuracy of 3D laser scanners While the resolution affects the image quality in the x and y dimensions, the accuracy refers to the image quality in the z (or depth, or range) dimension. 3DD scanners calculate the range of each point on the target object. CCD noise, imperfect optics, and fundamental laws of physics all result in some error in the calculated range. It is not possible to design a 3d laser scanner that does not have some error. The accuracy is a measure of this error. It is defined as the standard deviation of the difference between the measured range and the actual range to a target. The range error is approximately Gaussian in nature. This implies that if we scan a perfectly flat plane, at a fixed range of 245mm (10″), and if the accuracy of the scanner is 250microns (0.01″), and we build a histogram of the ranges of each of the points it would look like the one shown in the following figure. 65% of the range points will lie within +/- 1 standard deviation from the mean, i.e.: +/-250microns (+/- 0.01″). 95% of the range points will lie within +/- 2 standard deviations from the mean, i.e.: +/-250microns (+/- 0.02″). Point Density of 3D laser scanners Point density refers to the distance between neighboring range measurement points. This will be different in the x and y dimensions. The x density is determined by the number of scan lines, while the y density is determined by the CCD resolution. For example if the user selects to scan with 500 lines and the CCD has 480 vertical pixels the point density is 500 x 480. At a range of 300mm (12″), this corresponds to a point spacing of 0.61mm x 0.64mm (0.024″ x 0.025″). 3D laser scanner Depth of Field The depth of field or ‘depth of focus’ refers to the range of distances over which a focused image is obtained. As with a normal camera our products are focused for a particular range. Objects outside this range will result in blurred images and inaccurate range data. Therefore the 3D Digital software automatically discards range data for objects outside the design range. This ensures that the output data is all within our specified accuracy. The following figure illustrates the concept of depth of field. Field of View on 3D laser scanners The field of view of the scanner determines the largest object that can be imaged using a single scan. The field of view is normally expressed as an angle and it describes the angle of a cone within which an object must be placed for the 3d laser scanner to be able to image it. The field of view cone is illustrated in the following figure. The tip of the cone is at the center of the imaging lens. Obviously the larger the target to be imaged the further away from the scanner it must be placed. A disadvantage of this is that the accuracy of the scanner generally decreases at longer ranges, so a large field of view is generally very attractive as it allows large targets to be imaged with high accuracy. Learn More about 3D Laser Scanners Learn more about how the software and 3d laser scanner hardware work together and what it can be used for:
<urn:uuid:d783cd55-ce8f-41a6-b0b9-ae5da6fcb4f6>
CC-MAIN-2015-11
http://www.3ddigitalcorp.com/3d-laser-scanner.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00098-ip-10-28-5-156.ec2.internal.warc.gz
en
0.923016
1,371
3.6875
4
Youth is too beautiful to be wasted on the young. That may have been true in the 19th Century, but in 21st-century San Diego — and elsewhere — being youthful is no longer so beautiful, at least from an economic standpoint. The recession hit young adults harder than other age groups, and they have gained back less ground than older generations in the recovery. According to the organization Generation Opportunity, the national unemployment rate for people 18 to 29 years of age is 13.1 percent, well above the overall rate. San Diego’s equivalent rate would probably be a bit higher, says Kelly Cunningham, economist for the National University System Institute for Policy Research. Reason: the San Diego economy is weaker than the national economy. Vince Vasquez, senior policy analyst at the same institute, says that the unemployment rate for San Diego military veterans 18 to 34 years of age is 13.4 percent. But the rate is only 8.1 percent for the next-older cohort, veterans 35 to 54. Many of today’s millennial generation (ages 18 to 29) have recently entered the job market. Strike one. “Research has shown that workers who enter the labor market during a recession can see long-term negative effects on their employment and earnings,” according to the United States Bureau of Labor Statistics. A Pew Research study last year showed that almost half of people age 18 to 34 took a job they didn’t want so they could pay their bills. Because of the weak economy, more than one-third have gone back to school and almost one-third have postponed getting married or having a baby. In 1998, fully 65 percent of 18- to 34-year-olds were certain they could get another job if they lost their current post. That plunged to 27 percent in recessionary 2009. It has since bounced back to 43 percent, but that’s a long way from the 1998 level. Early this month, the American Psychological Association released a study indicating that Americans age 18 to 33 are the most stressed-out of any age group. On a 10-point scale, those in that younger generation reported an average stress level of 5.4, compared to the national average of 4.9. Almost 40 percent said their stress levels increased over the past year. San Diegans of all ages have long lived in an economic squeeze: the cost of living is one of the highest in the nation, but incomes are only moderately higher than those in other metro areas. “It is no secret that it costs a lot to live in San Diego,” says Margie de Ruyter, senior director of workforce initiatives for the San Diego Workforce Partnership. Data from the partnership tell the story: basic monthly living expenses for a single adult in San Diego County come to $2959; that requires a salary of $35,508 a year. But look at what average young adults make in the county, according to California Employment Development Department data: The average pay of 14- to 18-year-old people in the county in the fourth quarter of 2011 was $12,576. For 19- to 21-year-olds, the average yearly pay was $13,990, and the average new hire made $12,828. For 22- to 24-year-olds (including college grads), the average annual wage was $22,944 and the average new hire made $21,888. For those 25 to 34 years old, the yearly wage rose to $44,796, but the average new hire was paid only $36,156. Not surprisingly, women suffer pay discrimination. For females 22 to 24 in the fourth quarter of 2011, the average annual pay was $21,276, and for new hires, $20,280. In the 25–34 cohort, the average annual pay was $39,516 and for new hires $32,964, or below the minimum requirement for a single adult. “Few households live off one income,” says Cunningham. Living in this squeeze “takes multiple workers per household, doubling up in housing and often working multiple jobs, full-time as well as part-time. This is particularly true for young people, considering how expensive housing is.” Housing prices have come down 35 percent from pre–Great Recession peaks, “but rents went up.” According to Zillow.com, the median home value in the San Diego County market is $381,900, which is fourth highest among the 30 largest metro areas, and well over double the nation’s $157,400 median. The median rent is $2101 per month, fourth highest among the 30 largest markets and far above the nation’s $1274. “Teen homelessness is on the rise; more young people are couch-surfing or sleeping at friends’ places,” says de Ruyter. Older, experienced people are forced to delay or cancel retirement “and take jobs below what they were making before; because they have more experience, they push out young people,” says Cunningham. San Diego is suffering from out-migration, and among those leaving for cheaper areas are the young adults. Similarly, the squeeze on San Diego’s millennial generation inhibits young people from moving here from elsewhere. “Think of those young people with a college degree in liberal arts, saddled with debt, working at a Starbucks.” The fact that young couples need two incomes inhibits birth of babies; San Diego’s natural population increase (births minus deaths) declines, according to Cunningham’s figures. In San Diego, remedial steps are being taken. The San Diego Workforce Partnership administers federal job-training funds and raises money elsewhere. The organization trains young low-income people, “foster youth or those transitioning out of foster care, youth with disabilities, gang-affiliated, high school dropouts,” says de Ruyter. The partnership’s job is to help such people with employment. The partnership got $200,000 from City government sources. The money will be used for a youth-hiring program that includes high school dropouts as well as grads, and even some at the college level. Vasquez, of the National University System Institute for Policy Research, is spearheading, along with a friend, the Military Veteran Scholarship Fund at the University of California San Diego. The group aims to raise $25,000 that will be matched by university alumni. There is good news. The Social Science Research Council did a study on what percentage of those 16 to 24 were neither working nor in school. They are named “the disconnected.” Among 25 metro areas, San Diego had the third-lowest percentage of disconnected (11.1), including the lowest percentage of disconnected African-Americans (12.1) and second lowest of Latinos (13.3).
<urn:uuid:ac0d7151-16ba-4475-9307-46fd5849aeee>
CC-MAIN-2015-11
http://m.sandiegoreader.com/news/2013/feb/27/citylights1-couch-surf-or-get-roommate/?templates=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462700.28/warc/CC-MAIN-20150226074102-00023-ip-10-28-5-156.ec2.internal.warc.gz
en
0.962257
1,434
2.515625
3
Hot enough for you? Not as toasty as your car or truck sitting in the summer sun. According to AAA, your vehicle's interior reaches between 131 and 172 degrees when parked in the sun and when the outside temperature is in the low to mid-90s. That's hot enough to roast a hot dog on the front seat. This wasn't always an issue for one simple reason: We used to sweat a lot more in the summer. The earliest automobiles were open to the elements; catching a breeze was easy. Once the closed car was introduced, keeping cool on a hot day became more of a challenge. Manufacturers equipped closed cars with roll-down windows or windshields that tilted open slightly. By the 1930s, many vehicles also had pop-up vents ahead of the windshield to funnel air to the cabin. Of course, it wasn't as if you would suddenly become cooler; the air was still hot. And it was filled with dirt, pollen and bugs. Coupled with the engine heat older cars gave off, and their metal and leather interiors, these vehicles could be hot enough to melt your enthusiasm. General Motors, with help from its Frigidaire division, started working on the problem in 1933. Initially, engineers proposed cooling a car's interior by a mere 10 degrees, as it was feared that any greater cooling would cause passengers to experience thermal shock while stepping into the hot sun from a cool car. Six years later, GM had a prototype system ready, fitted in the trunk of a Cadillac. But it wasn't GM that made it to market first. That honor went to Cadillac's rival, Packard, which offered the Weather Conditioner as a $274 option. According to Mohinder Bhatti of the American Society of Heating, Refrigeration and Air-Conditioning Engineers, Packard sold 1,500 cars with air-conditioning between 1940 and 1942. Cadillac's system was offered in 1941 models; some 300 were sold. A year later, Chrysler offered its AirTemp system, although few, if any, cars were sold with it. As with any new technology, these systems suffered from several problems: • There were no controls on the instrument panel; the system ran constantly. Turning it off meant lifting the hood and removing a belt. • The units were mounted in the trunk, reducing trunk space. • Because the units were rear-mounted, it wasn't unusual for condensation to collect above rear-seat passengers. It would then drip down, staining clothes. Meanwhile, little air reached the front seat. • Unlike later systems, these early units didn't pull in any outside air, a problem in an era when many people smoked. Given the problems of the system and its expense, it's a wonder any were ordered. Instead, many drivers used swamp coolers, a window- mounted metal tube that would be filled with ice. As air blew over the ice, it was cooled. The chilled air was funneled inside. Air-conditioning would not become a big player in automobiles until 1953, when GM, Chrysler and Packard introduced new air-conditioning systems. Others soon followed, and by 1956, all major American car companies offered air-conditioning as an option. The following year, Cadillac offered air-conditioning as standard equipment on the Cadillac Eldorado Brougham, an industry first. Even so, it was rare to find a car back then with factory air. With an average price of $435, just 3.7 percent of cars had it, but that would grow significantly over the next decade as the price dropped. By 1969, more than half of all new cars came with air-conditioning. For those who couldn't afford factory-installed units, aftermarket units installed under the dashboard were common. In the 1970s, scientists found that chlorofluorocarbons, or CFCs, were depleting the earth's ozone layer. Since most auto air-conditioning units used a CFC-based refrigerant named R-12, it fell on automakers to come up with a solution. It was no small matter. In 1980, 72 percent of all new cars had air-conditioning. By 1990, 94 percent of cars had it. And all of these systems used R-12. Preliminary tests on a suitable replacement, R-134a, began in 1978. Once it proved satisfactory a decade later, car manufacturers were required by the U.S. government to switch over to R-134a by 1996. It is still in use. Today, almost every car and truck comes with air-conditioning, although there are exceptions. They include base models of the Chevrolet Aveo; Honda Civic; Hyundai Accent and Elantra; Jeep Wrangler; Kia Forte and Rio; Mazda 3; Mitsubishi Lancer; Nissan Versa; and Smart ForTwo. So while finding a car with standard air-conditioning is no sweat, a lot of it was shed to keep you cool in the summer.
<urn:uuid:aa13ef56-80be-4101-b6c6-05b3e3f258cf>
CC-MAIN-2015-11
http://www.tampabay.com/news/business/autos/a-little-schooling-on-auto-cooling/1187943
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.980254
1,044
2.90625
3
PASADENA, Calif.—Do you have second thoughts when ordering a strange-sounding dish at an exotic restaurant? Afraid you'll get fricasseed eye of newt, or something even worse? If you do, it's because certain neurons in the brain are saying that the potential reward for the risk is unknown. These regions of the brain have now been pinpointed by experimental economists at the California Institute of Technology and the University of Iowa College of Medicine. In the December 9 issue of the journal Science, Caltech's Axline Professor of Business Economics Colin Camerer and his colleagues report on a series of experiments involving Caltech student volunteers and patients with specific types of brain damage at the University of Iowa. The object of the experiments was to see how the brain responded to degrees of economic uncertainty by having the test subjects make wagers while being scanned by a functional magnetic resonance imager (fMRI). The results show that there is a definite difference in the brain when the wagers add a degree of ambiguity to the risk. In cases where the game involves a simple wager in which the chance of getting a payoff is very clearly known, the dorsal striatum tends to light up. But in a nearly identical game in which the chances of winning are unknown, the more emotional parts of the brain known as the amygdala and orbitofrontal cortex (OFC) are involved. According to Camerer, this is a clear advancement in understanding the neural basis of economic decision making. Much is already known about how people deal with risk from the standpoint of social sciences and behavioral ecology, but greater understanding of how the brain structures are involved provides new insights on how certain behaviors are connected. "The amygdala has been hypothesized as a generalized vigilance module in the brain," he explains. "We know, for example, that anyone with damage to the amygdala cannot pick up certain facial cues that normally allow humans to know whether they should trust someone else." Problems with the amygdala are also known to be associated with autism, a brain disorder that causes sufferers to have trouble recognizing emotions in other people's faces. One of the authors of the paper, Ralph Adolphs, the Bren Professor of Psychology and Neuroscience at Caltech, has done extensive work in this area. As for the OFC, the structure is associated with the integration of emotional and cognitive input. Therefore the OFC and amygdala presumably work together when a person is confronted with a wager for which the odds are unknown-the amygdala sends a "caution" message and the OFC processes the message. The researchers set up the experiments so that the "risk" games and "ambiguity" games looked similar, to control for activity in the visual system so they could focus only on differences in decision making. In the "risk" games, each test subject was provided an opportunity to either choose a certain amount, like $3, or else choose a card that could be either red or blue. If the card was red, the test subject got $10, but if it came up blue, the test subject got nothing for that particular card. In the risk games, each test subject was informed that the chance of drawing a red card was 50 percent, that there would be 10 of each color out of the total of 20 cards. Subjects made a series of 24 choices, with different sums of money at risk and different numbers of cards. In the ambiguity games, however, each test subject was told that the deck contained 20 cards, but was told nothing about how many were red and how many were blue. As predicted from past experiments in which this type of risk was observed in test subjects, the researchers knew that the Caltech subjects with no brain damage would be more likely to draw cards in the risk game than in the ambiguity game, because people dislike betting when they do not know the odds. They were more likely to take sure amounts, which meant that their fear cost them money in expected value terms. The patients at the University of Iowa Medical School, on the other hand, who had lesions to the OFC, played the game entirely differently. On average, these subjects with damage to the OFC were much more tolerant of risk and ambiguity. Camerer says that the result with the brain-damaged test subjects fits well with the observation that many have suffered in their personal lives due to reckless financial decisions. The research also addressed the intensity of the response in the brain as it correlates with degrees of risk. The results for the Caltech students showed more intense activity in the amygdala and OFC when the chance of winning is ambiguous, but there would be no such difference in patients with damage to those areas. In sum, the results provide an important neurological understanding of how we humans handle risk in the real world, Camerer says. "If you think about it, how often do you know the probability of success? Probably, the situation we modeled with the risk game is more the exception than the rule," he says. "In most situations, I think you are confronted with a risky choice in which you have little idea of the chances of different payoffs." Does the study have any applications for society? Camerer says that our knowing what is happening at the most microscopic level in the neurons of the brain could lead to better understanding of bigger social effects. For example, a fear of the economic unknown will also create a strong preference for the familiar. In every country in the world, investors hold too many stocks they are familiar with, from their own countries, and do not diversify their stock holdings enough by buying ambiguous foreign stocks. The opposite of fear of the economic unknown may be driving entrepreneurs, who often thrive under uncertainty. "It could be that aversion to ambiguity is like a primitive freezing response that we've had for millions of years," Camerer says. "In this case, it would be an economic freezing response." The study is titled "Neural Systems Responding to Degrees of Uncertainty in Human Decision Making." In addition to Camerer and Adolphs, the other authors are Ming Hsu and Meghana Bhatt, both graduate students in economics at Caltech; and Daniel Tranel of the University of Iowa College of Medicine.
<urn:uuid:3d57f704-ebc0-4603-97f4-e27c3adc89cb>
CC-MAIN-2015-11
http://www.caltech.edu/tags/hss?page=16
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.969386
1,273
2.859375
3
Discover the War of 1812 on the Star-Spangled Bike Tour Return to War of 1812 Bicentennial for Commemorative Events, to see objects from the Office of Historic Alexandria collections, and to learn more about the war and occupation. Alexandria Bike or Walking Tour Visit places where the events of the five-day British occupation of Alexandria occurred in late August 1814, on this 6.6 mile tour. This route is part of the National Park Service's Star-Spangled Banner National Historic Trail. It can be enjoyed on foot or bicycle. Most roadways are low volume, low speed and suitable for cycling except where noted in the cue sheet to go on paths or the sidewalk. Tour information includes Cue Sheet and printable or interactive maps, through Ride with GPS. Star-Spangled Banner National Historic Trail Discover the War of 1812 on the Star-Spangled Banner National Historic Trail — a path tracing troop movements through historic places, inspiring landscapes, charming waterfront towns, and waterways of the Chesapeake Bay region. Along the way, you’ll follow the story of the United States National Anthem and the citizens, soldiers, and leaders who faced British military might on home territory just thirty years after the American Revolution. Three Star-Spangled Banner signs are located in Alexandria. "Raise the White Flag" is installed in Waterfront Park. "Plundered" is being installed in the Torpedo Factory arcade, near the Timeline. "Fighting Back" is being placed at the base of Shuter's Hill, across from the Callahan Drive crosswalk. Alexandria and the War of 1812 On August 24 and 25, the British burned nearly every public building in Washington. From downstream on the Potomac River, the people of Alexandria could see the flames. Within days, a British fleet appeared from the south to take — or destroy — the port of Alexandria. Militia from Alexandria and the surrounding countryside had been called into action earlier that month, taking nearly all of the arms and artillery with them. With no way to defend the town, its leaders made the painful choice to capitulate. The British occupied Alexandria for five days, from August 29 through September 2. They spared the town in exchange for the peaceful surrender of all naval supplies, ships, and merchandise of every description. They sailed away with a hefty load, including 16,000 barrels of flour, 1,000 hogsheads of tobacco, 150 bales of cotton, and some $5,000 worth of wine, sugar, and other items. Alexandria Connections on the Star-Spangled Banner Trail Total round-trip route of approximately 6.6 miles. This tour, developed by the Alexandria Archaeology Museum in cooperation with the National Park Service, follows scenes from the five-day British occupation of Alexandria in August 1814. Most roads are low volume, low speed, and suitable for cycling except where noted to travel on paths or sidewalks. You can print a turn-by-turn cue sheet at Ride with GPS. Highlights are described below. - Begin at the foot of Cameron Street on the Potomac River. Look upstream to Washington and the Capitol building, and look across the river to the site of the Mount Welby plantation. From Mount Welby, the DeButts family witnessed the attack on Washington. Mary Welby DeButts wrote, “Our house was shook repeatedly by the firing upon forts & bridges [at Bladensburg], & illuminated by the fires in our Capital.” - On Fairfax Street, you’ll pass the Carlyle House and Gardens. A Carlyle grandson served in the War of 1812 and fought at the Battle of Bladensburg. A British officer on one of the ships that occupied Alexandria was related to the Carlyle family by marriage. You’ll also past the Stabler-Leadbeater Apothecary Museum, where business suffered during the war. At the Old Presbyterian Meeting House, in February 1814, Frances Scott Key spoke "for religious spirit instead of party spirit.” - From South Lee Street, view the harbor where British ships once anchored. Continue into Jones Point Park and look downstream to where the British fleet first appeared on its approach to Alexandria. Then walk the riverfront and enjoy an overlook from the Woodrow Wilson Memorial Bridge. - Stop by the old Presbyterian Cemetery off Wilkes Street, where Robert Allison, Jr. is buried. Allison, age 27, helped pursue the British as they left Alexandria and died in a conflict along the Potomac on September 5, 1814. He was described as an “affectionate son, a generous friend, and a useful member of society." - On the cobblestone section of Prince Street, now known as Captain's Row, prosperous sea captains and ship masters built many Federal-style (1780-1830) homes. - At the lower end of King Street, an American naval officer assaulted a British midshipman who was overseeing the removal of tobacco from a warehouse. The officer had ridden into town looking for a fight and almost provoked the British into destroying the town.
<urn:uuid:0e186da5-0048-4a26-8db2-518c149c970a>
CC-MAIN-2015-11
http://www.alexandriava.gov/historic/info/default.aspx?id=78241
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462839.81/warc/CC-MAIN-20150226074102-00058-ip-10-28-5-156.ec2.internal.warc.gz
en
0.948003
1,064
3.0625
3
Since Fidel Castro and his guerrilla army marched into Havana on New Year’s Day 22 years ago Cuba has been a thorn in the side of an often belligerent United States government. From President Kennedy onwards successive US leaders have done everything in their power (and often beyond it) to undercut Cuba’s attempts to follow a radically different development path. The CIA led a series of bizarre assassination attempts on Castro himself, including trying to poison his famous cigars. A full-scale trade embargo begun in the early 60s continues to this day. The American military still occupies Guantanamo Naval Base on the southeast end of the island-despite repeated Cuban protests about violation of its national sovereignty. The US press and much of the mass media in other Western nations are almost rabid in their denunciation of Dr. Castro and his associates. Most of the criticism is justified with standard anti-communist argument. The Cuban government is unacceptable because it refuses to play according to the ground rules of the Western liberal democracies. Walking hand in hand with the Soviets on foreign policy and sending troops to the front lines of the liberation struggles in Africa only confirm the US view of the island as an unsavoury international pariah. And adding insult to injury, the upstarts have the nerve to do all this only scant miles from the Florida beaches in the Caribbean Sea. The US has always treated that stretch of water as a kind of seventh Great Lake, filled with salt water and lined with palm trees. For almost 100 years Washington has considered the Caribbean Basin part of its sphere of influence. And it’s been none too subtle about methods of keeping a firm hold. The Marines have been one way. Twenty-five thousand troops occupied the Dominican Republic in 1965 when Juan Bosch’s socialist party threatened to win at the polls. American soldiers occupied Haiti from 1915-1934 to ‘stabilize’ the government. The CIA helped organize the botched Bay of Pigs invasion of Cuba in 1962. Washington passed the infamous Platt Amendment in 1902, after the Cuban War of Independence, giving America the ‘right’ to intervene in internal Cuban affairs. Military bases were quickly established. And in the same year, after the Spanish-American War, Puerto Rico was annexed outright. The Canal Zone was leased and the Panama Canal built and in 1917 the Danish Virgin Islands were bought, again for ‘security purposes’. America’s strategic interest in the region is clear-cut. From Haiti to Trinidad the islands stretch like a girdle across the Atlantic entrance to the Panama Canal. There are also important supplies of bauxite (critical for aluminum and the US aerospace industry) in Jamaica, Guyana and Surinam. But the clincher is oil. Half of all American oil imports pass through Caribbean shipping lanes and one-sixth of all US consumption is refined there. But Cuba is not a military force, at least not one capable of matching American firepower. And treating the island as a threat to US energy supplies is clearly ludicrous. The trade blockade has nipped all economic ties so US business has nothing more to lose. In fact Cuba appears to pose no direct threat at all. So why does the tiny nation of ten million continue to be the whipping boy of American politicians? The reason is not just that Cuba is run under a different political system, but that by the most basic measures of development it seems to beworking. Health care, food, housing, employment, education: all have improved immeasurably for Cuba’s poor majority over the last two decades. That doesn’t mean there aren’t soft spots in the armour of Dr. Castro’s revolution. There are. From a flabby,self-indulgent bureaucracy to nagging shortages of consumer goods. But when both sides of the ledger are totalled the revolution’s achievements are remarkable. And when compared to other Central American and Caribbean countries, unique. And that, from the point of view of Washington, is worrisome. In the last two years popular leftist revolutions in Nicaragua and Grenada, civil war in El Salvador and deepening class conflict in Jamaica have made the US sit up and take note of potential Cuban influence. Washington’s response has been typically heavy handed. The first step was to announce formation of a Caribbean Task Force based in Key West, Florida. Its function is to ‘monitor intelligence and communication’ and supervise increased military manoeuvres. The second step was to increase aid to the English-speaking Caribbean, most of it in the form of military assistance (from $1 million in 1979 to nearly $10 million in 1981). That includes $5 million for Barbados, which seems to be the odds-on choice for most likely client state. Military training funds have also been proposed for the Bahamas, Barbados, Dominica, Jamaica, St. Lucia and St. Vincent. Haiti and the Dominican Republic (the countries closest to Cuba) between them will get almost $1 billion in military assistance in 1981. But shoring up the military and throwing dollars at the poor has had precious little success in solving poverty. The proof of the pudding is in the eating and all indications are that the portions are going to get smaller for the Caribbean’s poor. Cuba, still heavily dependent on Soviet aid and sugar exports, will face its own problems. But it will remain a symbol of radical changeand an example of independence and resolve against the hemisphere’s dominant superpower. And thatalonewill keep its profile high in the Caribbean. In the long run by remaining blind to the revolution’s success and by remaining so unbendingly opposed to any hint of socialiststyle change, the US may do more to increase Cuba’s status and influence in the Caribbean than to undercut it. Time will tell. This first appeared in our award-winning magazine - to read more, subscribe from just £7
<urn:uuid:069c3004-4781-4a3d-88f6-e63293d40c43>
CC-MAIN-2015-11
http://newint.org/features/1980/12/01/cuba/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.95416
1,216
2.609375
3
Project based learning prepares students for engineering careers March 28, 2012 From gazettextra.com: “Engineering goes back to school” — Seventh-grader Deadrick Vance raised his hands above his head, signaling triumph. “Success!” he said, turning to give his teacher a high-five. Vance was among the first to construct a Morse code device for his science class at Janesville’s Edison Middle School recently. He had cut the wire, wrapping it around a nail, connected the paper clips and powered the system with a D-cell battery. As he pressed down on the paperclip that acted as the key, another paper clip was drawn down onto the nail, which had become an electromagnet. Later, teacher Andy LaChance would string wire between classrooms and let students take turns sending messages. Vance had completed one small task in a curriculum that has been infused with a new kind of thinking: That kids can learn science and math with real-world technical skills while in middle and high school. The curriculum is called Project Lead the Way. It has swept across the country in recent years. Project Lead the Way seeks to address the concerns of industries that complain they can’t find enough workers with the right skills, as well as the dearth of American college graduates in science, engineering and math, said Ken Maguire, director of the nonprofit organization’s upper Midwest region. Maguire said Project Lead the Way is growing fast, with a 20 percent increase in the region just in the past year. But Project Lead the Way doesn’t want schools to jump in without committing themselves to quality. “If they’re wanting it because a neighboring school has it, if they’re wanting it because voters say they want it, that is the biggest impediment,” Maguire said. Startup costs might be $25,000 for a high school that has the computers to run the software, Maguire said. Schools start with one course and add courses until they make a path that leads to classes in engineering in high school, giving them a base for college studies or even college credit. Project Lead the Way is a part of middle and/or high school curriculums in many school districts in Rock and Walworth counties. Clinton High School is the most developed program in Rock County, said Janesville’s Steve Huth, director of a countywide consortium that promotes Project Lead the Way. During a recent visit to Clinton High School, students in one class were using a computer-assisted design program to create a simple, three-dimensional model of a railroad engine. Next door, students in a digital electronics class were using Boolean algebra to design circuits that would spell out a message, similar to the electronics used on a sports scoreboard. Students who complete the Clinton program get advanced standing at Blackhawk Technical College, while others get credit in four-year programs, such as the Milwaukee School of Engineering, said teacher Tim Thieding. Thieding said he started the year with 10 digital electronics students. He now has six. “It’s a tough course,” he said. Thieding also teaches a computer-integrated manufacturing course that takes students from invention to computer modeling to building a manufacturing process, with milling and robotics thrown in. “Right now, manufacturing is something we need to build back up in the United States, so we need to get our students not only familiar with it but proficient,” Thieding said. Clinton also offers certifications in architecture and civil engineering. It plans to introduce bio-medical engineering next year, and there’s talk of extending the program into the elementary grades. “We’re kind of excited, as small as we are, to offer all those,” Thieding said. Most Project Lead the Way teachers are certified in science or tech ed. They must go through a reportedly tough summer training program for each course they teach. Thieding’s tech-ed colleague, Derek Tietz, also teaches Project Lead the Way courses. The pair also offer more traditional tech courses in woodworking, metals and construction. “Project Lead the Way gives them a chance to see it before they have to really pay for it in college, so they see if they want to do this as a career,” Tietz said. Two Clinton students have internships at Scot Forge in Clinton, and Scot Forge engineers volunteer with the program. Others are planning to pursue engineering at MSOE or UW-Platteville. Clinton also gets help from Gilbank Construction and Paperchine. In some states, local industries donate to establish a particular kind of engineering course in local schools, but Maguire wasn’t aware of any relationships like that in Rock County. Even one Project Lead the Way course might make a difference. It did for 2011 Janesville Parker High School grad Markus Murdy. Murdy said the principles of engineering course was all he could work into his schedule. He said it helped him combine his interest in aviation with his desire to figure out how things worked. “It was like, ‘Whoa, there’s a whole field dedicated to this kind of thing,'” Murdy said. “Coming out of that. I had a much better idea of what I wanted to do.” Murdy is majoring in aerospace engineering at the University of Alabama in Huntsville. At Edison Middle School, LaChance surveyed his students with a smile. “Look at these guys right now,” he said, referring to a group hovering over one of their devices as the lunch bell sounded. “They’re still working on it. Usually these guys are the first ones in line for lunch. “I like it. We need more hands-on stuff.” Project Lead the Way has been introduced in several area schools, according to the Project Lead the Way online locator. — Beloit Memorial High School and middle schools — Beloit Turner High School and middle school — Evansville J.C. McKenna Middle School — Janesville Parker and Craig high schools and all three middle schools. — Orfordville Parkview, middle school level — Delavan-Darien High School and Phoenix Middle School — Elkhorn Area High School — Lake Geneva Badger High School — Whitewater High School and middle school — Brodhead High School and middle school
<urn:uuid:da499ec7-0815-47e9-9240-bf2b9c18ae96>
CC-MAIN-2015-11
https://wistechcolleges.wordpress.com/2012/03/28/project-based-learning-prepares-students-for-engineering-careers/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00189-ip-10-28-5-156.ec2.internal.warc.gz
en
0.966497
1,375
2.984375
3
Help support New Advent and get the full contents of this website as an instant download or CD-ROM. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99... An ascetical writer, b. at Camerino, in the March of Ancona, 9 Apr., 1458; d. there, 31 May, 1527. Her father, Julius Caesar Varano or de Varanis, Duke of Camerino, belonged to an illustrious family; her mother, Joanna Malatesta, was a daughter of Sigismund, Prince of Rimini. At baptism Baptista received the name of Camilla. Of the first ten and the last twenty-three years of her life little or nothing is known; our knowledge of the intervening years is derived almost entirely from her own writings. This revelation of herself was brought about through the influence of her confessor, Blessed Peter of Mogliano, provincial of the Franciscans in the Marches (1490). It seems to have been the eloquence of Mogliano that brought about the "conversion" of Baptista, who, for a time at least, appears to have been captivated by the glamour of the world. Her father did all in his power to force his daughter into a brilliant marriage, even to the extent of imprisoning her. But Baptista resisted his plans so firmly that after two years and a half he restored her to liberty, for fear, as he said, of drawing upon himself the Divine vengeance, and gave his consent to her becoming a nun. On 14 Nov., 1481, Baptista entered the monastery of the Poor Clares at Urbino. Not long afterwards her father founded a new monastery of that order at Camerino, and presented it to his daughter. Baptista introduced the primitive observance of the rule there, and thenceforth her vigorous and impressive personality found scope not only in the administration of this monastery, of which she became the first abbess, but also in the production of various literary works. These include the: "Recordationes et instructiones spirituales novem", which she wrote about 1491; "Opus de doloribus mentalibus D.N.J.C.", written during 1488-91 and first published at Camerino in 1630; "Liber suae conversionis", a story of her life, written in 1491, and first published at Macerata in 1624. These works have been edited by the Bollandists in connection with some of Baptista's letters. But most of her "Epistolae spirituales ad devotas personas" as well as her "Carmina pleraque latina et vulgaria" are still unpublished. As a whole the writings of Baptista are remarkable for originality of thought, striking spirituality, and vividly pictorial language. Both St. Philip Neri and St. Alphonsus have recorded their admiration for this gifted woman who wrote with equal facility in Latin and Italian, and who was accounted one of the most brilliant and accomplished scholars of her day. Baptista died on the feast of Corpus Christi, and was buried in the choir of her monastery. Thirty years later her body was exhumed and was found in a state of perfect preservation. It was reburied to be again exhumed in 1593. The flesh was then reduced to dust but the tongue still remained quite fresh and red. The immemorial cultus of Baptista was approved by Gregory XVI in 1843, and her feast is kept in the Franciscan Order on 2 June. Acta SS., May, VII (Antwerp, 1688), 476-514; WADDING, Annales Minorum ad annum 1509, n. 25; IDEM, Scriptores ord. Min. (3rd ed., 1906), 36; SBARALEA, Supplementum, pt. I (1908), 113-114; LEON DE CLARY, Lives of the Saints and Blessed of the Three Orders of St. Francis, II (Taunton, 1886), 315-48; DE RAMBUTEAU, La Bienheureuse Varani, Princesse de Camerino et religieuse franciscaine (Paris, 1906); JORGENSEN, I det Hoje (Copenhagen, 1908), German tr. in Excelsis (Kempten and Munich, 1911), which contains a charming sketch of Baptista and gives us a glimpse of her poetic talent. For an appreciation of her poetry see CRESCIMBENI, Storia della volgare poesia, I, lib. 2, cap. xiii. APA citation. (1914). Blessed Baptista Varani. In The Catholic Encyclopedia. New York: The Encyclopedia Press. http://www.newadvent.org/cathen/16006c.htm MLA citation. "Blessed Baptista Varani." The Catholic Encyclopedia. Vol. 16 (Index). New York: The Encyclopedia Press, 1914. <http://www.newadvent.org/cathen/16006c.htm>. Transcription. This article was transcribed for New Advent by Herman F. Holbrook. Omnes sanctae Virgines et Viduae, orate pro nobis. Ecclesiastical approbation. Nihil Obstat. March 1, 1914. Remy Lafort, S.T.D., Censor. Imprimatur. +John Cardinal Farley, Archbishop of New York. Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads.
<urn:uuid:45387279-8550-4c71-acd7-89a47765df4d>
CC-MAIN-2015-11
http://newadvent.org/cathen/16006c.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464840.47/warc/CC-MAIN-20150226074104-00209-ip-10-28-5-156.ec2.internal.warc.gz
en
0.940856
1,209
2.609375
3
There is more relevance in the above statement with regard to the control of native/exotic invasive plants than one might recognize at first glance. This is particularly true in relation to the control of the exotic plant group commonly referred to as saltcedar (Tamarix ramosissima, T. parviflora, T. chinensis ), which has replaced several million acres of native vegetation within southwestern stream and wetland natural areas. Resultant saltcedar-dominated natural areas appear to be affected hydrologically and the saltcedar plant communities subsequently formed have been found to be far less productive, diverse and ecologically functional, than the native plant communities they replace. Several control strategies have been developed to remove saltcedar from natural areas for a variety of management objectives, but vegetative site restoration and maintenance are the only two common elements of those control programs that have been effective over the long term. Vegetative site restoration involves not only restoring the native plant community, terrain and hydrology of a natural area but the ecological processes and disturbance cycles necessary to sustain that native plant community over time. Unfortunately, little has been written as specific guidance for site restoration and maintenance associated with saltcedar control. This document briefly discusses the concept of site restoration and maintenance in relation to saltcedar control and outlines a seven point approach to consider in the implementation of such a control program. Vegetative site restoration and long-term maintenance of such efforts in any natural area are difficult tasks in and of themselves. When combined with having to do battle with 1) a plant species such as saltcedar that has an incredible capacity to invade, i.e., ability to allocate a large proportion of available resources to seed production and vegetative growth as well as adaptations for both wind and water dispersal of these elements; and 2) native streamside and wetland plant communities that have characteristics of easy invasibility, i.e., areas with a large perimeter to volume ratio, altered natural disturbance regimes, mesic habitat conditions and contact with human activities (Bossard 1992); site restoration and maintenance can prove to be a daunting task. Major challenges to site restoration and maintenance in natural areas affected by saltcedar control programs often include: These challenges can appear overwhelming for project managers, but a little creativity and networking can go a long way in meeting these challenges, or at least towards minimizing their influence upon project objectives. Above all, natural area site restoration and maintenance is an evolving management field that should be viewed as a combination of art, experimentation and applied science. Selected techniques, strategies and planning have to be frequently designed from scratch, monitored and modified to fit the needs or realities at a particular site. Although it has become increasingly obvious that intensive management is required for the maintenance of natural ecosystems (Brussard 1991), the amount of on-the-ground site restoration and maintenance work necessary to achieve effective saltcedar control can range from little effort over an extended time (Neill 1985) to intensive effort on an annual basis (Taylor 1994), depending on whether the particular system is open to water flow or closed, the degree of saltcedar infestation, control/restoration techniques used and the amount of labor/supply resources dedicated to control efforts. Site restoration costs can similarly range from low to high (Egan et al., 1993), with site maintenance costs increasing as site restoration success decreases. Applied restoration techniques have shown both success and failure, but their basis is conceptually sound (Bureau of Reclamation 1990a). Due to the inherent resilience of streamside and wetland plant communities, site restoration goals can often be achieved with minimal effort if control efforts encompass a large enough area, control efforts are sustained and land management practices are altered to promote conditions conducive to native plants rather than saltcedar (Lovich et al 1994, Dudley and Collins 1995). Long-term maintenance of restored areas in relation to saltcedar in the American Southwest is more problematic, depending foremost upon how open the natural area is to waterborne saltcedar sources; the proximity of windborne saltcedar seed sources; and the degree to which site restoration was effective in establishing both native ground and canopy, vegetative cover. Site restoration is a relatively young field of natural area management in terms of available empirical information and successfully demonstrated techniques. Each site, each system, is different and we still have a lot to learn. The following seven point approach to site restoration and maintenance is recommended as general guidance for individuals and organizations currently involved in, or contemplating, saltcedar control in natural areas. 1. Look at the entire watershed or system and identify the factors which allow the invader and desired plant species to proliferate, as well as the influence of human activities on the site. Use an historic background if possible. Plan with a long-term vision. Control, restore and maintain strategically. 2. Plan for a sufficiently large restoration site in order to provide for the natural conditions necessary to promote plant and animal community diversity. Focus on a goal of plant community transition zone or "edge" habitat reduction and apply restoration maintenance efforts in such "edge" areas. 3. Make use of natural processes such as flood and fire as well as applied control efforts to assist in site restoration and maintenance when opportunities arise. Two examples include: retention of burnt saltcedar woody material resulting from a controlled fire to create suitable germination sites for seeding; and utilizing floodborne sediment to plant native tree poles. 4. Eliminate livestock grazing, minimize motor vehicle and railroad influences and modify fire suppression efforts in affected natural areas. Minimize soil disturbance, protect native vegetation, utilize fire to assist in saltcedar control and follow suppression efforts with additional control efforts needed to effectively kill burned, invasive plant species capable of resprouting. 5. Minimize recreation conflicts within or near the subject natural area. Be cognizant of the full array of recreational uses that may occur and their associated influences on natural features, upon invasive plant control, site restoration and maintenance goals. 6. Monitor and maintain desired site conditions on a regular basis. Revise control, restoration and maintenance strategies accordingly. Even a minimal monitoring and action effort can ward off stumbling blocks to achieving your restoration goals and is likely to be cost-effective in the long run. 7. Lastly, keep informed. Maintain close liaison with others involved with habitat restoration work, particularly those involved with non-indigenous plant species control. The principles outlined in the above approach are based upon information summarized in Schierenbeck's 1995 documentary, "The Threat To The California Flora From Invasive Species: Problems And Possible Solutions" as well as a review of saltcedar control efforts to date. This approach is offered specifically for saltcedar control, but may also have applicability in site restoration for other invasive plant control efforts in our nation's natural areas. Bossard, C.C. 1992. Factors leading to invasiveness and invasibility. Proceedings of the Second California Exotic Pest Plant Symposium. Morro Bay, Calif. Brussard, P.F. 1991. The role of ecology in biological conservation. Ecological Applications 1 :6-12. Bureau of Reclamation. 1990a. Vegetation management study-lower Colorado River. Phase 1 Draft. Lower Colorado Region, Boulder City, Nev. Dudley, T. and B. Collins. 1995. Biological invasions in California wetlands, the impacts and control of non-indigenous species in natural areas. Pacific Institute for Studies in Development, Environment and Security. Oakland, Calif. Egan, T.B., R.A. Chavez and B.R. West. 1993. Afton Canyon saltcedar removal first year status report. In, L. Smith and J. Stephenson (tech. coords.), Proceedings of the Symposium on Vegetation Management of Hot Desert Rangeland Ecosystems. Phoenix, Ariz. Lovich, J.E., T.B. Egan and R.C. De Gouvenain. 1994. Tamarisk control on public lands in the desert of Southern California: two case studies. Proceedings of the 46th Annual California Weed Conference, California Weed Science Society. San Jose, Calif. Neill, W.M. 1985. Tamarisk. Fremontia 12:22-23. Schierenbeck, K.A. 1995. The threat to the California flora from invasive species: problems and possible solutions. Madrono 42:164-174. Taylor, J.P. 1994. A comparison of mechanical and herbicide/burn saltcedar control techniques. U.S. Fish and Wildlife Service Agency Environmental Assessment, Bosque del Apache National Wildlife Refuge, Socorro County, New Mexico. Continue on to the paper on Saltcedar Management: A Success Story or return to the Workshop Table of Contents Conference proceedings hosted by the National Invasive Species Information Center
<urn:uuid:6ae7e7fa-1cbc-4606-9225-05e588ae3b63>
CC-MAIN-2015-11
http://www.invasivespeciesinfo.gov/docs/news/workshopJun96/Paper14.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00205-ip-10-28-5-156.ec2.internal.warc.gz
en
0.906961
1,827
3.078125
3
Through the concept of constructivism, a child is encouraged to learn through determining his own path of knowledge and individual process. Each child is different and special, just like their learning, and constructivism supports the idea that we construct our own understanding of the world we live in through generating rules and ideas based on individual experiences and trial and error. With the learning theory of constructivism, there are no flash cards or standardized tests. Instead, the child is supported to follow his instinct and create his own knowledge and strategies for understanding and learning. What is Constructivism? The history of social constructivism leads us back to Lev Vygotsky and his social theories of learning. His studies found that a child often successfully accomplished new tasks while working in collaboration with an adult instead of on his own. This does not mean the adult is teaching the child how to solve problems, but in the act of the adult engaging with the child, the learning experience improves and offers the child the ability to refine thinking and perform effectively. It is the idea of “can do” versus “cannot do” and offering the child opportunities to change to the “can do” attitude with supportive, individual adult input. By combining the idea of social and cognitive constructivism, the child is able to develop in positive ways. Social constructivism emphasizes the learning a child accomplishes through interaction with others and outside experiences. Cognitive constructivism is based on a child’s developmental stages and individual learning style. As stated before, each child is different and when his specific learning style is determined, his ability to learn is enhanced, especially when adults are able to fine-tune teaching to fit his specific learning. Teaching with Constructivism The educational system is not conducive to comfortably support constructivism in the mainstream classroom. But, there are small things educators, and parents, can do to support a child’s learning and development through constructivist theory. It is thought that most educators view learning as an objectivist theory, with the belief that learning exists outside of the bodies of learners residing in books and other educational documents. This leads to curriculum being based on teaching the child through textbooks instead of through experience. Through constructivism, the main way of learning is the senses, causing the brain to build a full understanding of the surrounding world. This leads us back to the understanding that each child is an individual creating unique responses and experiences. With testing being the popular way to determine a child’s knowledge base, constructivism encourages the concept of experience and interaction. The process of learning through doing and engaging is the goal. Also, understanding each individual child’s prior-knowledge is key, used to build and grow adult interactions and teachings. This encourages greater bonds between adult and child, and deeper educational experiences resulting in higher knowledge and self-esteem. Ways to Integrate Constructivism Introducing constructivist theory may seem like an unattainable goal for the classroom, but educators can make a difference through making simple changes and a bit of extra time. Parents can benefit from doing the same thing, creating a positive environment where the child is encouraged to explore and build his knowledge base through constructive ideals. Take time to talk: It’s challenging in a bustling classroom to cover topics required by state standards of learning and maintain requirements of the school, but shortening lectures and book study and adding more interaction and discussion is one way to offer each student the opportunity to take part in learning. Including activities that encourage the student to apply their existing knowledge and real-world experiences promotes constructive learning. A healthy class debate is always a wonderful way to talk things out and hypothesize new ideas and problem solving. In the home, take time to talk through problems and encourage conversations at the dinner table, discussing new and exciting topics. And, do not forget to ask lots of open-ended questions! Doing is learning: Get out of the classroom and use those senses for learning! This goes for the home environment, too. As a population, we get caught up with the Internet and other social media as ways of entertainment and education. The big textbook has been replaced with surfing the web. Turn to the great outdoors, along with real-life social interactions for learning and growth. Taking students into the real world to test their ideas and knowledge benefits constructive learning and understanding. Encourage a group discussion to finish the lesson after the out-of-classroom experience. And, parents can do the same by getting out of the house for a simple nature walk. Ditch your expectations: Constructivism is not about test results and rote learning but about developing the child’s senses and understanding of the world around him. Find ways to encourage that learning through doing activities that are free of set limits and end results. Allowing a child to experiment with open-ended activities encourages creativity and self-esteem. If talking about weather systems, have students create a colorful weather collage. When discussing architecture, brainstorm as a group ways for building better covered bridges. Not only is the child developing his brain in amazing ways, he is pushing his senses to the limits, learning more about his strengths and weaknesses and then making adjustments. Offering pre-tests allows for the teacher to gain understanding of student’s existing knowledge, aiding in creating educational lesson plans. In the home, direct open-ended questions without pressure or expectations. Use language focused on learning, instead of on results such as grades, to instill confidence. Introducing constructivist theory into the home or classroom is easier than one might think and offers fantastic benefits for both child and adult.
<urn:uuid:33f23c15-4f8c-410f-a734-0b2616006473>
CC-MAIN-2015-11
http://www.funderstanding.com/theory/child-development/constructivism-and-the-developing-child/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00139-ip-10-28-5-156.ec2.internal.warc.gz
en
0.95849
1,146
4.21875
4
Gary McGraw describes several best practices for building secure software. One is the use of so-called abuse cases. Since his chapter on abuse cases left me hungry for more information, this post examines additional literature on the subject and how to fit abuse cases into a Security Development Lifecycle (SDL). Modeling Functional Requirements With Use Cases Abuse cases are an adaptation of use cases, abstract episodes of interaction between a system and its environment. A use case consists of a number of related scenarios. A scenario is a description of a specific interaction between the system and particular actors. Each use case has a main success scenario and some additional scenarios to cover variations and exceptional cases. Actors are external agents, and can be either human or non-human. For better understanding, each use case should state the goal that the primary actor is working towards. Use cases are represented in UML diagrams (see example on left) as ovals that are connected to stick figures, which represent the actors. Use case diagrams are accompanied by textual use case descriptions that explain how the actors and the system interact. Modeling Security Requirements With Abuse Cases An abuse case is a use case where the results of the interaction are harmful to the system, one of the actors, or one of the stakeholders in the system. An interaction is harmful if it decreases the security (confidentiality, integrity, or availability) of the system. Abuse cases are also referred to as misuse cases, although some people maintain they’re different. I think the two concepts are too similar to treat differently, so whenever I write “abuse case”, it refers to “misuse case” as well. Some actors in regular use cases may also act as attacker in an abuse case (e.g. in the case of an insider threat). We should then introduce a new actor to avoid confusion (potentially using inheritance). This is consistent with the best practice of having actors represent roles rather than actual users. Attackers are described in more detail than regular actors, to make it easier to look at the system from their point of view. Their description should include the resources at their disposal, their skills, and their objectives. Note that objectives are longer term than the (ab)use case’s goal. For instance, the attacker’s goal for an abuse case may be to gain root privileges on a certain server, while her objective may be industrial espionage. Abuse cases are very different from use cases in one respect: while we know how the actor in a use case achieves her goal, we don’t know precisely how an attacker will break the system’s security. If we would, we would fix the vulnerability! Therefore, abuse case scenarios describe interactions less precisely than regular use case scenarios. Modeling Other Non-Functional Requirements Note that since actors in use cases needn’t be human, we can employ a similar approach to abuse cases with actors like “network failure” etc. to model non-functional requirements beyond security, like reliability, portability, maintainability, etc. For this to work, one must be able to express the non-functional requirement as an interactive scenario. I won’t go into this topic any further in this post. Creating Abuse Cases Abuse case models are best created when use cases are: during requirements gathering. It’s easiest to define the abuse cases after the regular use cases are identified (or even defined). Abuse case modeling requires one to wear a black hat. Therefore, it makes sense to invite people with black hat capabilities, like testers and network operators or administrators to the table. The first step in developing abuse cases is to find the actors. As stated before, every actor in a regular use case can potentially be turned into an malicious actor in an abuse case. We should next add actors for different kinds of intruders. These are distinguished based on their resources and skills. When we have the actors, we can identify the abuse cases by determining how they might interact with the system. We might identify such malicious interactions by combining the regular use cases with attack patterns. We can find more abuse cases by combining them systematically and recursively with regular use cases. Combining Use Cases and Abuse Cases Some people keep use cases and abuse cases separate to avoid confusion. Others combine them, but display abuse cases as inverted use cases (i.e. black ovals with white text, and actors with black heads). The latter approach makes it possible to relate abuse cases to use cases using UML associations. For instance, an abuse case may threaten a use case, while a use case might mitigate an abuse case. The latter use case is also referred to as a security use case. Security use cases usually deal with security features. Security use cases can be threatened by new abuse cases, for which we can find new security use cases to mitigate, etc. etc. In this way, a “game” of play and counterplay enfolds that fits well in a defense in depth strategy. We should not expect to win this “game”. Instead, we should make a good trade-off between security requirements and other aspects of the system, like usability and development cost. Ideally, these trade-offs are made clearly visible to stakeholders by using a good risk management framework. Reusing Abuse Cases Use cases can be abstracted into essential use cases to make them more reusable. There is no reason we couldn’t do the same with abuse cases and security use cases. It seems to me that this not just possible, but already done. Microsoft’s STRIDE model contains generalized threats, and its SDL Threat Modeling tool automatically identifies which of those are applicable to your situation. Although abuse cases are a bit different from regular use cases, their main value is that they present information about security risks in a format that may already be familiar to the stakeholders of the software development process. Developers in particular are likely to know them. This should make it easier for people with little or no security background to start thinking about securing their systems and how to trade-off security and functionality. However, it seems that threat modeling gives the same advantages as abuse cases. Since threat modeling is supported by tools, it’s little wonder that people prefer that over abuse cases for inclusion in their Security Development Lifecycle.
<urn:uuid:8c177353-9688-4420-a4b2-f7bca91e6cf6>
CC-MAIN-2015-11
http://www.javacodegeeks.com/2012/09/security-requirements-with-abuse-cases.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.931639
1,323
2.640625
3
Is there a more loaded word in the Arab-Israeli conflict than "refugee"? Is there anything more visceral or emotional than the sight of millions of Palestinians living in miserable refugee camps for three generations? If any one thing has symbolized the Palestinian cause and put Israel on the defensive, it is this image -- this powerful and constant reminder to the world that Israel's creation 60 years ago came with an "original sin," and that Palestinians deserve the "right of return." You can debate the fairness of this claim, but in our world of easy sound bites, the image of Palestinian suffering has become an albatross around Israel's neck. The fact that few Jews would ever agree to this right of return -- which would erode Israel's Jewish character -- has made this an enormous obstacle to any reconciliation between the two people. But here's the question: Will Israel ever be able to claim the high ground when it comes to justice for refugees? This week in Montreal, where I am spending Passover with my family, I met a man who thinks the answer is yes. He is one of the leaders of the Jewish community here, and he is actively fighting for justice for Middle Eastern refugees. Jewish refugees, that is. As Sylvain Abitbol explains it, the expulsion and exodus of more than 850,000 Jews from Arab countries is among the most significant yet little-known injustices against humanity of the past century. For hundreds of years, and in many cases for millennia, Jews lived in countries such as Algeria, Egypt, Lebanon, Lybia, Morocco, Syria, Tunisia, Iran, Iraq and Yemen. In several of these countries, the Jewish population was established more than 1,000 years before the advent of Islam. From the seventh century on, special laws of the Dhimmi ("the protected") subjected the Jews of the Middle East and North Africa to prohibitions, restrictions and discrimination -- not to mention harsh conditions of inferiority. Still, many Jews managed to prosper despite these circumstances. Things took a turn for the worse after the birth of Israel in 1948. Between the 1940s and 1980s, the Jews of Arab countries endured humiliation, human rights abuses, organized persecution and expulsion by the local governments; Jewish property was seized without compensation; Jewish quarters were sacked and looted and cemeteries desecrated; synagogues, Jewish shops, schools and houses were ransacked, burned and destroyed; and hundreds of Jews were murdered in anti-Semitic riots and pogroms. To this day, Arab countries and the world community have refused to acknowledge these human rights violations or provide compensation to the hundreds of thousands of Jews forced to abandon their homes, businesses and possessions as they fled those countries. But activists like Abitbol are fighting back, all the way to the White House and the U.S. Congress. Abitbol, the first Sephardic Jew to lead the local Jewish Federation in Montreal and now co-president of the Canadian Jewish Congress, connected with this movement a year ago when he joined the board of Justice for Jews from Arab Countries (JJAC). Together with other organizations like the American Sephardi Federation (ASF) and the World Organization of Jews from Arab Countries (WOJAC), the movement, which is officially called the International Rights and Redress Campaign, toiled for years in obscurity. A few weeks ago, they hit the jackpot. That's when the U.S. Congress overwhelmingly passed the first-ever resolution to grant recognition as refugees to Jews from Arab and Muslim countries. House Resolution 185 affirms that all victims of the Arab-Israeli conflict must be treated equally, which means it will now be official U.S. policy to mention "Jewish refugees" whenever there is mention of Palestinian refugees in any official document. It's a huge victory, but only a beginning. The United Nations and the world media are the next fronts in this battle for Jewish justice. Abitbol, a sophisticated man in his mid-50s who's fluent in French, English, Arabic, Hebrew and Spanish, has no illusions about Israel's precarious image in the world. But he's far from being a cynic. He's passionate about fighting for the rights of Jewish victims, and he is also a Jewish refugee (from Morocco). Yet he hardly acts like either a refugee or a victim. Over tea at my mother's house, he reflected on the major influences of his life. One of the things that stuck with me was something Abitbol said he learned early in his career, when he was in sales. Abitbol, who has two engineering degrees and is chairman of an innovative software company called uMind, calls the technique "listen and adapt:" You adapt your strategy and your communication to the values of your audience. He gave me a fascinating example. While in Dubai recently on business, an Arab businessman confronted him on the situation in Israel. Abitbol, seeing that the man was a devout Muslim who believed that everything comes from God, gently explained -- in Arabic -- that if Israel has survived so many wars over 60 years, maybe it's because it is "Inshallah" (God's will). Abitbol got the other man's attention. Same thing when he spoke recently at a United Nations conference in Geneva on the subject of Jewish refugees. Directly facing representatives of Arab countries, he used the language of indignation and human rights that Arabs have used so successfully against Israel for so many decades, only this time it was on behalf of Jews. Of course, he added that there is one major difference: Jews didn't put their 850,000 refugees in squalid camps so they could have a powerful image on the evening news. They helped them resettle, so that one day, one of them would learn five languages and fly to Geneva to speak up on their behalf. David Suissa, an advertising executive, is founder of OLAM magazine and Meals4Israel.com. He can be reached at [email protected]. We welcome your feedback. Your information will not be shared or sold without your consent. Get all the details. Terms of Service JewishJournal.com has rules for its commenting community.Get all the details. JewishJournal.com reserves the right to use your comment in our weekly print publication.
<urn:uuid:41c5ca23-0d50-49af-a92f-7431e67f7463>
CC-MAIN-2015-11
http://www.jewishjournal.com/david_suissa/article/the_other_refugees_20080425
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00119-ip-10-28-5-156.ec2.internal.warc.gz
en
0.957748
1,300
2.828125
3
On February 7, 1894, gold miners near Cripple Creek, Colorado walked off the job, leading to one of the biggest victories for organized labor in the Gilded Age after the state of Colorado intervened on the side of the workers. This strike made the Western Federation of Miners the major labor organization among western miners, as well as a reputation for violence that made it unacceptable to conservative labor leaders in the American Federation of Labor. By the 1890s, the area around Cripple Creek was the center of the Colorado gold fields. Cripple Creek itself was the second largest city in the state. The Panic of 1893 theoretically could have helped these workers; it was silver prices that collapsed and the government needed all the gold it could get. But this led silver miners to flood into the mines and convinced the mine owners to lower wages. Announcing a 10 hour day (previously 8) with no pay raise led the miners to walk out. The strike was widespread and effective. By the end of February, virtually every gold mine in Colorado was shut down. A few gave in and restarted their mines after retreating back to the 8-hour day. However, the big mines were intransigent and brought in scab labor. At first, the WFM tried to organize these men into the union. But work was scarce in 1894 and even a low-paying job with long hours was too good to pass up. So on March 16, a group of armed miners captured and beat six sheriff’s deputies heading up to a mine at Victor, where they were to assist in the protection of scabs. This act of violence led to El Paso County Sheriff M.F. Bowers to request state militia intervention from the governor, the Populist Davis Waite. Waite was not the preferred governor for Colorado capitalists. When he realized that Bowers was lying to him about the extent of violence and really wanted a state strikebreaking force, he withdrew the militia. Bowers then arrested the strike leaders, but a jury found them not guilty of trumped up charges. Meanwhile, the strikers began to attack the scabs, throwing bricks and getting into fistfights with them. The mine owners then attempted to negotiate with the miners, offering a return to the 8 hour day but at reduced pay. When the miners rejected this offer out of hand, and with the refusal of Governor Waite to use the militia as the personal army of the mine owners, the owners decided to raise a private army of their own. They paid for an army of 100 men, mostly ex-policemen, to become sheriff’s deputies and protect the hundreds of scabs they intended to bring to the mines. When the miners heard about this, they organized to defend themselves. On May 24, they took over the Strong Mine, near Victor. When 125 deputies marched to take it, the miners blew it up. The deputies fled and the miners wanted blood. They filled a railroad car with dynamite and send it down the railroad track, hoping to cause an explosion in the deputies’ camp, but it derailed. Many wanted to systematically blow up the mines. This didn’t happen, but tensions rose even further when the mine owners paid for an additional 1200 deputies for their private army. Fearing a complete massacre, Governor Waite stepped in. In an extremely rare move for the Gilded Age, Waite issued an order declaring the owners’ private army illegal and ordered the capitalists to disband it, sending in the state militia as a peacekeeping force. He then went to the miners and got their approval to be their bargaining agent with the mine owners. To say the least, the mine owners were apoplectic. This was the age of the Great Railroad Strike, of Homestead, of Pullman. Capitalists expected the state to do their bidding. When Waite called a meeting of the union and owners in Colorado Springs, a mob whipped up by the companies formed outside and threatened to lynch Waite and the unionists. Through a decoy, they snuck out the back door and escaped. Despite this, Waite forced the mine owners to agree to restore the eight hour day at the previous wages of $3 a day (about $73 today, so basically the equivalent of about $9 an hour for extremely dangerous work). Even though they had reached an agreement, mine owners wanted revenge. Bowers could not control the 1200 deputies. After a confrontation with the state militia at Victor, the deputies went to Cripple Creek, where they arrested hundreds of miners on trumped up charges. They even formed a gauntlet and forced townspeople to run through it while being beaten. The state militia then rounded up the deputies, essentially arresting the police. The mine owners refused to disband the private army but the governor said he’d keep the militia in town for another month which meant that the owners would have to pay the private army to do nothing. Finally, they gave up. It was arguably organized labor’s biggest win in the entire Gilded Age. The militia detaining the illegal sheriff deputies. Governor Waite was seen by the respectable people of Colorado as a promoter of anarchy and was defeated in his reelection campaign in the fall of 1894, effectively ending the Populist movement in Colorado. The Western Federation of Miners went on to play a key role in the founding of the Industrial Workers of the World in 1905, although it remained independent of that organization. It later became the International Union of Mine, Mill and Smelter Workers (or Mine, Mill for short), one of the communist led unions that the CIO eventually kicked out of the organization in the 1940s. It is probably most famous today for having produced the film Salt of the Earth, detailing a mining strike in southern New Mexico in the early 1950s. It finally merged with the United Steelworkers of America in 1967. Cripple Creek itself became a gambling town in a state attempt to revitalize its old mining towns. Although less ravaged and gross than Black Hawk, which has become a gambling mecca for Denver that has completely obliterated the historical character of the town, the gambling has made Cripple Creek pretty unpleasant without providing many of the promised jobs. This is the 50th post in this series. Previous posts are archived here.
<urn:uuid:7b750fa0-1c97-45f8-8aff-1aee528332b2>
CC-MAIN-2015-11
http://www.lawyersgunsmoneyblog.com/2013/02/this-day-in-labor-history-february-7-1894/comment-page-1
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00157-ip-10-28-5-156.ec2.internal.warc.gz
en
0.977849
1,299
3.421875
3
The Marathi language is the official language of India's Maharashtra state, where the major city of Mumbai is located. Given Mumbai's important cultural and economic status within India, it should come as no surprise that the Marathi language is of great significance to modern India. With roots dating as far back as the 8th century and a flourishing cultural history, Marathi has long played an important role in the country. Classification and Early History of Marathi Marathi is classified as part of the Indo-Aryan subfamily of the Indo-European family of languages. The languages of the Indo-Aryan family are known to have developed in three major stages: Old Indo-Aryan, also known as Sanskrit; Middle Indo-Aryan, which includes Prakrit and Apabhramsha; and finally, the New Indo-Aryan, which dates from about the 10th century CE. Historical records and other evidence suggest that the debut of Marathi as a distinct language can be dated to approximately the 8th century. Marathi is thought to have evolved through the Sanskrit, Prakrit and Apabhramsha stages of Indo-Aryan languages. Modern Marathi syntax and grammar points to a connection to Maharashtri Prakrit, an influential Indian language that remained active until the late 9th century. Marathi Language Distribution in India The modern Marathi language is primarily located in western and central areas of India, extending along the western coast from north of Bombay past Goa. Marathi is recognized as one of India's official languages by the country's constitution, serves as an official language in the Indian state of Maharashtra, and is also used for official purposes in the state of Goa. The current standard of Marathi is based on the dialect spoken in Pune, the eighth largest city in India and the second largest city, after Mumbai, in the Indian state of Maharashtra. Marathi in Maharashtra Since 1966, Marathi has served as the official language of the Maharashtra state, one of India's most significant states both within the country and internationally. It covers an enormous expanse of territory and is also home to the city of Mumbai (sometimes called Bombay), India's most populous city. Thanks to its coastal location, Maharashtra has also benefited from a strong shipping trade in the past. As the second most-populous and the richest state in India, Maharashtra plays a large role in the country. Written Marathi Language: The Devanagari Script The first known examples of the written Marathi language are found in inscriptions dating to about the 11th century. Today Marathi is most commonly written using the Devanagari script, which is also used in the Hindi and Sanskrit languages. The Sanskrit alphabet dates back to circa the 7th century AD and long served as the sacred and literary language of Hindi India. The form of Devanagari used to write Marathi is slightly different from that used to write Hindi and other Indian languages; variables may include characteristics such as diacritic marks inserted to alter pronunciation. The Devanagari script is easily recognized by the horizontal line over each letter that connects groups of letters. In the Marathi language, the Devanagari script is used both for official purposes and printed literature, as well as for everyday handwriting. An alternative form of cursive Devanagari, known as Modi, is also used for handwritten Marathi, although less frequently. Early Development of Marathi Language Literature Marathi has an impressive literary tradition dating from about 1100 AD. The start of Marathi language literary culture was in part due to the adoption of the Marathi language by two religious sects, the Warkari and Mahanubhava. The poetry and prose published by members of these religious sects marked the beginnings of a literary Marathi language tradition. Further growth of Marathi literature was promoted with the rise of the Yadava Dynasty, which ruled a Hindu kingdom spanning the area that is now modern-day Maharashtra from the 12th to 14th centuries. Under the Yadava Dynasty, Marathi was adopted as the official court language, promoting its use in both scholarship and the arts. Throughout the Yadava reign, a significant amount of Marathi literature, including poetry, prose and academic writing, appeared. Standardization of the Marathi Language: Later Developments The written Marathi language underwent changes throughout British colonial rule of India. During this time, steps were taken to standardize the Marathi language grammar. These efforts were primarily led by Christian missionaries who played a significant part in the publication of Marathi language dictionaries and grammar texts. Aside from taking steps toward standardization, the Marathi language at this time also began to develop a more modern literary culture. The first Marathi language newspaper was created in the early 19th century, followed by the launching of a number of other periodicals and journals, many of which served as outlets for writers of the time. The 19th century also marked the dawn of Marathi-language drama, a medium that remains popular. Marathi language writers continue to live and work in India today, most of them in Maharashtra. Modern Marathi Language and Dialects The majority of Marathi speakers are located in India, especially western and central areas. Modern Marathi is also spoken by immigrant communities around the world, especially in the United States, United Arab Emirates, South Africa, Australia, New Zealand and areas of Europe. An estimated 70 million native Marathi speakers can be found in the world today, with approximately 20 million additional second-language Marathi speakers, bringing the total number to about 90 million. A variety of regional dialects exist within the Marathi language, with the standard form of the language based on the dialect of Pune. This standardized dialect is influenced not only by the language of the media and academic institutions, but also by the dialect of the educated elite of the region. Differences in dialect within the Marathi language also appear along social lines as set by India's caste system. Marathi Quick Facts Alternate Names & Spellings: MAHARASHTRA, MAHARATHI, MALHATEE, MARTHI, MURUTHU Language Family: Indo-European, Indo-Iranian, Indo-Aryan, Southern zone. Spoken by Approximately 68,022,000 people Spoken In: United States Learn About Other Languages
<urn:uuid:a5a6c0c5-cc26-468f-8f07-778433ab24f2>
CC-MAIN-2015-11
http://www.alsintl.com/resources/languages/Marathi/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00098-ip-10-28-5-156.ec2.internal.warc.gz
en
0.958972
1,313
3.84375
4
The emergence of the shale gas boom in the United States, and the discovery of significant reserves in Australia and elsewhere, has prompted many people in the energy industry to proclaim a “golden age” of gas, one that will cause the premature demise of renewable energy sources, even before they have a chance of creating an energy revolution of their own. The claims have, of course, been heavily promoted by the gas industry itself, as well as from institutions such as the International Energy Agency and the US Energy Information Administration, who have both suggested the boom in shale gas will defer investment away from wind and solar. But in a recent report, the energy analysts at international investment bank Citigroup question these assumptions, which are based on the idea that gas and renewables will compete with each other. “We suggest the opposite is true,” Citi writes. Rather than replacing renewables, the Citi analysts suggest that the shale gas industry will actually be dependent on the broader deployment of wind and solar for its future. That’s because gas will be priced out of the conventional market in the short term, but will then be required to fill in the gaps as wind and solar are deployed more widely, and coal generation is shut down. Far from competing with each other, Citi suggests renewables and shale gas will be co-dependent as the world’s energy systems are weaned away from the baseload model that has dominated the industry for the last century. That is until forms of dispatchable renewable energy, such as solar thermal with storage, and technologies such as smart grids, push gas out of the market. The key to Citi’s prediction is the conclusion that the cost of exploiting shale gas is highly uncertain, as are its long-term environmental credentials. Shale gas is likely to be considerably more expensive than it has been in the US, and by the time it is exploited it will be unable to compete with the cost of renewables in most markets. “The perception of renewables as an expensive source of electricity is largely obsolete, given the huge cost reductions achieved in recent years,” the Citi analysts write. The report notes residential solar PV has already reached ‘grid parity’ in many countries, with much of the world set to follow by 2020. It also says that utility-scale renewables will also be competitive with gas-fired power in the “short to medium” term. This has already occurred with wind energy in many countries. The exact ‘crossover’ points for utility-scale solar will vary from country to country, but in many regions, the Citi analysts say that big solar will be competitive by 2020. In areas such as Saudi Arabia, it suggests, utility-scale solar is already cheaper than gas at a price of $15/MMBtu. Even at a price of $8MMBtu, solar will be cheaper than gas by 2020. “Utility-scale solar is rapidly approaching parity with wholesale electricity prices in a number of countries, including Italy, Spain, the US and China,” Citi says. “By 2020, we calculate that utility-scale solar will be competitive with gas-fired power for a broad range of natural gas prices. “Under the optimistic assumption that the gas price reaches around $16/MMBtu, utility-scale solar would be cheaper than gas-fired power in all key markets around the world, including the UK, Russia and Germany.” Even in the US, utility-scale solar located in the south-west of the country would be competitive with gas-fired power at all gas prices over $6-8/MMBtu, depending on whether solar prices fall according to its ‘single-speed’ or ‘three-speed’ scenarios. Wind is also cheaper than gas-fired power in the US at a natural gas price of around $6/MMBtu, although it does depend on the capacity factor of the plant. This evaluation of the competitiveness of wind and solar in the world’s biggest electricity market is crucial, because while Citi says while gas prices have been low in the US due to the shale price boom, they are unlikely to remain there – as much of the resource is uneconomic to extract at under $5/MMBtu, and some studies suggest the level to be in the $6-$8/MMBtu range. The assessment by the Citi energy team is significant because it is one of a number of teams from leading investment banks that have recognised the fundamental changes that are taking place in the global energy market. And all these changes are being driven by the falling cost of solar and wind, as highlighted by the likes of UBS, Macquarie Group and Deutsche Bank. Citi notes that in the early stage of their deployment, renewables will actually require less peaking capacity provided by open cycle gas plants, a prediction that is borne out from experience in South Australia. However, as renewable penetration grows, more peaking capacity is required as baseload generation is shut down. Those who noticed the Graph of the Day from Monday, which showed Germany’s generation profile last Sunday, may be fascinated to see Citi’s predictions of what happens when twice as much renewable generation is deployed. Baseload power plants are built on the economics of being, well, baseload. And many of the business models are also based on reaping the cream from higher-priced peak power – the areas of dark blue now occupied by solar. In short, such a scenario – which, in Germany, is official government policy – signals the demise of baseload power. This “inverting effect”, as Citi describes it, is essentially turning the market upside down, as predicted by the majority of high penetration renewables scenarios. More flexible gas-fired plants – and perhaps some coal-fired plants that manage to adapt – will be required to fill in the gaps. Since, at large penetration levels, the requirement for ‘peaking power’ rises as renewable penetration increases, gas-fired power is not only compatible with renewables, it is in many ways essential for its large-scale adoption. Forget about baseload and peaking-load scenarios, the future will be in flexible and inflexible generation. “This makes the relationship between renewables and gas-fired power symbiotic; they each assist the other to gain a larger slice of the electricity market,” the Citi analysts note. But it won’t be a permanent relationship. Eventually, in the “very much longer term”, the Citi analysts expect that ‘peaking’ power will eventually be supplied through renewable sources, through large-scale integrated storage, for instance, or through a continent-wide smart grid. RenewEconomy Free Daily Newsletter
<urn:uuid:ebb18971-841a-41a1-b587-9c5decc49b30>
CC-MAIN-2015-11
http://reneweconomy.com.au/2013/age-of-renewables-why-shale-gas-wont-kill-wind-or-solar-54691
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00151-ip-10-28-5-156.ec2.internal.warc.gz
en
0.95993
1,417
2.8125
3
|Older Children Can Benefit From Treatment For Childhood’s Most Common Eye Disorder Surprising results from a nationwide clinical trial show that many children age 7 through 17 with amblyopia (lazy eye) may benefit from treatments that are more commonly used on younger children. Treatment improved the vision of many of the 507 older children with amblyopia studied at 49 eye centers. Previously, eye care professionals often thought that treating amblyopia in older children would be of little benefit. The study results, funded by the National Eye Institute (NEI), part of the National Institutes of Health (NIH), appear in the April issue of Archives of Ophthalmology. “Doctors can now feel confident that traditional treatments for amblyopia will work for many older children, said Paul A. Sieving, M.D., Ph.D., director of the NEI. “This is important because it is estimated that as many as three percent of children in the United States have some degree of vision impairment due to amblyopia. Many of these children do not receive treatment while they are young,” he said. Amblyopia is a leading cause of vision impairment in children and usually begins in infancy or childhood. It is a condition resulting in poor vision in an otherwise healthy eye due to unequal or abnormal visual input while the brain is developing in infancy and childhood. The most common causes of amblyopia are crossed or wandering eye (strabismus) or significant differences between the eyes in refractive error, such as, astigmatism, farsightedness, or nearsightedness. Children in the study were divided randomly into two groups. One group was fitted with new prescription glasses only. The other group was fitted with glasses as well as an eye patch, or the eye patch along with special eye drops, to limit use of the unaffected eye. These children were also asked to perform near vision activities. The patching, near activities, and eye drops force a child to use the eye with amblyopia. Patching was prescribed for periods of two to six hours daily, while the eye drops were administered daily for the children seven though twelve years of age. The study investigators defined successful vision improvement as the ability to read (with the eye with amblyopia) at least two more lines on a standard eye chart. The study investigators found that 53 percent of children age seven through twelve years who received both glasses and treatment with patches and near activity met this standard, while only 25 percent of those children in this age group who received glasses alone met the standard. For children age 13 through 17 years who were treated with both glasses and patches (these children did not get drops), 25 percent met the standard while 23 percent of children of these ages who received only glasses met the standard. The study also revealed that among children age 13 through 17 years who had not been previously treated for amblyopia, 47 percent of those who were treated with glasses, patching and near activities improved two lines or more compared with only 20 percent of those treated with glasses alone. Despite the benefits of the treatment, most children, including those who responded to treatment, were left with some visual impairment. They did not obtain “20/20” vision. Rates of Success Treating Children With Amblyopia In ||Treatment Group ** ||Optical Correction Group (glasses Ages seven through 12 |Ages 13 through 17, no prior treatments |Ages 13 through 17 * The standard for success in the trial was a child’s ability to read at least two more lines on a standard eye chart using the eye with amblyopia. This may not be the maximum possible benefit that can be achieved ** Treatment was eye patching, special eye drops, and near vision activities for ages seven through 12; eye patching and near activities for ages 13 through 17. “This study shows how important it is to screen children of all ages for amblyopia.” said study co-chairman Richard W. Hertle, M.D., Children’s Hospital of Pittsburgh. Commented co-chairman Mitchell M. Scheiman, O.D., Pennsylvania College of Optometry, “This study shows that age alone should not be used as a factor to decide whether or not to treat a child for amblyopia. The opportunity to treat amblyopia does not end with the pre-school It is not known, say the authors of the current study, whether vision improvement will be sustained in these children once treatment is discontinued. The NEI is supporting a one-year, follow-up study to determine the percentage of amblyopia that recurs among the children who responded well to treatment, as well as many other clinical studies of amblyopia at eye centers nationwide. Dr. Sieving also commented that the current study results are “a wonderful example of the adaptability of the human visual system and brain. The NIH is exploring ways to take advantage of this adaptability in order to better understand and treat vision problems and other The study described in this release was conducted by the NEI-funded Pediatric Eye Disease Investigator Group. The Group focuses on studies of childhood eye disorders that can be implemented by both university-based and community-based practitioners as part of their routine practice. The study was coordinated by the Jaeb Center for Health Research in Tampa, Florida. A list of study centers is attached. For background information regarding amblyopia, please A list of current study centers is available online The National Eye Institute is part of the National Institutes of Health (NIH) and is the Federal government's lead agency for vision research that leads to sight-saving treatments and plays a key role in reducing visual impairment and blindness. The NIH is an agency of the U.S. Department of Health and Human Services.
<urn:uuid:3ef38232-cc4b-45da-a3ee-30787c6ae2de>
CC-MAIN-2015-11
http://www.nih.gov/news/pr/apr2005/nei-11.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00178-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945164
1,304
3.171875
3
POSSESSION (IN LAW), a term derived from Roman law. It has been said to be either a right or a fact conferring a right, or both together. The latter is the view of Savigny, the leading au thority upon the subject (Recht des Besitzes). The definition of W. A. Hunter may be accepted : "Possession is the occupation of anything with the intention of exercising the rights of owner ship in respect of it" (Roman Law). Possession is inchoate or incomplete ownership; it is on its way to become ownership. In both Roman and English law the possessory tended to super sede the proprietary remedies from their greater convenience— that is to say, the plaintiff based his claim or the defendant his right upon possession rather than property. The English posses sory action may have been directly suggested by the interdict. Bracton (Io3b) identifies the assise of novel disseisin, the most common form of possessory action, with the interdict uncle vi. In England ejectment had practically superseded other real actions before the latter were (with the exception of dower, writ of dower and quare impedit) expressly abolished by the Real Prop erty Limitation Act 1833, s. 36. The action for the recovery of land, introduced by the Judicature Acts, is the modern representa tive of the action of ejectment. Possession gives in English law, speaking generally, much the same rights as in Roman law. Thus it serves to f ound a title (see LIMITATION, STATUTES OF; PRESCRIPTION), and to throw the onus of proof upon the claimant. In an action for the recovery of land the defendant need only allege that he is in possession by himself or by his tenant, and (where such an allegation is neces sary) that he had no notice to quit. In English law the doctrine of possession becomes practically important in the following cases : (I) Possession serves as a con venient means of division of estates. (See LAWS OF REAL PROP ERTY.) One of the divisions of estates is into estates in possession and estates in reversion or remainder. It also serves as a division of personal property (q.v.). A chose in action is said to be reduced into possession when the right of recovery by legal proceedings has become a right of enjoyment. (2) Possession gives a title against a wrongdoer. In the case of real property it is regarded as prima facie evidence of seisin.' In the case of personal property the mere possession of a finder is sufficient to enable him to maintain an action of trover against one who deprives him of the chattel.' (3) What is called "unity of possession" is one of the means whereby an easement is extinguished. (4) Possession is very im portant as an element in determining the title to goods under 13 Eliz. c. 5, the Bills of Sale Act 1878 and the Bankruptcy Acts 1883 to 189o. (5) Possession of goods or documents of title to goods is generally sufficient to enable agents and others to give a good title under the Factors' Acts. (See FACTOR.) (6) In crim inal law the question of possession is important in founding the distinction between larceny and embezzlement. (See Stephen, Digest of the Criminal Law, note xi.) (7) Actions of possession of ships fall within the jurisdiction of the admiralty division. This jurisdiction in the case of British vessels depends upon the Ad miralty Court Act 1861 (24 Vict. c. 1o, s. 8), in the case of for eign vessels (in which the jurisdiction is rarely exercised) upon the general powers of the court as a maritime court. Under the Statutes of Limitation the only question now is, not whether possession has been adverse or not, but whether twelve years have elapsed since the right accrued. Scotland.—In Scotland possessory actions still exist eo nomine. Actions of molestation, of removing, and of maills (payments) and duties are examples. A possessory judgment is one which entitles a person who has been in possession under a written title for seven years to continue his possession (Watson, Law Dict., s.v. "Posses sory Judgment"). United States.—In American law possession carries much the same important significance that it does in English law. Except in Louisiana where the civil law prevails, possession is commonly divided into actual and constructive possession. The former con cerns actual occupancy or the exercise of dominion over a thing; the latter occurs where there is no actual possession but simply ownership and the possession is either vacant or consistent with the outstanding ownership, such as possession by a servant or bailee. The doctrine of possession has an outstanding importance in practically every branch of the law, especially in the numerous cases where ownership to realty or personalty is in issue. Espe cially significant are the doctrines of adverse possession, where long continued and uninterrupted possession of chattels or realty under a claim of right and hostile to the true owner ripens after the statutory period into indefeasible ownership. In addition to the authorities cited may be mentioned W. A. Hunter, Exposition of Roman Law (4th ed. 1903) ; 0. W. Holmes, The Common Law (1882) ; F. Pollock and R. S. Wright, Possession In the Common Law (1888) ; W. Markby, Elements of Law (2905) ; T. H. Holland, Elements of Jurisprudence (13th ed. 1924). and "possession" are used sometimes as synonyms, as generally by Bracton ; at other times they are distinguished: thus there can be possession of a term of years, but no seisin (Noy, Maxims, p. 2). It seems doubtful, however, how far in English law a tenant for years has true possession, for he is in law only a bailiff or servant of the landlord. But he certainly has possessory remedies. 'Compare the Code Napoleon, art. 2,279: "En fait de meubles la possession vaut titre."
<urn:uuid:78846e46-e8df-461f-a596-6cbf9b6d98bc>
CC-MAIN-2015-11
http://gluedideas.com/content-collection/Encyclopedia-Britannica-Volume-18-Plants-Raymund-of-Tripoli/Possession-in-Law.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00140-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945034
1,306
2.734375
3
Common Core State Standards The California Kindergarten Association is here to support you as you learn the new Common Core State Standards and adapt your teaching to help your students master them. You can kick off your learning about the new Common Core State Standards by reading Common Core Standards for Young Learners by our own Ada Hand and checking out the Common Core Curriculum Maps with ideas from teachers (funded by Pew with Gates Foundations money). Want to Share Your Teaching Ideas? Every month CKA will feature a Common Cores State Standards Lesson/Unit Plan. To contribute your ideas, email CKA the Lesson Plan Form below. If you have pictures of children or teachers you would like to use, please include a photo release form. If your teaching idea is selected you will receive a gift from CKA! Teaching ideas must be submitted by the 15th of the month prior to be considered. The end of January is fast approaching. Do you still have some students who are struggling with letter and/or number recognition? Today’s Tuesday Teaching Tip is here to help! First Grade teacher Julie McGreevy shares this easy and simple to personalize idea with us. You’ll want to make the dollar store or a thrift store your first stop – they carry cookie sheets. Then, either use a fun font or do a google image search for letters/numbers in a particular theme. You could choose one that goes along with the unit...read more Today’s Tuesday Teaching Tip comes to you from the incomparable Heidi Butkus of HeidiSongs. We are lucky enough to be able to claim her as a CKA Board Member as well. Do you have some kids in your class still struggling to learn the alphabet? Here’s Heidi with some apps to help! Best Apps for Teaching the Alphabet Fish School By Duck Duck Moose $1.99 This is a great app for pre-K, TK, or younger; my kindergartners were initially happy with it but quickly got bored. It’s not really a game, it’s more...read more Halloween is finally behind us and we’re in NOVEMBER! Veteran’s Day and Thanksgiving short month November! Phew! Are your kids still worn out from way too much Halloween fun? Need an activity that is SUPER simple and guaranteed to keep their attention? Rather then having them write sight words, letters or numbers, have them erase them instead! This activity works really well on a chalkboard but would also work with white boards (especially with dry erase crayons rather than markers). It could easily be done as a...read more Have you picked up some of the cute bulletin board boarders at Target recently? They’re in the Dollar Spot. (They often have similar ones at the Dollar Tree). Here’s a quick way to turn them into an easy activity to help your students learn their letters. All it takes is writing the letters on the clothespins and you’ll be ready to go! Need to make it more challenging? Write lower case letters on the clothespins. Not only will your students be practicing their letter recognition, they’ll also be building...read more New to Transitional Kindergarten or Kindergarten? Moving down from an upper grade? Or just looking to find tips to ease your way back into a new school year? CKA Board Member and first grade teacher, Deb Meng has you covered. Deb has taught Pre-K, TK and Kindergarten and is here to help! Imagine teaching TK for the first time when the only grades you have taught are third and fourth grade! I just got off the phone with a friend who is teaching TK for the first time. We talked for an hour about learning/management strategies for her...read more Ok, the count down is on! For some of you, summer is right around the corner. Others are going to have to wait just a little bit longer. Either way, who can’t use a super simple, active way to review core skills? So grab a large piece of paper, a marker or crayon and a pack or two of post-its. You’ll need maybe 5 minutes to prep and you’ll be ready to go. It’s that easy. We promise. Choose your target. This was done with sight words, but you could just as easily review numbers, addition/subtraction...read more We’re not quite sure where the time has gone,but somehow we’ve made it to the end of another school year! The count is on and summer is just around the corner. Here are some great read alouds to help wrap up your year! The incomparable Miss Bindergarten returns to bid farewell to her students in another installment of this classic series by Joseph Slate. Just try to hold the tears back as this beloved Kindergarten teacher wraps up her year! A new twist on a familiar classic! ”I think I can” becomes...read more Start Your Math Engines! Common Core State Standards Counting with an Automotive Twist (and a Free Printable)! Remember last week when we showed you this “speedy” activity? Rev Up Your Sight Words! Well, we were so “revved up” by it that we couldn’t resist adding a twist and turning it into a math activity! Here’s a free printable you can download now and be ready to go! Download (PDF, 155KB) Simply print out the cards – cardstock or other heavier paper would be better, but isn’t necessary. Then laminate for durability and cut them apart. Working in a small group, the students draw a card, then...read more Today’s Tuesday Teaching Tip comes to us from CKA Board Member and Transitional Kindergarten teacher Heather Morrow. Here’s a math activity we just did that was very successful – even for my “lowest” kiddos and is aligned to Common Core. First we talked about lines and put them together to make a triangle. We identified the corners or points with magnets. Then I gave students strips of paper and had them make triangle – first they made the green, then blue, then multicolored...read more Here’s an easy way to practice letters and improve fine motor skills, too. Plus – pin art is super fun, so it’s win-win! The best part? It’s super easy to prepare and a great independent center – perfect for times when you have testing to do, or you want to pull a small group. So, what’s this “pin art” business about anyhow, you say? You’ll want a carpeted space for your students to work, since the push pin won’t work well on a hard surface. Then you’ll need some...read more
<urn:uuid:c7e8b48c-df5b-4eb3-9fa5-c77054ebc411>
CC-MAIN-2015-11
http://www.californiakindergartenassociation.org/common-core-standards/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462700.28/warc/CC-MAIN-20150226074102-00023-ip-10-28-5-156.ec2.internal.warc.gz
en
0.943394
1,447
3.0625
3
Of all the Jewish languages that have become extinct, or been dropped by Jews as a spoken language, Aramaic is the most famous. In truth, Aramaic cannot be accurately described as a "Jewish language"; for unlike Yiddish, for example, which was spoken only by Jews and some gentiles with Jewish connections, Aramaic was the spoken tongue in a number of communities including Jews. Aramaic cannot be accurately described as a "Jewish language"Nevertheless, it's definitely a language with strong Jewish ties. While nearly no Jews still speak it or a modern version of it, Aramaic is an important part of Jewish literary and liturgical tradition. The part of the Talmud called the Gemara is almost entirely in Aramaic (whereas the Mishnah part of the Talmud is Hebrew). Most of the Book of Daniel (chapter 2:4 through 7), describing events that occurred in Babylon in the 4th century BCE, and parts of the Book of Ezra are also in Aramaic. The Book of Zohar, other kabbalistic and halachic works, and sections of the Dead Sea Scrolls are written in Aramaic The traditional ketubah (marriage contract) and Jewish divorce document are also in Aramaic. The same is true of many hymns and prayers, such as the first paragraph of the Passover Haggadah, "This is the bread of our affliction"; the wonderful song about the goat at the end of the seder, Chad Gadya; the prayer for the dead, known as the kaddish; and various other prayers and synagogue liturgy. Jewish Aramaic texts, however, both ancient and modern, are written using Hebrew letters with phonetic spelling. As with other Jewish languages, such as Yiddish, many terms are borrowed from Hebrew. The Long History of Aramaic Linguistic scholars believe that Aramaic arose somewhere between 900 and 700 BCE and was originally used by the Aramaeans (a Semitic semi-nomadic people who lived in upper Mesopotamia and Syria). It is part of the Semitic family of languages which includes Hebrew, Arabic, Ethiopic and the ancient Babylonian and Assyrian languages of Akkadian. It is closely related to Hebrew with the script being very similar. In fact, the Talmud (Pesachim 87b) tells us that, after the destruction of the First Temple, G‑d specifically chose to exile the Jews to Babylon because of the similarity of languages, to ease the acculturation process. The dominance of Aramaic continued well into the 9th centuryDuring the period of Assyrian domination, the language was used for the administration of the empire. This practice was continued by the Babylonian and Persian empires which ruled from Ethiopia to India. The Jews who returned to Israel from Babylonian captivity and established the Second Jewish Commonwealth in the 4th century BCE brought Aramaic with them. During this time, Hebrew lost its place as an everyday language amongst Jews, who adopted Aramaic instead. Hebrew was known as the Lashon Hakodesh, or the "Holy Tongue," and was reserved for matters such as prayer, and not for ordinary social and commercial activities. (A similar situation developed centuries later with Yiddish.) During this period, knowledge of Hebrew was limited amongst the masses to the extent that the public reading of the Scripture in Hebrew had to be accompanied by a translation in Aramaic. Some of these targums, as they were known, also incorporated interpretation. Aramaic was so dominant in Jewish life that both the Jerusalem and the Babylonian Talmuds are dominated by Aramaic. The dominance of Aramaic continued well into the 9th century CE when it was replaced by Arabic. Though there were pockets of Aramaic speakers especially among the Jews, Islamic persecution in Arab countries significantly reduced the number of Aramaic speakers throughout the Eastern world. During the period of about 200 BCE to 200 CE, which scholars call the Middle Aramaic period, Aramaic began to split into an Eastern Branch and a Western Branch each with a number of dialects. The Western Branch was largely used in the area which had been under Roman and later Byzantine rule. The Jerusalem Talmud is in Western Aramaic. The Eastern Branch was under Persian Empire influence, and as a result the Babylonian Talmud is in Eastern Aramaic. The Western Branch of the language was called Syriac (as distinct from Syrian) by the Greeks. This term is still used today. Aramaic has in fact, not completely died out as a spoken language. Both Jews and Christians have continued to use Eastern Aramaic up to modern times in Kurdistan. There are villages in Syria in which Western Aramaic is spoken. There are even pockets of Aramaic-speakers in the United States with two schools in New Jersey actually teaching Aramaic! The so-called Neo-Aramaic-speaking Jews largely emigrated to Israel in the 1950s where the language largely died out in preference to Hebrew. Many thousands of students labor over ancient Talmudic and other Aramaic textsEven though Aramaic has largely died out among Jews as a spoken language, Jewish usage of Aramaic has certainly not ended. In yeshivahs around the world, many thousands of students labor over ancient Talmudic and other Aramaic texts. And the preoccupation with these texts doesn't end at graduation. According to Jewish tradition, Torah study is a lifelong pursuit—and many of the most basic Torah texts are in Aramaic. Apart, however, from university centers specializing in near eastern classical languages, as a general rule, yeshiva and rabbinical students study Aramaic only in conjunction with the Jewish texts on which they are concentrating. Aramaic is seldom studied separately as a classical language. Case in point: Daf Yomi, an international movement to study one page of Talmud per day, has attracted what some think may be as many as 100,000 followers. Madison Square Garden and the Nassau Coliseum were both sold out a few years ago with live video links to other cities, to celebrate the siyum, the completion, of the study cycle. It took seven and a half years to complete the study of the Babylonian Talmud in Aramaic. Assuming that these figures are correct, this would mean that there are more Jews studying in Aramaic texts today than there have been since the majority of Jews lived in Babylon over 1000 years ago...
<urn:uuid:c52ef9e6-2d71-4b75-8446-e9d5f4ec8e40>
CC-MAIN-2015-11
http://www.chabad.org/library/article_cdo/aid/1051040/jewish/Aramaic-the-Yiddish-of-the-Middle-East.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00144-ip-10-28-5-156.ec2.internal.warc.gz
en
0.97653
1,316
3.859375
4
PITTSBURGH — A study led by researchers from the University of Pittsburgh School of Medicine found less technical sepsis treatments are just as effective as their more structured counterparts in battling the life-threatening condition. Researchers looked at three treatments for sepsis and found no significant difference in survival rates among them. The findings come from a national, randomized clinical trial released today. The study will be published in the May 1 edition of the New England Journal of Medicine. Sepsis is a condition where infection affects more than one organ and can cause organ failure. It can be a complication, for example, of pneumonia or an abdominal or kidney infection and is most common in elderly people and those with weakened immune systems. In septic shock, when the infection reaches the circulatory system, blood pressure drops dramatically and can lead to death. Sepsis is treated with a combination of antibiotics, intravenous fluids, and blood pressure medicines. Every year, about 750,000 cases of severe sepsis and septic shock occur in the United States. Between 18 and 21 percent of sepsis patients die in the hospital. “Sepsis is more deadly than a heart attack or a stroke,” said Donald Yealy, investigator, professor, and chair of Pitt’s department of emergency medicine. “Until 10 years ago, 40 to 50 percent of people coming into a hospital with sepsis died,” Dr. Yealy said. “It didn’t seem that anything mattered.” Then a 2001 “landmark trial” in Detroit found success in treating sepsis patients with a special catheter called a central line to the jugular vein to monitor blood pressure and oxygen levels, Dr. Yealy said. The treatment protocol, called “early, goal-directed therapy,” or EGDT, combined the use of the catheter with a delivery of drugs, fluids, and blood transfusions. The study found using this treatment reduced patient mortality from 46 percent to 30 percent. However, the treatment was very detailed and sometimes difficult to administer. “We wondered, could we get there in a simpler way?” Dr. Yealy said. The new study looked at three treatment methods: the EGDT treatment used in the Detroit study; a protocolized standard care, or PSC, that was simpler than EGDT that still required vein access but no central catheter; and the usual care used in hospitals where individual physicians direct course of treatment. Protocolized Care for Early Septic Shock, also known as ProCess, was a five-year, multicenter study funded through an $8.4 million grant from the National Institute of General Medical Sciences, part of the National Institutes of Health. Thirty-one hospitals participated, with 1,351 patients with sepsis enrolled. Researchers found no significant difference in survival rate between the standardized protocols and the patients who received care under an individual doctor’s discretion. They concluded that with early detection and vigilant care, care driven by doctors’ decisions is as effective as a pre-prescribed sepsis treatment. After 60 days, 21 percent of the EGDT group had died in the hospital, compared with 18.2 percent of the PSC group and 18.9 percent of those receiving standard care. There remained little difference in mortality after 90 days or one year. Dr. Yealy said the recent study refined the thinking of the 2001 study. For all sepsis treatment, “early treatment and recognition is crucial,” he said. “Sepsis is easy to miss,” he said. “There is no one signal or test for sepsis,” unlike heart attacks or strokes. “Many organizations have endorsed structured guidelines for treatment that often call for invasive devices early in care,” said study investigator Derek Angus, department chair of critical care medicine at Pitt, in the news release about the study. “But with prompt recognition and treatment of the condition, we found that these approaches do not improve outcomes but do increase use of hospital resources.” One of the 31 hospitals was Allegheny General Hospital, which enrolled 16 patients between April, 2011, and June, 2013. Arvind Venkat, site principal investigator for the trial and director of research in the department of emergency medicine at Allegheny Health Network, said the treatment of sepsis “is a huge issue in emergency medicine.” “For us in emergency medicine, it makes a big difference,” Dr. Venkat said. “You want to do well by all patients. Knowing what are necessary things to do, and know what’s extraneous matters to how efficiently and well we can treat patients.” Though much has changed since the 2001 study, for Dr. Yealy, a mortality rate around 20 percent is still too high. “It’s a deadly disease,” he said. “But it’s a dramatic improvement over a decade ago. That’s the silver lining.” The Block News Alliance consists of The Blade and the Pittsburgh Post-Gazette. Lauren Lindstrom is a reporter for the Post-Gazette. Contact Lauren Lindstrom at: [email protected] or 412-263-1964.
<urn:uuid:ef0b34f6-8028-445c-abc5-47604dcb94c5>
CC-MAIN-2015-11
http://www.toledoblade.com/news/2014/03/18/Study-Sepsis-treatments-equally-effective.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945158
1,117
2.8125
3
Battling Malnutrition in Vulnerable Age Groups Despite modern-day advances in medicine and consumer education, two age groups continue to be susceptible to a condition not often thought of as a problem in the United States—malnutrition. For older adults, malnutrition is often a function of “If anything, malnutrition is more widespread than it was in the past when families lived together and people weren’t living as long as they are now,’’ says Richard Gottlieb, president and CEO of Senior Services Inc. of Forsyth County for more than 30 years. “I think nutrition really can affect peoples’ well-being and be a factor in so many health issues. Proper nutrition is one of the keys to aging well.’’ Malnutrition in children and adolescents occurs for different reasons than older adults, but those causes often are just as much a sign of modern times. “If kids are eating on the go, not paying attention to whether they’re hungry or full, eating in front of the TV, it’s a problem,’’ says Holly Van Poots, RD, a pediatric nutritionist with Wake Forest Baptist Health. “And food insecurity, which is not having access to enough healthy foods, or to nutritionally adequate foods, can lead to hunger and may be present in the undernourished population.’’ Why Nutrients are Critical Malnutrition is a lack of proper nutrients in a person’s diet that contributes to health issues. Although it is frequently thought of in the sense of undernourishment, those who work with seniors and adolescents say it applies to overeating as well, because the lack of proper nutrients based on overeating or eating poorly can cause health issues such as obesity and type 2 Mary Christiaanse, MD, a developmental pediatrician with Wake Forest Baptist Health, started the Kids Eat program based at Amos Cottage in Winston-Salem 15 years ago. The program is geared to address eating difficulties children have up to age 18. The work covers physical issues such as swallowing disorders, neurodevelopment and motor skills issues, and behavioral problems. Christiaanse says the lack of proper nutrition in children and adolescents can result in health problems that last a lifetime. For example, iron deficiency at a young age can result in lower learning ability. Van Poots works with children in different units at Wake Forest Baptist Medical Center to ensure they are getting proper nutrition while hospitalized or during treatment for long-term illnesses. She says when children don’t get the right nutrition, it can worsen medical problems or increase their length of hospital stays. For older adults, the physical changes associated with aging can affect eating, as can chronic conditions and dementia. “As you get older, you need fewer calories to maintain your weight and health, but at the same time, you need at least as many nutrients if not more,’’ says Denise Houston, PhD, RD, a nutritional epidemiologist with Wake Forest Baptist Health who specializes in nutrition, chronic disease and physical function in older adults. “But changes with age affect nutritional status. You lose some of your sense of taste and smell, so food no longer tastes as good. Poor oral health or dentures can make it difficult to chew,’’ she says. Many older adults avoid meats and raw fruits and vegetables, which contain essential protein and nutrients, because of chewing difficulties. Others have arthritis, which limits their ability to open jars or cans. Depression, another major problem for older adults, impacts the desire to eat, too, Houston says. “We do know that people in poor nutritional states have longer hospital stays, which can exacerbate their chronic conditions such as diabetes or heart disease, and face more health complications.’’ Educating on Eating Senior Services offers one of the oldest Meals-on-Wheels programs in the nation, as well as two other food programs, which cumulatively provide more than 1,000 older adults throughout Forsyth County with regular Kathy Long, vice president of adult day services for Senior Services, says educating families about their older relatives is a critical part of her organization’s work. “We try to make sure that families know how important it is that their older relatives are eating a well-balanced diet,’’ she says. In addition, relatives must understand the importance of their loved ones drinking water and getting proteins from snacks such as nuts, yogurt, cheese or peanut butter, or correct meal portions of chicken or fish. Linda Kearsley, vice president of nutrition services for Senior Services, says older adults can pose unique challenges because of their “We have some men that we serve who just don’t know how to cook. When they lost their wives, they had no idea what to do,’’ she says. There also are generational issues to deal with. “A lot of these folks grew up in a different lifestyle of cooking,’’ Kearsley says. “They cooked with fat and they cooked with salt and they weren’t as nutritious as they should have been.’’ For children and adolescents, modern-day marketing, combined with the hectic lifestyles of many parents, can make meals tough from a “What I have noticed is a tremendous amount of marketing misinformation, misleading information for products that don’t even need to be on the shelves,’’ says Christiaanse, the developmental pediatrician. Indeed, with healthy foods costing more than junk food (a single apple typically costs more than a bag of potato chips) and the temptations of an ever-expanding array of fast foods and prepared foods, parents often struggle to provide a balanced diet for their children. “People have really busy lives and I think just being aware, trying to promote intuitive eating is important for everyone to do,’’ Van Poots says. “But it’s hard to do in this day and age. Leading busy lives is not necessarily conducive to sitting down and eating three healthy meals a day.’’
<urn:uuid:248ba6a4-3a2f-4c0c-93bb-990bae5d01c1>
CC-MAIN-2015-11
http://www.wakehealth.edu/Gerontology-and-Geriatrics/Battling-Malnutrition-in-Vulnerable-Age-Groups.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.951817
1,367
3.078125
3
Stances of Faiths on LGBT Issues: Church of Jesus Christ of Latter-day Saints (Mormons) The Church of Jesus Christ of Latter-day Saints (Mormons) is now the fourth largest Christian denomination in the United States and counts over 13 million members worldwide. As the gay rights movement began in the 1950s, the church became fiercely antagonistic toward gay and lesbian people. In the past, gays and lesbians were excommunicated from the church as soon as their orientation was discovered. Being gay was considered by church leaders to be a sinful choice, one that required repentance and could be overcome with different types of reparative therapy. If such treatment failed, gay people would lose their membership in the church. The church also has been a leading, and vocal, opponent of marriage equality for same-sex couples. A central tenet of Mormon theology is that marriages performed in one of the more than 120 temples in the world bind couples together not only for the rest of their lives, but also in the infinite afterlife. Such traditional families, if their members obey church principles, will live together eternally. Mormon leaders stated in a 1995 "Proclamation to the World" that God has defined the family as a man and a woman married with intent to raise children, and that those who strayed from this would "bring upon individuals, communities and nations the calamities foretold by ancient and modern prophets." This belief makes homosexuality incompatible with a central doctrine of the faith. As the church has rapidly grown in Africa, Latin America, and other developing parts of the world, non-traditional families are challenging the assumed supremacy of the traditional family in the church. Further, the church has begun to realize that their stridently anti-gay stance is severely splitting many families, the basic societal units the church works so hard to maintain. As a result, the church began to soften its rhetoric and treatment of its LGBT members in recent years. Church publications often counsel members to accept LGBT family members and friends with love and compassion and have repeatedly told parents to refrain from rejecting their children just for being gay or lesbian. At the same time the church consistently tells parents not to condone behavior that is not in harmony with church teachings. At the same time, however, the church has solidified its stand against same-sex marriage, reinforcing its view that full salvation cannot come to those who are not married to opposite-sex spouses. Bisexual and Transgender Mormons The Mormon church views bisexual members the same as gays and lesbians. As long as they do not act on their same-sex attraction, they can participate in church activities. An important difference is that bisexual people married to opposite-sex partners can participate in all church activities without any restrictions, as some rites and sacraments are reserved for married couples. The church has not publically confronted the issue of transgender Mormons. However, a transgender Mormon who has sex reassignment surgery will almost certainly be subject to ecclesiastical discipline. Because the Mormon church at present rarely speaks about bisexual and transgender people, this piece focuses specifically on gay and lesbian issues. Not an Orientation but a Behavior Mormon leaders do not speak of a gay or lesbian sexual orientation, though they now fully acknowledge that many people "struggle with same-gender attraction." In a lengthy 2006 interview on the subject, one leading church authority compared the plight of gay and lesbian people to that of his mentally handicapped daughter, who would never be married but needed to make the best of her lot and be content to receive her reward in Heaven for her righteousness here on Earth. The church draws a distinction between attractions or feelings and sexual activity. While acknowledging the existence of inclinations and temptations—and admitting they do not know the origins of such leanings—leaders expect of gays and lesbians the same celibacy they require of unmarried heterosexuals. Gay and lesbians can participate fully in church activities as long as they abide by the rule of celibacy, with some restrictions. For example, while a heterosexual adult would be expected to date, gays and lesbians would be viewed with suspicion for similar activities. Leaders counsel gay and lesbian members to avoid associations with LGBT groups and individuals, lest they succumb to the temptation of sexual activity. Church leaders have expressed the belief that a few people who are unhappy with their same-sex attraction may be able to change their inclinations if they are strongly determined to do so. However, church leaders concede change isn’t possible for everyone and no longer counsel straight marriage as a solution or a "cure." Although not satisfactory this is a marked shift in attitude from the past. The church considers Mormons who act on feelings of same-sex attraction to have disobeyed church teachings on morality and thus are subject to ecclesiastical discipline. They may be (1) placed on probation (for those desiring to change their behavior), (2) "disfellowshipped" (excluded from participating in the sacraments for a finite period of time while they correct their behavior), or (3) excommunicated. Members who face a disciplinary council and refuse to repent—or insist that their feelings are integral to who they are—almost always are excommunicated. They lose their membership and cannot participate in any way other than attend meetings. They also lose the eternal ties that bind them to their families and their church. However, church discipline is administered by local congregations, so the treatment of gays and lesbians may vary by geography and congregation. Because Mormons don’t shop around for the church that fits them best, but attend the church that is closest too them, geographical difference is particularly significant. Treatment of gay and lesbian people by local leaders has moderated in recent years. The church cautions local leaders not to embark on any witch hunts and to leave alone gays and lesbians who do not hold high church positions and who are quiet about their sexuality. This policy, however, hasn’t always been followed in practice and even when it is amounts to "don’t ask, don’t tell." Gay and lesbian people who have been in leadership positions, and are public about their same-sex relationships or are openly critical of church leadership are apt to face church discipline. The Mormon church opposes marriage rights for same-sex couples and has actively worked to stop it in the past. In 1998, for example, then-church President Gordon B. Hinckley issued a statement, saying: "We cannot stand idle if [gays and lesbians] indulge in immoral activity, if they try to uphold and defend and live in a so-called same-sex marriage situation. To permit such would be to make light of the very serious and sacred foundation of God-sanctioned marriage and its very purpose, the rearing of families." In that same year, the church contributed $500,000 to the Alaska Family Coalition and $600,000 to Save Traditional Marriage in Hawaii. In 2000, the church joined forces with other conservative groups to support a campaign to constitutionally ban marriage for same-sex couples in Nevada and supported a fight against marriage equality in California. The church expressed support of the Federal Marriage Amendment, which would have written discrimination against same-sex couples into the U.S. Constitution. Support of such ballot measures brought wide-spread criticism both from outside and inside the church. The Mormon church maintains neutrality in partisan politics and has never endorsed a candidate or a political party. So, when the same-sex marriage debate began to polarize political parties, the church stepped into the background. Since 2000 the church has mostly ceased direct funding of such ballot measure efforts and although strong opposition to same-sex marriage remains, church rhetoric has toned down considerably. After the January 2008 death of President Gordon B. Hinckley, the mantle of leadership fell to Thomas S. Monson. In the past he has not spoken specifically about LGBT issues, but his views became clear within a few months. In late June of 2008 the church’s First Presidency, which Monson leads, sent a letter to all congregations in California asking members to give their time and resources to a coalition of organizations supporting Proposition 8, the November 2008 ballot initiative aimed at altering the California State Constitution in such as way as to define marriage as a legal act between two members of the opposite sex. Since then, local Mormon leaders have called in many of their members and given them specific assignments to canvass their neighborhoods for the proposition and have asked for monetary pledges to support the effort. On August 13, 2008, the church released a more lengthy rationale, explaining in depth their position. As a reaction, there were a number of public resignations from the church and many Mormons spoke out against the church becoming involved in a political matter. Undeterred, the church considers it a moral matter, not a political one, and continued its campaign. Mormons for Marriage, a group of (mostly) heterosexual people who banded together to oppose California’s Proposition 8. Resources for LGBT Mormons - Affirmation: Gay and Lesbian Mormons works to attain equal rights for LGBT people within the Mormon church and to support those struggling with their sexual orientation. - The Family Fellowship is a service and support group for Mormons with gay and lesbian family members. It holds that “gay and lesbian Mormons can be great blessings in the lives of their families, and that families can be great blessings in the lives of their gay and lesbian members.” The Church of Jesus Christ of Latter-day Saints website. If you would like to communicate with the headquarters of the Church of Jesus Christ of Latter-day Saints, here is their mailing address: The Church of Jesus Christ of Latter-day Saints 50 East North Temple Salt Lake City, UT 84150
<urn:uuid:871bd38b-091c-4c66-9b2b-132babb5df58>
CC-MAIN-2015-11
http://www.hrc.org/resources/entry/stances-of-faiths-on-lgbt-issues-church-of-jesus-christ-of-latter-day-saint
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00098-ip-10-28-5-156.ec2.internal.warc.gz
en
0.974755
1,992
3.09375
3
- The South Atlantic Anomaly is a worrisome dip in the donut-shaped Van Allen Radiation Belts off the coast of South America. It is caused by a more-or-less permanent mismatch between the spin axis of the earth and its magnetic dipole. An 11-degree angle exists between the two axes and, in addition, there is a 300 mile distance between the geometric center of the earth and the center of its magnetic dipole. These relatively small mismatches result in a localized magnetic field strength that is only about half as strong as the worldwide average value of 0.5 Gauss. The energetic protons in the lower Van Allen Radiation Belt are trapped in the earth’s magnetic field, and, as a result, they are pulled down toward the earth’s surface in the South Atlantic Anomaly. When low-altitude satellites fly through the South Atlantic Anomaly, they experience dramatically increased levels of radiation. Astronauts, computer chips, and solid-state sensors must be protected from the extra radiation found in the South Atlantic Anomaly. Mission planners avoid “space walks” over that part of the world, the Hubble Space Telescope is temporarily shut down, and laptop computers carried onboard the space shuttle and in the International Space Station sometimes malfunction. In addition, some of the Globalstar mobile communication satellites are believed to have died earlier than predicted because of the extra radiation they experienced while gliding through the South Atlantic Anomaly. Strategies designed to cope with this region of enhanced radiation include extra hardening of the onboard electronics, the use of self-annealing gallium-arsenide circuit chips, careful mission planning to avoid the worst radiation-enhanced portions of space, and careful positioning of delicate components inside the spacecraft among other heavy and dense components. 2. As you suspected, the South Atlantic Anomaly does move, expand, and change in intensity over relatively long periods of time. Generally, it is expanding and moving predominantly in the southwestern direction. Its field strength is also gradually weakening (which results in stronger doses of radiation for low-altitude satellites coasting though that region of space). The Van Allen Radiation Belts, which are composed primarily of highly energetic protons, electrons and positive ions, are trapped in the earth’s magnetic field. They are shaped like gigantic donuts in space. These enormous belts were first discovered in 1958 by the American physicist, Dr. James Van Allen, a professor at Iowa State University, shortly after the Explorer 1 spacecraft was lofted into space. The lower Van Allen Radiation Belt reaches its peak intensity at an altitude of about 1800 miles above the earth. It consists primarily of protons and positive ions spiraling in long, lazy loops around the earth’s magnetic lines of flux. A sphere two feet in diameter positioned at the center of the lower Van Allen Radiation Belt would be penetrated by 20 million of these energetic protons every second of its mission. The upper Van Allen Radiation Belt reaches its peak intensity at about 10,000 miles above the earth. It consists primarily of electrons at substantially lower energy levels. Most of the time when the various charged particles hurtling around the magnetic flux lines reach their northernmost or southernmost latitudes, an abrupt mirror-image reflection hurls them back into the opposite direction. But near each pole a small number of them escape, plunge to lower altitudes, and impact the hydrogen, oxygen, and argon atoms in the Earth’s atmosphere. These collisions create the Northern and Southern Lights. Each type of atom is associated with its own characteristic colors. The GPS satellites are, unfortunately, positioned at an altitude of 12,500 miles near the peak intensity of the upper Van Allen Radiation Belt. The intense radiation found there damages their silicon solar cells. Consequently, over its 7.5-year design lifetime, a typical GPS satellite loses about 25 percent of its electrical generating capacity. Near the peak of the sun’s 11-year sunspot cycle, the belts are pumped up by the larger number of charged particles in the solar wind. Consequently, the GPs satellites’ power levels decline even more rapidly due to these enhanced levels of radiation. A solid metallic sphere 750 miles in radius lies at the center of the earth. Surrounding it is a liquid metal shell that swirls around due to the Earth’s rotational motion. This moving dynamo creates the earth’s rather complicated and variable magnetic field. About 90 percent of the earth’s magnetic field comes from its simple dipole that behaves like a bar magnet with a positive pole at one end and a negative pole at the other. The remaining 10 percent comes from the earth’s various other non-dipole components (monopoles, quadrupoles, etc.). Over the past 150 years, (during which scientific measurements have been available), the dominating dipole component has decreased in magnetic field strength by about 6 percent. This weaker dipole, in turn, causes a systematic increase in the size of the South Atlantic Anomaly as experienced by low-altitude satellites. During each decade, on average, the center of the South Atlantic Anomaly moves predominantly in the southwestern direction at an average rate of 0.8 degrees of longitude. This is equivalent to a movement of 48 statute miles per decade. Over much larger intervals, the earth’s magnetic field reverses polarity, rather abruptly, at unpredictable and irregular intervals: the North Magnetic Pole becomes the South Pole and vice versa. On the average, these reversals are 300,000 to 1,000,000 years apart. Unequivocal evidence highlighting these dipole reversals is provided by the large magnetized strips frozen into basalt layers lining the sea floor on opposite sides of the slowly spreading mid-Atlantic ridge. 3. According to my sources, the best and most readily available information on the status, shape, and location of the South Atlantic Anomaly and related matters, comes from NASA’s Community Coordinated Modeling Center (CCMC). The World Wide Web address of the center – which is maintained by NASA Goddard in Greenbelt, Maryland is: The letters “gsfc” in this address stand for the Goddard Space Flight Center. I have taught short courses at the Goddard Space Flight Center for many years, but I do not know anyone who works at their modeling center. Goddard’s headcount totals about 3000. If your organization plans to launch, operate or use satellites in space there are six different sources of radiation you may have to plan for and worry about: 1. The various layers of the ionosphere 2. The auroras (Northern and Southern Lights) 3. The two major Van Allen Radiation Belts 4. Periodic and intense solar proton events 5. Cosmic rays originating in deep space 6. Solar wind Fortunately, I often include material on these radiation sources in my “Orbital Mechanics” short courses, especially in the longer 5-day versions. Discussions of the South Atlantic Anomaly are included in the portion that deals with the Van Allen Radiation Belts, including practical mitigation strategies that can help mission planner alleviate their worse detrimental effects.
<urn:uuid:8124b27c-d7db-4f78-b622-9d73598ab4e9>
CC-MAIN-2015-11
http://www.aticourses.com/blog/index.php/2010/11/15/dealing-with-the-south-atlantic-anomaly/comment-page-1/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463460.96/warc/CC-MAIN-20150226074103-00185-ip-10-28-5-156.ec2.internal.warc.gz
en
0.925489
1,477
3.859375
4
For most of the world, his name is synonymous with courage and perseverance. Leaders and citizens, athletes and artists remembered Nelson Mandela on Friday - though many struggled to find words big enough to describe the man who changed the face of South Africa and inspired a continent and a world: a colossus, a father figure, a giant baobab tree providing shade for an entire nation. Images: Mandela through the years | Visit to Boston Flags were lowered to half-staff in many countries, a portrait of Mandela adorned the outside of France's Foreign Ministry, mourners left flowers at a statue in London, and children in South Africa ran through the streets carrying his image. African leaders gathering in Paris for a summit about bringing peace and security to the troubled continent opened their conference with a moment of silence. While Mandela inspired and challenged people everywhere to stand up for others, he had a special legacy for Africa. But his message there was often also an uncomfortable one for leaders who clung to power and amassed riches while their populations suffered. In Gambia, for instance, intellectuals and public servants quietly wondered if the death of the South African icon would serve as a wakeup call to President Yahya Jammeh, who has ruled his West African nation with an iron fist, accused of imprisoning, torturing and killing his opponents, including journalists. Jammeh has yet to comment on Mandela's death. A GUIDING LIGHT FOR AFRICA "God was so good to us in South Africa by giving us Nelson Mandela to be our president at a crucial moment in our history," Archbishop Desmond Tutu said. "He inspired us to walk the path of forgiveness and reconciliation, and so South Africa did not go up in flames." Former U.N. Secretary General Kofi Annan said the world had lost "a visionary leader, a courageous voice for justice and a clear moral compass." Both Annan and Tutu were part of Mandela's group of African statesman known as The Elders. "He is comparable to a great baobab, this invincible tree under which everyone shelters. And when this baobab falls, we find ourselves exposed," said Guinea President Alpha Conde. AN INSPIRATION TO THE WORLD "He no longer belongs to us. He belongs to the ages," said President Barack Obama, who shares with Mandela the distinction of being his nation's first black president. Prime Minister Manmohan Singh of India compared Mandela to his country's own icon for the struggle for freedom, independence leader Mohandas K. Gandhi. "A giant among men has passed away. This is as much India's loss as South Africa's. He was a true Gandhian. His life and work will remain a source of eternal inspiration for generations to come." In Haiti, a Caribbean nation that became the world's first black republic in 1804 through a successful slave revolt, Mandela symbolized the struggle for black equality. "Mandela is not only the father of democracy in South Africa, but is also a symbol of democracy," said Haitian President Michel Martelly. "And like any symbol, he is not dead. He is present in all of us and guides us by his lifestyle, his courage and faith in the true struggle for equality." At the Muhammad Ali Center in Louisville, Ky., on display is a photograph of the U.S. boxing great with Mandela, their hands clenched into fists as if they're boxing. "He made us realize we are our brother's keeper and that our brothers come in all colors," Ali said. "He was a man whose heart, soul and spirit could not be contained or restrained by racial and economic injustices, metal bars or the burden of hate and revenge." Former Soviet leader Mikhail Gorbachev, whose efforts to open up his country helped lead to the end of the Cold War, said Mandela "told me several times that our perestroika in the USSR had helped his country a lot to get rid of apartheid." "He did a lot for humankind, and memory of him will live not only in his country, but across the world," Gorbachev said in comments carried by the Interfax news agency. "When he could leave prison after 27 years of suffering, that coincided with the fall of communism in our part of the world, thus Mandela became a moral compass, a source of inspiration not only in South Africa but in our region, too," Hungarian President Janos Ader said in a letter addressed to his South African counterpart, Jacob Zuma. The Norwegian Nobel Committee, which awarded the 1993 peace prize to Mandela and F.W. de Klerk, called Mandela "one of the greatest names in the long history of the Nobel Peace Prize." "His work presents a message also today to all those who bear responsibility for apparently unresolvable conflicts: Even the most bitter of conflicts can be solved by peaceful means," the committee said. Myanmar pro-democracy leader and fellow Nobel Peace Prize laureate Aung San Suu Kyi hailed a "great human being who raised the standard of humanity. ... He also made us understand that we can change the world." President Xi Jinping of China, which supported apartheid's opponents throughout the Cold War, praised Mandela's victory in the anti-apartheid struggle and his contribution to "the cause of human progress." For Chinese rights activists, Mandela's death served as a reminder that one of their own symbols of freedom, Nobel Peace Prize laureate Liu Xiaobo, remains imprisoned by Chinese authorities. "This moment magnifies how evil the current regime is," Beijing activist Hu Jia said. " As we remember his triumphs, let us, in his memory, not just reflect on how far we've come, but on how far we have to go," said the U.S. actor Morgan Freeman, who portrayed Mandela in the 2009 film "Invictus." "His actions helped save millions of lives and transformed health in Africa," UNAIDS Executive Director Michel Sidibe said in a statement. "He broke the conspiracy of silence and gave hope that all people should live with dignity." In New York City's Harlem neighborhood, artist Franco Gaskin, 85, stood before a mural featuring Mandela he had painted on a storefront gate almost 20 years ago. He remembered a Mandela visit there in 1990. "It was dynamic. Everyone was so electrified to see him in Harlem," Gaskin said. "I idolized him so much. He leaves a legacy that all of us should follow." "I'm stunned, crushed, in mourning with you and his family. I feel only honored to have portrayed him," British actor Idris Elba, whose portrayal of Mandela is in theaters now, posted on Twitter. "He's in a better place now. RIP NM." Foreign Minister Radek Sikorski of Poland called Mandela a "Titan of the 20th century." "All people who fought for freedom in the 20th century, including the Poles, understand what this great man meant to Africa and for the whole world," he said. Queen guitarist Brian May, a founding ambassador of Mandela's 46664 charity, which assisted those infected or affected by HIV/AIDS, remembers spending time with him at a game park retreat while organizing a benefit concert in the South African city of Cape Town. "They were life-changing days, with quiet time and talks around a camp fire at night, which we will remember 'til we die. Mandela was the most inspiring man of his generation. His message, by example, was the power of forgiveness." Britain's Prince Charles also paid tribute to Mandela's sense of humor. "Mr. Mandela was the embodiment of courage and reconciliation. He was also a man of great humor and had a real zest for life." AN UNCOMFORTABLE LEGACY Robert Mugabe, whose wasted Zimbabwe is often held up as the counterpoint to Mandela's multiracial, prosperous South Africa, has yet to comment on Mandela's death. Mugabe recently criticized Mandela for being too conciliatory to whites. "Africa should continue to produce more Mandelas who think more about the people than personal power; for whom the people's welfare is more important than the selfish pursuit of personal power and glory," said Zimbabwean opposition leader Morgan Tsvangirai.
<urn:uuid:c92ced16-4e06-4b56-a5f3-5c6b2b53647b>
CC-MAIN-2015-11
http://www.wcvb.com/news/local/metro/mandelas-legacy-unity-love-respect/23349620
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00143-ip-10-28-5-156.ec2.internal.warc.gz
en
0.97217
1,716
2.828125
3
|Column Tag:||STRUCTURED PRogramming in Modula-2 Draw the Towers of Hanoi By John Bogan This month we will explore three items. First, we will continue to introduce the elements of Software Engineering in a historical perspective. Second, we will discuss why Modula-2 is not a hackers language and finally, we will look at a sample program that uses the Mac ROM to draw the starting position for the Towers of Hanoi. A New Direction Last month we saw that Software Engineering is capable of being abused as well as being able to provide important insights into the process of building good computer software. By the late 1960s the Software Engineers had, in effect, dictated that COBOL would be the primary language of the FORTUNE 1000 probably until the end of the century. Most microcomputer programmers faced with the prospect of coding in COBOL would shudder in terror at the thought. In 1968 Software Engineering took a turn for the better when a famous and well regarded European computer scientist lit a fire under the COBOL and FORTRAN programming community, a fire whose embers still smolder and flare up to this day. The scientist was E.W. Dijkstra and the arson was committed in the Communications of the ACM with a letter entitled GOTO Statement Considered Harmful. In this letter Dijkstra observed that after having read a multitude of programs in a variety of languages that the quality of a program was inversely proportional to the number of GOTO statements in that program. The graph below illustrates this discovery. The idea is simple ... jumping around a program with branching statements leads to unreadable program texts (known in the trade as spaghetti code) which are next to impossible to debug or for a third party to pick up and read. Since ALGOL-60 (the Europeans favorite language) has advanced control structures which permits GOTOless programming and FORTRAN doesnt, the battle lines were drawn. Letter after letter poured into the journals feeding the flames. Finally in 1972 in an effort to quell the controversy Dijkstra together with Dahl and Hoare published a book on just how to write high quality programs without using the dangerous GOTO statement. This book, Structured Programming, estab- lished once and for all that GOTOs are redundant. Every sequential program- ming task can be accomplished with a combination of three constructs. BEGIN ... s1 ... s2 ... s3 ... END WHILE c1 DO ... s1 ... ENDWHILE IF c1 THEN s1 ENDIF If acceptance in the curriculum of the worlds Universities Computer Science Departments is a valid measure then Structured Programming is an overwhelming success. Only those programmers corrupted by traditional BASIC or Assembler still grasp at the past and argue the merits of the GOTO. Meanwhile the course of Software Engineering was changed forever. An example of this change is Modula-2. This language is rich in structured control statements and does not support the GOTO at all. There are no statement labels in Modula-2 and while it is possible to write poor code in Modula it is impossible to write spaghetti code. The structured control statements supported by Modula are the statement sequence, the WHILE ... DO, the REPEAT ... UNTIL, the FOR ... TO ... BY ... DO, the LOOP ... EXIT, the IF ... THEN ... ELSIF, the CASE ... OF and the WITH ... DO statements. What is Structured? In some ways this is a very difficult question to answer. For adherents of the Structured Techniques the concept of Structured is very much like the Bible is to Jerry Falwell. It is the guiding light, the one true path to paradise, the blessed and final word on how to think about solving complex logical problems. A slightly more dispassionate view might produce the following definition of structured - a philosophy for solving problems which attempts to conserve scarce resources by arriving at the perfect solution in the fewest attempts by following a plan. Why Plan When You Can Hack? The idea of a plan is very important in understanding the Structured Techniques, Software Engineering and Modula-2. It also illustrates why Modula-2 is not particularly well suited for hacking. Most hackers I have known use the technique of incremental discovery or trial by error. In other words programs just grow from line 1 until the last bell and whistle is debugged. Assembly language and to a lesser extent C are well suited for this type of programming. Modula-2 most definitely is not. As we will see in future columns the quaility of a Modula-2 program is dependent on the quality of the detailed planning that occurs before the first line of code is written. In many ways this dependence on upfront planning is a distinct disadvantage for learning a new and unique system like the Mac. So many of the techniques peculiar to the Mac (such as the entire user interface or resources or Quickdraw) are best approached and mastered by trial and error hacks. When you combine this reality with the compile-link-execute overhead of Modula-2 it should be obvious why Modula-2 is not particularly suited to casual hacking. A good strategy for making the best use of Modula-2 would be to learn the Mac with Apples interpreted Pascal and then to translate these programs into the much faster Modula-2. As we progress in these columns we will see just how close Modula and Pascal are to each other so this suggestion wont seem so painful. The bottom line is that Modula-2 is not a language for the seat-of-the-pants hacker. This Months Code The piece of Modula-2 code that follows is primarily useful because it shows how to access the Mac ROM on a 128K machine. The Quickdraw calls used are SetRect, PaintRect and PaintRoundRect. You should be aware that the method of specifying ROM calls is different for a 512K box. Also it should be noted that the data types VHSelect, Point and Rect could have been imported blindly instead of spelled out but then their internal structures would have been hidden and the topic of information hiding in Modula-2 is an advanced and complex issue. (* build starting position for Hanoi Towers *) FROM Terminal IMPORT ClearScreen; FROM InOut IMPORT WriteString, ReadCard, WriteLn; (* data structures for Quickdraw calls *) VHSelect = (v,h); Point = RECORD CASE INTEGER OF 0: v: INTEGER; |1: vh: ARRAY VHSelect OF INTEGER; END; (* CASE *) END; (* RECORD *) Rect = RECORD CASE INTEGER OF 0: top: INTEGER; |1: topLeft: Point; END; (* CASE *) END; (* RECORD *) CX = 355B; QuickDraw1ModNum = 2; (* absolute module number of QuickDraw1 *) r: Rect; NumDisks: CARDINAL; PROCEDURE SetRect (VAR r: Rect; left,top,right,bottom: INTEGER); CODE CX; QuickDraw1ModNum; 51 END SetRect; PROCEDURE PaintRect (r: Rect); CODE CX; QuickDraw1ModNum; 62 END PaintRect; PROCEDURE PaintRoundRect(r: Rect; ovWd, ovHt: INTEGER); CODE CX; QuickDraw1ModNum; 67 END PaintRoundRect; BaseLeft = 36; BaseTop = 261; BaseRight = 476; BaseBottom = 270; PostTop = 144; PostBottom = 261; PostWidth = 6; HalfPostWidth = PostWidth DIV 2; PostPosition = 128; n, PostLeft, PostRight: INTEGER; WHILE n <= 3 DO PostLeft := (PostPosition * n) - HalfPostWidth; PostRight := PostLeft + PostWidth; n:= n + 1; END; (* WHILE *) PROCEDURE DrawVarDisks(numberofdisks: CARDINAL); bigdiskleft = 128 - 60; bigdisktop = 261 - 12; bigdiskright = 128 + 60; bigdiskbottom = 261; deltalength = 5; deltadepth = 12; VAR leftedge, topedge, rightedge, bottomedge: INTEGER; IF (numberofdisks > 2) AND (numberofdisks < 10) leftedge := bigdiskleft; topedge := bigdisktop; rightedge := bigdiskright; bottomedge := bigdiskbottom; FOR i := 1 TO numberofdisks - 1 DO leftedge := leftedge + deltalength; topedge := topedge - deltadepth; rightedge := rightedge - deltalength; bottomedge := bottomedge - deltadepth; END; (* FOR *) END; (* IF *) PROCEDURE GetInput(VAR NDisks: CARDINAL); WriteString(Enter number of disks (between 3 to 9)); WriteString(To quit - enter number out of range); PROCEDURE InitGraphics(NumberofDisks: CARDINAL); VAR Delay: CARDINAL; FOR Delay := 1 TO 30000 DO END; (* FOR *) WHILE (NumDisks >= 3) AND (NumDisks <= 9) DO END; (* WHILE *)
<urn:uuid:7999d7e7-0384-419d-b8dd-7d6ccd2cb384>
CC-MAIN-2015-11
http://www.mactech.com/articles/mactech/Vol.01/01.07/DrawTowers/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00289-ip-10-28-5-156.ec2.internal.warc.gz
en
0.840463
2,020
2.71875
3
(Last Updated on : 20/10/2014) Krishna has ever been the perfect 'Avatar' of Lord Vishnu whose influence on human lives far exceeds that of any other God incarnate. Krishna is also depicted as Govinda, who is the principal cause of all causes, the embodiment of wisdom and selfless action as well as a human liberal and practical philosopher with foresight. Krishna is a Sanskrit term whose literal meaning is black or dark and describes someone with a very dark skin. The Gaudiya tradition explains the primary meaning of the name Krishna is "all-attractive. The meaning of the name is justified by an interpretation of a verse in the Mahabharata and is given in the Chaitanya Charitamrita. According to Adi Sankara's, Krishna is the 57th name of Vishnu and means the "Existence of knowledge and Bliss." Three great works in Hinduism enumerate Krishna's Teachings, namely the Bhagavad Gita, Anugita and Udhavagita. Bhagwad Gita is the sacred Book depicting 'Mahabharata' for Hindus. The advice Lord Krishna renders to discouraged Arjuna , immortalized the Bhagavad Gita, influenced philosophers and continues to inspire millions of people worldwide. Srimad Bhagavad Gita is the narrations about the relationship between the Supreme Lord and his devotees. In this narration, transcendental nature of the Supreme Lord and his devotees is fully described. Krishna always played the role of a defender of the oppressed. He killed Kansa to unshackle his victims from cruelty. He befriended the poor; the character of Sudama is a legendary character whose berries he ate. He came to rescue of Draupadi . Lord Krishna is also seen as a playmate to cowherds at Vrindavan, a loving and giving soul. Krishna defined dharma (religion) as something that brought about the good of the individual and society. Krishna's conversations with Arjun are on transmigration of soul and aims at attaining liberation, descriptions of Karma and effects of austerity. Devotion, meditation and other religious disciplines reflect in Bhagavad Gita . Krishna also touches upon the psychic powers of yogic practices. The love of Gopis is divine which says of the greatness and divinity of Lord Krishna. He is said to create an air of romanticism, enchanted the Gopis and impressed them with the tune of his 'bansuri'. Krishna responded by dancing with Gopis in Ras Leela. The mystical passage of Krishna's life with Gopis and love for Radha is the most marvelous expansion of love expressed in that beautiful play at Vrindavana, which no one can understand yet, become perfectly chaste and pure. The Harivamsa of Mahabharata is an appendix to this epic and contains the earliest detailed version, starting from birth of Lord Krishna and leading to his childhood and youth. The scenes from the narrative are set in north India, mostly in the present states of Uttar Pradesh . The events in the childhood of Lord Krishna like Kaliya Daman , Mountain lifting by Lord Krishna and others are considered to be sacred by the Hindus. Lord Krishna's birthday is celebrated as Janmasthami , which is based on scriptural details and astrological calculations. Krishna took birth in the royal family of Mathura and was the eighth son born to princess Devaki and her husband Vasudeva. King Kamsa, Devaki's brother, had ascended the throne by imprisoning his father, King Ugrasena. Afraid of a prophecy that predicted his death at the hands of Devaki's eighth son, he had the couple cast into prison where he planned to kill all of Devaki's children at birth. After killing the first six children, and Devaki's apparent miscarriage of the seventh, Krishna took birth. As his life was in danger he was given to his foster parents Yasoda and Nanda in Gokul, Mahavana. Two of his siblings also survived, Balarama (Devaki's seventh child, transferred to the womb of Rohini, Vasudeva's first wife) and Subhadra (daughter of Vasudeva and Rohini born much later than Balarama and Krishna). The stories of Lord Krishna's plays with the gopis in his growing days were romanticised in the poetry of Jayadeva, author of the Gita Govinda. Krishna as a young man returned to Mathura, killed his uncle Kamsa, and made Ugrasena as the king of the Yadavas. In the meanwhile, he became a friend of Arjuna and the other Pandava princes of the Kuru kingdom; living on the other side of the Yamuna .He married Rukmini, daughter of King Bhishmaka of Vidarbha. In Vaishnava traditions, Krishna's wives in Dwarka are believed to be expanded forms of the Goddess Lakshmi. In the Mahabharata Krishna was the cousin of both the Pandavas and the Kauravas. He asked the sides to choose between his army and himself. The Kauravas picked the army and he stayed supporting the Pandavas. He agreed to be the charioteer for Arjuna in the great battle of Kurukshetra. The Bhagavad Gita is the advice given to Arjuna by Krishna before the start of the battle. In the Bhakti movement Krishna was the focus of attention and even with its end and is still an important and popular devotional and ecstatic aspects of Hindu religion, particularly among the Vaishnava sector. The Supreme Lord descends from time to time in this material world to re-establish the teachings of the Vedas. In His Bhagavad-Gita, Lord Krishna promises: "Whenever and wherever there is a decline in religious practice, O descendant of Bharata, and a predominant rise of irreligion--at that time I descend Myself. To deliver the pious and to annihilate the miscreants, as well as to reestablish the principles of religion, I myself appear millennium after millennium."
<urn:uuid:1e0f2b12-4c57-4515-b700-50c1767ef81c>
CC-MAIN-2015-11
http://www.indianetzone.com/2/lord_krishna.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00152-ip-10-28-5-156.ec2.internal.warc.gz
en
0.96594
1,301
2.53125
3
Dwight D. Eisenhower, 1953-61 President Dwight D. Eisenhower recognized the importance of intelligence from his days as Supreme Allied Commander in Europe during World War II. During the Eisenhower administration, technological advances enabled CIA to collect information previously unavailable. The U-2 reconnaissance aircraft and CORONA satellite reconnaissance programs both began under Eisenhower, permitting CIA to penetrate the Iron Curtain. CIA began construction of its present headquarters complex in Langley, Virginia, in 1959. In a November ceremony, the President along with his Director of Central Intelligence Allen Dulles laid the cornerstone of the current Original Headquarters Building. "AMERICA'S FUNDAMENTAL aspiration is the preservation of peace. To this end we seek to develop policies and arrangements to make the peace both permanent and just. This can be done only on the basis of comprehensive and appropriate information. "In war nothing is more important to a commander than the facts concerning the strength, dispositions, and intentions of his opponent, and the proper interpretation of those facts. In peacetime the necessary facts are of a different nature. They deal with conditions, resources, requirements, and attitudes prevailing in the world. They and their correct interpretation are essential to the development of policy to further our long-term national security and best interests. To provide information of this kind is the task of the organization of which you are a part. "No task could be more important. "Upon the quality of your work depends in large measure the success of our effort to further the nation's position in the international scene. "By its very nature the work of this agency demands of its members the highest order of dedication, ability, trustworthiness, and selflessness--to say nothing of the finest type of courage, whenever needed. Success cannot be advertised: failure cannot be explained. In the work of intelligence, heroes are undecorated and unsung, often even among their own fraternity. Their inspiration is rooted in patriotism--their reward can be little except the conviction that they are performing a unique and indispensable service for their country, and the knowledge that America needs and appreciates their efforts. I assure you this is indeed true. "The reputation of your organization for quality and excellence of performance, . . . is a proud one. "Because I deeply believe these things, I deem it a great privilege to participate in this ceremony of cornerstone laying for the national headquarters of the Central Intelligence Agency. On this spot will rise a beautiful and useful structure. May it long endure, to serve the cause of America and of peace." President Dwight D. Eisenhower, Laying of cornerstone for CIA building, 3 November 1959 "I HAVE MADE SOME NOTES FROM which I want to talk to you about this U-2 incident. . . . "The first point is this: the need for intelligence-gathering activities. "No one wants another Pearl Harbor. This means that we must have knowledge of military forces and preparations around the world, especially those capable of massive surprise attacks. "Secrecy in the Soviet Union makes this essential. . . . " . . . ever since the beginning of my administration I have issued directives to gather, in every feasible way, the information required to protect the United States and the free world against surprise attack and to enable them to make effective preparations for defense. "My second point: the nature of intelligence-gathering activities. "These have a special and secret character. They are, so to speak, `below the surface' activities. "They are secret because they must circumvent measures designed by other countries to protect secrecy of military preparations. "They are divorced from the regular visible agencies of government which stay clear of operational involvement in specified detailed activities. "These elements operate under broad directives to seek and gather intelligence short of the use of force--with operations supervised by responsible officials within this area of secret activities. . . . "These activities have their own rules and methods of concealment which seek to mislead and obscure-- . . . "Third point: how should we view all of this activity? "It is a distasteful but vital necessity. "We prefer and work for a different kind of world--and a different way of obtaining the information essential to confidence and effective deterrents. Open societies; in the day of present weapons, are the only answer. . . . "My final point is that we must not be distracted from the real issues of the day by what is an incident of a symptom of the world situation today." President Dwight D. Eisenhower News conference following Soviet downing American reconnaissance aircraft, 11 May 1960 " . . . ACCORDING, AT THIS morning's private session, despite the violence and inaccuracy of Mr. Khrushchev's statements, I replied to him on the following terms: . . . "In my statement of May 11th and in the statement of Secretary Herter of May 9th, the position of the United States was made clear with respect to the distasteful necessity of espionage activities in a world where nations distrust each other's intentions. We pointed out that these activities had no aggressive intent but rather were to assure the safety of the United States and the free world against surprise attack by a power which boasts of its ability to devastate the United States and other countries by missiles armed with atomic warheads. As is well known, not only the United States but most other countries are constantly the targets of elaborate and persistent espionage of the Soviet Union." President Dwight D. Eisenhower, Paris summit, 16 May 1960 "DURING THE PERIOD LEADING up to World War II we learned from bitter experience the imperative necessity of a continuous gathering of intelligence information, . . . "Moreover, as President, charged by the Constitution with the conduct of America's foreign relations, and as Commander-in-Chief, charged with the direction of the operations and activities of our Armed Forces and their supporting services, I take full responsibility for approving all the various programs undertaken by our government to secure and evaluate military intelligence. "It was in the prosecution of one of these intelligence programs that the widely publicized U-2 incident occurred. "Aerial photography has been one of many methods we have used to keep ourselves and the free world abreast of major Soviet military developments. The usefulness of this work has been well established through four years of effort. The Soviets were well aware of it. . . . "The plain truth is this: when a nation needs intelligence activity, there is no time when vigilance can be relaxed. Incidentally, from Pearl Harbor we learned that even negotiation itself can be used to conceal preparations for a surprise attack. . . . " . . . It must be remembered that over a long period, these flights had given us information of the greatest importance to the nation's security. In fact, their success has been nothing short of remarkable. . . . "I then made two facts clear to the public: first, our program of aerial reconnaissance had been undertaken with my approval; second, this government is compelled to keep abreast, by one means or another, of military activities of the Soviets, just as their government has for years engaged in espionage activities in our country and throughout the world." President Dwight D. Eisenhower, Television report after the Paris summit, 25 May 1960 "AS I THINK YOU KNOW, I WISH you and your associates in the Central Intelligence Agency well in the tremendously important job you do for our country. Upon the work of your organization there is an almost frightening responsibility; I know all members of the CIA will continue to do the best they can for all of us." President Dwight D. Eisenhower Letter to Mr. Allen W. Dulles, DCI, 18 January 1961 ""FOR: THE CENTRAL INTELLIGENCE AGENCY An indispensable organization to our country. Dwight D. Eisenhower" Inscription on the photograph of President Eisenhower, which he presented to CIA
<urn:uuid:21a5369f-f47c-4996-b552-5ebda670966b>
CC-MAIN-2015-11
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/our-first-line-of-defense-presidential-reflections-on-us-intelligence/eisenhower.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00288-ip-10-28-5-156.ec2.internal.warc.gz
en
0.952565
1,636
3.0625
3
March 3, 2010Notre Dame Campus Newspaper Refuses To Publish Dr. Rice's Biweekly Column Upholding The Church's Teaching on Homosexuality A big issue at Notre Dame a few weeks ago was “sexual orientation” and the status of the Notre Dame Gay/ Lesbian/ Bisexual/ Transgender (GLBT) community. Enough time has passed to make it useful to review some of the governing principles as found in the teaching of the Catholic Church. That teaching includes four pertinent elements: - Homosexual acts are always objectively wrong. The starting point is the Catechism: “Homosexuality refers to relations between men or between women who experience an exclusive or predominant sexual attraction to persons of the same sex. It has taken a great variety of forms through the centuries and in different cultures. Its psychological genesis remains largely unexplained. Basing itself on Sacred Scripture, which presents homosexual acts as acts of grave depravity, Tradition has always declared that ‘homosexual acts are intrinsically disordered.’ They are contrary to the natural law. They close the sexual act to the gift of life. They do not proceed from a genuine affective and sexual complementarity. Under no circumstances can they be approved.” No. 2357. Homosexual acts are doubly wrong. They are not only contrary to nature. They are wrong also because they are extra-marital. The Letter on the Pastoral Care of Homosexual Persons, issued in 1986 with the approval of John Paul II, said, “It is only in the marital relationship that the use of the sexual faculty can be morally good. A person engaging in homosexual behavior therefore acts immorally. To choose someone of the same sex for one’s sexual activity is to annul the rich symbolism and meaning, not to mention the goals of the Creator’s sexual design.” No 7. - Since homosexual acts are “intrinsically disordered,” the inclination toward those acts is disordered. An inclination to commit any morally disordered act, whether theft, fornication or whatever, is a disordered inclination. “The number of men and women who have deep-seated homosexual tendencies,” says the Catechism, “is not negligible. This inclination, which is objectively disordered, constitutes for most of them a trial.” No. 2358. That inclination, however, is not in itself a sin. - “[M]en and women who have deep-seated homosexual tendencies,” says the Catechism, “must be accepted with respect, compassion and sensitivity. Every sign of unjust discrimination in their regard should be avoided.” No. 2358. In a culture which tends to marginalize and disrespect those with physical or psychological disorders, it will be useful to recall the admonition of the 1986 Letter that “The human person, made in the image and likeness of God, can hardly be adequately described by a reductionist reference to his or her sexual orientation…. Today the Church provides a badly needed context for the care of the human person when she… insists that every person has a fundamental identity: the creature of God and, by grace, his child and heir to eternal life.” No. 16. The prohibition of “unjust” discrimination, however, does not rule out the making of reasonable and just distinctions with respect to military service, the wording of university nondiscrimination policies and other matters including admission to seminaries. As the Congregation for Catholic Education said in its 2005 Instruction on the subject, “the Church, while profoundly respecting the persons in question, cannot admit to the seminary or to holy orders those who practice homosexuality, present deep-seated homosexual tendencies or support the so-called ‘gay culture.’” No. 2. - “[M]en and women who have deep-seated homosexual tendencies…. are called to fulfill God’s will in their lives, and, if they are Christians, to unite to the sacrifice of the Lord’s Cross the difficulties they may encounter from their condition…. Homosexual persons are called to chastity. By the virtues of self-mastery that teach them inner freedom, at times by the support of disinterested friendship, by prayer and sacramental grace, they can and should gradually and resolutely approach Christian perfection.” Catechism, nos. 2358, 2359. The positive, hopeful teaching of the Church on marriage, the family and the transmission of life is founded on the dignity of the person as a creature made in the image and likeness of God. The “gay rights” movement is, instead, a predictable consequence of the now-dominant contraceptive ethic. Until the Anglican Lambeth Conference of 1930, no Christian denomination had ever said that contraception could ever be objectively right. The Catholic Church continues to affirm the traditional Christian position that contraception is intrinsically an objective evil. Contraception, said Paul VI in Humanae Vitae in 1968, is wrong because it deliberately separates the unitive and procreative aspects of the sexual act. If, sex has no intrinsic relation to procreation and if, through contraception, it is entirely up to man (of both sexes) whether sex will have any such relation, how can one deny legitimacy to sexual acts between two men or between two women? The contraceptive society cannot deny that legitimacy without denying itself. Further, if individual choice prevails without regard to limits of nature, how can the choice be limited to two persons? Polygamy (one man, multiple women), polyandry (one woman, multiple men), polyamory (sexual relations between or among multiple persons of one or both sexes) and other possible arrangements, involving the animal kingdom as well, would derive legitimacy from the same contraceptive premise that justifies one-on-one homosexual relations. It would be a mistake to view the homosexual issue as simply a question of individual rights. The militant “gay rights” movement seeks a cultural and legal redefinition of marriage and the family, contrary to the reality rooted in reason as well as faith. Marriage, a union of man and woman, is the creation not of the state but of God himself as seen in Genesis. Sacramento coadjutor bishop Jaime Soto, on Sept. 26, 2008, said: “Married love is a beautiful, heroic expression of faithful, life-giving, life-creating love. It should not be accommodated and manipulated for those who would believe that they can and have a right to mimic its unique expression.” Space limits preclude discussion here of the “same-sex marriage” issue, which we defer to a later column.
<urn:uuid:e4ad1725-949f-4854-bcc1-c6060835685d>
CC-MAIN-2015-11
http://www.pewsitter.com/view_news_id_30006.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463104.7/warc/CC-MAIN-20150226074103-00076-ip-10-28-5-156.ec2.internal.warc.gz
en
0.952609
1,386
2.6875
3
Facts of the Matter States of matter easily seen in water ALL MATTER can exist in only four different states: solid, liquid, gas and plasma. This is true of all substances, although the relationships between the states can be quite different depending on the substance. We only encounter plasma here on Earth in closed tubes such as those in fluorescent lights, xenon flash on our cameras, or in the tiny pixels of plasma TVs. Plasma consists of oppositely charged atomic nuclei and electrons, having been energized to the point where electrons are completely stripped away from their atoms. Virtually all substances can exist in the other three states, although the solid, liquid and gaseous forms of water are the ones we most commonly encounter. Transitions between the three states always involve the absorption or release of energy in the form of heat, which is called latent heat. Latent heat is defined as the amount of heat required to change a given amount of a substance from one state to another. The calorie is a common unit of heat. It is defined as the amount of heat required to raise the temperature of one gram of water by one degree Celsius. ZEE EVANS / NATIONAL SCIENCE FOUNDATION Water is the common substance used to define and measure heat. It also is the classic model for understanding transitions of state. Above, a bank of clouds rolls into Arthur Harbor, Anvers Island, Antarctica. This should not be confused with the Calorie (capital C) used in measuring the energy content of food. The Calorie is equivalent to 1,000 calories or 1 kilocalorie. Water is a common substance that is used to define and measure heat, and we are familiar with all three states. For that reason it is also the classic model for understanding transitions of state. Latent heats of fusion (freezing and melting) and vaporization (evaporation and condensation) are not the same for most substances. For example, it takes 80 calories to melt one gram of ice but 550 calories to vaporize that same gram. Compare that with 100 calories that would be required to raise the temperature of water from freezing (0 degrees Celsius) to boiling (100 degrees Celsius). Rudolph Clausius formulated the kinetic theory of heat to explain the thermodynamic properties of matter in a classic paper published in 1857. Kinetic theory is based upon the dual propositions that molecules have a great amount of space between them, and that heat and temperature are due to the motion of molecules. When used as a model, it provides the basis to explain nearly all of the physical properties of matter. It allows for the motion to be translational, rotational or vibrational, which makes the theory apply equally well to all three states. According to kinetic theory, the higher the temperature of a substance, the more heat it contains and the faster its molecules move. From the molecular point of view, latent heat is the energy that is required to sever the bonds between atoms or molecules and allow them to escape. When ice is melting, absorbed heat is breaking bonds between adjacent water molecules in the crystal lattice, and it becomes liquid. Liquid water is made of free water molecules and clumps of water molecules. The clumps could be the tiny remnants of ice crystals or just chains of molecules. Molecules are moving so fast that the clumps form and re-form a billion times per second as molecules attach and detach from one another. At freezing temperature of 0 degrees Celsius, ice and water are in a state of dynamic equilibrium, and the number of molecules breaking free from the ice is the same as the number being captured by a crystal from the liquid. The clumps are large, and there are relatively few free molecules. Adding heat causes the temperature to rise as the energized molecules move faster. Clumps disintegrate into smaller pieces and release more free molecules, until the water boils. A Rayleigh function describes their motion, such that at boiling temperature the average energy of water molecules is such that slightly more than one-half of the molecules can escape as vapor. Evaporation is a cooling process because molecules escaping from the liquid as vapor leave behind molecules with a lower average energy. The electrical forces between water molecules are very strong, so it takes significant speed for a molecule to escape. This is what gives water its high latent heat compared with other substances. Temperature is not the only factor affecting changes of state. Pressure plays a role in changes of state as well. For each substance there is a unique relationship between the pressure and the temperature at which transitions between states proceed. A state diagram, which is a graph of pressure versus temperature, (also phase diagram), clarifies these relationships. The graph has the characteristic shape of a distorted, curved and tilted Y. The actual shape and location of the Y on the graph are different for each substance, but all lean to the right. The V-shaped portion of the Y represents the liquid state with the solid state below and gaseous state above. The point where the Y diverges is called the triple point. It is at that temperature and pressure and only at that temperature that all three states can coexist. The triple point for water under 1 atmosphere pressure is 0 degrees Celsius, its freezing temperature. At this temperature and pressure, the vapor pressure of ice, water and water vapor are equal. We are familiar with dry ice, which is frozen carbon dioxide, a case in which the solid sublimes directly to the gas without passing through a liquid state. By comparison, the triple point of carbon dioxide occurs at a pressure of 5.2 atmospheres and minus 56.4 degrees Celsius. This is the lowest temperature and pressure at which there can be liquid carbon dioxide. The vapor pressure of solid carbon dioxide is 1 atmosphere at minus 78.5 degrees Celsius. At room temperature there is no liquid state. The same thing happens to water ice in the freezer, but the triple point of water is at much lower pressure and much higher temperature, so dry ice sublimates much more quickly than water ice. Combining kinetic theory with the state diagram allows us to visualize, understand and explore many thermodynamic processes such as these state transitions. It's one more example of the synergy of scientific syntheses that continue to expand our knowledge of how the universe works. picks up where your high school science teacher left off. He is a professor of science at Honolulu Community College, where he teaches earth and physical science and investigates life and the universe. He can be reached by e-mail at [email protected]
<urn:uuid:f019854c-0fc7-4743-870c-287aed33059e>
CC-MAIN-2015-11
http://archives.starbulletin.com/2006/10/15/business/brill.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00178-ip-10-28-5-156.ec2.internal.warc.gz
en
0.931784
1,371
3.703125
4
October 10, 2006 > Preventing and Treating Strokes Preventing and Treating Strokes by Washington Hospital Each year, at least 700,000 people in the United States suffer a stroke, according to the American Stroke Association. One in four people will die as a result of suffering a first stroke, and many more will face a lifetime of devastating disability. Fortunately, most strokes are preventable, and for people who do suffer a stroke, improved treatments have made it easier to preserve brain function. “Administering treatment as soon as possible after a stroke is crucial,” says cardiologist Dr. Ash Jain, medical director of the Stroke Program at Washington Hospital. “The sooner we can treat a patient who has suffered a stroke, the better the results are likely to be. There are a lot of exciting new developments in the treatment of strokes, and the treatment available through our program at Washington Hospital is as good as it gets.” To expand community awareness of stroke prevention and treatment advances, Jain and Stroke Program Coordinator Douglas Van Houten, R.N., will present a free Health & Wellness Seminar on Monday, October 16 from 1 to 3 p.m. The seminar will be held in the Conrad E. Anderson, M.D. Auditorium, Rooms A & B, in the Washington West Building located at 2500 Mowry Avenue in Fremont. For more information about the seminar, or to register to attend, please call (800) 963-7070. “There are two broad categories of strokes,” Van Houten explains. “Hemorrhagic strokes, which account for only 10 to 15 percent of all strokes, are caused by ruptured blood vessels bleeding into the brain or the spaces around the brain. Ischemic strokes – by far the vast majority of all strokes – are caused by decreased blood flow to the brain due to a blocked blood vessel.” Van Houten notes that there is a big difference in the symptoms of a hemorrhagic stroke as opposed to an ischemic stroke. “A hemorrhagic stroke happens quickly and causes intense pain,” he says. “People who suffer this type of stroke often will say, ‘I’ve got the worst headache I’ve ever had in my life!’ Because of the intensity of the pain, these people usually go to the hospital as soon as possible.” Ischemic strokes, on the other hand, often don’t produce pain, and they come on slowly, he adds. “Someone suffering an ischemic stroke might say, ‘I’m having some trouble with dizziness, and I’m dragging my foot. I’m tired and I’m going to bed.’ They don’t recognize they are experiencing a stroke. That can create grave problems if they don’t get to the hospital early enough to receive treatment.” The symptoms of a stroke fall into five main categories, Van Houten says: - Sudden numbness or weakness, almost always on one side of the body. - Sudden confusion or difficulty in speaking or understanding language. - Sudden trouble with seeing, such as double vision, blind spots, or a “hole” in the field of vision. - Sudden trouble with walking, dizziness, loss of balance or coordination. - Severe, sudden headache with no known cause. “The symptoms you experience during a stroke depend on the area of the brain that is affected,” Van Houten explains. “You won’t necessarily have all of the symptoms, although that is a possibility.” People who experience stroke symptoms that go away fairly quickly may have suffered a transient ischemic attack (TIA). “With TIAs, the symptoms do resolve themselves, but they can be the precursor to a major stroke,” Van Houten says. “Having a TIA means you are at a much, much higher risk of suffering a major stroke, and you need to be evaluated right away to determine effective preventive measures and lower your risk factors for a stroke.” The risk factors for stroke are very similar to the risks for cardiovascular disease, including high blood pressure, high cholesterol levels, smoking, excessive alcohol consumption, physical inactivity and obesity. The risk of stroke increases after age 45 and is highest for people in their 70s and 80s. In general, men are more likely to suffer strokes than women, but the incidence of strokes in women increases after menopause. Some additional risk factors for stroke include cardiovascular disease, diabetes, a family history of strokes and atrial fibrillation (irregular heartbeat). “Recent studies have suggested other risk factors for stroke,” says Jain. “One is a high level of the amino acid homocysteine in the blood. Homocysteine interferes with the metabolism of cholesterol, and changes the good cholesterol (HDL) into bad cholesterol (LDL). Another one is a high level of CRPhs, or high-sensitivity C-reactive protein, in the blood. This protein is a ‘marker’ that indicates inflammation in the lining of the arteries, which is linked to coronary and cerebrovascular problems.” Controlling your risk factors is key to stroke prevention. “Obviously you can’t control factors such as age, but most risk factors can be controlled with a healthy diet and exercise,” Jain says. “Your physician may prescribe medications to help control blood pressure, cholesterol or diabetes, or to help with quitting smoking. We also can conduct various screenings such as MRIs and carotid artery Doppler sonograms to detect blockages. When blockages are discovered, various procedures can be performed to remove them.” Treatment options for stroke victims now include the use of the clot-busting medications. If administered soon enough, these drugs can dissolve many blood clots that cause strokes. “Patients who come in within three hours of suffering a stroke may be candidates for intravenous administration of clot-dissolving medications,” Jain says. “If the patient comes in within three to six hours, we could administer the medications via the arteries. That procedure, however, is more invasive and must be done using a catheter. “After six hours, the patient is no longer a candidate for clot-dissolving medications, although we can perform procedures to go into the brain and open up the blockage,” he adds. “After eight hours, most of the damage to the brain has been done, and it’s primarily a matter of rehabilitation, rather than interventional treatment.” Jain emphasizes that people need to be aware of the symptoms of stroke and to seek treatment as soon as possible. “It is even more important to deal with your risk factors for stroke,” he says. “Preventing a stroke is always preferable to treating one.” To learn more about the Stroke Program at Washington Hospital, or to schedule an evaluation, please call (510) 745-6525. Visit www.whhs.com and click on “Services and Programs” to learn more about services at Washington Hospital that can benefit you and your family.
<urn:uuid:babc21af-cad8-4a18-999a-876f67543b63>
CC-MAIN-2015-11
http://tricityvoice.com/articledisplay.php?a=6158
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00006-ip-10-28-5-156.ec2.internal.warc.gz
en
0.948297
1,551
2.5625
3
Students who are passionate gamers can talk a blue streak about the virtual online worlds where they invest their free time and energy. Usually, of course, they get to play only when they're not at school. But why not bring gaming into the classroom? Could teachers tap that same passion to spark learning? Gaming remains new territory for most schools. As the following examples show, educators on the frontiers are eager to share what they're learning. Here are just a few examples. Evoke Social Change This spring, several teachers introduced their high school students to an alternate reality game that challenges players to solve big global challenges. Evoke attracted nearly 20,000 players from around the world during its 10-week run. Game designer Jane McGonigal, who developed Evoke for the World Bank Institute, calls it "a crash course in changing the world." Here's how it works: Each week, a new chapter from a graphic novel introduces players to a different challenge from the not-so-distant future. These "missions" range from food scarcity to human trafficking. Players respond -- and earn points -- by posting blogs, videos, or photos that convey their proposed solutions or reactions. They also comment on other players' postings, sparking dialogue, collaboration, and critical thinking. Paul Allison, an English teacher at East-West School of International Studies in New York, has been playing Evoke right alongside his students. He's one of several teachers from the New York Writing Project who decided to experiment with the game as a springboard for digital literacy. These colleagues have been comparing teaching strategies and student responses. They have also taken their conversation to a larger audience by talking about gaming and learning during recent episodes of the weekly webcast, "Teachers Teaching Teachers," which Allison hosts. Allison has seen a mix of reactions among students, who are also reflecting on their experience on a site called Youth Voices. Some say they enjoy the novelty of being virtual "agents" who tackle global crises with their own wits. Others are more critical, suggesting that Evoke lacks the excitement of commercial games. One student said being asked to write blog posts about global issues feels too much like regular homework. Now that the game is nearly over, some students are taking their online creativity into the real world (which was exactly what game designer McGonigal had in mind). Allison's students, for instance, are using a local garden to investigate questions about culture and community. As Allison explains in this recent blog post: This work has become such a passion this spring. My colleagues have wondered why. And it has to do with how many of the missions in Evoke can be answered in our garden. It's about Social Innovation, Food Security, Water Crisis, Urban Resilience, and Indigenous Knowledge. Because of Evoke, these words have a resonance that bounces from Africa to India to China and Cuba and back to our wonderful community garden in Flushing, Queens." WoW and Tech Standards? World of Warcraft (WoW) is a commercial blockbuster, with millions of subscribers from around the world. Dean Groom, an Australian educator and advocate of the Web 2.0 classroom, suggests that teachers use a free, 10-day trial of WoW to meet standards, such as the Educational Technology Standards for Students. In a post on his Design 4 Learning blog Groom explains how to use backward design to plan a robust, game-based project that meets important learning goals. The game is a hook to grab interest, but the real learning happens through inquiry. "It's not about what you learn by playing a game," Groom insists, "but how the game can be use to foster inquiry skills, critical thinking, and student learning." SimCEO: Innovation Platform When Derek Luebbe was a social studies teacher, he used to run a stock market simulation to teach students about finance. But in six weeks of picking stocks, he found that students didn't learn much more than the mechanics of the market. And they tended to pick companies with well-known names rather making critical judgments. So Luebbe began imagining a better approach. What if students created their own companies, complete with business plans? What if they could also buy and sell stocks in classmates' companies? What if they could see how stock prices fluctuated over a 10-year period rather than just a few weeks? The result of that brainstorming became an online simulation called SimCEO. Luebbe, principal of American International School of Budapest, has been fine-tuning his creation by sharing it with educators around the world. They have surprised him by taking projects in directions he never imagined. He expected teachers to focus on financial literacy and entrepreneurship. But some have brought in different content. "They might set the simulation in Colonial America or New York in the 1920s," Luebbe says, then ask students to consider how historical factors would have affected market prices. Because teachers determine all the content, he adds, "they can bring in demographic data, real or fictional news, historical events -- whatever they want." The game becomes an open platform for teacher innovation. For Earth Day, for instance, one teacher challenged students to propose ideas for reducing their school's carbon footprint. Using SimCEO, they bid on each other's proposals. Dynamic stock prices gave them immediate feedback for adjusting their plans. If you're a teacher interested in bringing gaming into your classroom, there's no shortage of opportunities to get started. Luebbe invites teachers to set up a free SimCEO account (use the promotional code: edutopia), and see where your creativity takes you. Meanwhile, the first run of Evoke has just ended, but teachers are already brainstorming a future version customized for the classroom. Have you used gaming in your classroom? Please tell us about your experience.
<urn:uuid:f3add3a5-c3d1-41ad-8a05-dffe6676cb9e>
CC-MAIN-2015-11
http://www.edutopia.org/online-games-simulations-teaching-tools?quicktabs_edutopia_blogs_sidebar_popular_list=2
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.96736
1,197
3.078125
3
A century of conservation efforts inspired by ecologist Aldo Leopold. THERE IS A SULFUR BOG and a series of burping ponds in a little valley on the south end of the Valles Caldera National Preserve. The aquamarine ponds that feed the marshy area below the valley emit a very particular rottenegg smell. Years ago, a road was cut through the forest and up the valley that lies alongside these wetlands. The road altered the way the water from rain and snowmelt ran down the hills and into the valley bottom. The result was that a series of deep gullies threatened to drain the sulfur bog and its ponds. On an August weekend, I joined about 20 other volunteers from the Albuquerque Wildlife Federation (AWF) to stop the gullies from reaching the wetlands and destroying them. That weekend we were building one-rock dams and Zuni bowls—simple, effective, and inexpensive stone structures that slow runoff, and trap sediment and seeds so that new grasses, bushes, and trees can take root, further slowing the water and stopping the erosion. This kind of volunteer-driven restoration work is the specialty of the Albuquerque Wildlife Federation, which is celebrating its 100th birthday this month. MOST OF THE HUNTERS who gathered in Albuquerque on July 21, 1914, had witnessed in their own lifetimes the extinction of the passenger pigeon and the decimation of the bison. They acknowledged that most of that damage was done by hunters like themselves, and reasoned that if things continued in the same way, there would soon be nothing left to hunt. The organization born from that meeting was the brainchild of Aldo Leopold, one of the first Forest Service managers in New Mexico and later author of the seminal ecology text A Sand County Almanac. Initially incorporated as the Albuquerque Game Protective Association, the sportsmen actively promoted wildlife protection laws, starting with the landmark Migratory Bird Treaty Act of 1918. During the following decades, the group advocated for a system of national game refuges, the creation of the State Game Commission, and closed deer- and elk-hunting seasons. They also made it a habit to publicly shame those who violated the new game laws. Over time, however, they focused less on hunting issues and more on overall species conservation. By the 1970s, AWF increasingly focused on ecological restoration work. By the 1990s, the reenergized nonprofit and its volunteers were leading the improvement of habitat for the sake of wildlife throughout the state. New Mexico’s landscape is not only an ecological treasure, but also an economic gold mine. Tourism generates approximately $5.9 billion for the state each year, and hunting, fishing, bird-watching, and other types of outdoor recreation are key contributors. Without a doubt, the health of the state’s economy is dependent on the health of the rivers, lakes, and wildlife habitat that support these activities. The work this small conservation group does reaches far beyond the rims of the canyons where they haul rocks and plant willows. THIS SUMMER, AWF volunteers will focus on nine habitat restoration projects throughout the state. One of these is Cebolla Canyon, in El Malpais National Monument, near Grants. Eighty years ago, a productive spring in the valley attracted a number of families who started truck farming. Unfortunately, the very road the farmers built to the area also drained the meadow and the spring. Eventually they had to move away, and cattle tramped into what was left of the wetland, destroying the plants that once held the soil in place. A massive arroyo grew in the canyon and the wildlife moved out. In 2000, AWF volunteers set to work, fencing the spring to keep the cows out, constructing small dams in the arroyo, and planting trees, shrubs, and grasses to help stop the erosion. “It took 70 years for the problem to get this bad, and it will take 70 years to fix it,” says Kristina Fisher, vice president of AWF. “But we’ve already seen 100 acres of wetland come back, as well as ducks, geese, salamanders, turkey, and elk.” The Sora rail and the yellow-headed blackbird, two bird species uncommon in New Mexico, also started nesting in the area again. Limestone Canyon, in the San Mateo Mountains southwest of Socorro, is a small, steep canyon dressed in towering ponderosa pines. Historic logging and cattle grazing in the area caused the stream to dry up and the cottonwood forest that grew along its banks to die off. For seven years, AWF has built an impressive number of one-rock dams in the streambed to get the water to slow down and seep into the ground. The results have been dramatic. The stream is flowing again, so much so that it is overflowing its banks at times and bringing nearby meadows back to life. Last year, volunteers found cottonwood sprouts, which have not been seen in the valley in more than 50 years. Elk and deer have also returned, and there is talk that the endangered Chiricahua leopard frog could even come back. “PERHAPS THE BIGGEST ecological impact of these projects is that we have a dedicated group of people with a long-term commitment to these places,” says Bill Zeedyk, the guru of watershed restoration in the American Southwest. A soft-spoken retired Forest Service manager, Zeedyk guides the AWF restoration work to ensure it has a scientific basis and a solid plan to work from. “You need to have people who are committed to the land. With a lot of these projects you can’t see an immediate result, but it grows over time,” he says. “The cumulative effect of years of volunteer work is ecologically significant.” The AWF restoration projects do indeed have a core group of volunteers, but they also have a wide range of people like me who join in when they can. There’s also a growing number of people from out of state who plan part of their visit to New Mexico to work with AWF. “This kind of work offers visitors to New Mexico the perfect opportunity to get to places they would never otherwise be able to see, and to meet New Mexicans they would never otherwise meet,” says AWF president Michael Scialdone. “Our projects are an ideal way for visitors to get an intimate connection with our state and the public lands that we all own.” It may seem hard to believe, but for many of us, carrying rocks, planting seedlings, building dams, and putting up fences is fun. It’s the kind of work that makes you feel like you’ve made a difference. Plus, at the end of a long workday there are buffalo burgers and fabulous campfire conversations. AWF volunteer restoration projects are listed on its website (abq.nmwildlife.org), as is information on its monthly meetings. The AWF will host its 100th anniversary celebration on Saturday, July 19, at the Valle de Oro National Wildlife Refuge, near Albuquerque. The public is invited. “AWF was founded on the same principles that Aldo Leopold later articulated in his land ethic writings,” says Fisher. “That is, people should be citizens of the ecological community, not conquerors of it.” ✜ Jim O’Donnell is the author of Notes for the Aurora Society: 1500 Miles on Foot Across Finland (Infinity Publishing, 2009). Find him in Taos and at aroundtheworldineightyyears.com.
<urn:uuid:07393af6-2654-43ac-ac1b-97431134e64a>
CC-MAIN-2015-11
http://www.nmmagazine.com/article/?aid=86934
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00156-ip-10-28-5-156.ec2.internal.warc.gz
en
0.965202
1,600
3.1875
3
Why Do Movies Move? Movies are not smooth. The time between frames is empty. The camera records only twenty-four snapshots of each second of time flow, and discards everything that happens between frames—but we perceive it anyway. We see stills, but we perceive motion. How can we explain this? We can ask the same question about digital movies, videos, and videogames—in fact, all modern digital media—so the explanation is rather important, and one of my favorites. Hoary old "persistence of vision" can't be the explanation. It's real, but it only explains why you don't see the emptiness between the frames. If an actor or an animated character moves between frames then—by persistence of vision—you should see him in both positions: two Humphrey Bogarts, two Buzz Lightyears. In fact, your retinas do see both, one fading out as the other comes in—each frame is projected long enough to ensure this. It's what your brain does with the retinas' information that determines whether you perceive two Bogarts in two different positions or one Bogart moving. On its own the brain perceives the motion of an edge, but only if it moves not too far, and not too fast, from the first frame to the second one. Like persistence of vision, this is a real effect, called apparent motion. It's interesting but it's not the explanation I like so much. Classic cel animation—of the old ink on celluloid variety—relies on the apparent-motion phenomenon. The old animators knew intuitively how to keep the successive frames of a movement inside its "not too far, not too fast" boundaries. If they needed to exceed those limits, they had tricks to help us perceive the motion—like actual speed lines and a poof of dust to mark the rapid descent of Wile E. Coyote as he steps unexpectedly off a mesa in hot pursuit of that truly wily Road Runner. Exceed the apparent motion limits—without those animators' tricks—and the results are ugly. You may have seen old school stop-motion animation—such as Ray Harryhausen's classic sword-fighting skeletons in Jason and the Argonauts—that is plagued by an unpleasant jerking motion of the characters. You're seeing double, at least—several edges of a skeleton at the same time—and correctly interpret it as motion, but painfully so. The edges stutter, or "judder," or "strobe" across the screen—the words reflect the pain inflicted by staccato motion. Why don't live-action movies stutter? (Imagine directing Uma Thurman to stay within "not too far, not too fast" limits.) Why don't computer-animated movies a la Pixar judder? And, for contrast, why do videogames, alas, strobe horribly today? All are sequences of discrete frames. There's a general explanation that works for all three. It's called "motion blur," and it's simple and pretty. Here's what a real movie camera does. The frame it records is not a sample at a single instant, like a Road Runner or a Harryhausen frame. Rather the camera shutter is open for a short while, called the exposure time. A moving object is moving during that short interval, of course, and is thus smeared slightly across the frame during the exposure time. It's like what happens when you try to take a long-exposure still photo of your child throwing a ball and his arm is just a blur. But a bug in a still photograph turns out to be a feature for movies. Without the blur all movies would look as jumpy as Harryhausen's skeletons—unless Uma miraculously stayed within limits. A scientific explanation can become a technological solution. For digital movies—like Toy Story—the solution to avoid strobing was derived from the explanation for live-action: Deliberately smear a moving object across a frame along its path of motion. So a character's swinging arm must be blurred along the arc the arm traces as it pivots around its shoulder joint. And the other arm independently must be blurred along its arc, often in the opposite direction to the first arm. All that had to be done was to figure out how to do what a camera does with a computer—and, importantly, how to do it efficiently. Live-action movies get motion blur for free, but it costs a lot for digital movies. The solution—by the group now known as Pixar—paved the way to the first digital movie. Motion blur was the crucial breakthrough. In effect, motion-blur shows your brain the path a movement is taking, and also its magnitude—a longer blur means a faster motion. Instead of discarding the temporal information about motion between frames, we store it spatially in the frames as a blur. A succession of such frames overlapping a bit—because of persistence of vision—thus paints out a motion in a distinctive enough way that the brain can do the full inference. Pixar throws thousands of computers at a movie—spending sometimes more than thirty hours on a single frame. On the other hand, a videogame—essentially a digital movie restricted to real time—has to deliver a new frame every thirtieth of a second. It was only seventeen years ago that the inexorable increase in computation speed per unit dollar (described by Moore's Law) made motion-blurred digital movies feasible. Videogames simply haven't arrived yet in 2012. They can't compute fast enough to motion blur. Some give it a feeble try, but the feel of the play lessens so dramatically that gamers turn it off and suffer the judder instead. But Moore's Law still applies, so soon—five years? ten?—even videogames will motion blur properly and fully enter the modern world. Best of all, motion blur is just one example of a potent general explanation called The Sampling Theorem. It works when the samples are called frames, taken regularly in time to make a movie, or when they are called pixels, taken regularly in space to make an image. It works for digital audio too. In a nutshell, the explanation of smooth motion from unsmooth movies expands to explain the modern media world—why it's even possible. But that would take a longer explanation.
<urn:uuid:1f6ea03d-4fee-4b77-929c-2b97a01ef362>
CC-MAIN-2015-11
http://edge.org/print/response-detail/10548
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00289-ip-10-28-5-156.ec2.internal.warc.gz
en
0.953844
1,311
2.578125
3
Thursday, August 28, 2008 Wednesday, August 27, 2008 They both generated discussion about the amount of money NFL made (billions!) and interpretations of the velocity graph and why it may be so "wiggly" going up and down and such and how you knew when he reached the store. The questions were worded such as: find v(24) and interpret the meaning. So they had to think about what "24" meant in this problem and what the "y" value meant and put it all in a coherent sentence. We also started a discussion on graphs such as y = abs(f(x)). We first refreshed our memory on abs(x) (much needed for some folks). Then I had them make a table for f(x) = x*x - 2 and graph it. Then I had them hold up their hands in the shape they thought y=abs(f(x)) would be .... some, of course, held up "V" hands. So we made the table values and graphed JUST the points, and then I showed them the visual of "flipping" all the negatives "up". Ooh, ahh. That was a good segue into doing the same table/graph thing with f(x) = x ..... then doing y = abs(f(x)). On a whiny note, my 6 class sizes so far are: 31, 22, 17, 26, 39, 34. I'm just saying. .... but maybe that's the norm in other schools. BUT, I rember my math teacher friend in another state complaining that she had LARGE classes one year .... "26". Saturday, August 23, 2008 I was at a teacher supply store the other day, and found 48 for $5.95, and bought them thinking I could find some use for them. Well, now I have 2 things so far. On the first day of school, I will review functions and lead to function notation and how to read f(x) and find f(3) and find x such that f(x) = 6, etc, by first handing out premade graphs/grids/coordinate planes to each student and one wikki stix (stick?) to each kid. I'll first instruct them to plop down a "graph", and maybe have them decide if they're functions or not and maybe have themselves walk with their graphs and separate into 2 camps of functions and non functions. They can then self correct by glancing at others and discussing it amongst themselves. Then I'll say find your f(3), and separate yourselves into like groups (how to deal with non integers .....???). Anyway, you get the idea. I could do more. My second idea is what I think is an improvement on an old activity I've done with precal in the past regarding learning the sine and cosine graphs. But my teacher friend (who I first learned to teach with/from) in another state basically does the same activity but with Wikki Stix. She has them do the measuring of the angles and the heights, not with a string, but with the Stix. Also, once they measure the "height", they snip the Stix into that length and "stick" it down on their graph. So ultimately, later on you have a Wikki Stix sine curve graph. Way cool and something I'll try this year .... though with 3 precal classes of (current sizes) 37, 32, 30ish, how much will that cost? Wednesday, August 20, 2008 Suppose you're graphing, and suppose you simultaneously want to see the graph and the table screens. Well: mode > G-T, and poof, when you hit graph, voila, split screen. Then you can toggle between the 2 parts by hitting the "table" or "graph" button, and then you can do whatever you want on that part of the screen. Also, you can split the screen horizontally (mode > horiz ...) and then you can show the graph and either the main window or the lists or a table, etc. Sunday, August 17, 2008 Saturday, August 16, 2008 On a side note, as I was trying the new games, I found myself getting blurry eyed just reading all the instructions, and I just wanted to jump in and test the waters instead of reading about it. Hmmmm, sounds familiar. So now I'll try to think of each school lesson in a new way: how can the students get started right away doing something and then learning what they need to know about it at various stages of the class. Thursday, August 14, 2008 They'll work on it quietly while I'm calling roll, and then I'll prompt them to check and work with their group and meet everyone in the group while I'm snapping pictures. Section "A" prompts them about "PEMDAS". Section "B" has orders-of-operation problems with 2 answers to circle, one for the common mistake and one correct answer. Section "C" has a fraction/decimal/percent table with one column filled out where they fill in the other 2 with equivalent expressions. Section "D" has four "4"s and an answer, and they're to fill in operations to get the right answer. Here's part of their first assignment (and parent homework): This is a math autobiography and asks questions about past classes and school experiences and such. It also asks their parents to indicate "I am proud of my child because" .... This will tell me many things about the student: if they do work on time, if they are neat/verbose/last-minute/thoughtful. They also get to see their parent's bragging comments (and sometimes if there are no comments, I'm sad for the kid). I also have a good opportunity to get their parents' e-mail address for future grade sending. Then I have about 50 minutes left. I'm thinking of a "box plot" activity and a "meet and greet" activity. ... still in the planning stages, though. Whew! Two tasks done. Tuesday, August 12, 2008 I got to be a boundary judge and learn the skills of how to read a sequence card and how to call the ins and outs and how to survive blistering heat and curious cows and carcas sightings. First my partner and I (another wrangled wife) had to drive 10 minutes to the location. Here is an actual corner boundary that the pilots would see from the air. This is the other wife sitting in position ready to call outs/ins. The contraption is uber cool and thought up by an engineer/pilot who used a compass and his brains. AND there's math involved (what else). There are 2 sets of 2 strings lined up perpendicular to the other set, and you line up the strings of one set with your eye and .... since 2 lines form a plane, you can determine when the aerobatic planes cross the boundary or not. We were at the "southeast" boundary, so our job was to call "out south", "in south", "out east", "in east". Boy were we stressed about doing it right. We're not pilots, and we had to figure out what squiggly lines on the cards matched what things the pilots were doing in the air. Eventually, we mastered it as a team. Here are some things that kept us company each time we went out. Tuesday, August 05, 2008 * I made one of the 1st homework assignments be for parents to look at the site and send me an e-mail. This gave me their address for sending home grades, and it also made them aware. * It gave me a place to post extra worksheets and solutions where they could download them (I didn't do this too much, but maybe will increase it this year) * Students had an easy way to find homework assignments for whatever reasons. * Parents now had a place to see/check whether their children had homework or tests coming up. This year ... (with my 4 PREPS!) I'll continue it, and I want to enhance it: * I want to somehow incorporate quick easy-to-make-&-upload videos showing various math techniques (I'll film them). * I potentially want to link to videos from TeacherTube (since YouTube is blocked at our campus). * I want to post notes for students that are absent (this one I'm iffy about for a variety of reasons: difficulty, space issues, student accountability, ...) All in all, I'm happy with weebly.com. Hopefully, it will continue to be free or even cheap, and hopefully they'll resist putting ads on their/my page since that was a big draw for me.
<urn:uuid:06b52a81-9de3-4c0f-a566-7634c08f6cb7>
CC-MAIN-2015-11
http://mathteachermambo.blogspot.com/2008_08_01_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00098-ip-10-28-5-156.ec2.internal.warc.gz
en
0.974088
1,835
2.828125
3
Slavs belong to the oldest inhabitants of Europe, they became the dominant ethnic group on the Slovakia’s territory in the 5th century. Map of Slavs in 5th century: They lived in a kind of symbiosis with the Avars who came to the same region a bit later. They took part in joint expeditions against the Franks, Langobards, Byzantines even though the Slavs were suppressed by the Avars – In the 6th and 7th century Slavs suffered from invasions of Avars. Indeed, skirmishes among Avars and Slavs provided the occasion for the development of the first important state organization among the western Slavs, the Empire of Samo – after a successful Slavic insurrection against the Avar Khaganate in 623. Samo, a Frankish buyer, united Slavs, fought against Avars and ruled the territory for thirty-five years. Map of Samo’s Empire: After his death in the year 658, there are no written documents concerning this empire – most likely it collapsed. Only after one and a half century (at the beginning of the 9th century), the Frankish reports reveal the existence of a further state in the region – the principality of Nitra (Nitra as the capital), which was governed by Prince Pribina. At the beginning of the third decade of the ninth century Pribina was expulsed by Mojmír, a prince from neighbouring Moravia. Through this union of the Old Moravian and the Nitra principalities developed Great Moravia. Great Moravian State arose around year 830 when Mojmír unified the Slavic tribes settled north of the Danube and extended the Moravian supremacy over them. The Great Moravian Empire encompassed the lands of modern Slovakia and Moravia as well as parts of Hungary and Austria. For a short time the lands of Bohemia, the southern part of Poland and Lusatia, today part of Germany, also belonged to it. Map of Great Moravia in 9th century: Letters, chronicles and archaeological findings from the Great Moravian period provide information concerning Great Moravian stone structures and the flowering of handicrafts, iron and other metal workers as well as glass-makers skilled in various techniques as demonstrated by the remarkable necklaces, earrings, buttons they produced. Great Moravia was an equal partner with its neighbour to the west, the Frankish Empire. They maintained lively commercial and cultural contacts. But military confrontation between them also developed and called forth the attempts of the rulers of the Frankish Empire to extend their sphere of influence to the east. This also influenced the most significant cultural initiative of the era of Great Moravia – the acceptance of Christianity. Christianity first penetrated the territory of Slovakia from the Frankish Empire already during the era before the emergence of the Great Moravian Empire. In 828 or 829 Prince Pribina had a stone church in Nitra consecrated by the Archbishop of Salzburg. But Mojmír’s successor – prince Rastislav wished to free himself from the church influence of the Franks and to strengthen his own independence, so he turned to the Byzantine emperor with a request to send priests, who spreaded Christianity in Great Moravia and education of the Slavic languages. In 863 the brothers Constantine and Method headed a mission to Great Moravia at the invitation of Prince Rastislav. From the small Greek alphabet Constantine devised the oldest Slavonic calligraphy – Glagolitic (Hlaholithic) alphabet. Together with Methodius they translated liturgical books and part of the Bible into Old Church Slavonic. They also established an ecclesiastical organization and founded a theological training center – they were teaching young priests, who replaced the foreign priests. Pope Hadrian II approved the use of Old Slavonic as a liturgical language and in 870 consecrated Method as an archbishop in Rome. However, after the death of Method, the use of the Slavonic liturgy was terminated in Great Moravia due to the pressure of the Franks and as a result or the decision of Svätopluk. But Method’ s pupils, who were forced into exile in Bulgaria and Macedonia, continued to cultivate the Slavonic liturgy and the old Slavonic language. Later, the old Russian Christian culture was drawn from this spring. Effects of Constantine and Methodius in Great Moravia had a major cultural and political importance. Spreading Christianity and education in the language they all understood was something new. Slavic language exalted to the level of cultural languages, such as Latin and Greek at that time. After Rastislav, his nephew Svätopluk started to govern Great Moravia and since 871 he became relatively independent monarch of Great Moravian Empire. Under Svätopluk’s government Great Moravia reached the largest territorial expansion, but after his death, a gradual decline occurred in the country. The Empire was divided between Svätopluk’s sons: Mojmír II. and Svätopluk II. Main ruler should have been Mojmír II., but there were conflicts between the two sons. Great Moravia was weakened by wars with its neighbours and because of the invasions of nomadic tribes – Hungarians (Magyars). Mojmír II. was not able to maintain the integrity and independence of the empire and around the year 907, the Great Moravian Empire collapsed. Even if it existed only for seventy years, the Great Moravian Empire is still considered to be the most important part of the historical consciousness of the Slovaks. Constantine, canonized under the name Cyril, and Method are considered national saints. Since the era of romanticism, the princes Pribina, Mojmír, Rastislav and Svätopluk have been the heroes of epic poems, prose and dramatic works. Many creative artists and musicians have been inspired by their activity, doing Great Moravian art. Map of West Slavs in 9th and 10th century:
<urn:uuid:1d2e8ec4-350f-4817-b74d-18e7f6480321>
CC-MAIN-2015-11
http://www.slovak-republic.org/history/great-moravia/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463165.18/warc/CC-MAIN-20150226074103-00097-ip-10-28-5-156.ec2.internal.warc.gz
en
0.956094
1,265
3.984375
4
Varanasi City: City of Lord Shiva, City of religion and city of enlightenment we call Varanasi (Kashi) by many names. It is called the oldest living city. Varanasi is the religious capital of India. It is believed that Varanasi is situated on the trident of Lord Shiva. Varanasi (Visheshvara) exists on the middle fork of trident of Lord Shiva, Omkareshvara on the north fork and Kedareshvara on south fork of trident of Lord Shiva (Omkareshvara, Visheshvara, Kedareshvara). Lord Shiva always lives here invisibly and flow the energy from his hair in the form of Ganga River. One of the most popular temples (Jyotirlinga) of Lord Shiva ‘Kashi Vishwanath’ is situated here. Varanasi is considered as the last pilgrimage. Kashi(Varanasi) on the Trident of Lord Shiva Varanasi is also very popular for Buddhist pilgrimages. The Founder of Buddhism Lord Buddha has given his first sermon at Sarnath in Varanasi. Parshvanath (One of the Tirthankars of Jainism) and Patanjali(Author of Yaga Vashistha) also belong to Varanasi. Varanasi is linked with many centuries of history and yet dynamic with its association with river Ganga. Varanasi city is also known as the city of Kabir, Tulsi, Raidas and Munshi Prem Chand (great Hindi poet and Novelist).It is associated with its oldest root customs and culture. To keep the old customs and traditions alive the people of this city are trying hard to achieve this goal. They do their work with unity. Varanasi is known for its Ganga-Yamuni culture. Ganga-Yamuni culture denotes the harmony of different religions such as Hindi, Muslim etc. There is unity in diversity. The whole world admires this effort and unity of this city. The Hindu and the Muslim celebrate their festivals with unity and enthusiasm. People of Varanasi enjoy various fairs and festivals. Some popular festivals celebrated in Varanasi are Holi, Diwali, Id, Dussehera, Christmas etc. and some popular fairs of Varanasi are Durga Pooja, Bharat Milap, Naag Nathaiya, Panchkoshi yatra. World popular Ram Lila (Drama on the Life of Lord Rama) is enacted at Ram Nagar Fort in Varanasi. Many tourists and people from all over the world come to visit this beautiful city. Varanasi is the oldest city in the world and older than history. Varanasi has been destroyed four times by Muslim invaders between 11th to 17th centuries but it has been re-built. In Varanasi, there are over 3000 Hindu temples, 1400 mosques, 12 churches, 3 Jain temples, 9 Buddhist temples and 3 Sikh temples. Varanasi is denoted by various names such as Varanasi, Kashi, Banaras, Benares, Mahasmashana, Avimukta, Anandvan, Rudravasa etc. Kashi: The word Kashi is taken from Atharva Ved which means 'concentration of cosmic light’. Kashi gives Moksha (liberation) to everybody. Kashi is originated from name of Kasha who was the seventh king of Kashi. Hindu Devotees of the city called it Kashi because the rays of the sun in the morning spread across the river. Varanasi: This city is called Varanasi (Varuna + Assi) because it is lying between Varuna River (north side) and Assi River (now just narrowed to water stream in south side). It is believed that Varuna and Assi originate from the left and the right legs of Lord Vishnu lying at Allahabad (Prayag) and both the rivers originate from his legs to guard the entrance of evil. No evil power can reside between this area and this is the reason that Tulsi Das selected Varanasi to reside and compose the Epic Ram Charit Manas (One of the religious books of the Hindus). Banaras: This city is denoted by Banaras or Banarasi by Buddhist literature. Pali version became more popular in the time of Muslim ruler and British ruler. This city was popular by Banaras. One meaning of Banaras is also popular as: Banaras = Bana (readymade) Ras (Juice), thus Banarase means a place where readymade juice of life is always available. Avimukta: According to the literature, Lord Shiva said “I never forsake it”. That’s why this great place is known as Avimukta (‘never forsaken’). Anandvan: Lord Shiva explains: “My lings are everywhere there, like little sprouts arisen out of sheer enjoyment” (mentioned in Kashi Rahasya). Thus it is known as forest of enjoyment (Anand+Van=Anandvan). Rudravasa: This city is known as Rudravasa because Lord Shiva lives here and protects it. Mahasmashana, The ground of great cremation: The whole city is the ground of cremation which controller is Lord Shiva. The word Mahasmashana is explained as: Maha (great), Sma (dead body), and Shan (final rest). All the five gross elements (earth, water, air, fire and sky) live here like corpses. At present there, are two cremation ghats (Harishchandra ghat, Manikarnika ghat) in Varanasi. More than 50,000 dead bodies are cremated here in a year. People come here from all other parts of India to get salvation.
<urn:uuid:93089842-be93-43df-9c7a-c2222ff3e193>
CC-MAIN-2015-11
http://varanasicityonline.com/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461848.26/warc/CC-MAIN-20150226074101-00222-ip-10-28-5-156.ec2.internal.warc.gz
en
0.947125
1,238
2.578125
3
on orders of $85 or more An excerpt from www.HouseOfNames.com archives copyright © 2000 - 2015 Where did the Irish Noonan family come from? What is the Irish Noonan family crest and coat of arms? When did the Noonan family first arrive in the United States? Where did the various branches of the family go? What is the Noonan family history?All Irish surnames have a unique and often romantic meaning. The name Noonan originally appeared in Gaelic as O Nuadhain. The original Gaelic form of the name was O hIonmhaineain, which was originally derived from "ionmhain," meaning "beloved." The search for the origins of the name Noonan family name revealed numerous spelling variations. These variants can be somewhat accounted for when it is realized that before widespread literacy people only recognized their name by pronunciation; it was up to scribes to decide how it was to be formally recorded. Variations found include Noonan, O'Nunan, O'Noonan, Nunan, Neenan and others. First found in County Cork (Irish: Corcaigh) the ancient Kingdom of Deis Muin (Desmond), located on the southwest coast of Ireland in the province of Munster, where they held a family seat from ancient times. This web page shows only a small excerpt of our Noonan research. Another 213 words(15 lines of text) covering the years 1172 and 1341 are included under the topic Early Noonan History in all our PDF Extended History products. More information is included under the topic Early Noonan Notables in all our PDF Extended History products. Thousands of Irish left in their homeland in the 18th and 19th centuries to escape the religious and political discrimination they experienced primarily at the hands of the English, and in the search of a plot of land to call their own. These immigrants arrived at the eastern shores of North America, early on settling and breaking the land, and, later, building the bridges, canals, and railroads essential to the emerging nations of United States and Canada. Many others would toil for low wages in the dangerous factories of the day. Although there had been a steady migration of Irish to North America over these years, the greatest influx of Irish immigrants came to North America during the Great Potato Famine of the late 1840s. Early North American immigration records have revealed a number of people bearing the Irish name Noonan or a variant listed above: Noonan Settlers in United States in the 19th Century - Richard Noonan, who landed in Morgan County, Illinois in 1838 - Edmund Noonan, who arrived in Mississippi in 1843 - Henry Noonan, who landed in Mississippi in 1847 - Mrs. Noonan, who arrived in San Francisco, California in 1851 - Daniel Noonan, who landed in Westmoreland County, Pennsylvania in 1851 Noonan Settlers in Canada in the 18th Century - Thomas Noonan, who arrived in Halifax, Nova Scotia in 1752 Noonan Settlers in Canada in the 19th Century - James Noonan, who arrived in Nova Scotia in 1804 - John Hyacinth Noonan, who landed in Nova Scotia in 1815 - Daniel Noonan, aged 26, a labourer, arrived in Saint John, NB in 1833 aboard the barque "Independence" from Kinsale - Catharine Noonan, aged 25, arrived in Saint John, NB in 1833 aboard the barque "Independence" from Kinsale - John Noonan, aged 23, a labourer, arrived in Saint John, NB in 1833 aboard the barque "Independence" from Kinsale Noonan Settlers in Australia in the 19th Century - Maurice Noonan arrived in Adelaide, Australia aboard the ship "Birman" in 1840 - John Noonan arrived in Adelaide, Australia aboard the ship "Orleana" in 1840 - John Noonan, aged 38, a farm servant, arrived in South Australia in 1851 aboard the ship "Marion" - Susan Noonan, aged 23, a farm servant, arrived in South Australia in 1854 aboard the ship "Isle of Thanet" - Margaret Noonan, aged 15, a servant, arrived in South Australia in 1855 aboard the ship "Agincourt" Noonan Settlers in New Zealand in the 19th Century - Daniel Noonan, aged 38, a labourer, arrived in Auckland, New Zealand aboard the ship "Maori" in 1864 - Mary Noonan, aged 36, arrived in Auckland, New Zealand aboard the ship "Maori" in 1864 - John Noonan, aged 13, arrived in Auckland, New Zealand aboard the ship "Maori" in 1864 - Mary Noonan, aged 12, arrived in Auckland, New Zealand aboard the ship "Maori" in 1864 - Anne Noonan, aged 10, arrived in Auckland, New Zealand aboard the ship "Maori" in 1864 - Frederick Joseph Noonan (1893-1937), American aviation pioneer who disappeared with Amelia Earhart somewhere over the Pacific during their World Flight in 1937 - John Thomas Noonan Jr. (b. 1926), American Senior Circuit Judge on the United States Court of Appeals - Tom Noonan (b. 1951), American actor and film writer-director - Professor Emerita Jacqueline Anne Noonan (b. 1921), American pediatric cardiologist - Karen Elizabeth Noonan (1967-1988), American Student from Potomac, Maryland, America, who flew aboard the Pan Am Flight 103 from Frankfurt to Detroit, known as the Lockerbie bombing in 1988 and died - Michael Noonan (b. 1943), Irish politician, Leader of the Opposition and Leader of Fine Gael from February 2001 to June 2002 - Michael J. Noonan (1935-2013), Irish Fianna Fáil politician, Minister for Defence (1987-1989) - Thomas F Noonan (1861-1912), prominent New Jersey Attorney, Judge, Democratic Party Leader - Katie Anne Noonan (b. 1977), Australian singer-songwriter - Magnusson, Magnus. Chambers Biographical Dictionary 5th edition. Edinburgh: W & R Chambers, 1990. Print. - Burke, Sir Bernard. General Armory Of England, Scotland, Ireland and Wales. Ramsbury: Heraldry Today. Print. - Grehan, Ida. Dictionary of Irish Family Names. Boulder: Roberts Rinehart, 1997. Print. (ISBN 1-57098-137-X). - Browning, Charles H. Americans of Royal Descent. Baltimore: Genealogical Publishing. Print. - Fairbairn. Fairbain's book of Crests of the Families of Great Britain and Ireland, 4th Edition 2 volumes in one. Baltimore: Heraldic Book Company, 1968. Print. - McDonnell, Frances. Emigrants from Ireland to America 1735-1743 A Transcription of the report of the Irish House of Commons into Enforced emigration to America. Baltimore: Genealogical Publishing, 1992. Print. (ISBN 0-8063-1331-5). - Egle, William Henry. Pennsylvania Genealogies Scotch-Irish and German. Harrisburg: L.S. Hart, 1886. Print. - Passenger Lists of Vessels Arriving at Galveston Texas 1896-1951. National Archives Washington DC. Print. - Best, Hugh. Debrett's Texas Peerage. New York: Coward-McCann, 1983. Print. (ISBN 069811244X). - Hanks, Patricia and Flavia Hodges. A Dictionary of Surnames. Oxford: Oxford University Press, 1988. Print. (ISBN 0-19-211592-8). The Noonan Family Crest was acquired from the Houseofnames.com archives. The Noonan Family Crest was drawn according to heraldic standards based on published blazons. We generally include the oldest published family crest once associated with each surname. This page was last modified on 13 November 2014 at 16:22. houseofnames.com is an internet property owned by Swyrich Corporation. on orders of $85 or more
<urn:uuid:d6da77dd-2f8b-4189-b0c3-0380ea5d42e4>
CC-MAIN-2015-11
https://www.houseofnames.com/noonan-family-crest
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463956.95/warc/CC-MAIN-20150226074103-00202-ip-10-28-5-156.ec2.internal.warc.gz
en
0.924716
1,732
3.375
3
Looking for sentences using compound subjects and compound verbs? Here are 15 sentences using compound subjects and 15 sentences using compound verbs along with a quick review of compound subjects and compound verbs. Defining a Compound Subject The subject of a sentence is generally defined as the noun or pronoun engaging in the activity of the verb. For example, study the following sentences: - Beth reads very slowly. - She reads very slowly. In the first sentence, “Beth” is the subject. In the second sentence, “She” is the subject. In both sentences, the subject is engaged in the activity of reading. When a sentence has two or more subjects, that’s called a “compound subject.” The individual subjects in a compound subject are joined by a coordinating conjunction (and, or, neither, nor). When the subjects are joined by “and,” the verb agrees with the pronoun “they.” - Joanie and Chachi love each other. (NOT Joanie and Chachi loves each other.) When the subjects are joined by “or” or “neither/nor,” the verb agrees with the subject that is closest to the verb. - The piano or the book case has to go. - The piano or the tables have to go. - Neither the pillows nor the curtains match the couch. - Neither the pillows nor the blanket looks good in this room. Defining a Compound Verb A compound verb, or compound predicate, is used when the subject does more than one thing. You could write separate sentences for each verb, but if the subject is the same, that’s just not necessary. For example: - John paints beautifully. + John sells his work from time to time. = John paints beautifully and sells his work from time to time. Compound verbs, like compound subjects, are also combined with a coordinating conjunction. The above example used “and,” but you can also use other conjunctions. - Mike either lies all the time or has the most extraordinary life I’ve ever seen. - Alice neither likes the water nor has any plans to get in it. Compound Subjects and Compound Verbs In Action The following 15 sentences use compound subjects: - Potato chips and cupcakes are bad for you. - Uncle Jim, Aunt Sue and my cousin Jake went to Jamaica on vacation. - Beth and Kendra read very slowly. - The boots by the door and the flip-flops in the living room need to be put away. - Neither the boots by the door nor the flip-flops in the living room will be here any more if you don’t put them away. - Neither a tall man nor a short man lives in that house. - Neither wind nor rain nor sleet nor hail can stop the US Postal Service from delivering the mail. - Neither the rugs downstairs nor the carpet upstairs has been vacuumed. - Either you or your brother is going to be punished. - Either the chicken or the beef in the freezer needs to be thawed for dinner tonight. - Either the matches or the candles caused the fire. - Either a rat or the gerbil keeps chewing up all my socks! - Everything on the bed and everything in the closet was organized in under an hour. - Nobody in the bank and nobody in the store saw the accident. - Anyone on the soccer team and anybody on the basketball team is eligible for the scholarship. For many more examples, in different types of sentences, see Compound Subject Examples. The following 15 sentences use compound verbs: - The “victim” sprayed her assailant with pepper spray, punched him in the nose, kicked him in the groin, and ripped out his nipple ring. - Last night, we drank a bottle of wine and watched a movie. - Every Sunday, Sherri goes to the store and buys food for the week. - My cats lie around all day and run around all night. - Her husband fixes things that break around the house, irons better than she does, and bakes the best apple crisp you’ve ever tasted. - I either get a lot done during the day or do nothing at all. - The weekend either flies by or drags on forever, depending on what you’re doing. - The rain here either mists or drenches. - Someone either hit my car with a shopping basket or backed into it as they were leaving. - Stay or go; I don’t care which. - He neither wants nor needs to take a vacation. - They neither have the money nor want to give it to him. - Carol neither likes nor dislikes the wall color. - She neither eats nor drinks nor sleeps nor talks to anyone since he left. - We have neither seen each other nor spoken since our first date. For many more examples, in different types of sentences, see Compound Verb Examples. English speakers do just about everything they can to shorten, tighten and speed up what they want to say. By using compound subjects and compound verbs, they do just that. Hopefully studying these sentences using compound subjects and compound verbs will help you to communicate more efficiently as well.
<urn:uuid:de1fa45b-d6dc-4368-857d-bddf2db5e300>
CC-MAIN-2015-11
http://grammar.yourdictionary.com/sentences/15-sentences-using-compound-subjects-and-compound-verbs.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00029-ip-10-28-5-156.ec2.internal.warc.gz
en
0.945528
1,119
3.171875
3
Overview[edit | edit source] Agriculture includes subsistence agriculture, which is producing enough food to meet the needs of the farmer and family, and also the production of income from cultivation of the land or commercial raising of animals (animal husbandry). Agriculture is the practice -- the study of these disciplines is called agricultural science. Agriculture produces food for humans and for animals. Agriculture also produces other goods, such as cut flowers, ornamental and nursery plants, fertilizers, animal hides, leather, industrial chemicals (starch, ethanol, and plastics), fibers (cotton, wool, hemp, and flax), fuels (methane, biodiesel, biomass), and both legal and illegal drugs (biopharmaceuticals, marijuana, opium, etc.) The origin of agriculture may be more than 10,000 years old, but it is not certain exactly how old it is. The practice of agriculture is often used to distinguish the new stone age period from the old stone age. The first domestic crops included wheat and barley. Agriculture started in the Fertile Crescent, in East Asia, and there was probably a gradual transition from a hunter-gatherer economy to an agricultural economy. During a certain period of time, some crops were deliberately planted, and other foods were gathered from the wild. The reasons for the earliest introduction of farming may have included climate change. Farming allows a much greater density of population than can be supported by hunting and gathering. In the Western world, the efficiency of agriculture has greatly improved over the last decades. This improvement is due to cultivation of better varieties, better management of the soil, and better weed control. At the same time, use of mechanization has decreased labor requirements. For these reasons, farmers are less and less numerous in developed countries. In poor countries, the yields are often low. There are many reasons for this. farmers are less educated, and they have less money to buy modern equipment. When yields are low, forests are sometimes cut to provide new lands to grow food. This is good in the short term, but can be bad for the country and the land in the long term. In developed countries, there are more and more problems because of intensive agriculture. Farmers use a lot of chemical nutrients or chemical pesticides. This sometimes pollute the soil or the water (for example, the nitrogen surplus in rivers and lakes). The insects become resistant to some insecticides. The soil is sometimes damaged (by erosion). Agriculture techniques[edit | edit source] There are many techniques to cultivate crops. Some of them are : - Tillage by plough - Crop rotation - Weed removal Farmers selected plants with better yield, more resistance to disease, more tolerance to drought, easier to harvest, with better taste, and better nutritional value. Centuries of careful selection and breeding have had enormous effects on the characteristics of crop plants. The crops give better yield with other techniques (use of fertilizers, chemical pest control, irrigation). For example, the yields of wheat in France are over 90 qx/ha. In South America, the yields are 20 qx/ha. In Africa, the yields are less than 10 qx/ha. Some companies have been searching for new plants in poor countries, and genetically modify these plants. They try to patent the seeds, and can sell them back in the poor countries. New plants were created with genetic engineering. They are modified to resist to an herbicide for example. Food[edit | edit source] It is important for there to be enough food for everyone. The food must also be safe and of good quality. Some people say the food is not always good. They say it is sometimes not safe, because it contains some chemicals. Other people say intensive agriculture is damaging the environment. For this reason, there are several types of agriculture. Traditional agriculture is mostly done in poor countries. Intensive agriculture is mostly done in western countries. It uses pesticides, machinery, chemical fertilizers. Organic farming is using only natural products. Integrated farming is using local resources, and trying to use the waste from one process as a resource in another process. Agricultural policy focuses on the goals and methods of agricultural production. At the policy level, common goals of agriculture include: - Food safety: to be sure that the food supply is safe. - Food security: to be sure there is enough food for everyone. - Food quality: to be sure the food is of good quality. Problems in agriculture[edit | edit source] There are some serious problems that face people trying to grow food. These include Crops[edit | edit source] The major crops produced in the world in 2002, are maize (corn), wheat, rice, and cotton. - Maize 624 millions of metric tons - Wheat 570 millions of metric tons - Rice 381.1 millions of metric tons - Cotton 96.5 millions of metric tons See also[edit | edit source] - Agricultural science - International agricultural research - Timeline of agriculture and food technology. - Agricultural sciences basic topics - List of subsistence techniques - List of sustainable agriculture topics - Arid-zone agriculture - Community Supported Agriculture There are specialty producers who raise less common types of livestock or plants. Aquaculture, the farming of fish, shrimp, and algae, is closely associated with agriculture. Animal husbandry means breeding and raising animals for meat or to harvest animal products (like milk, eggs, or wool) on a continual basis.
<urn:uuid:956f687b-8f9d-4131-9498-d75cbf4e76c7>
CC-MAIN-2015-11
http://test2.wikipedia.org/wiki/Agriculture
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00140-ip-10-28-5-156.ec2.internal.warc.gz
en
0.941135
1,148
3.40625
3
a child’s body with the right foods not only supports growth, but can also establish lifelong healthy eating habits. Establishing a healthy eating pattern early on is critical for a lifetime of health. with your baby at about age six months, when they begin to show an interest in food. First foods can be just tastes of what the family is eating. Pureed orange and green vegetables are great first foods. By age one, your child should be eating what the family eats, although meat and chunky foods will need to be grinded or cut up. Your child should begin to self feed by nine to twelve months. Place healthy food on their tray and let them pick and choose what to eat and when to stop. We all have a great natural control of our appetite, and encouraging babies to self feed is a great way to help develop this. Try to avoid the "one more bite" approach to feeding. If a baby turns their head away when you offer them food, their regulation system is saying it is full and they are done eating. Eat Light and Often need to eat more frequently than adults. Especially during growth spurts, your child will need extra fuel. Offer your children nutritious snacks in between meals so they don’t reach for unhealthy ones when they are famished. Cut up vegetables and fruit, whole grains, and lean proteins like chicken, fish, tofu, and legumes all make great snacks. prevent excess weight gain, encourage regular physical activity and balance portion sizes with calories burned. You don’t have to count your child’s calories or weigh their food. However, if they have had an inactive day, don’t overload their plate; it’s unnecessary. On the other hand, if they have been particularly active—had soccer practice, rode their bike with a friend, and played tag after school—they may need that extra fuel at dinnertime. Eat as a Family show that families who eat together provide kids with more nutrition overall. Those children who eat with their families consume more fresh fruit and vegetables and less soda. They also eat less fat and more fiber, calcium, iron, folate, and certain vitamins. The research indicates it doesn’t matter how many people there are in your family or how old the children are—eating together is good for everyone. While eating lunch together may be impossible, aim to eat breakfast and dinner as a family often. Eat Your Veggies kids won’t eat vegetables if they don’t see you doing the same. Make sure to model the kind of behavior you want your kids to have. Make eating produce easy: have fresh fruits and veggies on hand and easily accessible so kids will reach for them, and serve a fruit and/or vegetable at every single meal. Serve Nutrient Rich Foods Processed foods are often full of sugar, sodium, unhealthy fats, and calories. Avoid making meals for your children using processed food. Instead, opt for fresh fruits and vegetables, whole grains, lean cuts of meat, fresh fish, poultry, and fiber-rich foods like beans and leafy greens. At the grocery store, "shop the perimeter” where the fresh foods are. Avoid the inside aisles where many of the processed foods are shelved. Eat the rainbow! Kids need all of their vitamins and minerals to grow properly. Serve foods high in nutritional quality to make sure they are getting everything they need. Nutritionists recommend that we eat the rainbow— meaning vegetables and fruits of all colors. It is important to eat at least five servings of fruit and vegetables each day. Start giving kids whole grain varieties of grains early on, so that they learn to enjoy them. While white breads and sugary cereals are largely marketed towards children, they are not nearly as healthy as whole grains. Try whole grain bread and brown To prevent picky eaters, offer a variety of foods early on and encourage kids to try new foods. Get kids involved in the planning, shopping, and cooking of food—you may find that if they are part of the process, they’ll be more likely to eat a variety variety, and moderation in a child’s eating pattern. All of us are born with natural regulation of what it feels like to be hungry, satisfied, full, and overfull. Encourage your child to eat to satisfaction without overfilling their attention on what, when, and how much your child is eating, you can raise a healthy eater who will enjoy a variety of foods in the correct portions for a Clean Your Plate Club Encouraging kids to always clean their plate can lead to overeating. Let them decide when they’re full. Once they are old enough (about five years), you should even allow them to serve themselves. And give them seconds if they are still hungry. If you feel like your child is using this freedom to avoid certain things on their plate (namely vegetables), save what’s left for their next snack time. Filling Up on Juice Too much fruit juice can be detrimental to your child’s eating habits and health. A form of liquid calories, it may contribute to excess calorie intake without satisfying hunger. Alternately, your child may “fill up” on juice and not eat other nutritious foods. Finally, all the sugar in fruit juices can lead to dental concerns. Until the age of 6 months, children should not have fruit juice unless it is to relieve constipation. According to the Mayo Clinic, for most children, eight ounces of 100-percent fruit juice should be the daily limit. Poor Nutrient Quality Many kids eat too many foods that contain high amounts of fat, sugar, and sodium. Chips, cookies, doughnuts, and other processed foods represent “empty” calories with few health benefits. Always offer nutritious foods first and consider “junk” foods only as an occasional special treat. Becoming a Short Order Cook Don’t end up making a special dinner for everyone in the family. .Everyone in the family should be eating the same meal. The only exception is if someone in the family has a food allergy. To get children to try new foods, ask them to take at least one bite of each food item on
<urn:uuid:e0d1f181-cd46-4052-b4b4-dad085c237d2>
CC-MAIN-2015-11
https://www.aarpmedicareplans.com/health/healthy-eating-for-kids
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462141.68/warc/CC-MAIN-20150226074102-00288-ip-10-28-5-156.ec2.internal.warc.gz
en
0.944996
1,382
3.71875
4
Peace Corps Volunteers Support New ‘Let Girls Learn’ Effort by Educating Women and Girls around the Globe WASHINGTON, D.C., June 20, 2014 – Peace Corps volunteers worldwide are supporting the new government-wide Let Girls Learn effort by increasing opportunities for women and girls through education. Let Girls Learn launched today to raise awareness about the need to support all girls in their pursuit of a quality education. The effort, coordinated by the U.S. Agency for International Development, includes $231 million in new education programs in Nigeria, Afghanistan, South Sudan, Jordan and Guatemala. Below find three examples of Peace Corps volunteers’ work to empower women and girls. Peace Corps volunteers Heather Pace of Dublin, Calif., Kelly Baug of Hamlin, N.Y., and Ashley Gannon of Harrington, Del., are spearheading efforts to organize a Camp GLOW (Girls Leading Our World) for local girls in Benin. The week-long camp will help participants develop leadership skills and learn about important health and social issues affecting their communities. Girls will attend sessions that discuss vital public health concerns, emphasize the value of education, focus on building life skills, and encourage creativity and critical thinking. On the final day of the camp, Pace and her fellow volunteers and community members will lead a discussion on how girls can bring what they learned back to their villages. “The girls will be mentored by adult Beninese women who have been selected for the exceptional example they set as professional, progressive women, as well as older girls from last year’s camp selected as outstanding participants,” said Pace, a graduate of St. John’s University who has been living in Benin since 2012. “Most importantly, the girls will be surrounded by positive encouragement. They will be reminded that they are special and valuable.” Camp GLOW is a Peace Corps program that began in Romania in 1995 to promote female empowerment. The program began in Benin in 2004 and has been widely successful. During her Peace Corps service, recently returned volunteer Sarah Quinn of Athens, Ga., collaborated with a group of 40 female artisans to teach marketable skills to young Moroccan women during a 10-day camp. The artisans mentored camp participants in traditional craftwork and local female leaders led supplemental workshops on successful business practices to encourage creativity and give the women an opportunity to establish financial independence. “The camp created new opportunities for both the artisans and the girls who attended,” said Quinn, a graduate of the University of Georgia. “The artisans thrived in their roles of planning and implementing the logistics of the camp. The girls not only learned the basics of several traditional handicrafts, but really poured their energy and creativity into several remarkable pieces. It was a really successful ten days in every way.” Following the camp’s success and popularity, Quinn’s community plans to make it an annual event, and the artisans are looking into further mentorship opportunities for local women. Peace Corps volunteer Brian Harris-McTigue of Brooklyn, N.Y., is working with fellow volunteers and community members in Senegal to host a week-long leadership camp for girls ages 12-16. Volunteers and community members will lead educational sessions throughout the week to empower and equip girls with tools to become the next generation of female leaders. “Girls are selected to participate in the camp based on their academic promise, leadership ability and motivation,” said Harris-McTigue, a graduate of Wheaton College who has been living in Senegal since 2013. “At the camp, the girls will learn to take ownership of their own lives.” Camp sessions will include topics like healthy lifestyle choices, financial literacy and planning for the future. To ensure sustainability, Harris-McTigue and his fellow volunteers will train their community members to independently organize and manage future camps that promote youth volunteerism and positive gender development in the region. A portion of funds for the leadership camp are being raised through the Peace Corps Partnership Program (PCPP), which supports Peace Corps volunteer community projects worldwide. The PCPP funds will be used to purchase materials for the camp’s educational workshops, transportation and meals. The local community will provide resources to cover guest speaker and counselor fees, classroom space and entertainment. To support Harris-McTigue’s project in Senegal, visit www.peacecorps.gov/donate. His project number is: 14-685-043. About the Peace Corps: As the preeminent international service organization of the United States, the Peace Corps sends Americans abroad to tackle the most pressing needs of people around the world. Peace Corps volunteers work at the grassroots level with local governments, schools, communities, small businesses and entrepreneurs to develop sustainable solutions that address challenges in education, health, economic development, agriculture, environment and youth development. When they return home, volunteers bring their knowledge and experiences – and a global outlook – back to the United States that enriches the lives of those around them. President John F. Kennedy established the Peace Corps in 1961 to foster a better understanding among Americans and people of other countries. Since then, more than 215,000 Americans of all ages have served in 139 countries worldwide. Visit www.peacecorps.gov to learn more.
<urn:uuid:01a9ac98-baad-4f70-b033-298727896f2e>
CC-MAIN-2015-11
http://www.peacecorps.gov/media/forpress/press/2403/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00139-ip-10-28-5-156.ec2.internal.warc.gz
en
0.947417
1,088
2.578125
3
A brief history of Yorkshire First-class debut 1864 Admitted to Championship1890 County Championship 1893, 1896, 1898, 1900, 1901, 1902, 1905, 1908, 1912, 1919, 1922, 1923, 1924, 1925, 1931, 1932, 1933, 1935, 1937, 1938, 1939, 1946, 1949(Shared), 1959, 1960, 1962, 1963, 1966, 1967, 1968, 2001 Gillette/NatWest/C&G 1965, 1969, 2002 Benson & Hedges 1987 Sunday League 1983 Twenty20 Best - Quarter-finals 2006 No county has enjoyed as much Championship success as Yorkshire nor have any attracted more comment or controversy. The game itself had been played in the Yorkshire since the mid 18th century, but the county club was only officially formed in 1863, even though a selection committee had been in place for two years. Also, the side had already engaged in their first Roses match (1849) and was loosely based at Sheffield. For the next couple of decades Yorkshire's fixtures were irregular and performances similar. There were many talented individuals - Tom Emmett and Ted Peate to the fore - but results were disappointing, and by the 1880s murmurings of discontent were growing. In 1883 Lord Hawke- ironically, given the county's almost fanatical refusal to allow anyone not both with the boundaries to play for them, not a Yorkshireman - took charge. While no great player himself, he forged a side so powerful that it dominated the game for almost eighty years. It took Hawke time to turn the tide, and in 1893 he broke the stranglehold held by Sheffield and, coincidently, in the same season Yorkshire won their first Championship. Hawke had forged a side built on ferocious loyalty and teamwork. In 1896 they won again, one of six titles and three runners-up slots in the next decade. George Hirst and Wilfred Rhodes led the way, and in 1906 Hirst scored 2386 runs and took 208 wickets. A slight downturn before World War One was merely a blip, and between the wars the Championship was won 12 times and the county were never out of the top five. Between 1922 and 1925 they lost only six times in 122 matches and immediately before World War Two they won seven titles in nine seasons. It was not hard to see why. Rhodes continued until 1931, by which time he was 51, and he was joined by Emmott Robinson and Bill Bowes. In Hedley Verity they possessed a truly great spinner, and between 1930 and 1939 he took 1558 wickets. Herbert Sutcliffe and Percy Holmes forged a solid opening partnership (they set the world record opening stand of 555 against Essex in 1932) and Maurice Leyland provided mid-innings flair while len Hutton emerged shortly before the cessation. Their success continued with another success when the Championship resumed in 1946, but a shared title in 1949 was to be their only other success until the 1960s. While Surrey dominated the 50s, Yorkshire finished second to them four times. But a membership used to success was not happy and neither was the dressing-room and stories of rows were common. Things reached a head when Johnny Wardle, a supremely talented spinner, was sacked in 1958 for newspaper comments criticising the club. Nevertheless, in 1960 the county appointed their first professional captain and with Fred Trueman and Brian Close leading the way, and Geoff Boycott churning out runs, the 1960s was a good decade. Those troubles were forgotten in the 1960s as six titles came in eight years, and they even added a couple of Gillette Cup wins for good measure. But all was not well and the seeds of discontent were growing. Promising talent did not come on; the county contrived to lose a number of their better players - including Ray Illingworth, John Hampshire and most controversially Close - and they failed to embrace a changing world where one-day cricket was usurping the three-day game. And, crucially, other counties drafted in top cricketers from abroad while Yorkshire steadfastly stuck to their Yorkshire-only policy. Close's departure in 1970s triggered the first of seemingly innumerable members' revolts, and the captaincy of Boycott poured high-octane fuel on the fire. While he led by example, he utterly polarised opinion. The county won nothing and it often seemed that Boycott's role in the county mattered more than the team itself. The 1980s were no better, although there was the solace of one B&H and one Sunday league win. In 1991 the county bowed to the inevitable and voted to allow players not born in the county to represent them, although it took another year for overseas players to be signed - Sachin Tendulkar was the first. There was no dramatic turnaround in their fortunes, however, but in 2001 David Byas led the side to the Championship, and the C&G Trophy followed a year later. But again success came at a price, as the club reported record losses and inevitable cut-backs followed. In 2005 the club bought Headingley, where they had been unhappy tenants for many years, a move which landed them with a heavy debts but meant that finally they could earn money from their home. History to follow Martin Williamson is managing editor of Cricinfo
<urn:uuid:08efdf7c-0b4d-4d23-8e3d-7ccb7d2d017f>
CC-MAIN-2015-11
http://www.espncricinfo.com/yorkshire/content/current/story/261973.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465693.74/warc/CC-MAIN-20150226074105-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.982056
1,100
2.53125
3
There are certain events that we always associate with fixed periods in history, like the Great Depression was in the 1930s, Woodstock was in 1969 and the brief window when men were allowed to get perms was in the fall of 1983. Any grade school history book can tell you that. But sometimes old habits die harder than you think, and you find out that stuff you only thought existed in grainy old pictures continued until just a few years ago. You know, things like ... #6. Executions by Guillotine A guillotine execution (aka where they drop a huge blade on your neck and your severed head falls into a basket) probably ranks among the five worst things that can happen to you. It's the perfect symbol of a terrifying practice from a barbaric, primitive era. Selling tickets to executions. That's how we can fund our schools! It's easy to forget that the entire point of the method was that it was considered humane; the alternative execution method for French nobility was usually getting their heads chopped off with a sword or ax, which sometimes took several painful whacks. And commoners just got hanged, which sucked even harder. So even though we imagine that the walk to the guillotine was pretty nerve-racking, getting your head lopped off in one swift blow was mercifully brief compared to the torturous alternatives. That's not to say that the French Revolution's Reign of Terror, which ended with over 16,000 heads, is up for a retroactive Amnesty International award for employing a relatively mild form of capital punishment. But hey, at least they weren't 16,000 disembowelments. And it's all ancient history anyway -- in a world where most countries have done away with executions completely, beheadings have to be the stuff of the powdered wig era. Most of history was just folks passing time, waiting for the Internet to be invented. But Actually ... Death by guillotine was the official method of execution in France until capital punishment was banned ... in freaking 1981. The Guillotine Headquarters The last public guillotining was in 1939. Then "morality" stepped in and ruined public murder for everyone. No, they didn't always do it in the town square in front of a crowd -- they had the decency to switch to private executions in 1939. Between 1940 and 1977, dozens of criminals were executed by the National Razor, just in the privacy of their prisons, rather than in front of bloodthirsty onlookers. The last French execution by guillotine was in 1977. So around the same time that Star Wars was playing in the theaters and Apple Computer was getting its start, a convicted murderer could still get the old head chop. And that was just in France. The Nazis managed over 16,000 beheadings during their reign. You'd think the fact that "Oh, now that's a Nazi thing" would be the end of guillotine altogether. Not if one Georgia legislator had his way. As late as 1996, Doug Teper proposed replacing the electric chair with the guillotine as the official method of execution for the state of Georgia, but only so the state could harvest criminal organs after their deaths. See? Humane. #5. The Bubonic Plague When you picture the Middle Ages, you probably imagine a lot of filthy people slowly dying of some kind of plague. That's thanks to the infamous bubonic plague, aka the Black Death. In the 14th century, the Black Death wiped out 60 percent of Europe's population in as horrifying a fashion as you can imagine without a handsaw being involved. And in case you're not aware of how the disease works, fleas catch it from rodents, then pass it on to people. As if catching rat sick from an insect isn't bad enough, the victim's lymph nodes begin to swell to hilariously unnatural sizes, his fingers and toes develop gangrene and he eventually starts bleeding out of the ears. Within four days, he'll die in a disgusting heap of diseased skin that no one will want to touch, for obvious reasons. Man, are we glad that nightmare is well behind us. These people are either dying of plague or in high school. But Actually ... Who said it ever went away? Sure, these days we can treat it with antibiotics. But you can still totally go to the doctor and hear him say, "Yeah, you've got a little bit of bubonic plague." "We can probably just lance it." An Oregon woman was treated with the bubes in 2010. And a New Mexico man had it in 2011. Also in 2010, Peru had an outbreak that affected 31 people and killed a 14-year-old boy. And the awful news doesn't end there, folks! While bubonic plague is strictly an animal-to-person disease, its wicked stepsisters pneumonic plague and septicemic plague can totally be spread from person to person. And they're deadlier than bubonic ... if left untreated. So, yes, the deadliest disease the planet has ever known is still out there, hiding in our rats and raccoons and squirrels, just biding its time until it can make its big comeback to remind us who really rules the planet (hint: it's bacteria). "Thanks for keeping it warm and filthy for us!" Think back on the last time you walked out onto your cul-de-sac and saw your neighbors resolving a property-line spat via a gentleman's duel with comically oversized pistolas. It's probably been a while, right? A while, as in never? Because dueling as a dispute settlement option died out once people realized how cool it is to go to TV court and settle things there. Or in the latter part of the 19th century. We can't remember which. Above: What college students did before beer pong. But Actually ... While it's true that dueling has been an anachronism since before World War I, that hasn't stopped individuals from using one-on-one combat to settle matters of honor. Hell, we've all seen the video for "Beat It." "Wanna drop some acid before we try this?" It started when Defferre called his colleague Ribiere an "asshole" for fidgeting during a political debate. You'd think that Ribiere would be the one who'd have an ax to grind over getting publicly humiliated, but no -- it was Defferre who demanded their differences get settled by the sword. And Ribiere accepted. He also lost the duel, which was formally refereed by another colleague. The good news was that Ribiere didn't die during the fight. He just got slashed twice before he quit. Oh, and we have video -- here's footage of the very last duel (which was captured by French newsreel cameras):
<urn:uuid:5f66782e-dab3-4be5-a5bd-a70ab57bb418>
CC-MAIN-2015-11
http://www.cracked.com/article_19708_6-historical-events-that-are-way-more-modern-than-you-think.html?wa_user1=3&wa_user2=History&wa_user3=article&wa_user4=recommended
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.976645
1,422
2.65625
3
Erick Conard's Lucky Hit Ranch| When I was a pre-teen, my dad was able to explain these "gross" red round structures I saw on goat and cow placentae in a very easy to understand way. He called them "buttons." He explained that these "buttons" on the "placenta" snapped onto the uterus to stabilize the placenta in the uterus and to allow food to pass from the mother to the growing embryo. When I was older and received a more "scientific" explanation for these placental structures, I was amazed how accurate his "simple" explanation is. A more scientific explanation follows the definitions. My dad also cautioned me that if I tried to remove the placental membranes forcefully before all of the "buttons" unhook naturally, some of these "buttons" will be left in the uterus to rot and possibly cause infection. (Chemicals produced in the animal's body during birth induce the "buttons" to disengage. However, in some animals this function is less efficient than in others. A warm antibiotic douche can be helpful in these animals. Also, my dad carefully manually removed any "unhooked buttons" in our cows, usually after a stillbirth.) Cotyledon - Cot`y*le"don, n. [Gr. a cup shaped hollow, fr. . See Cotyle.] (Anatomy) -One of the patches of villi found in some forms of placenta. The cotyledon is the structure on the fetal side of the placentae. Cotyledonary placenta - A type of chorioallantoic placenta in which the villi are grouped into tufts or balls separated by regions of smooth chorion. One of a Subset of FOUR PLACENTAL TYPES In 1604, Fabricius introduced a placental classification scheme based upon the macroscopic structure of the sites where attachment occurs between the embryo and the endometrium of the uterus. He listed four main placental types. These are now referred to as the diffuse, cotyledonary, zonary, and discoidal placentas. 1. In diffuse placentae, seen in horses, pigs, camels, lemurs, opossums, kangaroos, and whales, the chorionic sac meets the uterine endometrium over its entire surface. The villi of the chorion are distributed evenly throughout the surface of the chorion, and they extend into processes in the uterine endometrium. (total coverage) 2. Cotyledonary placentae, common to ungulates such as cows, deer, goat, and giraffe, have their villi clumped together into circular patches called cotyledons. The fetal cotyledon meets with maternal regions called caruncles to form the placentome where maternal-fetal exchanges take place. ("buttons") 3. In the zonary placenta, which is characteristic of carnivores, the chorionic villi have aggregated to form a broad band that circles about the center of the chorion. Such zones may be complete circles (such as those in dogs and cats) or incomplete (such as those in bears and seals). It is thought that zonary placentae form from diffuse placentae in which the villi at the ends regress, leaving only those in the center to function. At the edges of the zonary placenta is the hemophagous organ, which is green. The color is due to the degradation of hemoglobin into bilivirdin. This green organ provides iron for the developing fetus. (circular or partially circular band) 4. The discoid placenta is seen in numerous groups -- humans, mice, insectivores, rabbits, rats, and monkeys. In such placentae, part of the chorion remains smooth, while the other part interacts with the endometrium to form the placenta. The maternal blood cells are in direct contact with the fetal chorion. (disc shaped) The Gross Structure of the Cotyledonary Placentae Ruminants have a cotyledonary placenta. Instead of having a single large area of contact between maternal and fetal vascular systems, these animals have numerous smaller placentae. The terminology used to describe ruminant placentation is: 1. Cotyledon: the fetal side of the placenta 2. Caruncle: the maternal side of the placenta 3. Placentome: a cotyledon and caruncle together Caruncles are oval or round thickenings in the uterine mucosa resulting from proliferation of subepithelial connective tissue. Caruncles are readily visible in the non-pregnant uterus. Further, they are the only site in the uterus to form attachments with fetal membranes. Patches of chorioallantoic membrane become cotyledons by developing villi that extend into crypts in the caruncular epithelium. Pregnant sheep, goats and cattle have between 75 and 125 placentomes. Deer also have a cotyledonary placenta, but only 4 to 6 placentomes which are correspondingly larger. During parturition, there is substantial loosening of the cotyledonary villi from caruncles, and the placentomes expand laterally. After expulsion of the fetus and loss of fetal circulation to the cotyledons, capillaries within the villi collapse, leading to a decrease in their size. The uterus contracts and the caruncular stock shrinks, further enhancing the separation of cotyledons from caruncles. In the normal case, fetal membranes with cotyledons are delivered within 12 hours of birth. There is no significant loss of maternal tissue, and therefore, ruminant placentation is considered non-deciduate.
<urn:uuid:40d114df-9ba5-4448-87e5-e9218bf7b69f>
CC-MAIN-2015-11
http://www.luckyhit.net/goats001.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.917677
1,272
3.1875
3
From Uncyclopedia, the content-free encyclopedia Imagine you're a grunt drafted into the Vietnam war, on patrol in the jungle at night. It's raining, the place is crawling with snakes and leeches. All of a sudden machine gunfire breaks out and you're being ambushed - bullets are hissing past your head, friends are getting killed all around you. Someone yells, "Đó là một cuộc tấn công!" - Duh? So you dive for cover and find yourself impaled on several sharp spear-like sticks embedded in the ground. "Lạy Chúa tôi!" - you have just made the worst possible mistake. Because it's an American attack, you're "Charlie", and you just jumped on your own trap! "Người ngu dại!" No, no! This is only a metaphorical scenario. God forbid! But such gruesome examples lead us to the extremely titillating subject of this article: Punji sticks. A punji stick is a multi-purpose Bamboo stake, often carved into the shape of a guide-arrow which leads to a booby-trapped pit studded with sharpened stakes. Guide arrow punji sticks were commonly painted with red, green and yellow stripes, much like candy canes, to better attract the interest of sugar-starved US soldiers. The soldiers would innocently follow the arrows, thinking they might lead to a "Gingerbread Hooch". The punji sticks themselves - usually coated in baser substances, such as Cobra feces - were used both as guide arrows as well as sharp-stakes, and were a primary weapon in the arsenal of the Vietnamese Army's Charlie-brigade during the Americanization of Vietnam. America's subtraction techniques proved invaluable in culling the global population; yet their noble actions were befuddled, literally at every step, once the local population introduced punji sticks into the fray. This tug-of-war operated under the classification "Police Concert in S.E. Asia", played from 1959 until 1974, before the band finally reformed back in the UK. But the Vietnamese victory cannot be attributed to the absence of corny music alone - certainly the noble punji stick holds a hallowed place of honor in the hearts of vainglorious Vietnamese nationalists, not to mention poking a god-awful hole in the foot of many an unwilling and out-attritioned US draftee. Uses during the Vietnam War |Hey Sarg! The dumb gooks left a trail we can follow!| Punji sticks are often placed on the ground, and usually deployed in substantial numbers in a line of arrows leading to ultimate doom. Other uses include placing sharp punji sticks as stakes in the ground. Punji sticks were quite often used in the preparation of an ambush.Viet Cong (VC) soldiers, waiting for the US soldiers to pass, would place hundreds of punji sticks in the areas where the surprised enemy might be expected to take cover. Thus soldiers diving for cover would be in for a really nasty surprise. This was also cited as another cause of Post-Traumatic-Stress-Syndrome in US soldiers caught in ambushes, because they were faced with the hopeless choice of either getting shot or jumping on the punji sticks. Of course, there was always the third choice of refusing induction in the first place. But that required courage. Types of holes known to contain one or more punji stick Apart from laying punji sticks on the ground as guide arrows, sharpened punji sticks would also be stuck in holes (trou de loup). For example: in a pit covered in grass, in a ditch covered in weeds, in quicksand covered in sand, in mud covered in water, or in poontang covered in Asian 'peach fuzz'. The fifth 'pit-fall' was the reason why most US soldiers claimed to be gay in Vietnam - except for the really brave ones. In fact, being fearless in Vietnam was not about war, it was about daring to shag a sexy VC babe and coming out alive afterwards. Such heroic survivors were called "Two-Timers".. When the punji stick popped out of the ground and found the soldier standing there, the point of penetration was usually in the foot or, occasionally, into the rectum. Punji sticks were not meant to kill the soldier who stepped, fell, sat on, or toyed with them; rather they were designed to tie up his unit while the unlucky schlep gets choppered out to a medical hooch - often under intense indigenous automatic weapons and small arms fire. Punji Sticks were also used in Vietnam to complement various defenses, such as army regulation lies, broken promises, international uproars, and political bullshit. Various poisons used Often the sharp tip of the punji stick would be dipped in some form of drug or poison. This was meant to infect, intoxicate, tickle, humor and/or disable the victim, potentially leading to incapacitation. Following are the most common substances used by the locals: Cobra feces, Belladonna, Spanish fly, rabid dog stool, and STD-infected blow fish urine. Some of these compounds will ruin your sex life, some of them will actually enhance your sex life, while others are just downright horrendous. If you ever get offered a chance to try a punji stick (first one is free), remember Nancy, and just say, "NO!" But if the VC offer you a 'Buddha stick', remember, don't look a gift-horse in the mouth. If you can't beat them, then join them. Ever since American sports commentator Howard Cosell vowed never to cover another bloody mismatch, the popularity of punji sticks has gone down dramatically. In the 21st century a punji stick is practically worthless in the West. If you don't believe it, just try to sell a feces-covered punji stick in downtown Manhattan...good luck even giving it away. Never-the-less, punji sticks are still listed in today's Army Manual, along with the warning, "If you happen to step on a punji stick, DO NOT STEP ON IT! - That's an order!" - Signed: Your C.O., Mr. Barak Obama. Since the end of the War, punji sticks were converted to use as weather vanes on the farms of Vietnam. It has become a tradition in all Vietnam provinces that punji stick weather vanes always point WEST as a constant reminder to any lost or love-struck US trooper still dreaming of heading home. Apart from their use as weather vanes, punji sticks are still used by the Vietnamese jungle people to trap and impale wild pigs or still missing American MIAs. It is generally accepted throughout Vietnam that MIA meat is superior to dog flesh, and is by far the gourmet food of choice. This may of course just be a Vietnamese joke, but knock three times and ask for 'Alfred E. Neugan'. You may be in for an absurd surprise. Vietnamese food is catching on in the West, although few Americans question the ingredients. Punji sticks aren't very complex. They are simply a sharpened bamboo stake. Not exactly high tech, yet they beat high tech all to hell. U.S. Commander William Westmoreland dropped more bombs on Vietnam than all of the ordinance used in WWII, yet he was still whipped by 'savages' with sharp bamboo sticks. That's almost impossible to comprehend, but, if anyone could do it, that would have to be General Westmoreland. The punji stick arrows and stakes themselves are believed to be the brain child of Sir Nygun "Punji" Van Cleefh, OVE after he read the works of A. A. Milne and the Winnie the Pooh stories. The 'pooh sticks' in that story therefore were changed from a harmless game for idle children into the deadliest weapon the American army had ever come across. Punji decided to call them 'Punji sticks' but his claims were dispute by the estate of Milne on the grounds of copyright, though the inherent absurd idea of confusing Pooh and Piglet with the Viet Cong didn't prevent Disney trying to sue the Vietnamese government. In a separate case, the estate of Fred Flintstone and his 'jungle friends' - to whom Mr. Flintstone traded the secret of 'fire' for the copyright-in-perpetuity on punji sticks - also claimed to own the patent on Punju sticks. But, legally speaking, Flintstone was merely a 'toon', endowed only with those rights to which a toon is entitled. Meanwhile, Sir Nygun holds the Vietnamese patent, which is written on rice paper using invisible ink for fool-proof political transparency. Question: Which is a more humane trap? - VN Punji stick stake pit - US Claymore mine trip-wire Answer: Punji stick puts a hole in your foot, but a Claymore mine blows off your legs. - ↑ Roughly translated as "Oy vey!" - ↑ "Police Concert in Nam," US Army, Vietnam History Studies, Washington, D. C. - ↑ Lanning and Cragg, op. cit - ↑ The American military hid this statistic. Anyone who failed trying were listed as injured while on Special Operations. Embarrassed survivors would agree with this definition of their war wound, and proudly display the medal. - ↑ Army Manual, Chap III, Pg. 96
<urn:uuid:e45557b1-bb3c-449f-af8b-44d2c348bbb1>
CC-MAIN-2015-11
http://uncyclopedia.wikia.com/wiki/Punji_stick
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00244-ip-10-28-5-156.ec2.internal.warc.gz
en
0.961683
2,004
2.625
3
The Semantic Web: A Primer by Edd Dumbill | Pages: 1, 2 Semantic Web Technologies (con'td) The W3C's Resource Description Framework is one of the cornerstones of Semantic Web work. While its somewhat unwieldy syntax often attracts negative attention from XML developers, the real value of RDF is the data model. It defines a very simple data model of triples (subject, predicate, object), where subject and predicate are URIs, and the object is either a URI or a literal. With this simple model, objects and their properties may be represented. Although the XML serialization of RDF (the "Syntax" of the RDF Model & Syntax specification) is referred to as RDF/XML, other syntaxes are being proposed to try and overcome the awkwardness of the existing syntax. For example, RDF models could just as easily be serialized using SOAP's serialization rules (see presentation at WWW9 by Henrik Frystyk-Nielsen). It is in this simple data model where the power of RDF truly lies. As long as information on the web can be reduced to triples like this, it doesn't really matter which XML serialization format is used. What isn't negotiable here though is the role of the URI as a universal identifier. The table below shows an hypothetical RDF/XML snippet, and the generated triples in the data model. <contact rdf:about="edumbill"> <name>Edd Dumbill</name> <role>Managing Editor</role> <organization>XML.com</organization> </contact> Once we have the data model, there's a need to describe the characteristics of the objects being modeled. For instance, we want to say that a "Contact" must have a name, role, and organization property. This is where RDF schemas come in -- they define an RDF vocabulary that can be used to express the "Contact" class. This allows all users of a resource of type "Contact" to have an agreed expectation of its properties and relationship to other resource types. RDF schemas differ somewhat from XML schemas (such as DTDs or W3C XML Schemas) in that they do not define a permissible syntax but instead classes, properties, and their interrelation: they operate directly at the data model level, rather than the syntax level. Scaled up over the Web, RDF schemas are a key technology, as they allow machines to make inferences about the data collected from the web. In fact, work is now underway to take RDF Schemas one step further in the description of ontologies. (An ontology is essentially a formal description of objects and their interrelationships.) The MIT/LCS has begun to define DAML (DARPA Agent Markup Language), a language for expressing ontologies. Although DAML is very much a work in progress, real work can be done now with RDF Schemas, see the section on Redfoot below. The hardest problem in this area is not the infrastructure, but the actual ontologies themselves. Until an industry-wide ontology exists for, say , vehicle parts, there is a limit to the utility of the SW in the auto manufacturing industry. Organizations such as the Dublin Core Metadata Initiative have been developing such vocabularies for some time now, and they've made progress both in terms of the ontologies themselves and also tools to manage and maintain them. Work on XML protocols -- the use of XML for messaging and remote procedure calls -- approaches the Semantic Web from the other end of the spectrum. Avoiding grand schemes for the classification of everything, it is focused on standardizing XML-based interactions between computers. A key component of XML protocol technology is the description and discovery of web services available via XML protocols such as SOAP, since systems require the ability to conduct electronic transactions with other systems of which they have no prior knowledge. This requirement has led to the creation of technologies such as Web Services Description Language (WSDL), which describes the characteristics of the interface offered by a web service, and ADS, which allows the advertisement and discovery of such services. ADS, by offering techniques for embedding such descriptions inside normal web content, fits neatly into the Semantic Web vision. (For more on WSDL and ADS, see our XML Protocol Technology Reference.) The recently announced UDDI effort also provides an API for registries of web e-business services. Although the Semantic Web vision focuses on decentralized technology as opposed to centralized registries, the emphasis on machine discovery of resources is a common theme. While the XML protocol-related technologies solve narrow problems in order to achieve results over the next year, they represent use-cases for the Semantic Web, and one expects that mature SW technologies will cater for the solution of problems such as these. The major center of Semantic Web-related development thus far has been in the area of RDF. The creation of semantically-richer documents is a relatively easy task, so most of the effort has been concentrated on accumulating the data, storing it and querying it. RDF/XML provides a useful intermediate syntax which, when combined with tools like XSLT, allows multiple data sources to be combined. Further details on RDF tools and applications can be obtained from the W3C's RDF home page, and the RDF category of XMLhack. In this section I will concentrate on introducing tools useful for making a relatively speedy start with Semantic Web development. Redland: Redland is an RDF application framework with C and Perl APIs. As a framework, most of its components are pluggable. For instance, you can choose which RDF parser you use (an important factor at this stage in RDF's development, where the emphasis on conformance for RDF parsers is not as high as it is for XML parsers). Storage mechanisms are also pluggable: currently, in-memory storage and Berkeley DB are supported. Beta-level software. Redfoot: Redfoot is a 100% Python application framework for distributed RDF applications. It provides a web interface to its RDF import, editing, and viewing functions. It also has support for RDF Schemas. One of its more intriguing features is emerging support for peer-to-peer exchange of RDF data -- peered Redfoots (Redfeet?) will be able to discover the contents of each other's stores. Easy customization of the web interface makes this a good choice for experimentation with RDF. Alpha/beta-level software. Wraf: The Web Resource Application Framework is another RDF application framework, this time written in Perl. It also offers a web interface to RDF storage, editing and querying. Alpha-level software. RSS 1.0: This work on the next generation of web site metadata distribution employs RDF for its data model and syntax. Of particular interest is its use at the W3C, where XSLT is used to extract the RSS information from the front page. Dan Connolly has documented how this was done. If you want to experiment with scraping data from XHTML pages, this is an interesting starting point. Describing and retrieving photos using RDF and HTTP: This note, written by W3C staff, describes the creation of a system allowing the description and retrieval of photographs using RDF. The RDF itself is embedded in the comment portion of JPEG files using a custom editor application, and it's retrieved through an extension to a web server. This illustrates another good starting point for doing Semantic Web development using existing web technologies: attempting to combine this work with a framework such as Redfoot would be an interesting line of investigation. The Semantic Web has already been the subject of much bluster among the XML developer community and will doubtless continue to be so. Arguments rage over the usefulness of the technology, the difficulty of using RDF, and so on. However, the Semantic Web vision of a machine-readable web has possibilities for application in most web technology -- while some complain about its lack of definition, its broad scope properly reflects the quietly radical effect it will have on the Web.
<urn:uuid:89bf02ba-f099-4c6e-a125-00ed08ec8199>
CC-MAIN-2015-11
http://www.xml.com/pub/a/2000/11/01/semanticweb/index.html?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462035.86/warc/CC-MAIN-20150226074102-00266-ip-10-28-5-156.ec2.internal.warc.gz
en
0.910583
1,710
3.078125
3
Thyroid Eye Disease Understanding Thyroid Eye Disease Graves’ ophthalmopathy, which is also known as thyroid eye disease or TED, is an eye disorder that can accompany hyperthyroidism in patients with Graves’ disease. Using sophisticated imaging techniques, such as magnetic resonance imaging (MRI), eye changes attributed to Graves’ ophthalmopathy such as swelling are seen in nearly 80 percent of patients with Graves’ disease. Incidence of Clinically Significant Disease Clinically significant eye changes requiring treatment intervention are seen in about 30 percent of patients with Graves’ disease. Overall, 80 percent of all clinically significant TED is seen in patients with Graves’ disease. Another 10 percent of cases are seen in patients with Hashimoto’s thyroiditis and the remaining 10 percent of cases are seen in patients with no evidence of thyroid dysfunction (euthyroid Graves’ disease). Many different symptoms of TED can occur although most patients develop several predominant symptoms. Common symptoms include: - Exophthalmos (proptosis or bulging) - Dryness Redness (erythema) - Eyelid lag - Eyelid retraction - Blurred vision - Foreign body sensation - Double vision (diplopia) - Staring appearance - Subtypes of TED Symptoms of TED can occur as a result of abnormal thyroid hormone levels or as an autoimmune process, which runs its own course independent of the thyroid condition. Most conditions of TED are caused when levels of thyroid hormone are too high (hyperthyroidism). These eye conditions resolve spontaneously shortly after thyroid hormone levels return to the normal range. Autoimmune TED is thought to be caused by a combination of genetic and environmental factors. TSH receptor antibodies and immune system chemicals known as cytokines both contribute to the autoimmune mechanism in TED. Environmental triggers include cigarette smoke, low selenium levels and stress. Phases of TED The autoimmune subtype of TED presents in stages or phases. In the active disease phase, which is characterized by inflammation, orbital muscles enlarge and symptoms of TED tend to wax and wane without resolving. The active phase of TED can last from several months to 5 years. The active phase is followed by a resolution phase in which symptoms tend to spontaneously resolve. Treatment of TED Corticosteroids, immunosuppressants such as methotrexate and external beam irradiation are all used to reduce inflammation during the active phase. However, because all of these treatments have the potential for serious side effects and symptoms can return when medications are stopped, therapies are usually reserved for patients who have complications or the potential for orbital nerve compression, a condition that can result in vision loss. Color vision loss is a symptom of orbital nerve compression. Once the active and resolution phases of TED have ended, orbital decompression surgery can be used to cosmetically treat any permanent changes. However, decompression surgery is rarely needed today because of spontaneous healing. If decompression surgery is performed during the active phase of TED, which was customary twenty years ago, spontaneous healing becomes impaired. Furthermore, surgical changes interfere with healing, resulting in further abnormalities and the need for further surgeries. Various natural therapies including selenium supplements, the herb bugleweed, low dose naltrexone, and stress reduction techniques have been reported to improve symptoms in TED. Antioxidant vitamins, particularly vitamins B2, D, E, and C have also been reported to help. The plant bioflavinoids, such as dark chocolate and resveratrol in red wine, are also rich in antioxidants and reported to offer improvement in TED. Avoiding environmental toxins such as cigarette smoke, aspartame in artificial sweeteners, and excess iodine in fast and processed foods also helps TED. Avoiding fans and drafts helps to prevent eye dryness. Avoiding sugar, salt, and saturated fats is also important for reducing inflammation. Drinking adequate water also helps to prevent dehydration, which exacerbates dryness and tearing. Because stress is particularly crippling to the immune system, yoga, tai chi, meditation, and forms of light aerobic exercise all help the healing process. Q. How does smoking affect thyroid eye disease? A. People with Graves' disease (GD), who smoke are 7.7 times more likely to develop thyroid eye disease (TED), also known as Graves ophthalmopathy (GO) than nonsmokers with graves' disease. Q. How are steroids used to treat thyroid eye disease? A. A short course of steroids often helps symptoms of GO, although when used at higher doses, symptoms may return in full force when the steroids are discontinued. Natural methods used to slow down the immune system, including dietary changes, can also help reduce symptoms. Q. How many Graves' patients can expect to develop GO? A. With sophisticated imaging tests, nearly all GD patients show evidence of ocular changes. However, clinically significant GO only occurs in 10% to 25% of GD patients. Of these, only 5% have severe GO. Q. How do doctors classify the severity of eye symptoms? A. Eye symptoms are classified by a system called NOSPECS with class 0 = no symptoms and class 6 = sight loss due to optic nerve compression. Source: Elaine Moore, “Thyroid Eye Disease, Understanding Graves' Opthalmopathy”, Sara Health Press, 2003. © 2003-2011 by Elaine Moore
<urn:uuid:ea1c9f89-1a60-4556-873d-1e18d9a09f32>
CC-MAIN-2015-11
http://www.elaine-moore.com/Articles/GravesOphthalmopathy/ThyroidEyeDisease/tabid/63/Default.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00157-ip-10-28-5-156.ec2.internal.warc.gz
en
0.938247
1,123
2.953125
3
The Cloud Privacy Illusion Laws around the world allow governments free access to data in the cloud. What may come as a surprise is that Mutual Legal Assistance Treaties facilitate cooperation across international boundaries. Under these MLATs, the U.S. and EU member states allow law enforcement authorities to request data on servers of cloud providers located in any countries that are part of the MLATs. Privacy in the cloud may be an illusion, given the known cybersecurity risks, not to mention the laws in the U.S. and around the world that permit government agencies relatively easy access to remote data including data stored in the cloud. Of course, businesses have relied on storing data in the cloud for more than 50 years. While many companies take great pains to protect cloud data from cyberthreats, they have no way to prevent governments from freely accessing their cloud data. Companies using the cloud may not realize that cloud data is more vulnerable than other remotely stored data, including data held in disaster recovery locations. Generally, IT security experts are alarmed that most businesses that use the cloud do not consider how vulnerable their data is from a cybersecurity standpoint. Oftentimes, cloud solutions are chosen by businesses to reduce IT infrastructure costs, with little regard for the actual security of cloud data from cybercriminal or government access. Most will remember that in the aftermath of 9/11, the U.S. Patriot Act became law. The Patriot Act permits the U.S. government, without court orders, to have simplified access to telephone, email, and electronic records to gather intelligence in the name of national security. The official name of the Patriot Act says a great deal about its purpose: "Uniting and Strengthening America by Providing Appropriate Tools Required To Intercept and Obstruct Terrorism Act of 2001." Of course before there was a Patriot Act, law enforcement agencies had access to many types of data, including cloud data, by conventional means, such as obtaining court-issued search warrants. Another example is the Foreign Intelligence Surveillance Act (FISA), passed in 1978 and amended by the Patriot Act, which addresses other approaches to electronic surveillance and collection of foreign intelligence information. Conclusions About Government Access We are not alone. Laws around the world allow governments free access to data in the cloud. What may come as a surprise is that Mutual Legal Assistance Treaties (MLATs) facilitate cooperation across international boundaries. Under these MLATs, the U.S. and EU member states allow law enforcement authorities to request data on servers of cloud providers located in any countries that are part of the MLATs. On May 23, 2012, international law firm Hogan Lovells published a white paper entitled " A Global Reality: Government Access to Data in the Cloud." Some of the white paper's conclusions: On the fundamental question of governmental access to data in the Cloud, we conclude, based on the research underlying this White Paper, that it is not possible to isolate data in the Cloud from governmental access based on the physical location of the Cloud service provider or its facilities. Government's ability to access data in the Cloud extends across borders. And it is incorrect to assume that the United States government's access to data in the Cloud is greater than that of other advanced economies.The White Paper makes this additional observation when comparing the U.S. Patriot Act to comparable European laws: ... our survey finds that even European countries with strict privacy laws also have anti-terrorism laws that allow expedited government access to Cloud data. As one observer put it, France's anti-terrorism laws make the Patriot Act look "namby-pamby" by comparison.The analysis of the MLATs in the Hogan Lovells' white paper continues with details about the following countries: U.S., Australia, Canada, Denmark, France, Germany, Ireland, Japan, Spain and the United Kingdom. If your company does business in any of those countries, you may want to become more aware of the data privacy risks. When Does the US Government Need a Warrant? Prior to the enactment of the Patriot Act, search and seizure of Internet data was generally subject primarily to the protections afforded by the 4th Amendment of the Constitution: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.The decision by a judge to issue a warrant to permit a search and seizure includes balancing the need for the search against the protected interests of liberty, property and privacy. In the context of electronic data, the diversity of data types and sources has led to a variety of approaches as to what constitutes a reasonable search and seizure. Depending on the jurisdiction, as well as the device or data sought or investigation pending, a court may require different levels of detail before issuing a warrant. For this discussion, the term "devices" will broadly refer to desktops, laptops, cellphones, tablets, external hard drives or memory storage, or any other computer-related technologies that could store or transmit data. One of the first distinctions to make is whether the data sought is "inside" or "outside" a device. "Inside" and "outside" helps to establish who possesses the data and what laws may regulate it. Another distinction is between personal or non-personal use. Further, the "expectation of privacy" is important to the evaluation of a reasonable search, and that expectation is impacted by the location of the data. When data resides on a computer used strictly for personal matters, there is a greater expectation of privacy than if the data is stored on a device used for a business or government purpose. Similarly, where the data may be available for some public access, there is less or no expectation of privacy. In a criminal matter, if the data are "inside" the device, there are issues of verifying who was using the device when the crime occurred, locating the device, obtaining the search warrant or consent to search, and forensic analysis of the device. If the data is "outside" the device, then collecting the data probably invokes the 1986 Stored Communications Act, which law controls data posted by users on Internet hosts such as Facebook, Google, LinkedIn and other social media sites. Based on Terms of Service (which very few people read), Internet hosts rarely provide any information in a civil lawsuit unless the owner of that data agrees in writing, relying on the Stored Communications Act in a civil proceeding -- but governments can get that same data in a criminal proceeding without the permission of the owner of the data. Privacy Groups and Government Access to the Internet Among the many privacy issues the Electronic Privacy Information Center (EPIC) focuses on are those implicated in the Patriot Act and relating to personal data stored on the cloud and remote Internet sites. EPIC's overview of the Patriot Act includes these statements: The implications for online privacy are considerable. ... The Act also extends the government's ability to gain access to personal financial information and student information without any suspicion of wrongdoing, simply by certifying that the information likely to be obtained is relevant to an ongoing criminal investigation.The impact of the MLATS between the U.S. and EU is not discussed by EPIC, but EPIC does devote a great deal of resources to monitoring privacy in the EU. There, Directive 95/46 of the European Parliament and the Council of 24 October 1995 was established ... to provide a regulatory framework to guarantee secure and free movement of personal data across the national borders of the EU member countries, in addition to setting a baseline of security around personal information wherever it is stored, transmitted or processed.The Electronic Frontier Foundation (EFF) also dedicates a great deal of resources to protect privacy and specifically focuses on the Patriot Act. The EFF produced a white paper entitled "Patterns of Misconduct: FBI Intelligence Violations from 2001-2008" based on a review of about 2,500 pages of FBI documents secured from Freedom of Information Act requests. The EFF White Paper states the following: The documents suggest that FBI intelligence investigations have compromised the civil liberties of American citizens far more frequently, and to a greater extent, than was previously assumed. ... From 2001 to 2008, the FBI engaged in a number of flagrant legal violations, including: - submitting false or inaccurate declarations to courts. - using improper evidence to obtain federal grand jury subpoenas. - accessing password protected documents without a warrant. Assuming the EFF's findings are accurate regarding the FBI's access to personal data on the Internet, the privacy expectation of Internet data in the U.S. should be of concern to the business community. In ConclusionSecurity of data in the cloud should be of concern to all businesses, whether that concern is due to cybercriminals or governments. In particular, businesses relying on the cloud should be mindful of these privacy risks of cloud data being captured by governments, foreign and domestic.
<urn:uuid:a72eb91d-e229-4934-b656-0022e77af851>
CC-MAIN-2015-11
http://www.linuxinsider.com/story/75848.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.937978
1,848
3.03125
3
|Scientific Name:||Tarsius bancanus| |Species Authority:||Horsfield, 1821| |Infra-specific Taxa Assessed:| Tarsius natunensis Chasen, 1940 |Taxonomic Notes:||The taxonomy of this species is disputed, with some subspecies considered dubious (Brandon-Jones et al. 2004). Indeed, little work has been done on T. bancanus in the past 20 years and a taxonomic revision based upon intensive and systematic field surveys is overdue. Until more definitive evidence is available, and given that these allopatric populations have already been named as separate taxa, it is more conservative to treat them as distinct than not.| |Red List Category & Criteria:||Vulnerable A2cd ver 3.1| |Assessor(s):||Shekelle, M. & Yustian, I.| |Reviewer(s):||Mittermeier, R.A., Rylands, A.B. (Primate Red List Authority) & Hoffmann, M. (Global Mammal Assessment Team)| Over the last 20 years (approximately three generations), at least 30% of the habitat has been lost, qualifying this species as Vulnerable where population reduction is inferred based on habitat loss. In addition, levels of exploitation can be regionally high for the pet trade, yet impacts at the population level are unknown. Further research is needed (taxonomic, threat and ecological) in order to further assess this species. |Range Description:||This species is found in Brunei, Indonesia (Bangka, Belitung, Karimata, southeastern Sumatra, Serasen in the South Natuna Islands, and Kalimantan Borneo), and Malaysia (Sabah and Sarawak) (Groves 2005). The distribution in Sumatra is unknown but is thought to be delimited by the Musi River. Tarsius bancanus saltator Confined to the island of Belitung (Billiton), Indonesia. Tarsius bancanus natunensis Confined to Serasan (Sirhassen) in the South Natuna Islands, and possibly nearby Subi Island, Indonesia. Tarsius bancanus borneanus Occurs in Brunei, Indonesia (Kalimantan Borneo and Karimata Islands) and Malaysia (Sabah and Sarawak Borneo) and on the island of Karimata (Indonesia). Tarsius bancanus bancanus Occurs in southeastern Sumatra and the island of Bangka, Indonesia. Native:Brunei Darussalam; Indonesia; Malaysia |Range Map:||Click here to open the map viewer and explore range.| |Population:||Density has been variously calculated at 80 animals/km2 in Sarawak (Niemitz 1979, 1984), 15-20 individuals/km2 in Sabah (Crompton and Andau 1986, 1987), and 19-20 individuals/km2 in Belitung (I. Yustian pers. comm.). Based on satellite studies of the extent of available habitat on Belitung Island, Yustian (2006) estimated a total population for T. b. saltator of 29,440 (Yustian unpubl. data).| |Habitat and Ecology:|| This species can live in both primary and secondary forest, as well as along the coasts or on the edge of plantations (Niemitz 1979). This is often described as a lowland species, most common below 100 m elevation; however, there is at least one record from 1,200 m from the Bukit Baka-Bukit Raya National Park in western Kalimantan (Gorog and Sinaga in press). The species is 100% carnivorous, eating mainly insects (including beetles, grasshoppers, cockroaches, butterflies, moths, praying mantis, ants, phasmids, and cicadas), but also small vertebrates (including bats, snakes, and birds) (Niemitz 1979). These animals are nocturnal and exhibit adaptations for vertical clinging and leaping modes of locomotion and prey capture (Roberts 1994). They spend a majority of their time below 2 meters off the ground and only 5% above 3 meters (Niemitz 1979, 1984; Crompton and Andau 1986, 1987). |Major Threat(s):||The principle threat is habitat loss due to forest conversion, especially due to expanding oil palm plantations, fires and logging. The species is collected for the illegal pet trade, particularly, it is thought, in the vicinity of Lampung and Way Kambas National Park. It is wrongly considered a pest to agricultural crops, and can suffer, directly and indirectly, from contamination from agricultural pesticides.| The species is protected by law in Indonesia and in Malaysia, and is listed in CITES Appendix II. T. b. bancanus occurs in a few protected areas, such as Bukit Barisan Selatan National Park, Kerinci Seblat National Park, Way Kambas National Park (Indonesia) (M. Richardson pers. comm.); T. b. borneanus occurs in several protected areas, including Tasek Merimbun Sanctuary (Brunei); Bukit Baka Bukit Raya National Park, Kayan Mentarang National Park (Indonesia); Bako National Park, Gunung Malu National Park, Kinabalu National Park, Sapagaya Forest Reserve, Semengo Forest Reserve, Sepilok Forest Reserve (Malaysia) (M. Richardson pers. comm.); while T. b. saltator and T. b. natunensis do not occur in any protected areas. |Citation:||Shekelle, M. & Yustian, I. 2008. Tarsius bancanus. The IUCN Red List of Threatened Species. Version 2014.3. <www.iucnredlist.org>. Downloaded on 01 March 2015.| |Feedback:||If you see any errors or have any questions or suggestions on what is shown on this page, please provide us with feedback so that we can correct or extend the information provided|
<urn:uuid:de5e08dd-8dcb-4b35-9d12-75e2d37ee521>
CC-MAIN-2015-11
http://www.iucnredlist.org/details/summary/21488/0
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462555.21/warc/CC-MAIN-20150226074102-00029-ip-10-28-5-156.ec2.internal.warc.gz
en
0.81502
1,318
2.5625
3
|Birth: ||Jun. 17, 1862, Germany| |Death: ||Jun. 26, 1941| Hulda emigrated on August 07, 1865 from Klein Klonia, Prussia to the USA arriving in Chicago with her parents. One story is of Hulda, which demonstrates her spirit, ingenuity and resourcefulness Hulda was turned into the Water Commissioner, Graves Benson, for illegally using water from Greaser Creek. For the first complaint, Hulda was issued a warning and told not to use any water. The second time the Commissioner shut her head gate down and tagged it; thus preventing her from opening her head gate legally to use the creek water for irrigating her fields. He told her that any water she could use would be from a whisky barrel, like she used to catch rainwater from the eaves. Taking him at his word, Hulda dug a trench alongside her head gate and laid a wooden barrel with the end knocked out for the water to run through. When the Commissioner was called back on the next complaint, Benson had no recourse. He said that she had done just what he'd told her. So he left her alone and she continued with her irrigation. While living in the Valley, George always had problems with sleeping and being able to breathe well. With their children grown, George and Hulda hitched up their team and wagon to tour different areas, camping out in different locations trying to find a place where he was able to get some rest. They spent time near the Huerfano Butte, then on to the Greaser Creek area near Gardner. The first night there George was able to breathe and sleep better. This was the deciding factor in their decision to homestead in the Greaser Creek area. Both George and Hulda received Homestead patents, with Hulda purchasing the Howser place in 1921. So along with Daniel's place deeded to them in 1897, they had scattered places in two counties in which to manage. They had a matched trotting team, stocking legged, bald-faced sorrels that were hooked to a buggy used for their transportation to go back and forth among the three places to take care of crops on the many acres. Bob McClain had acreage close to Badito where Hulda and George would camp out for a few days while they picked wild plums to make into their winter supply of jams and butters. Hulda always had coffee along with fresh baked bread and thick, spicy apple butter to offer anyone who stopped by. She used Ben Davis apples in making her well-known apple butter in a big black iron kettle. The butter then was stored in big stone crocks. WET MOUNTAIN TRIBUNE [WESTCLIFFE, CO], JULY 4, 1941 PIONEER RESIDENT SUCCUMBS Funeral services were held Saturday morning at the Community Church for Mrs. Hulda Baker who died Thursday at the home of her daughter, Mrs. Claud Stephens, after a prolonged illness. Mrs. Baker was born in Germany on June 17, 1862 and came to this country at the age of four. In 1877 she married George W. Baker and to that union six children were born, four boys and two girls, of which three boys and her husband preceded her in death. She passed away at the age of 79 years and 8 days. She is survived by one son, Albert Baker of Gardner, two daughters, Mrs. Claud Stephens of Westcliffe and Mrs. Charles Schmidt of Gardner, four sisters, Mrs. Mollie Eikelman of Westcliffe, Mrs. Lena Koch of Hillside, Mrs. Amanda George [Georges], and Mrs. Hyrm [Hyram] Perkins of California, ten grandchildren and nine great grandchildren. Obsequies were held by Rev. G. W. Ellis with the Menzel Funeral Home in charge, and interment was held at the Rosita cemetery with John Reis, Harvey Belisle, Chas. Jones, Gottlieb Hallauer, Carl Kiesler [Kiesler] and Ray Vickerman acting as pallbearers. June 26, 1941 Walsenburg World Independent Pioneer Resident of Westcliffe Dies Thursday Mrs. Hulda Baker, a long time resident of Gardner and Westcliffe communities, dies at Westcliffe Thursday, it was learned here today. She is survived by four sisters, two in Westcliffe and two now residing in California; one son, Albert Baker of Gardner, two daughters, Mrs. Claud Stevens and Mrs. Charles Schmidt both of Gardner, by ten granchildren and nine great-grandchildren. Funeral services will be help Saturday morning at 10 o'clock at the Westcliffe Community Church, the Menzel Mortuary in charge. Interment will be at the Rosita Cemetery. Wilhelm Friedrich Knuth (1838 - 1911) Justine Pauline Friedriche Totz Knuth (1833 - 1919) George Washington Baker (1850 - 1924) Edgar Secoy Baker (1870 - 1897)* John D. Baker (1880 - 1882)* James Baker (1881 - 1882)* Albert Daniel Baker (1882 - 1947)* Lily Amanda Baker Stephens (1883 - 1971)* Naomi Gustina Baker Schmidt (1885 - 1958)* Johann Friedrich Wilhelm Knuth (1859 - 1897)* Hulda Henriette Knuth Baker (1862 - 1941) Lena Pauline Knuth Koch (1867 - 1952)* Amalia L Knuth Eikleman (1870 - 1966)* Helmuth F Knuth (1872 - 1924)* Amanda Knuth Carpenter (1873 - 1948)* Created by: Betty L. Schmidt Record added: Sep 04, 2010 Find A Grave Memorial# 58161541
<urn:uuid:2391f79b-28d3-4005-b431-3e88620e623b>
CC-MAIN-2015-11
http://www.findagrave.com/cgi-bin/fg.cgi?page=gr&GSvcid=213317&GRid=58161541
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00157-ip-10-28-5-156.ec2.internal.warc.gz
en
0.960531
1,205
2.6875
3
(for veterinary information only) 200 mg, 250 mg, 333 mg & 500 mg Erythromycin began its story as an antibiotic of the macrolide class (the same class as tylosin and azithromycin). It is made naturally by the bacterium “Streptomyces fradiae” and acts to inhibit bacterial protein synthesis by inhibiting a cellular structure only certain bacteria have/use to make internal proteins. This structure is called the "50S ribosome." This process works well because non-bacterial cells use a different type of ribosome called a "60S ribosome." Lower doses of erythromycin stop bacteria from reproducing but technically do not kill them. The patient's immune system must be able to finish the job. Antibiotics of this type are called "bacteriostatic" antibiotics. At higher doses, erythromycin can kill bacteria out right which makes it also a "bacteriocidal" antibiotic. One type of bacteria that tend to be sensitive to erythromycin are the Staphylococci. This has made erythromycin popular for skin infections (which almost always involve Staph. bacteria). Numerous other bacteria are also sensitive to erythromycin; however, newer drugs have come along leaving erythomycin with its three times daily dosing schedule to be prescribed less and less in favor of antibiotics given twice or even once a day. Today erythryomycin has seen some resurgence in popularity. This is partly because of over-use of drugs that had previously eclipsed erythromycin. Staphylococci developed resistance to the new drugs leading to a return to older drugs. Further, a new property of erythromycin was elucidated, one not relating to its antibiotic properties. Erythromycin has what are called "pro-kinetic effects"in the stomach which means it is able to normalize the rhythmic contractions of a flaccid stomach. This helps relieve nausea and facilitate digestion. Doses used for this purpose are too low to achieve antibiotic activity against bacteria. Erythromycin is one of the few drugs that is able to penetrate the prostate gland and treat infection there while most other antibiotics are stopped by the "blood-prostate" barrier. This ability to treat prostatitis also presents an opportunity where erythromycin might be selected, though, again dosing three times daily generally makes inconvenient dosing. Erythromycin is used as a stomach pro-kinetic agent as described. It is also used as an antibiotic against infections as described above. It is also the treatment of choice for intestinal infections caused by Campylobacter bacteria. The most common side effects are nausea, diarrhea, and appetite loss. Erythromycin should not be used with other drugs that bind the bacterial 50S ribosome or they will compete with each other and interfere with each other. Such other drugs include: clindamycin, lincomycin, chloramphenicol, azithromycin, tylosin. Erythromycin is synergized (i.e. works even better) when combined with rifampin or sulfa class antibiotics. Theophylline, an airway dilator, can reduce clearance of erythromycin from the body thus making toxicity more likely. Other drugs that can increase blood levels of erythromycin include omeprazole (an antacid) and the azole class of antifungal drugs (ketoconazole, itraconazole, and fluconazole.) Sucralfate, a medicine used for stomach ulcers, can interfere with the absorption of erythromycin. Administration of these medicines should be separated by 2 hours. When erythromycin and digoxin, a heart medicine, are used concurrently the digoxin blood level will be higher and potentially could be toxic. Other drugs that may also show unexpectedly high blood levels when combined with erythromycin include: bromocriptine (used for female hormone imbalances), buspirone (an anti-anxiety medicine), cyclosporine (an immunomodulator), alprazolam (an anti-panic drug), theophylline (the airway dilator mentioned above), and sildenafil (used for pulmonary hypertension) . The pro-kinetic effect of erythromycin may be diminished over time as the patient develops tolerance to the drug. This situation can be mitigated and possibly actually avoided by combining erythromycin with metoclopramide, another pro-kinetic drug. The oral suspension of erythromycin should be stored in the refrigerator, however, after it is dispensed it can be stored at room temperature for up to 14 days. **THIS DRUG IS TOXIC TO GUINEA PIGS, HAMSTERS, RABBITS AND GERBILS! THIS DRUG IS NOT SAFE FOR USE IN CATTLE OR ADULT HORSES. This drug is considered able to cause birth defects and should not be used during pregnancy. The use of erythromycin will falsely elevate the liver enzymes ALT and AST on a blood test. This is not harmful but the veterinarian should be aware of this reaction. Page last updated: 10/10/2013
<urn:uuid:e0738345-a511-48c3-8c3d-710e5ca12f62>
CC-MAIN-2015-11
http://marvistavet.com/html/body_erythromycin.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464193.61/warc/CC-MAIN-20150226074104-00205-ip-10-28-5-156.ec2.internal.warc.gz
en
0.911614
1,142
3.03125
3
“I certainly shall not. You know how I detest it, unless I am particularly acquainted with my partner. At such an assembly as this it would be insupportable. Your sisters are engaged, and there is not another woman in the room whom it would not be a punishment to me to stand up with. Pride and Prejudice, Chapter 3 Oh, dear…the unreconstructed Darcy at his worst. He didn’t make many friends that evening at the Meryton Assembly did he? But, do you ever wonder about the nature of pubic assemblies and how they began? Assembly Rooms epitomise , for me at least, certain aspects of Georgian life which have disappeared for ever: public assemblies of the company, where local people -often of differing social classes- could socialise, dance ( in the Ballroom), gamble ( in the Card Room) and take fashionable refreshments ( in the Tea Room). If the intricacies of this type of entertainment has ever intrigued you while reading Jane Austen, then this next short series of posts is for you. Let’s look at how they began, developed, the sort of rooms they begat, their rules and the personnel involved, and the ones Jane Austen knew.(Well, that should keep us busy for the next few days….) The fashion for public assemblies- balls where people from the genteel or trade classes in an area could meet together to socialise in an elegant environment -began in the early 18th century. The first assemblies were where genteel people met for conversation, taking tea and playing cards. Dancing was added to the agenda soon after, and during the 1720s this type of assembly became very, very popular. These first public assemblies were held in any large room or building which could accommodate a great gathering of people who wanted to dance country dances. The very nature of these dances called for a long room, that is longer than it was wide. An example of an existing building being adapted for use for assemblies, is the Guildhall in Boston, Lincolnshire. In early 18th century Boston assemblies were held not in a specially built set of assembly rooms but in “The Big Room” in the Guildhall, a building which was originally built in the 14th century. The room was newly fitted out with sash windows, it had a first floor gallery for the musicians and it had benches fitted around the walls to accommodate those not dancing. This was to become the pattern for ballrooms in sets of assembly rooms all over the country. Here, below, is an illustration by Rowlandson from my copy of The Poetical Sketches of Scarborough,(1813) and it contains many elements with which we are familiar from reading Jane Austen’s descriptions of balls. Let’s look at the print in some detail. You can see that the ballroom is separated from the tea room and the card room by arches; the musicians are above the company in a gallery, just visible to the right of the picture: You can also see that those not dancing are promenading about, and some are sitting on benches arranged around the walls, to the rear of the picture , under the curtained windows. There are chaperones, older men and couples. Note the presence of a clergyman -dressed in black, centre front- dancing, just like Mr Collins would do at the Netherfield Ball. And also note the presence of children, to the right of the picture, exactly as Jane Austen describes in this scene from her unfinished fragment, The Watsons. The assembly scene in this fragment is full of exquisite details, and confirms that the presence of young children was a usual thing. In this scene, quoted below, the young boy, Charles, is disappointed when Miss Osbourne quite unfeelingly fails to dance with him preferring instead to dance with Colonel Beresford, despite having previously promised Charles a dance: If the poor little boy’s face had in its happiness been interesting to Emma, it was infinitely more so under this sudden reverse; he stood the picture of disappointment, with crimsoned cheeks, quivering lips, and eyes bent on the floor. His mother, stifling her own mortification, tried to soothe his with the prospect of Miss Osborne’s second promise; but though he contrived to utter, with an effort of boyish bravery, “Oh, I do not mind it!” it was very evident, by the unceasing agitation of his features, that he minded it as much as ever. Emma did not think or reflect; she felt and acted. “I shall be very happy to dance with you, sir, if you like it,” said she, holding out her hand with the most unaffected good-humour. The boy, in one moment restored to all his first delight, looked joyfully at his mother; and stepping forwards with an honest and simple “Thank you, ma’am,” was instantly ready to attend his new acquaintance. The thankfulness of Mrs. Blake was more diffuse; with a look most expressive of unexpected pleasure and lively gratitude, she turned to her neighbour with repeated and fervent acknowledgments of so great and condescending a kindness to her boy. Emma, with perfect truth, could assure her that she could not be giving greater pleasure than she felt herself; and Charles being provided with his gloves and charged to keep them on, they joined the set which was now rapidly forming, with nearly equal complacency… It is very apparent that Jane Austen knew, from her descriptions of balls and assemblies in her novels, that people not only found happiness, but sometimes humiliations in these places. Back to assemblies…It soon became clear that these assemblies were an ideal place for a marriage market to thrive. Daniel Defoe in his Tour of Great Britain (1727) was appalled by this aspect of assembly balls. In his withering comments made on the Winchester and the Dorset assemblies, you can clearly see that he was not at all impressed. With regard to the assemblies in Winchester, where the gentry and wealthy clergy mixed, he dourly and ironically noted that: As there is such good company, so they are gotten into that new-fashioned way of conversing by Assemblies. I shall do no more than mention them here: they are pleasant and agreeable to the young people,and sometime fatal to them, of which in its place Winchester has its share of the mirth: may it escape the ill consequences… In Dorset he noted that the ladies: …do not want the Help of Assemblies to assist in match-making; or half pay officer to run away with their daughters… Mrs Bennet ought, perhaps,to have taken note. These assemblies became, quite understandably, very popular, despite Defoe’s misgivings, and soon they developed from being held in rooms in existing buildings or inns(as in the Crown in Emma) to being put on in purpose-built sets of Assembly Rooms, and these began to spring up in towns all over the country. The earliest purpose-built rooms to survive are those in Stamford in Lincolnshire, which I wrote about, here . You can see , in the picture of the ballroom, above, the raised dais for the musicians,( a development of the late 18th century), the benches set around the walls, the fireplaces to keep people warm and the magnificent chandeliers to provide an expensive and beautiful illumination to the room. Compare it to the Scarborough picture above, and you will find many common elements. This set was first built in 1726. Lord Burlington designed the Assembly Rooms in York, and they were built between 1728-30, but sadly they were a triumph of form over function. The ballroom was a beautiful but rather impractical design: a recreation of an “Egyptian Hall”, which you can see here, below, hosting a modern “Georgian Ball”: The room, though stunningly beautiful, originally had no gallery for the musicians and no heating. Chaperones and spectators had to view the dancing through the colums which lined the area for dancing, and when benches were eventually introduced to make their watch more comfortable, they made the space rather cramped. The area for dancing also disappointed: at 28 feet wide it was rather too narrow for the two parallel sets of dancers which was the norm for large assemblies. The purpose-built assembly rooms nearly always followed a similar pattern: here is the floor-plan of the Upper Rooms at Bath, as designed by John Wood, and you can clearly see the large ballroom with its musicians gallery, the separate card room (which also had a musicians gallery),where Mr Allen in Northanger Abbey took refuge from the dancing and talk of muslins, and the tea room where refreshments could be taken. Note also the colonnade for the sedan chairs used so profusely in the Bath terrain, and the separate entrance for carriages. Similar smaller sets of rooms were found in many provincial towns and many had impressive features, for their object was to promote not only the impression that the rooms were a place of enjoyment but, importantly, were also an elegant place for “the company” to gather together. Hertford, which we have seen was most probably the inspiration for Jane Austen’s Meryton, had the impressive Shire Hall, below: This large building, designed by the architect, Robert Adam’s brother, James, was multi-purpose. It not only houses a ballroom where dances took place, but the courts where criminal and civil cases were (and are) heard. Very handy for Sir William Lucas,as we shall see later in this series;) Next, how these rooms were used.
<urn:uuid:490a84e8-4fd3-4a18-ad9e-fb24c4244692>
CC-MAIN-2015-11
http://austenonly.com/2013/02/14/an-assembly-as-this-georgian-assembly-rooms-part-one/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.982966
2,037
2.65625
3
Tips for Freezing and Thawing Foods by Jyl Steinback - Freezer temperatures should never go above 0°F; fluctuating temperatures can affect the quality of frozen foods. - Supermarket wrappings are safe for most foods frozen 1 to 2 months, but for best quality, overwrap packages with heavy-duty freezer materials or store in plastic freezer bags. - Cool foods quickly before packaging. Don't let food stand at room temperature longer than 30 minutes before freezing. - Freeze food as soon as it is cooled to room temperature (or refrigerate in shallow containers uncovered until cooled, then package and freeze). - Label all foods with recipe name, date, number of servings, thawing and reheating directions and "use-by" date. - Do not overload your freezer with new foods; add no more than 2 to 3 pounds of food per cubic foot of freezer capacity so air can circulate for proper freezing. - Leave space between packages so air can circulate around them. - If you are unsure about the quality of certain foods after freezing, freeze a small amount first and test for quality after thawing and reheating. - Frozen raw foods that have been cooked can be refrozen (i.e., fresh chicken > packaged and frozen > thawed > cooked > frozen > thawed > reheated). - You can refreeze unused portions of cooked foods that have previously been frozen and thawed in the refrigerator. - Seal containers with as little air as possible unless freezing liquid or semiliquid foods that expand when frozen. Leave a 1 1/2-inch space below the rim to allow for expansion. - When freezing casserole dishes or containers with empty space between the food and lid, fill "dead spaces" with crumpled wax paper. - Store food in 1-gallon freezer bags; press out all the air and seal tightly so bags can be stacked on top of each other. - Do not freeze tomato-based or other acidic foods in aluminum baking pans, or cover them with aluminum foil. How to Prevent Freezer Burn - Freezer burn occurs when foods are frozen for an extended period of time or not properly wrapped and sealed. Even though these foods do not pose any health risks, the freezer-burned areas will be dried out and tasteless. For best results, cut away freezer-burned portions before or after cooking. - When wrapping foods for freezing, get as much air out as possible so moisture cannot get in. Vacuum-packing in FoodSaver® bags removes the air and keeps moisture out so foods can be frozen longer without freezer burn. - Use moisture- and vapor-resistant packaging that can be tightly sealed. Thawing Foods Safely - NEVER defrost perishable foods (meat, poultry, fish/seafood, dairy, eggs) outdoors, in a cold room in the house or on the kitchen counter. - Refrigerate meat/poultry/seafood or casseroles 24 to 48 hours or until completely thawed. Foods thawed in the refrigerator can usually be safely refrozen without changing taste or quality. - Allow 8 hours per pound of meat. - Allow 4 hours per pound of poultry. - Allow 6 hours per pound of fruit or vegetables. - For fast thawing, place frozen packages in a watertight, sealed bag and cover with cold water. Change water every 30 minutes until food is completely thawed. - In microwave oven: - Remove food from store wrapping (foam trays or plastic wrap) that may release chemicals into foods. - Allow 6 to 8 minutes per pound of food when thawing in microwave on low heat. Once food is defrosted, reheat on high heat. - Precooked foods low in moisture content (breads, cakes, cookies) can be thawed at room temperature. - Precooked foods higher in moisture content and/or containing dairy or egg products should be thawed in the refrigerator. - Reheat all previously cooked food to an internal temperature of at least 165°F. The food must reach this temperature within 2 hours. If the food will not reach this temperature within 2 hours, reheat it in small batches to shorten the reheating time. - Use a clean meat thermometer to check internal food temperatures. - Reheating frozen food without thawing: - Bake at 300 to 350°F for almost double the original cooking time. - Cooking frozen foods at higher temperatures does not result in quicker cooking. Higher temperatures will cook the outside before the inside is completely thawed. - Microwave reheating: - Cook until foods are steaming and hot (at least 165°F). - Cover foods with microwave-safe wrap; vent to prevent steam buildup. - Stir foods from the outside in to encourage even heating. - CAUTION: Be careful when opening microwaved plastic bags as steam can build up and cause burns when bags are opened. - When microwaving food in a FoodSaver bag, be sure to snip off a corner for venting. - Leftovers should be refrigerated as soon as possible. - Cut meat into slices (3 inches thick or less). - Store leftovers in small, shallow containers to hasten cooling. - Remove all the stuffing from turkey, chicken or meat and store separately. What "Use-By" and "Sell-By" Labels Really Mean - Use-By: Food is no longer acceptable for consumption and should not be purchased or used after the given date. - Date of Pack or Manufacture: This date refers to when the food was packed or processed for sale. Freeze food that will not be used within 3 to 5 days of purchase. - Freshness, Pull-or Sell-By: This refers to the last day that a particular food should be sold, but can be safely used for 1 week past the "sell- by" date (i.e., dairy and fresh bakery products). - Use Before or Best if Used By: This refers to the date at which food may begin to lose quality but can still be used safely (i.e., frozen foods, cereals, canned food, pasta, rice). - Fresh-cut and packaged, canned or frozen vegetables and fruits - Jarred minced garlic or garlic powder instead of fresh garlic cloves - Bottled marinades - Shredded cheese - Precooked chicken breast tenders, slices or cuts Excerpted from Cook Once, Eat for a Week by Jyl Steinback. Copyright © 2003 by Family Fit Lifestyle, an Arizona Corporation.To order this book go to Amazon.
<urn:uuid:f4dda6d9-ed4b-43e2-ba39-da871b54bfc4>
CC-MAIN-2015-11
http://life.familyeducation.com/foods/safety/36570.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461612.31/warc/CC-MAIN-20150226074101-00200-ip-10-28-5-156.ec2.internal.warc.gz
en
0.884818
1,394
2.78125
3
Fibromyalgia is a chronic illness that causes aches, pains, and extreme fatigue. The symptoms are similar to those caused by arthritis, but unlike arthritis, it doesn't cause damage to the joints and muscles. Anyone can get fibromyalgia, but those most commonly affected are: - Women in their 20s and 30s - People who have a disease that affects the joints, such as rheumatoid arthritis, lupus, or ankylosing spondylitis Fibromyalgia tends to get worse at times and better at others. It may never go away completely, but you can feel better with treatment. What causes it? Doctors aren't sure what causes fibromyalgia, but they think it's related to a problem with how the body processes pain signals, causing it to overreact to pain signals. Fibromyalgia is often brought on by an injury, an infection, or stress. It seems to run in families, so the tendency to get it may be at least partly inherited (genetic). What are the symptoms? The most common symptoms of fibromyalgia are: - Tenderness. One of the key features of fibromyalgia is the presence of specific "tender points" on the neck, shoulders, arms, legs, back, and hips. Even light pressure on these points may be painful. - Pain. The pain is widespread and affects different parts of your body at different times. Your muscles and joints may throb, ache, or burn. You may feel stiff when you wake up in the morning. - Fatigue. You may feel so exhausted that you have trouble getting through the day. - Sleep problems. You may have trouble getting enough deep, restorative sleep. Fibromyalgia may cause other symptoms, too. These include irritable bowel syndrome, headaches, restless legs syndrome, trouble thinking or remembering (sometimes called "fibro fog"), anxiety, and depression. How is it diagnosed? People sometimes live with the pain and fatigue for some time before they are diagnosed with fibromyalgia. Its symptoms are similar to those of many other conditions and it often occurs along with other diseases. Doctors usually have to rule out these diseases before fibromyalgia can be pinpointed. Doctors rely on a physical exam and a history of symptoms to diagnose it. You may be diagnosed with fibromyalgia if you have: - Widespread pain for at least 3 months - Pain or tenderness at 11 out of 18 specific "tender points" - Symptoms that can't be explained by another problem There are no blood tests or x-rays that can diagnose fibromyalgia, but a doctor might do these tests to help rule out another problem that causes similar symptoms. How is it treated? Fibromyalgia is a frustrating condition that can be hard to diagnose and treat. Many people benefit from a combination of medical treatment and self-care strategies. Medicines may help with your symptoms. Medicines that doctors often prescribe include: - Pain relievers. Over-the-counter pain relievers, such as acetaminophen (Tylenol) or ibuprofen (Advil, Motrin) help some people. Others need stronger prescription medicines, such as tramadol (Ultram). - Antidepressants, such as amitriptyline (Elavil, Endep), fluoxetine (Prozac) , venlafaxine (Effexor), and duloxetine (Cymbalta). Milnacipran (Savella) is similar to a drug used to treat depression but is approved only for fibromyalgia. These medicines may help with any sleep problems as well as pain and fatigue. - Medicine for nerve pain called pregabalin (Lyrica) or gabapentin (Neurontin). - Medicines for specific symptoms, such as muscle relaxants and headache remedies. Your doctor may also suggest other treatments, such as therapeutic massage, physical therapy, and counseling. A type of counseling called cognitive-behavioral therapy may help you learn ways to cope with your illness. Good self-care is vital in managing fibromyalgia. To do your best: - Get daily exercise. It may be hard to think of exercising when you have no energy and you hurt all over. But exercise is probably the best thing you can do for yourself. Start slowly and do more as you feel able. Try a 15-minute walk, swim, or bike ride, then do some stretching. Over time, exercise can reduce pain and stiffness. Always check with your doctor before you increase your activity. - Practice good sleep habits. Go to bed and get up at the same time every day. Make sure your bedroom is quiet, dark, and at a comfortable temperature. Avoid caffeine and alcohol before bedtime. Try not to nap during the day. - Find ways to reduce stress. Look for ways to simplify your schedule. Make some time each day to relax. Try meditation or deep breathing. - Learn more about fibromyalgia. Organizations such as the National Fibromyalgia Association have lots of information. Sharing what you learn with family, friends, and co-workers can help them understand more about your illness. Created on 02/19/2008 Updated on 09/27/2011 - Burkham J, Harris ED, Jr. Fibromyalgia: A chronic pain syndrome. In: Harris ED, Jr., et al., eds. Kelley's Textbook of Rheumatology, 7th ed. Philadelphia, PA: Elsevier Saunders; 2005. - National Institute of Arthritis and Musculoskeletal and Skin Diseases. Fibromyalgia. - Rooks DS, Gautam S, Romeling M, et al. Group exercise, education and combination self-management in women with fibromyalgia: A randomized trial. Archives of Internal Medicine. 2007;167:2192-2200. - American College of Rheumatology. Fibromyalgia.
<urn:uuid:ca91a299-4b83-4745-aaa0-d17650b1ebda>
CC-MAIN-2015-11
https://www.aarpmedicareplans.com/aarpoptum/fibromyalgia-coping-with-chronic-pain
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936468546.71/warc/CC-MAIN-20150226074108-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.930245
1,253
2.984375
3
Special Video Report: Courtesy: NBC Learn, the United States Golf Association and Chevron This new 10-part series continues to explore the physics and math behind the game of golf. Provided by NBC Learn, in partnership with the United States Golf Association and Chevron, students will learn about calculating golfers’ handicaps and golf scoring, the evolution of the golf club and ball, as well as how factors like friction, volume and energy all affect how a golf ball travels. Select a video by clicking on a topic below Wind, rain, air pressure and temperature all affect a golfer’s shot and cause many delays in a game or match. Meteorologists use scientific models and data to determine what weather events are likely to occur and stop play if lightening becomes a concern. Knowing weather conditions can also help golfers use the wind or wet greens and fairways to their advantage. Pace of play, which means how long it takes to make your way through a nine- or eighteen-hole course, can lead to frustration if players are left waiting too long. The science behind improving pace of play involves flow rate of players throughout the round, as well as time intervals between groups, known as cycle times. Power and speed are concepts that most people would connect with golf. However, there is more to these broad ideas, and that’s where Newton’s third law of motion comes into play. When the ball and club interact, they apply equal and opposite forces on each other, causing the impulse, which speeds up the ball and slows the club. Collisions, when two objects come into contact, and compressions, the resulting impact, are key concepts to the ideal golf swing. The resulting effect is the golf ball deforms and springs back, storing some of the kinetic energy as potential and then using that energy to fly off the club. Agronomy is the practice used to create an ideal golf environment and enable the turfgrass to grow in the conditions it is best suited for. Aspects such as amount of water, fertilizer and pest control products all factor into the environment for each grass across the country. It is a well-recognized fact of the sport: golf balls have dimples. The lesser-known information is the reason they are produced that way, which is related to aerodynamic drag, also known as wind resistance. The change in airflow because of the impressions in the ball creates air disturbance and allows the ball to fly farther. Newton’s first law of motion, the Law of Inertia, and second, which explains the idea of acceleration, are crucial to all aspects of the golf game. From the moment of impact between the club and ball, the flight of the ball, to the bounce and roll of a golf ball when it lands, both laws are at play to explain how the force applied to the ball produces its’ flight path. Every golf swing relies on potential and kinetic energy in order to move the ball. Potential energy is the energy an object has because of its position or capability to move. Potential energy can come from chemical energy in a golfer’s muscles that allow them to swing a golf club. Kinetic energy is the energy of an object in motion, encompassing the motion, heat, and sound released when a golf ball is hit. The mechanics behind a golf swing are crucial to a golfer’s ability to hit the ball straight and with the proper amount of power. Torque and moment of inertia are they key physics concepts behind this goal. The golfer’s body applies torque to their own body, the club, and finally the club head, which results in how the ball is hit. This segment discusses the transformation of the golf ball from the original wood to leather stuffed with goose feathers, tree sap, and finally today’s synthetic materials. Do you know why golf balls aren’t smooth, but instead have a dimpled surface? Find out in this video how that chance discovery was made, as well as the science behind it. See what is inside of a golf ball, why each material is used, and the guidelines for golf balls in the PGA. Similar to the “Evolution of the Golf Ball” segment, this video explores the design and engineering of golf clubs evolved from handcrafted hardwoods to what golfers use today. Learn about scientific principles such as mass distribution, inertia and acceleration, in the context of carefully creating golf clubs to ensure the best possible force behind the ball. Also, see how golf clubs are tested in laboratory settings to determine their effectiveness, comparing the old-fashioned wood clubs to today’s titanium. There are strict limits on the volume of golf clubs, but how could that affect golfer’s performance in the game? Find out in this segment why volume of club heads is important, as well as how to find volume using water displacement instead of measurements. Using the video, combine these concepts with inertia to understand how they come together to affect the power behind the golf ball. If you've ever heard the term “handicap” in golf, you know it’s an advantage that players get to even the field. What you may not know is how handicaps are determined. In this segment, explore the reason for the handicaps as well as the mathematics behind determining a player's handicap. Also learn how the averages come into play and how the USGA uses handicaps to encourage players to improve their game. Golf is filled with numbers, statistics and math, but how much do you know about the different numbers of golf scoring? In a previous video, we learned about handicapping, but how does that factor into the overall score of a game? Learn about pars, positive versus negative numbers in golf, and aggregated scores in tournaments. This video breaks down the powerful golf tee shot into three major physics concepts: torque, centripetal force, and the double pendulum effect. Learn how the way a golfer’s centripetal force created by their body can affect a golf shot, and what parts of the golfer’s body create the double pendulum. Also explore how the torque of a shot influences the rotation of the ball to create a powerful shot. This segment focuses on golf’s short game, using shorter clubs to get the ball close to the hole. Explore how different uses of spin can affect where the ball lands, such as backspin for the ball to stop quickly after landing, as well as how the spin is created by the club. Have you ever noticed the groves on the face on a golf club? Learn why those are included in order to improve the force of friction, which determines the spin of the ball. We've all seen professional golfers "reading the green" when preparing for a putt, but what are they looking for? In this video, learn the science behind the green, including how the friction and slope of the green affects the speed of the ball. Explore how this all comes together in the scientific term “kinematics,” which refers to acceleration, position and velocity to describe motion. This video also explains how professionals measure green speed, as well as the science behind the speed. An excellent demonstration of the physics concepts of work, energy and power, this video explores the science of putting in golf. Learn about the different types of energy and how it is transferred from the club to the ball, how the amount is work is determined using force and distance, and how much power is used, which is known as how much work is completed over a period of time, all in the context of a putt. Conserving water resources has become an important concern in recent years. This segment discusses how turf and water conservation specialists educate golf courses superintendents on conserving water at their course. Techniques like capturing rainfall, using recycled water and developing new varieties of turf grass are used to maximize the efficiency of the water that courses use. The video also describes new high-tech tools that courses use to find soil moisture, and some of the factors that affect moisture, such as evapotranspiration. NBC Learn is the educational arm of NBC News dedicated to providing resources for students, teachers, and lifelong learners. The online resources NBC Learn has created for the education community leverages nearly 80 years of historic news coverage, documentary materials, and current news broadcasts. Currently two offerings, NBC Learn K12 and NBC Learn Higher Ed, give students and teachers access to thousands of video clips from the NBC News archives, including great historic moments--from the Great Depression to the Space Race to the latest political coverage. NBC Learn also offers primary source materials, lesson plans and classroom planning resources, and additional text and image resources from our content partners. For more information, visit www.nbclearn.com.
<urn:uuid:55e20f99-41a0-4f61-921b-9ed85fffbb47>
CC-MAIN-2015-11
http://nieonline.com/starledger/science_of_golf.cfm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463956.95/warc/CC-MAIN-20150226074103-00201-ip-10-28-5-156.ec2.internal.warc.gz
en
0.947581
1,818
3.75
4
- Bulletin Board - New Products Methane gas (CH4) is a complex and, unfortunately, often misunderstood water problem that most water professionals tend to avoid. How does this substance enter our water systems? Typically, this occurs through natural decomposition of plant and animal waste, or from industrial processes, such as dewatering that usually accompanies mining processes. In its natural form, methane is colorless, odorless, tasteless and lighter than air, although well water containing methane can have a musty odor due to other substances such as hydrogen sulfide or sulfate-reducing bacteria. Although the US Environmental Protection Agency (EPA) does not regulate the methane content of drinking water, it is important that you stress the significance of its removal to your clients. It has the potential for harmful side effects: It may produce suffocation by replacing oxygen in confined air spaces. Although this is a rare phenomenon, it has this capability given the proper environment. Water hammer or pressure surge is yet another drawback of methane in a water system. These may occur when methane is released into pipes. In some cases, water hammer from a methane buildup can knock a drinking glass out of a person’s hands. Also, lighter-than-air methane readily will find its way out of a water system, and although methane is non-toxic, it is flammable and potentially explosive when mixed with air. With higher levels of methane, it is possible to turn on the faucet and get a flare-up of flame when you run a match by the faucet. In some instances, you may be able to turn on a tap and light it. In some of the more extreme cases, it will remain lit. There are some viable tests that can be applied to help diagnose a methane application; as always, proper precautions and safety measures must be correctly in place. • First, we need to time how long it takes the gas to come out of the water. When you run water from any tap into a glass, you’ll have bubbles adhering to the inside of the glass, but the liquid inside becomes clearer or more transparent. If it clears up quickly (say, within 45 seconds), often that is a good indication of the presence of methane, which is ready to be released with depressurization. Gas staying in the water for two minutes or more is often an indicator of carbon dioxide (CO2), which takes a little more work to pull out. • Second, fill a plastic beverage bottle about three-quarters full of water and put the cap on it (you can let it sit to the side while you time the water clarity in the previous test). Keeping safety in mind, take the cap off the bottle and run a match by it. A flame will be produced if it is methane. This may be difficult to see because it usually is a small blue flame. Ventilation, temperature, pressure Aeration units are not only the most common but also the simplest form of removal. Remember that in a 5 percent to 15 percent concentration in air, methane can become explosive and present a health hazard. Awareness is needed as you work on any water treatment systems that deal with methane. Again, methane is lighter than air and has the potential of concentrating into pockets within the building — this is why proper ventilation is necessary. Ventilation options are limited: You can use a power fan to dilute methane in the air and send it to the outdoors according to local building specifications. Another method is point-of-entry air injection, which dilutes the methane as it comes in, significantly reducing any hazards. When you are diluting air in the system and/or properly evacuating it, you must consider water temperature. Methane is completely dissolved in water at 42 degrees Fahrenheit (5.5 C) but can be completely released (as a gas) at 58 degrees F (14.5 C). As a rule of thumb, most well water is 54 degrees F (12.2 C). Increasing this temperature will get the best results. Water being pushed through a small apparatus at 54 degrees F by no means has time to warm up, and the methane will not release completely. Similarly, sending the water into an outbuilding where it is only 40 degrees F (4.5 C) will keep the methane in the water. So be mindful of where your treatment equipment is located. Another factor in methane treatment is depressurization: When you depressurize water, dissolved gases will form small bubbles and release from the water. Bringing the water up to atmospheric pressure significantly helps achieve the best results. If conditions around or in your treatment apparatus include cold temperature and high pressure, methane removal will be less efficient. Point-of-use equipment should be in a heated basement or a heated shed to help bring water temperature up and make a more efficient piece of equipment. Opening a sealed system with aeration/ventilation introduces the possibility of bacteria, so sanitizing the water must follow aeration. An easy way to sanitize is chlorination, with a storage tank. Primary sanitation immediately will kill any bacteria in the water, and secondary sanitation leaves a chlorine residual inside the tank to prevent further bacterial growth. If there is any iron or manganese in the water, or anything that can be oxidized, you’ll follow with mechanical filtration. Other treatment can be applied after filtration if necessary, such as water conditioning followed by treatment for drinking water. A methane removal system involving sanitation should be checked once a year at a very minimum. Other water issues may require more frequent checks of the system anyway. Of course, when sourcing drinking water systems, look for those in which all components are of food-grade quality and are NSF-certified.
<urn:uuid:64f8fffc-f392-4aeb-b870-cf6bc71d76cb>
CC-MAIN-2015-11
http://www.watertechonline.com/articles/the-fine-points-of-methane-removal
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00142-ip-10-28-5-156.ec2.internal.warc.gz
en
0.943561
1,194
3.65625
4
In mathematics, the Hausdorff distance, or Hausdorff metric, also called Pompeiu–Hausdorff distance, measures how far two subsets of a metric space are from each other. It turns the set of non-empty compact subsets of a metric space into a metric space in its own right. It is named after Felix Hausdorff. Informally, two sets are close in the Hausdorff distance if every point of either set is close to some point of the other set. The Hausdorff distance is the longest distance you can be forced to travel by an adversary who chooses a point in one of the two sets, from where you then must travel to the other set. In other words, it is the greatest of all the distances from a point in one set to the closest point in the other set. It seems that this distance was first introduced by Hausdorff in his book Grundzüge der Mengenlehre, first published in 1914. Let X and Y be two non-empty subsets of a metric space (M, d). We define their Hausdorff distance d H(X, Y) by that is, the set of all points within of the set (sometimes called the -fattening of or a generalized ball of radius around ). It is not true in general that if , then For instance, consider the metric space of the real numbers with the usual metric induced by the absolute value, Then . However because , but . - In general, dH(X,Y) may be infinite. If both X and Y are bounded, then dH(X,Y) is guaranteed to be finite. - dH(X,Y) = 0 if and only if X and Y have the same closure. - For every point x of M and any non-empty sets Y, Z of M: d(x,Y) ≤ d(x,Z) + dH(Y,Z), where d(x,Y) is the distance between the point x and the closest point in the set Y. - |diameter(Y)-diameter(X)| ≤ 2 dH(X,Y). - If the intersection X∩Y has a non-empty interior, then there exists a constant r>0, such that every set X′ whose Hausdorff distance from X is less than r also intersects Y. - On the set of all non-empty subsets of M, dH yields an extended pseudometric. - On the set F(M) of all non-empty compact subsets of M, dH is a metric. The definition of the Hausdorff distance can be derived by a series of natural extensions of the distance function d(x, y) in the underlying metric space M, as follows: - Define a distance function between any point x of M and any non-empty set Y of M by: - For example, d(1, [3,6]) = 2 and d(7, [3,6]) = 1. - Define a distance function between any two non-empty sets X and Y of M by: - For example, d([1,7], [3,6]) = d(1, [3,6]) = 2. - If X and Y are compact then d(X,Y) will be finite; d(X,X)=0; and d inherits the triangle inequality property from the distance function in M. As it stands, d(X,Y) is not a metric because d(X,Y) is not always symmetric, and d(X,Y) = 0 does not imply that X = Y (It does imply that ). For example, d([1,3,6,7], [3,6]) = 2, but d([3,6], [1,3,6,7]) = 0. However, we can create a metric by defining the Hausdorff distance to be: In computer vision, the Hausdorff distance can be used to find a given template in an arbitrary target image. The template and image are often pre-processed via an edge detector giving a binary image. Next, each 1 (activated) point in the binary image of the template is treated as a point in a set, the "shape" of the template. Similarly, an area of the binary target image is treated as a set of points. The algorithm then tries to minimize the Hausdorff distance between the template and some area of the target image. The area in the target image with the minimal Hausdorff distance to the template, can be considered the best candidate for locating the template in the target. In Computer Graphics the Hausdorff distance is used to measure the difference between two different representations of the same 3D object particularly when generating level of detail for efficient display of complex 3D models. A measure for the dissimilarity of two shapes is given by Hausdorff distance up to isometry, denoted DH. Namely, let X and Y be two compact figures in a metric space M (usually a Euclidean space); then DH(X,Y) is the infimum of dH(I(X),Y) along all isometries I of the metric space M to itself. This distance measures how far the shapes X and Y are from being isometric. The Gromov–Hausdorff convergence is a related idea: we measure the distance of two metric spaces M and N by taking the infimum of dH(I(M),J(N)) along all isometric embeddings I:M→L and J:N→L into some common metric space L. - R. Tyrrell Rockafellar, Roger J-B Wets, Variational Analysis, Springer-Verlag, 2005, ISBN 3-540-62772-3, ISBN 978-3-540-62772-2, pg.117. - Munkres, James; Topology (2nd edition). Prentice Hall, 1999. Pages 280--281. - Diameter and Hausdorff Distance, Math.SE - Hausdorff Distance and Intersection, Math.SE - Completeness and Total Boundedness of the Hausdorff Metric - Barnsley, Michael (1993). Fractals Everywhere. Morgan Kaufmann. pp. Ch. II.6. ISBN 0-12-079069-6. - Hausdorff-Based Matching - P. Cignoni, C. Rocchini, R. Scopigno, "Metro: Measuring Error on Simplified Surfaces", Computer Graphics Forum, Volume 17, Number 2, June 1998, pp. 167-174 - Hausdorff distance between convex polygons. - Completeness and Total Boundedness of the Hausdorff Metric (pdf) - Using MeshLab to measure difference between two surfaces A short tutorial on how to compute and visualize the Hausdorff distance between two triangulated 3D surfaces using the open source tool MeshLab. - MATLAB code for Hausdorff distance:
<urn:uuid:bf94aa74-f24e-40ec-895f-42309a31b02e>
CC-MAIN-2015-11
http://en.wikipedia.org/wiki/Hausdorff_distance
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936535306.37/warc/CC-MAIN-20150226074215-00151-ip-10-28-5-156.ec2.internal.warc.gz
en
0.837015
1,528
3.359375
3
The Mall A shopping center, shopping mall, or shopping plaza, is the modern adaptation of the historical marketplace. The mall is a collection of independent retail stores, services, and a parking area, which is conceived, constructed, and maintained by a separate management firm as a unit. They may also contain restaurants, banks, theaters, professional offices, service stations etc. The first shopping mall was the Country Club Plaza, founded by the J.C. Nichols Company and opened near Kansas City, Mo., in 1922. The first enclosed mall called Southdale opened in Edina, Minnesota (near Minneapolis) in 1956. In the 1980s, giant megamalls were developed. The West Edmonton Mall in Alberta, Canada, opened in 1981 - with more than 800 stores and a hotel, amusement park, miniature-golf course, church, "water park" for sunbathing and surfing, a zoo and a 438-foot-long Carts Sylvan Goldman invented the first shopping cart in 1936. Sylvan owned a chain of Oklahoma City grocery stores called Standard/Piggly-Wiggly. He invented the first shopping cart by adding two wire basket and wheels to a folding chair. Goldman, together with mechanic Fred Young, later designed a dedicated shopping cart in 1947 and formed the Folding Carrier Co. to manufacture the carts. In 1946, Orla Watson, of Kansas City, MO, invented the telescoping shopping cart. By using hinged baskets, each shopping cart fitted into the shopping cart ahead for compact storage. The telescoping shopping carts were first used at Floyd Day's Super Market in 1947. Smart Cart Silicon Valley inventor George Cokely - the same guy behind the Pet Rock - has come up with a modern solution to one of the supermarket industry's oldest problems: stolen shopping carts. It's called Stop Z-Cart. The wheel of the shopping cart hold the device which contains a chip and some electronics, when the cart is rolled over a certain distance away from the store, the shopping cart owners know about Cart Bumpers with Advertising Harold Evans patented (US patent #5,306,033) a shopping cart bumper system, a foam wrap-around unit that protects while providing valuable advertising space. Doors Horton Automatics developed and sold the first automatic sliding door in America in 1960. The company co-founders Dee Horton and Lew Hewitt invented the sliding automatic door in 1954. Their automatic doors used a mat actuator. "The idea came to Lew Hewitt and Dee Horton to build an automatic sliding door back in the mid-1950's, when they saw that existing swing doors had difficulty operating in Corpus Christi's winds. So the two men went to work inventing an automatic sliding door that would circumvent the problem of high winds and their damaging effect. Horton Automatics Inc. was formed in 1960, placing the first commercial automatic sliding door on the market and literally establishing a brand-new industry." Horton Family - Automated Entry If Horton Automatics of Corpus Christi has its way, homes in the United States will begin installing sliding automatic doors, which company co-founders Dee Horton and Lew Hewitt invented in 1954. Their first door in operation was a unit donated to the City of Corpus Christi for its Shoreline Drive utilities department. The first one sold was installed at the old Driscoll Hotel for its Torch Restaurant. Coupons A Philadelphia pharmacist named Asa Candler invented the coupon in 1895. Candler bought the Coca-Cola company from the original inventor Dr. John Pemberton, an Atlanta pharmacist. Candler placed coupons in newspaper for a free Coke from any fountain - to help promote the new soft drink. Codes The first patent for bar code (US Patent #2,612,994) was issued to inventors Joseph Woodland and Bernard Silver on October 7, 1952. Register In 1884, James Ritty invented what was nicknamed the "Incorruptible Cashier" or the first working, mechanical Cards and Money Past, present and future, the history Order Catalog Aaron Montgomery Ward sent out his first mail order catalog in 1872 - for his Montgomery Ward mail order business located at Clark and Kinzie Streets in Chicago. The first catalog consisted of a single sheet of paper with a price list, 8 by 12 inches, showing the merchandise for sale with ordering instructions. "Ward's gradually expanded the catalog. They became bigger, more heavily illustrated, chock full of goods-- often referred to as "dream books" by rural families." Aaron Montgomery Ward was born on Feb. 17, 1844 and died on Dec. 7, 1913. He first worked for Marshall Field, a department store, as both a store clerk and a traveling salesman. As a traveling salesman, he realized that his rural customers could be better served by mail-order, a revolutionary idea. He started his business with only $2,400 in capital. Montgomery Ward was a mail-order only business until 1926, when the first Montgomery Ward retail store opened in Plymouth, Department Stores According to Hoover's online, "Bloomingdale's was founded in 1872 by brothers Lyman and Joseph Bloomingdale, the store rode the popularity of the hoop skirt to sales success and practically invented the department store concept at the beginning of the 20th century. Bloomingdale's joined the Federated corporate family in In 1877, John Wanamaker opened "The Grand Depot" a six story round department store in Philadelphia. According to Andrew Maykuth Online, "John Wanamaker never claimed to have invented the department store, but he was on the cutting edge of a trend. The retail giants of the day, Marshall Field in Chicago, Alexander T. Steward in New York, were discovering that the vast power of buying wholesale could cut costs to reduce retail prices." John Wanamaker is credited with developing one of the first (if not the first) true department stores in the country, and with creating the first White Sale, modern price tags, and the first in-store restaurant. He also pioneered the use of money-back guarantees and newspaper ads to advertise his retail goods. In 1868, Mormon leader Brigham Young, founded Zion's Cooperative Mercantile Institution (ZMCI) in Salt Lake City, which some historians credit as being the first department store however, most historians give the credit to John Wanamaker. According to the Pioneers, "ZCMI first sold clothing, dry goods, drugs, groceries, produce, shoes, trunks, sewing machines, wagons, and machinery. It was thus a department store from the very start and ZCMI claims to be America’s first full-fledged department store at
<urn:uuid:ea4dc573-01e3-4c12-aa69-6d727bbefe70>
CC-MAIN-2015-11
http://theinventors.org/library/inventors/blshopping.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00189-ip-10-28-5-156.ec2.internal.warc.gz
en
0.92792
1,476
2.6875
3
In "Guns and the Constitution" (Writ, Nov. 2), Akhil and Vikram Amar offer creative insights about the right to keep and bear arms that provoke us to reexamine our premises. Much of the thesis is valid. However, portions rely on a skewed analysis of the constitutional text, and its tone is unduly harsh on the historical analysis set forth by the U.S. Court of Appeals in United States v. Emerson, 2001 U.S. App. LEXIS 22386 (5th Cir. 2001). The Amars suggest that Emerson reached the right conclusion "in recognizing an individual right and in deeming it nonabsolute," but "the court told the wrong constitutional story." While they persuasively show that the story is bigger, it is worth noting that the story has not been told at all before by any other of the courts of appeals. Most are still in Second Amendment denial. First, let's get the facts straight. The defendant was not charged with "brandish[ing] a firearm against his estranged wife in violation of a federal statute." The federal charge is that he possessed a firearm after a domestic restraining order was entered against him. There was a separate state prosecution for brandishing, of which the jury acquitted Dr. Emerson. We are told that the Second Amendment does not compel an individual rights reading. To "bear arms" refers to military service, not carrying guns merely for hunting or sport. "The Emerson court found only one clear nonmilitary use of the phrase before 1789." Not so. The Pennsylvania Declaration of Rights (1776) recognized "that the people have a right to bear arms for the defence of themselves and the state." Vermont repeated this language. This included the right, wrote James Wilson, "to keep arms for the preservation . . . of their own persons." Jefferson drafted a bill which Madison proposed to the Virginia legislature in 1785 punishing a game-law violator if he should "bear a gun out of his inclosed ground, unless whilst performing military duty." The Minority in the Pennsylvania convention of 1788 declared "that the people have a right to bear arms for the defense of themselves . . . or for the purpose of killing game . . . ." To "bear arms" simply means to carry arms. And what about the separate right to "keep" arms, which no one has asserted is a military term? Samuel Adams proposed in the Massachusetts convention "that the said Constitution be never construed to authorize Congress . . . to prevent the people of the United States, who are peaceable citizens, from keeping their own arms . . . ." The facts that "militia" is a military term and that the Amendment "flanks the Third Amendment," which concerns troop quartering, mean little. It also flanks the First Amendment. Moreover, the text meticulously refers to the "militia" in certain parts and to "the people" in others. Indeed, the Fifth Amendment provides for indictment by a grand jury except in cases arising, inter alia, "in the militia, when in actual service in time of war or public danger." Which brings us to the Amars' thesis that "the Amendment speaks of a collective ‘people,' not individual ‘persons.'" It seems that "the people" means "voters and jurors, rather than all citizens." True, the Preamble refers to "We, the people," but the voters did not "ordain and establish" the Constitution, "the conventions of nine States" did, as Article VII notes. And while Article I provides that the members of the House of Representatives shall consist of "members chosen every second year by the people of the several States," the fact that the States set qualifications for voting did not constrict the meaning of "the people" in the Bill of Rights. The First, Second, and Fourth Amendments refer to "the right of the people" "peaceably to assemble," "to keep and bear arms," and "to be secure . . . from unreasonable searches and seizures." The Amars confuse "rights," which only individuals exercise, with "powers," meaning governmental functions. In referring to the "powers . . . reserved to the States respectively, or to the people," the Tenth Amendment means exercises of authority. These powers include as Akhil Amar has written elsewhere the ballot box, the jury box, and the cartridge box (the militia). At the Founding, the Amars state, "women, children, and aliens fell outside this core definition of voting ‘people.'" But this was true only of the "powers" exercised by the people, such as suffrage, the jury, and the militia. No one denied that women were among "the people" who had "the right" to keep arms or to be secure in their houses from unreasonable searches. Nor does the syntax of the Second Amendment suggest that the "militia" and the "people" are "roughly speaking, synonymous." While the Framers favored a militia "composed of the body of the people," the fact that "militia" and "the people" were used in a single sentence precludes an interpretation that the terms are redundant. It is the "right" of individuals to have arms that encourages and provides a reservoir for the "power" of a well regulated militia. The Amars are on target in averring that, according to the Founder's vision, voters would serve in the militia, and that both juries and the militia would consist of one's peers. But it is a false dichotomy to suggest that the Amendment "confers a collective military right rather than an individual nonmilitary one." The Amars state: "The Founders were thinking of local militiamen like those who fought at Lexington and Concord not of hunters or sportsmen." But through hunting and target shooting, those militiamen honed their shooting skills. In the words of Lt. Frederick MacKenzie, one of the Redcoats routed at Concord: "These fellows were generally good marksmen, and many of them used long arms made for Duck-shooting." Concord militia Colonel James Barrett's 15-year-old granddaughter Meliscent told a British officer that the colonists could resist because "they would use powder horns and bullets just as they shot bear." While the serious federal purpose declared is "the security of a free state," not sport, this security is also protected in part by individuals who arm themselves to resist violent crime. In debates on the 1792 Militia Act, Roger Sherman "conceived it to be the privilege of every citizen, and one of his most essential rights, to bear arms, and to resist every attack upon his liberty or property, by whomsoever made." The States, "like private citizens, have a right to be armed, and to defend" themselves. The Amars detail the expansion of rights won by the Reconstruction Amendments. They mention legislation accompanying the Fourteenth Amendment recognizing the right of all, blacks as well as whites, to be armed in one's home for self protection. This was the Freedmen's Bureau Act of 1866, which declared that all citizens shall have the "full and equal benefit of all laws and proceedings concerning personal liberty, personal security, and . . . estate, real and personal, including the constitutional right to bear arms." The Amars fault Emerson for ignoring the Fourteenth Amendment, the tinted glasses through which we view the Bill of Rights today. However, Emerson does quote Senator Howard's speech introducing the Fourteenth Amendment, whose privileges-and-immunities clause protected "the personal rights guarantied and secured by the first eight amendments of the Constitution; such as . . . the right to keep and to bear arms . . . ." Emerson also quotes recent Supreme Court opinions on the Fourteenth Amendment which position the Second Amendment in an equal status with the other provisions of the Bill of Rights. Emerson is also faulted because it "blandly cited parts of the Supreme Court's infamous 1857 Dred Scott case" without noting that it was overruled by the Fourteenth Amendment. Yet Scott was cited with other Supreme Court cases to indicate that court's mention of the Second Amendment as a right of "the people." Emerson refers to the page asserting that citizenship would give blacks free speech and the right "to keep and carry arms wherever they went." Scott v. Sandford, 60 U.S. 393, 417 (1857). Emerson does not involve State action and thus could not be expected to include a full blown analysis of the Fourteenth Amendment. The proper relation between military service and the later Amendments expanding voting rights to blacks, women, and 18-year olds raise intriguing philosophical questions. But one could hardly expect a court of appeals to engage in such speculations in order to decide whether a prohibition on possession of a firearm while under a domestic restraining order violates the Second Amendment.
<urn:uuid:72f04393-4bdc-44c0-8aab-23b5c81d0903>
CC-MAIN-2015-11
http://www.stephenhalbrook.com/articles/emerson-article.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00156-ip-10-28-5-156.ec2.internal.warc.gz
en
0.969707
1,827
2.875
3
Lech Lecha(Genesis 12-17) Deconstructing and Reconstructing Avraham In Jewish tradition, Avraham is seen as the archetype of hesed; he is known not merely as the best example of loving kindness, but as the mortal reflection of this attribute of God. Hesed is often understood as "giving", and Avraham's reputation is built largely on the Torah's description of his enthusiasm in catering to the needs of his guests. Rabbinic tradition adds even more details of Avraham's yearning to perform acts of kindness and his eager anticipation of wayward travelers. These sources notwithstanding, a closer look at some of the other episodes of Avraham's biography, recorded in the Torah, paint a portrait that may seem incongruous with the trait of hesed. First, Avraham deserts his elderly father; he puts his wife in a precarious situation - not once but twice. He parts ways with his orphaned nephew, Lot, whom he had once considered his own heir. He becomes embroiled in regional conflicts and goes to war. He capitulates to Sarah's demands and banishes his maid, whom he has impregnated. Later he casts her, and their child, out of his house. He performs circumcision on his entire household. Even when he negotiates with God to save the city of Sodom, he does not seek mercy for the sinners. His argument is that it would be improper to kill the righteous along with the wicked. Last but certainly not least, he is prepared to slaughter his own beloved son. While each of these episodes can and should be studied and analyzed, the sum total of his life's work may not appear to justify his reputation as the man of hesed par excellence. So many of his actions and reactions seem to be incongruous with the spirit of kindness. How can we reconcile the Avraham that arises from these episodes with the traditional view of his character? Let us make a few suggestions: We can postulate that at the core level Avraham was, in fact, as kind as we have always been led to believe. The situations of conflict in which he so often found himself were not of his own choosing but rather were tests, designed to elevate him, to hone and clarify his personality and bring new facets to light. Alternatively, or perhaps additionally, we may be forced to reconsider our understanding of hesed itself. What constitutes hesed? While we may judge actions or motivations, these do not always dovetail: some acts that may seem kind may be motivated by something else altogether, and some kind intentions may have results that are far from kind. A case in point is Avraham's decision to go to war in order to free innocent captives. Here is an important moral lesson for those who see hesed as synonymous with non-violence and pacifism: The Torah definition of hesed is not that espoused by Gandhi, who advised the Jews to go as sheep to the slaughter and opined that fighting - even fighting Nazis - is "immoral" just as any and every war is immoral. Avraham, the archetype of kindness, knew - and not just in a theoretical sense - that at times one must fight for peace. When he fought to liberate Lot, both his motivation and the results of his actions were hesed even though the means used to achieve this goal may seem to us to be at odds with our own perception of what hesed means. Perhaps a better description of Avraham's personality would be that he was deeply engaged and involved in the lives of others. He displayed, in every one of the episodes mentioned above, an overarching concern for the welfare of others. He sought to better the world - one person at a time. He was not content with his own personal insight, understanding, revelation; he did not seclude himself or disengage from those who did not share his worldview. In this, he stands in stark distinction to Noah, who, when told that destruction was at hand, that the impending storm would be catastrophic, did not reach out to others, did not raise his voice to God or his fellow man in protest or warning. Noah did not impact another living soul. The Gemara teaches that a real turning point for the world took place in the fifty-second year of Avraham's life. Born in the year 1948, Avraham was 52 years old when the new millennium arrived. Thus, the first 2000 years of human history are characterized as years of "tohu" - void, emptiness, self-absorption. From the year 2000, when Avraham began to teach his ideas, the years of revelation - Torah - begin. This, then, is the real nature of the hesed of Avraham: His care for others, his deep engagement with the world around him, spurred him to share his insight, to teach and impact others with truth. The driving force of this hesed was the desire to fulfill the will of God; this may be seen as Avraham's hesed vis a vis heaven. Our ability to discern the hesed in all the episodes of Avraham's biography often requires nuanced thinking, yet careful examination of Avraham's words and deeds can empower us to live his legacy of hesed toward our fellow man and toward our Creator. True hesed is not pacifism, nor is it moral relativism that seeks to attain peace at the expense of truth. Hesed can only be meaningful when it springs from the deep desire to emulate God's attributes and share God's blessings with others. For a more in-depth analysis see: http://arikahn.blogspot.co.il/2013/10/lectures-and-essays-lech-lcha.html
<urn:uuid:c6490b7a-40dd-4d52-aa2f-efe6508ffc40>
CC-MAIN-2015-11
http://www.aish.com/tp/i/moha/226648911.html?s=nb
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465693.74/warc/CC-MAIN-20150226074105-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.982825
1,171
2.859375
3
Jal Satyagrah in Sitapur Narmada Bachao Andolan has been using Jal Satyagrah since 1993 as a means of protest wherein people facing submergence stay put in waist or sometimes neck deep rising waters of the river and endanger their lives. The administration or the government on the other hand is busy trying to save people by either forcibly pulling them out of water or agreeing to talk to them on their demands. Last year in Ghoglagaon of Khandwa district of Madhya Pradesh people were left standing in water for 17 days and the government was not willing to talk to them until the body parts of some of the people in water started dissolving. Far away from the Narmada valley people in Sitapur district of U.P. have now decided to adopt this method of protest to attract the attention of an insensitive government. About 800 families are living on roadside for the last two years on a road which abruptly ends over river Sharda in Reusa Block. Their villages have been erased from the face of earth as the furious Sharda changed its course by 7 kms over several years. However, the Sitapur district administration or the UP government do not have any plans either to arrest the erosion due to Sharda, which threatens to engulf more people in the coming monsoon, or to rehabilitate the people uprooted over the past years. The most the administration does is distribute some relief which is pittance and the people really consider it a disgrace to their dignity. Over the last half a century Sharda has devoured many villages in four Blocks of Sitapur District - Reusa, Sakran, Rampur Mathura and Behata. Villages which have been completely erased include Kashipur, Senapur and Mallapur among others. It appears that the palace of erstwhile Mallapur estate simply disappeared in thin air when the waters receded. Where once this palace stood is flat sand today. There is no trace of even a brick of this palace. The river becomes demonic during monsoon when water from the Banbasa dam in Sitarganj and from rivers in Nepal is released to protect the dams there. The erosion due to Sharda and Ghaghara, another river which also originates in Nepal and then joins Sharda not very far from here, affects Pilibhit, Lakhimpur Khiri, Sitapur, Barabanki, Bahraich, Basti and Ballia Districts of UP. Thousands of farmers living on the bank of these rivers are able to cultivate only one crop a year because of the flood. People are not able to take advantage of schemes like National Rural Employment Guarantee Act (NREGA) also because of this reason and hence the farmers and labourers of this area face problem of food scarcity. A number of them have simply fled the area and sought refuge in one of the metropolitan cities of the country in search for some decent living. In 2011, 4 primary and 2 secondary schools in Kashipur and Mallapur were submerged. About one thousand hectares of agricultural land was also drowned. Another primary school and community hall were lost to the waters in 2012 in Mallapur. Primary schools in Kamharia, Sheikhupur and another in Kashipur are on the verge of being drowned. The food security measures such as Integrated Child Development Scheme (ICDS) and Mid-Day Meal (MDM) are almost non existent resulting into severe malnourishment among children. But the government does not seem to be worried about its own infrastructure getting immersed in water and people of the area being denied the benefits of various developmental and social welfare schemes. The gravity of the nature of emergency does not seem to have dawned on the ruling class. The people have been left to fend for themselves. Kamharia, Sheikhupur and Badhainpurwa villages face the threat of being overwhelmed by river. A bridge near Harvilaspurwa in the Gram Sabha of Ajaypur Bhithauli is also in danger. Several people have lost their lives due to psychological pressure. Children from huts on roadside face danger from moving vehicles. People are living the life of helpless destitute. Last year the district administration put earth filled cement bags to prevent the erosion over 1300 metres of population belonging to Asaipur, Badhainpurwa, Kamharia and Kashipur villages. However, this effort was inadequate. The district administration has sent a proposal to the Irrigation department of UP government to take measures to prevent erosion of the above mentioned villages in the form of a series of projects on the banks of the river. Unless urgent sanction and initiation of work begins a large population and number of houses and fields face submergence in the coming months. The irrigation ministry is headed by powerful politician Shivpal Yadav, who also happens to be the uncle of present Chief Minister. Hence the only thing lacking is probably political will to save the lives and properties of people from the impending danger. To protest against the government apathy people of the area have decided to stage a jal satyagrah by getting down into the waters of Sharda and standing there all day long for two days. If the action fails to move the government people could follow it up with an indefinite action. It is strange that in-spite of developing world class infrastructure and having created an environment in our homes and workplaces suited to our needs we are still far away from taming the fury of nature. It is not very long back when a breach in dam on Kosi river in Bihar almost resulted in flooding of big areas of north Bihar. The human being seemed helpless in the face of such a tragedy. Kosi is also a reminder that any attempt to tame the nature is not foolproof. Hence an intelligent solution to the problem of erosion due to Sharda is required. - Asian Tribune -
<urn:uuid:1e747141-92d8-425d-9299-bd6ff565ce52>
CC-MAIN-2015-11
http://www.asiantribune.com/node/61756
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465693.74/warc/CC-MAIN-20150226074105-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.967516
1,209
2.5625
3
Producing transportation fuel from Canada's tar sands is more destructive, polluting, and carbon intensive than other ways of producing transportation fuel. With the help of ForestEthics, 19 large businesses and two US cities have publicly announced actions they have taken to reduce the environmental and social impacts that come from fossil-fueled transportation. Here are some facts about the newest examples of the accelerating corporate shift toward a cleaner energy future: - Walgreens1 has clearly decided to eliminate Canada's tar sands from its transportation footprint. - Chiquita2 has committed to identify any connections between Chiquita’s fuel providers and tar sands refineries and to pursue the goal of eliminating fuel from those providers that is connected to tar sands refineries. - Whole Foods3 has committed to the elimination where possible of its use of fuels produced by refineries that use feedstock from Canada’s tar sands. - Trader Joe's4 has asked its transportation providers to eliminate fuels from tar sands refineries where possible and adopt a strategy of continuous improvement toward elimination of these fuels. - Seventh Generation5 has asked its transportation providers to eliminate fuels from tar sands refineries where possible, is actively working with logistics providers to identify fuels from tar sands refineries and is committed to adopting a strategy of continuous improvement toward the elimination of these fuels. - eBay6 is looking into alternatives to tar sands-based fuels that make business sense for eBay, including checking with fuel providers to see if they have any commitments or intentions to avoid refineries that take tar sands inputs. - Patagonia7 is supporting environmental groups taking action on the tar sands issue with a grants program and various communication channels to inform customers about the devastation caused by tar sands extraction and distribution. - Actions by Quiksilver8, Gap Inc.9, Levi Strauss & Co.10, Timberland11 and FedEx12 are not specifically focused on Canada's tar sands, but they are relevant because fuels from tar sands are higher in carbon and other environmental and social impacts than conventional fuels. And each of these companies has said, in its own way, that it wants to reduce the environmental and social impacts of transporting products. - Bed Bath & Beyond13 asked all transportation providers to avoid fuels that would counter Bed Bath & Beyond's goal of reducing its carbon emissions. - Avon14 has asked its transportation providers to avoid high impact fuels such as those from the tar sands. - American Eagle Outfitters15 has asked its transportation partners to share more information with regards to their practices to reduce fuel consumption and minimize reliance on the most carbon-intensive forms of fuel, including fuel derived from tar sands. - Columbia Sportswear16 has asked its transportation providers to disclose their efforts to avoid high-impact fuels, such as those from Canada’s tar sands - LUSH Fresh Handmade Cosmetics17 has required its transportation providers to avoid fuel from US refineries connected to Canada's tar sands. - Fifth & Pacific Companies, Inc. (formerly Liz Claiborne Inc.)18 has adopted a new policy of encouraging its transportation providers to eliminate high carbon fuels such as those from Canada's tar sands. - The City of Bellingham19 (one of two US gateway cities for Canada's tar sands) also has a goal of reducing environmental and social impacts – including carbon emissions – so it adopted new guidelines that require minimizing its fuel purchasing from refineries taking feed stock from Canada’s tar sands. - The City of Burlington, VT20 (located near the route of a proposed tar sands pipeline) has declared its support for policies phasing out fuel purchases as quickly as possible from vendors whose refinery sources of origin use any form of tar sands. We look forward to speaking with more companies and cities about their consumption of high impact fuels such as those from Canada's tar sands. We are confident that more big buyers of transporation services and fuel – in their own way – will follow the leadership examples of Walgreens, Chiquita, Whole Foods, Trader Joe's, Seventh Generation, eBay, Patagonia, Quiksilver, Gap Inc., Levi Strauss & Co., Timberland, Bed Bath & Beyond, FedEx, Avon, American Eagle Outfitters, Columbia Sportswear, LUSH Fresh Handmade Cosmetics, Fifth & Pacific Companies, Inc. (formerly Liz Claiborne Inc.), the City of Bellingham and the City of Burlington, VT. 1 Weber, Bob. "More major U.S. corporations join boycott of Alberta oilsands fuels," Canadian Press, 27 August 2010. 2 Letter dated November 21, 2011, from Chiquita to ForestEthics. Download the letter >> 5 Company email to ForestEthics, January 17, 2012. 6 Company email to ForestEthics, August 6, 2012. 7 Company email to ForestEthics, November 6, 2013. 8 “[O]ur preference is to avoid using fuels with feedstocks from oil sands, as fuels derived from these feedstocks presumptively have higher than normal greenhouse gas footprints and environmental and social impacts.” – Company email to ForestEthics, December 2, 2011. 9 "As part of Gap Inc.'s commitment to reduce its overall environmental footprint, and to guide its selection of transportation providers, we have asked potential transportation providers who want to work with Gap Inc. to provide some details about what they are doing – or planning to do – to eliminate high carbon-intensive fuels." – Company email to customers, August 27, 2010. 10 "Levi Strauss & Co. informed all transportation providers that we will give preference to low-carbon fuels and transportation services with lower-than-normal greenhouse gas footprints and environmental and social impacts." – Company email to ForestEthics, August 24, 2010. 12 Weber, Bob. "More major U.S. corporations join boycott of Alberta oilsands fuels," Canadian Press, 27 August 2010. 13 Letter dated February 11, 2010, from Bed Bath & Beyond to all its transportation service providers. 17 "We attempted to identify sources for the fuel that we purchase, primarily in the U.S., and work to lessen or minimize purchasing fuel from vendors that were deriving their feedstock from the tarsands," said Concord vice-president Richard Brooks. Brooks said that effort began after a request from a Concord's customer, Lush Cosmetics.
<urn:uuid:16b983dc-e8c6-43f4-9f27-627ed407bdc5>
CC-MAIN-2015-11
http://www.forestethics.org/major-companies-act-to-clean-up-their-transportation-footprints
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463658.66/warc/CC-MAIN-20150226074103-00193-ip-10-28-5-156.ec2.internal.warc.gz
en
0.937854
1,309
2.84375
3
Examples of valid series IDs are C55, SE196, TM18. African American Resources |Government Records||Special Collections||Published/Internet Resources||Maryland Indexes| |Census Index 1776 and 1778||Ethnic Resources||Baltimore City Directory 1871||Baltimore City Directory 1881| Among the holdings of the Maryland State Archives are colonial and State executive, legislative, and judicial records; county probate, land, and court records; and State publications and reports. In addition, the Archives maintains vital records for the 23 counties and Baltimore City. For a general description of these records, see the Guide to Government Records. See also the following publications available at the Archives: - Resources for African American History - Researching Black Families at the Maryland Hall of Records by Phebe Jacobsen (REF 0605 Jacobsen) - "From Frederick to Thurgood" - An African American History of Baltimore - an on-line research project - Description of African American Records at the Maryland State Archives The department of Special Collections at the Maryland State Archives supervises the care, preservation, accessioning and description of non-government records. These records are usually acquired by the Archives through gifts or deposits by private donors and generally consist of personal letters, diaries, photographs, maps, and manuscript documents. - African American Newspapers Newspapers provide a contemporary record of daily life in Maryland. Unfortunately, the deterioration of these valuable historical documents has become a serious conservation issue. Since 1979, the Maryland State Archives has cooperated with concerned individuals, historical agencies, libraries, and newspaper publishers in the Maryland Newspaper Project, the only comprehensive program of its kind for Maryland. Although targeted for preservation, few issues of African American newspapers were located for microfilming. Single issues of the Afro-American Ledger (Baltimore) and the Negro Appeal (Baltimore; Annapolis) exist in the Archives' collections as well as scattered issues of the Lancet (Baltimore) on microfilm for the years 1902-1903. Additional African American newspapers -- Afro-American (Baltimore: 1892-1900?), Afro-American (Capital edition) (Baltimore: 1932?-1937?), Afro-American (National edition) (Baltimore: 1915- ), American Citizen (Baltimore: 1879-?), Commonwealth (Baltimore: 1915-1915?), Ledger (Baltimore: 1898-1899), Lyceum Observer (Baltimore: 1863-?), and Race Standard (Baltimore: 1894?-1898?) -- are available at other Maryland institutions. See: Nancy M. Bramucci and Elizabeth Ellis, eds., Guide to Maryland Newspapers (Annapolis: Maryland State Archives, draft 1995) for title history and source information. - Bank Records The records of the Savings Bank of Baltimore are an extraordinarily rich collection relating to the lives of hardworking, independent, wage-earning citizens of the city dating back to the first depositors of 1818. Founded as a mutual savings bank in 1818 to promote thrift and financial security among the working class, the Savings Bank of Baltimore has long held a prominent place in Baltimore's history. Of particular interest are the returning Civil War veterans, many of whom were immigrants and African American soldiers who deposited their pay with the Bank. The collection also includes the records of the Metropolitan Savings Bank, founded in 1867. In 1957, the bank merged with the Savings Bank of Baltimore. Since the establishment of the Hall of Records in 1935, the Maryland State Archives has been aware of the importance of church and synagogue records as a significant primary source for historians and genealogists. Since systematic recording of vital records was not established until 1875 for Baltimore City and 1898 for Maryland counties, religious records are often the only source for birth and death information. The Archives' collections include the records of several African American congregations which have been preserved through the Archives' Preservation Microfilming Program. Churches interested in participating in this program should contact the Maryland State Archives for further information. - Documents for the Classroom In the Aftermath of 'Glory': Black Soldiers & Sailors from Annapolis Maryland, 1863-1918, MSA SC 2221-8 Examines what happens to Black soldiers who survive the Civil War by tracing their careers through public and private records. Includes maps, contemporary accounts, census records, probate records, court depositions, and Federal pension files. It relates the soldiers to the efforts to expand and then restrict the suffrage ending with the voting rights cases of 1915 which involved a Civil War soldier from Annapolis. Ask for MSA Publication # 1727 - $5.00 Celebrating Rights and Responsibilities: Baltimore & the Fifteenth Amendment, May 19, 1870, MSA SC 2221-18 Includes documents and images relating to the ratification and celebration of the 15th Amendment in Baltimore, including a speech given by Frederick Douglass. Ask for MSA Publication # 5381 - large format, $7.00 From Segregation to Integration: The Donald Murray Case, 1935-1937, MSA SC 2221-1 Concentrates on efforts to integrate higher education in Maryland from 1934 to 1937 with emphasis on Thurgood Marshall, Lillie May Jackson, William I. Gosnell, Charles Houston, and Donald Murray's successful attempt to integrate the University of Maryland Law School. Ask for MSA Publication # 1844 - $5.00 Is Baltimore Burning?, MSA SC 2221-12 Includes newspaper and other accounts of the Cambridge riot of 1967, the Baltimore riot of 1968, selections from Governor Agnew's papers relating to both events including the Cambridge speech and subsequent trial of H. Rap Brown, and the Goldseker Foundation report Baltimore 2000. Ask for MSA Publication # 2395 - $5.00 Additional document packets, transparencies and poster-sized materials are also available. For copies and further information about Documents for the Classroom write the Maryland State Archives, 350 Rowe Boulevard, Annapolis, MD 21401, or call MD toll free (800) 235-4045 or (410) 260-6400. - Federal Manuscript Census - Slave Schedules The Maryland State Archives has microfilm of the Federal Manuscript Censuses beginning in 1790. The Federal Censuses of 1790, 1800, and 1810 indicate the number of slaves within a household. Beginning in 1820, the Federal Census lists the number of male and female slaves and free persons of color in broad age groups. The 1850 and 1860 Federal Censuses also contain separate Slave Schedules. While these schedules do not list individual slave names, they do indicate the slave owner's name and for each slave shows ages, color, sex, whether deaf, blind, insane, or idiotic, and whether a fugitive from the state. Census indices prior to 1860 are in book form. The 1850 Census index does not list free African-Americans. - Reference Resources in the Maryland State Archives' Library - Free African-Americans of Virginia, North Carolina, South Carolina, Maryland and Delaware, created by Paul Heinegg, has created a free database giving information on scores of African-American Families. - Allegany County African American History - Sources available for purchase from the Maryland State Archives' The Maryland State Archives offers a range of materials for sale. Books include titles on Maryland and family history, the American Revolution and Civil War, general history, and reference works. Original source material is available through the Archives of Maryland series, Documents for the Classroom, and the Microform Guides to county records at the Maryland State Archives. Pre-paid mail orders are also welcomed. Please identify the quantity, title and inventory number desired. (Freedom Records, AA, Index), 1805-1864. Index 34. MSA S1407 (Freedom Records, AA, Owner Index), 1785-1867. Index 35. MSA S1408 (African American Records, DO, Index), 1806-1868. Index 36. MSA S1409 (African American Records, DO, Owner Index), 1806-1868. Index 37. MSA S1410 (Freedom Records, PG, Index), 1806-1869. Index 38. MSA S1411 (Freedom Records, QA, Index), 1807-1864. Index 39. MSA S1412 (Freedom Records, QA, Owner Index), 1807-1864. Index 40. MSA S1413
<urn:uuid:0438dcf6-c1ae-4350-b814-f774ed36b424>
CC-MAIN-2015-11
http://guide.mdsa.net/viewer.cfm?page=afrosources
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00007-ip-10-28-5-156.ec2.internal.warc.gz
en
0.883437
1,747
2.59375
3
Winnipeg Free Press - PRINT EDITION Posted: 07/12/2013 1:00 AM | Comments: 0 Last Modified: 07/12/2013 6:25 AM | Updates CHURCHILL -- Global warming may extend the shipping season in Churchill, but it's also melting permafrost and softening the rail bed leading to the port, researchers say. That will make it more costly to transport product to Hudson Bay by rail to load onto ships, say researchers. "You might benefit from melting sea ice but you've got to get the product to and from port," said Rick Bello, climatologist at York University in Toronto. Research shows climate change is now causing peat moss that has been frozen for up to 6,000 years to melt. "Churchill was always on continuous permafrost. Now people are drilling bore holes and not finding permafrost," said Bello. -- Jeff McEachern, Churchill Gateway Development Corp., of global warming It means the Hudson Bay line connecting Churchill to the rest of the province could sink in places. "It will mean higher maintenance costs, for sure. We haven't seen the upper end of what it's going to cost," he said. Bello, who has studied Churchill for over 30 years, observed the situation first hand recently on a Via Rail train. The peatland that covers the Hudson Bay Lowlands in Manitoba and Ontario is massive -- the second largest on the globe next to the Central Siberian Plateau. The top 40 centimetres or so of the Hudson peat thaws and refreezes every year. But below that is peat moss about four metres thick that has stayed frozen for millennia -- until now. Peat is dead organic matter that accumulates faster than it can decompose. The cold temperatures slow the decomposition to a near standstill, allowing matter to accumulate. But the thawing of frozen peat threatens to unleash massive quantities of greenhouse gases. "That additional organic matter decomposes and releases additional CO2 and that warms the whole planet," said Bello. Another side-effect to global warming is increased rain events and lightning storms. "As the climate warms, there are more convective lightning storms and, therefore, more lightning fires. We're expecting that all along the treeline," which extends as far north as Churchill, he said. Peter Kershaw, adjunct professor in the earth sciences department at the University of Alberta, who was in Churchill recently on a research project, agrees. "It's a big concern and so far not well-quantified," said Kershaw, of greenhouse-gas emissions from thawing peat. "That organic material is being made available for decomposition. It's out of the freezer and sitting on the counter." One Kershaw study showed permafrost 15 metres deep in the Hudson Bay Lowlands has warmed by half a degree, from -0.9 degrees Celsius in the mid-1970s, to -0.45 degrees today. That half-degree warming penetrating so deeply into the ground is significant, he said. Jeff McEachern, executive director of the Churchill Gateway Development Corp., and temporary media liaison for track owner OmniTrax, is aware that while global warming will extend the shipping season on Hudson Bay, if insurers agree, it will also increase rail-maintenance costs. "It's a double-edged sword," said McEachern. He could not say whether track has deteriorated more quickly in recent years. Maintenance to the Hudson Bay line "is just a fact of life. It always has been," he said. Kershaw said it's obvious the track has deteriorated because it takes much longer to travel by train to Churchill than it once did, although he conceded he is relying on anecdotal evidence. Ottawa, the province, and OmniTrax invested $60 million into repairing the line in 2007. Will the melting of the permafrost in Manitoba’s north drive home to Manitobans the need to change the way we live to reverse the global warming trend? Join the conversation in the comments below. Republished from the Winnipeg Free Press print edition July 12, 2013 A8 Updated on Friday, July 12, 2013 at 6:25 AM CDT: replaces photo, adds question for discussion Having problems with the form?Contact Us Directly City budget day could mean tax increase, some service cuts No selfie sticks, museum says Support flows for attacked couple Embattled architecture dean departing Flu ravaging nursing homes Ashton wants family leave for workers Cold today and tonight, but warmer weather on the way Armstrong's Point in for heritage designation Pair pleads 'drunken stupidity' Is it time to put our phones away? Museum's $2-M tab for opening 'ridiculous': critic Funds flow in for Froese family Chill sets in over anti-terror laws Flu ravaging nursing homes Forgiving the unthinkable
<urn:uuid:c0b6dc94-126f-4c56-826e-4c93cbf8a5c5>
CC-MAIN-2015-11
http://www.winnipegfreepress.com/local/warmer-temps-threaten-railway-215197711.html?device=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00120-ip-10-28-5-156.ec2.internal.warc.gz
en
0.941491
1,041
2.59375
3
There are severaI types of hair thinning and balding. While the mechanism of the phenomenon of hair thinning and baldness is not fully understood, there is vast knowledge on the capability to treat the forms of hair loss and baIdness by medication or organic means. We are dividing the aIopecia varieties into treatable and non-treatable conditions and we will hereby explain easy methods to evaluate the possibilities of successful therapy in the treatabIe circumstances. When evaluating the possibilities of improving the condition of the hair, the most crucial criteria is the condition of the follicles of hair. For as long as the hair follicles are alive, there is also a chance to grow new hair. Otherwise, there is absolutely no basis for any treatment to succeed and the onIy choices are cosmetic- wig, curly hair transplant etc. Life time period of the follicles of hair may reach up to twenty-five years. The hair follicles grow hair in cycles of growth and fall. Along the way of hair thinning, each cycle of development produces shorter, thinner hair and there is less pigment (coIor). When the scaIp has a bright plume, it indicates that the tresses follicle is still alive but dormant. Provided the appropriate specialist’s knowIedge and treatment, the hair foIlicle could be stimulated to grow hair. However if the top is completely smooth, this implies that the hair follicle is no longer alive and there is zero chance to grow hair- except in some cases as explained beIow (Alopecia Areata, TotaIis and Universalis). The different types of hair loss and the probability of growth of new tresses are hereby given. Non Treatable conditions The conditions of hair loss which have no chance of hair regrowth are usually: Alopecia from birth, Scarring AIopecia, Traction Alopecia and Lupus disease. Alopecia from birth is really a rare condition, where the infant exists without hair foIlicles. In Scarring AIopecia the contaminated zone looks like a scar and the hair roots are dead. The reason why of the phenomena are unknown. The chances of growing new hair are usually zero, but with medicine the expansion of the Scarring AIopecia can be stopped. In Traction AIopecia the curly hair is pulled out of the scalp and the locks follicle becomes weak and dies. In alopecia which is due to Lupus disease, the skin is usually rough and pink and the chances of growth of hair is nearly non existent. The conditions of hair thinning which has a chance to be treated successfuIly are: Male Pattern Alopecia, AIopecia Areata, Alopecia TotaIis and Alopecia UniversaIis. Male Pattern AIopecia is typical male baldness. lt’s characteristics are lack of hair at the front and crown area initial. In many cases, there is stiIl at the very least hair plume, hair thinning and baldness can be stopped by affecting the hair foIlicles. In Alopecia Areata problem, typical round hair loss patches evolve rapidIy. Occasionally the bald patches distribute to full hair loss of the scaIp (Alopecia Totalis) as well as whole body areas (Alopecia Universalis). The phenomenon can harm men, women and small kids. Conventional medication assumes the AIopecia Areata problem is an autoimmune disease, though the exact mechanism of Alopecia Areata isn’t known nor completely understood. Oftentimes Alopecia Areata is caused by psychological pressure: individuals who experienced trauma have occasionally lost entire locks within hours or times. Evaluating Chances of Successful Treatment As explained in the introduction, the health of the hair foIlicles is the most important criteria for evaIuating the probability of successful treatment. Presence of thin white hair is a visibIe indication for living hair roots. The thin white curly hair can be observed when examining the scalp from cIose distance, with good Iight circumstances. Sometimes seeing the scalp from an angle against light source helps to see the thin white hair. Naturally, when there is thin white tresses on the aIopecia area, it indicates that the hair follicles are poor but alive, so there exists a basis to grow hair, given the correct treatment. However when the alopecia area is smooth, the assessment depends on the alopecia type: In man pattern alopecia problem, smooth scalp is a obvious indication that the hair follicles are not alive and there is absolutely no chance to grow new hair. However in Alopecia Areata, AIopecia Totalis and AIopecia Universalis the hair follicles sometimes remain aIive even if the alopecia area is smooth and analyzing the health of the hair roots should take into consideration other important factors. The elements which play important function in the condition of the hair foIlicles and hence the chances of success: - Age of the individual: at younger age there are higher chances to recover - Period with Alopeia Areata problem: if the condition is recent, the probabilities are higher. Among individuals who experienced Alopecia Areata for many years, the hair foIlicles are probably too weak. - Alopecia Areata condition was due to a shock: In those instances, the chances of recovery are better. - Usage of violent and inappropriate treatment: Some treatments cause long lasting harm to the hair foIlicles. In such cases, even if there’s growth of hair, it is common that once the therapy is stopped the hair falls and the hair follicles remain weaker, that makes it harder to stimuIate development. - Thin white tresses: as previously expIained, if there is thin white hair the probability of recovery increase. - Usage of wig: Whenever a wig is applied, the scaIp’s skin is not normally exposed to air and isn’t breathing (skin struggles to absorb oxygen). ln cases of wig users, the chances of recovery are lower. lf wig will be attached by gIue, it’s likely that near zero. It should be emphasized these are general guidelines for treatment achievement chances, based on experience with a population of Alopecia Areata sufferers. An individual evaluation is required in order to accurately evaluate the success chances of a specific person. Choosing the Right Treatment There are organic or medication therapies which are designed to revive the hair roots. When contemplating medication treatment, it is advised to consult with a professional dermatologist and inquire about achievable side effects. The internet includes vast information regarding the side effects of conventional treatments. In case of natural treatments, it really is advised to seek for a treatment which is certified by a recognized organization. The treatment should be certified to be safe for usage and without the side effects. In order to be certified for zero side effects, the treatment should contain just herbs and plant life with the maximaI basic safety degree – edible herbs- as defined by the U.S. CTFA set of plants.
<urn:uuid:0b6ffb75-ed8f-454e-9279-1b20a0cfaa53>
CC-MAIN-2015-11
https://comb6mathew.wordpress.com/2013/10/01/learn-the-strategies-to-protect-your-hair-from-diminishing-or-losing-read-this-free-information-to-end-baldness-right-away/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462700.28/warc/CC-MAIN-20150226074102-00023-ip-10-28-5-156.ec2.internal.warc.gz
en
0.934623
1,543
2.515625
3
Every year on St. Joseph’s Day (March 19), swallows come back to the San Juan de Capistrano Mission in California. Legend says that the birds took refuge in the mission when a local innkeeper, tired of having to live with their noise and their mud nests stuck on his building, chased them away. The swallows built their nests in the mission and made it their regular home. This mission of romance and legend was dedicated to a fourteenth and fifteenth century Italian saint. San Juan was born in Capistrano in southern Italy around 1385. It is believed that he was of French or German origin, since his father had come to Italy with the Duke of Naples, Louis of Anjou. San Juan began his career not in the church but in the field of law. He studied law in Perugia, and then was appointed governor of that city in 1412. In 1416 Perugia found itself at war with the powerful Malatesta Family, which controlled several other Italian cities. San Juan was imprisoned when he went to negotiate peace with the Malatestas. While in prison he had a religious awakening, and in the same year he took his religious vows and entered the Franciscan Order. He traveled all over Italy preaching and saving souls. At one time he is said to have preached to a crowd of over 120,000 people. In 1429 he and other friars were summoned to Rome to clear themselves of charges of heresy in connection with their preaching devotion to the Holy Name of Jesus. The friars chose San Juan as their spokesman and were cleared of charges. Over the next several years San Juan was involved in the affairs of the Franciscan Order and acted as a papal emissary on different occasions. He was also a fiery orator who preached against non-believers, Jews and heretics. In 1451 San Juan was sent to Austria as papal nuncio. He took the occasion to travel across the Holy Roman Empire combating heresy. The Hussites of Bohemia were his special target. On the one hand, he worked to prevent any conciliation between the pope and the Protestant Czechs. On the other, he preached against what he thought to be the evils of the Hussite heresy. King George of Podebrady, who was regent at that time, did not let San Juan enter Bohemia or Prague. San Juan did preach in Moravia and Silesia, however, especially in Brno, Olomouc and Wroclaw. In fact, he was somewhat successful. He reportedly won thousands of Hussite souls over to the Roman Catholic Church. The evangelist of the Hussite Czechs also came to be known as the “Scourge of the Jews.” Under San Juan’s fanatical influence several German princes banished the Jews from their lands, and the Polish king Kazimierz IV revoked privileges that the Jews had enjoyed in Poland. While in the Czech Lands San Juan visited the Silesian city of Wroclaw. His fiery sermons against the Jews resulted in a resurgence of hatred on the part of the townsmen. When a wealthy Jew was accused of desecrating communion bread, San Juan set up a court of inquiry. Some forty of the city’s Jewish residents were tortured and burned at the stake. Hundreds of others were driven from the city. The Inquisition visited the Czech Lands along with San Juan de Capistrano. In 1453 the city of Constantinople fell to the Turks as a Moslem tide swept over the Balkan Peninsula. Soon the Turks were at the gates of Hungary. San Juan helped raise an army to defend Hungary and Central Europe from the infidel onslaught, and fought with the great Hungarian warrior John of Hunyadi at the siege of Belgrade in 1456. Imagine, John of Hunyadi wielding his sword and San Juan de Capistrano his cross, inspiring the Christian troops to victory. Belgrade and Hungary were saved, for the time being, but both great leaders died from the plague caused by the multitude of unburied rotting corpses. San Juan de Capistrano was an historical figure whose impact was seen differently by different people. To Roman Catholics he was seen as a defender of the faith and a saint worthy of veneration. To the Hussites of Bohemia he was a religious zealot and redoubtable foe. To the Jews he was an intolerant fanatic who persecuted them and fanned the flames of hatred against them. To the Christians of Central Europe he was a hero who helped delay Turkish conquest for seventy more years, when Hungary finally fell at the Battle of Mohacs in 1526. To the people of the United States he has yet another significance. San Juan de Capistrano was beatified in 1694, and canonized in 1724. In 1776 Spanish friars dedicated a mission to him in California. It is to this mission dedicated to the evangelist of the Hussite Czechs that the famed swallows return every year. Even before that, however, in 1731, just seven years after his canonization, Spanish friars dedicated a mission to San Juan in what is now San Antonio, Texas. Even in the earliest days of Texas history one can trace connections to the Czech Lands. - Robert Janak “San Juan de Capistrano,” printed in the series Czech Connections, Cesky Hlas (Newsletter of the Czech Heritage Society of Texas), February 1999, page 5.
<urn:uuid:60c9f964-e405-4c4b-b79f-6bfa502c21c2>
CC-MAIN-2015-11
http://www.janakstexasczecharticlesandphotos.com/articles/san-juan-de-capistrano/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00140-ip-10-28-5-156.ec2.internal.warc.gz
en
0.982527
1,131
3.359375
3
From CreationWiki, the encyclopedia of creation science Suborder Strepsirrhini (non-tarsier prosimians) Suborder Haplorrhini (tarsiers, monkeys and apes) The reason why humans are classified in the Order primates is due to assumptions that humankind has evolved from ancient ape-like ancestors. This is largely due to a number of obvious similarities between apes and human. Apes and monkeys have opposable thumbs that can grip powerfully just like humans. The primitive limb structure of primates, one upper limb bone, two lower limb bones, (many mammals have "lost" various bones, especially in this area from fusing of the two lower limb bones), is also similar to human. Despite evolutionary assumptions, no true transitional form between the apes and humans has been found. In fact, paleoanthropologists have classified ancient humans and apes into two distinct genera. The genus to which humans belongs is homo. Australopithecus, which are believed to be ancient ancestors of humans, were instead fully ape. All primates have five fingers and nails instead of claws on each hand, just like humans. However, some primates have combination of nails and claws. Although opposing thumbs are not only limited to this order, it is a distinguishing feature of primates. The combination of opposing thumbs, short fingernail, and long, inward-closing fingers helps primates to grip branches, which eventually allows some species to develop brachiation as a significant way of transportation. Forward-facing color binocular vision is also useful for the brachiating primates, especially for finding and collecting food, though recent studies suggest it was more useful in courtship. Under the worldview of naturalism, the ultimate goal of animals is to maximize reproductive success. In primates, this goal is usually achieved by what is called K-selection. K-selection, which most of the female primates use, is having few young, and investing a great deal of time and effort to rear these young. On the other hand, male primates take very little interest in helping to rear young. Their ways of maximizing their reproductive success is to father as many young as possible and not to invest much on each one. The way male primates choose to rear young is called R-selection. If the human truly evolved from primates, it is certain that human is an heir to the primate’s K-selection. Most primates eat many different foods, but they usually prefer some foods over others. Two main nutrients they need are carbohydrates and protein. Most prosimians get carbohydrates from gum and fruit and protein from insects while most anthropoids get carbohydrates from fruit and protein from insects or young leaves. Primates can be categorized into four groups by their preference of food. These four groups are: insectivore, gummivore, frugivore, folivore. Insectivores, those that eat insects, are very small, because big primates can't maintain their life by eating such a small insect unless they have some special methods to get large quantities of insects, like anteater. Gummivores, who eat plant gum, are also usually small, due to the same reason as insectivores. Frugivores eat fruit and are of about intermediate size. Frugivores have especially wide incisors to scrape out the rinds of fruit from the meat. The leaf eating folivores range from intermediate to large. Primates have to be large in order to get plentiful leaves. As a testament to man's separation from these other primates, however, humans are the only practicing carnivores in the primate category. Relationship with human Evolutionists believe that humans and other primates have both evolved from some primate like ancestor. This commons ancestor is believed to have existed in the Pliocene geologic age between 5 to 8 million years ago. The large apes of Africa and Asia are analyzed to be the most similar to human. Among all animals in the world, they are most like humans in brain and body form, by having a complex social life, and in many other major and minor features, including the lack of a tail. Comparison of DNA by geneticists is also used to support that Chimpanzees in Africa are our closest living "cousins." It has long been paraded that humans and chimps share over 98% of their DNA, though this figure has been revised downwards in recent years. Using fossil records, paleoanthropologists have been trying to reconstruct the evolutionary history of humans from this common ancestor, but currently no substantial evidence has been found. This missing transitional form between humans and the other apes is typically referred to as the missing link. - Primateby multiple authors. Wikipedia - Primate Behaviour Dr. Bill Sellers. Faculty of Biological Sciences, University of Leeds. - The Unique Characteristic of Primates National Zoological Park. - Basic primate ecology: Food, territory, and living in groups Bruce Owen. - Our Primate Origins: An Introduction Human Ancestors Hall.
<urn:uuid:d99102d9-7d2c-420f-8b43-0b2afb29813b>
CC-MAIN-2015-11
http://creationwiki.org/Primates
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463411.14/warc/CC-MAIN-20150226074103-00142-ip-10-28-5-156.ec2.internal.warc.gz
en
0.949207
1,037
3.859375
4
Home Healing & Spirituality An Uncommon Ally for Science By Elaine Sedenberg, AMerican Progress, August 2, 2011 The Fourteenth Incarnation of the Living Buddha Teaches That Spirituality v. Science Isn’t an Either/or Question Washington D.C., USA -- Globally renowned as an advocate for a peaceful coexistence between China and Tibet, the Dalai Lama is perhaps less well known for his advocacy for a different kind of peaceful coexistence: that between science and spirituality. The Dalai Lama is a rare religious leader whose public zeal for science, research, and education serves as a positive example of the compatibility of science and spirituality. This enthusiasm for science research was apparent at His Holiness’s July 9 talk for world peace on the West Lawn of the Capitol in Washington D.C. Referencing scientific studies about the effects of selfishness on heart disease, and of negative emotions on the immune system more broadly, the Dalai Lama used scientific evidence to support his artful advocacy for universal compassion and world peace. Far from shunning science as a threat that disproves religious belief, the Dalai Lama has advocated for years that science and religion can be mutually enriching. Writing in 2003, the Dalai Lama said: “Though Tibetans have valuable knowledge about the internal world, we have been materially backward partly because of a lack of scientific knowledge. Buddhist teachings stress the importance of understanding reality. Therefore, we should pay attention to what modern scientists have actually found through experiment and through measurement the things they have proved to be reality.” Departing from his usual spiritual writings, the Dalai Lama even published a book about science and spirituality in 2006. The Universe in a Single Atom: The Convergence of Science and Spirituality discusses how science and religion can each promote the betterment of the other. On the one hand, since science can be used for either good or ill, it can benefit from religion’s ability help navigate the ethical space between. On the other, religion can avoid rigid fundamentalism by paying attention to advancing science. Together, he argues, they make a powerful combination that can help us better understand central questions of our humanity. In the past, he’s used his spiritual authority to urge his followers to participate directly in scientific studies. Scientists had had little success studying the effects of meditation on the brain until the Dalai Lama dispatched monks experienced enough to meditate amidst the noise of an fMRI machine to participate in neuroscience studies abroad. The real-time images these studies provided have helped scientists better understand the actual ways that meditation influences brain activity. Another set of studies on the long-term effects of meditation has also showed a positive connection between the practice of meditation and brain tissue thickness. In addition to using his spiritual authority to further science, the Dalai Lama has also exercised his political leadership to advocate for science education in society more broadly. He addressed the annual Society for Neuroscience meeting to champion a new cause: How moral leaders should work openly with scientists in order to keep up with the rapid progress of technical knowledge. As science speeds along gathering data behind common spiritually linked questions, the Dalai Lama asserts that religion should begin participating in the developing dialog. “Today the question of science’s interface with wider humanity is no longer a matter of academic interest alone; this question must assume a sense of urgency for all those who are concerned about the fate of human existence. I feel, therefore, that a dialog between neuroscience and society could have profound benefits in that it may help deepen our basic understanding of what it means to be human.” – Excerpt from article based on Society for Neuroscience talk. The Dalai Lama’s enthusiastic embrace of interdisciplinary research has brought him in contact with tutors including quantum mechanics experts Carl von Weizsacker and David Bohm along with neuroscientists Robert Livingston and Francisco Varela. Imagine what benefits the United States would see in science policy if more of our political and religious leaders fostered such close educational mentorships with scientists. Not only can meditation and spirituality aid our scientific understanding of human psychology, but science can augment the learning of the spiritual, according to the Dalai Lama. Since 2006 the Emory-Tibet Science Initiative has sent Tibetan monks to Emory University to take core science classes so that they can return to their monasteries in India and teach the basics to fellow monks and nuns. The partnership has also resulted in ongoing dialogue and collaboration between Tibetan monks and Emory science faculty, and has resulted in the translation of six science textbooks into Tibetan for the first time. Simple as it seems, the translation of science and mathematical teachings into Tibetan has brought down learning barriers between religion and science that have existed for centuries. Images of a tranquil Buddha sitting placidly among nature couldn’t be more starkly juxtaposed with white lab coats practicing rigid sterile technique. But according to the Dalai Lama, these two fields - which evolved from, separate historical, intellectual and cultural roots - have grown to share basic philosophical methodologies. Both modern science and Buddhism share a deep suspicion of absolute notions and support ideas that organisms and the universe emerged as part of an evolutionary process. Science continually renews itself by encouraging the questioning and correction of long-standing beliefs. Buddhism, he points out, does the same through a glorification of the investigation of reality that triumphs over even the most deeply venerated spiritual authority. The Dalai Lama’s open-minded attitude toward science should serve as an example not just for other political leaders, but for people of faith everywhere. Religious studies are increasingly enriched by contemporary findings in science while technological progress continues to lead us toward unavoidable ethical questions. Science and religion therefore shouldn’t be seen as opposing forces, but rather the two-colored lenses of the 3-D glasses of reality. We need them both to see the full picture. Elaine Sedenberg is a Science Policy Contract researcher at the Center for American Progress.
<urn:uuid:01a08f9c-fe39-43be-b227-e61916d0d28c>
CC-MAIN-2015-11
http://buddhistchannel.tv/index.php?id=7,10363,0,0,1,0
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462232.5/warc/CC-MAIN-20150226074102-00310-ip-10-28-5-156.ec2.internal.warc.gz
en
0.937755
1,215
2.625
3
Poor cell phone reception and dropped calls are part of our day to day lives. While this is tolerable in some situations, if the place that you're not getting good reception is in your home or office, then that becomes a problem that you really need to fix, otherwise you risk missing important calls, dropping a call during a critical conversation or not having reception during an emergency. In this guide, we're going to discuss what causes weak cell phone signal, poor reception, and dropped calls, as well as what a cell phone antenna booster is and how one can be used to amplify your cell phone signal, improve reception, and eliminate dropped calls. What Causes Poor Reception? There are typically two main causes of poor reception, either you're at the edge of your carrier's coverage area, or the materials used in the construction of the building that you're in are preventing a clear signal from reaching you. There are also situations where these two causes act together to cause reception problems and dead zones too. Edge of a Coverage Area Cellular carriers provide cell coverage by setting up cell towers to broadcast and receive cellular calls from their customers. These cellular towers are strategically placed to provide coverage to the greatest number of potential customers. Unfortunately, the further you are from a tower, the less signal strength you'll receive, which means that there are large areas that get very weak signal which isn't strong enough to make or receive a call. We'll discuss in the next section how a cell phone antenna booster can help in this situation. Recently, there have been significant advancements in construction materials for homes and buildings, which help with energy conservation, reducing health risks, and more. One downside of these advancements though are that many of these new construction materials end up blocking cell phone signals from entering the building. Many people then find themselves in the situation where they get good signal outside of the house, but lose their call when walking into their brand new home. This is also a situation where a cell phone antenna booster system can be an ideal solution. What is a Cell Phone Antenna Booster? A cell phone antenna booster (also known as a cell phone signal booster or a cell phone repeater), is a system which amplifies an existing cell phone signal and broadcasts it to an area which does not currently have good signal. A cell phone antenna booster system is typically comprised of an external (or outside) omni or yagi antenna, a signal amplifier, an internal antenna, and cable to connect all of those components together. The system works by having the external antenna receive a cell phone signal from the closest cell tower. It then passes that signal over a cable to the amplifier, which boosts the strength of the signal and then broadcasts it to the inside of the building via the internal antenna. Solving the Coverage Area Problem A cell phone antenna booster is able to solve the problems experienced when you live or work on the edge of a coverage area by boosting the weak cell phone signal that you typically receive to a usable level. Additionally, it's possible to use a directional outside antenna and aim at the closest cell tower, which would then result in an even stronger signal, since the system is now setup to interact directly with the tower. As long as you're able to receive one bar of signal outside while on the edge of a coverage area, then a cell phone antenna booster will work for you. Solving the Construction Material Problem A cell phone antenna booster is also able to solve the construction materials problem. Typically the issue is that the signal cannot penetrate the external of the house, so a cell phone antenna booster circumvents the construction materials by passing the cell phone signal over a cable from the outside antenna into the house (to the amplifier). The system boosts the signal for good measure, and then broadcasts inside of the house, effectively eliminating the construction material that is causing the problem. As you can see, a cell phone antenna booster is designed to solve both of these problems simultaneously, so even if you're faced with the situation where you're both on the edge of a coverage area AND have a building constructed of cell proof materials, you can still have great signal inside with a cell phone antenna booster. How to Choose the Right Cell Phone Antenna Booster Ultimately, you're looking for a cell phone antenna booster that supports the cell phone carriers that you use and can cover the necessary square footage that you need. We typically recommend starting with your cell phone carrier, and then choosing the right cell phone antenna booster based on the current outside signal strength and coverage area. UberSignal has created special carrier pages which help you determine which cell phone antenna booster will work for you (which you can choose from on the homepage), so we recommend starting there. Otherwise feel free to browse our signal booster systems for Home & Office, Large Buildings, and Vehicles. If you need to cover multiple carriers, very large buildings, or have a unique situation that you'd like our advice on, we're always happy to talk and provide expert guidance. Please contact us with any questions and we'll be glad to help you find the right cell phone antenna booster to solve your cell phone reception problems once and for all.
<urn:uuid:6c8c96cd-46ad-4a54-a5d3-13a6b8db6d33>
CC-MAIN-2015-11
http://www.ubersignal.com/blog/cell-phone-antenna-booster-guide/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936468546.71/warc/CC-MAIN-20150226074108-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.955329
1,050
2.578125
3
Download as PDF 0.3 MB - The gap between children from low-income and high-income households starts early. By age 5, it is 10–13 months. Lower attainment in literacy and numeracy is linked to deprivation throughout primary school. By age 12–14 (S2), pupils from better-off areas are more than twice as likely as those from the most deprived areas to do well in numeracy. Attainment at 16 (the end of S4) has risen overall, but a significant and persistent gap remains between groups. - Parental socio-economic background has more influence than the school attended. - Children from deprived households leave school earlier. Low attainment is strongly linked to destinations after school, with long-term effects on job prospects. - A range of evidence-based approaches can reduce the attainment gap. These span: high-quality, pre-school education; whole-school reforms based on timely, relevant data; and closer partnerships between home and schools. The researchers conclude that: - advice about developing the curriculum, improving educational outcomes for all pupils and inspecting schools should explicitly provide guidance on reducing the link between poverty and attainment; - lack of data, research and evaluation evidence for schools and local authorities currently hampers progress. The Scottish education community needs a national evidence base of what works and professional development in how to use evidence. This will help practitioners differentiate proven, promising and unproven approaches and inform choices about: appropriate curriculum design, resource allocation and how to monitor and evaluate practice for impact. Scottish education serves many children well, but the attainment gap between pupils from the richest and poorest backgrounds is wider than in many similar countries. - Preschool: Children from higher-income households significantly outperform those from low-income households at ages 3 and 5. By age 5, there is gap of 10 months in problem-solving development, 13 months in vocabulary. - Through school: A clear literacy gap in Primary 4 (ages 7–9) widens by Primary 7 (ages 10–12). By S2 (ages 12–14), more than twice as many students from the least deprived areas (as distinct from households) performed well in numeracy as those from the most deprived. The Scottish Survey of Literacy and Numeracy found an attainment gap of 14–17 per cent for reading, 21 per cent for writing, and 12-28 per cent for numeracy from primary through to secondary school. Although overall attainment has risen slightly at the end of S4 (ages 14–16), the gap between the most and least deprived remains. - Leaving school: Those from the most deprived families are consistently less likely to go into further/higher education, employment, training, or voluntary work. They are only one-third as likely as the least deprived to go into higher education (Scottish School Leavers Survey). - Employment: Studies show that, by age 22–23, low attainers are more likely to be unemployed (12 per cent vs 4 per cent), work part-time (12 per cent vs 6 per cent), earn less (difference of £23.45 per week for men, £44.94 for women) and be in low-status jobs. A 2007 OECD report indicated that parents’ socio-economic background mattered more for children’s attainment than their school. The 2009 PISA (Programme for International Student Assessment) report showed a stronger association between parental background and poor reading in Scotland than the OECD, English or Welsh averages. Findings from the 2012 PISA survey suggest that the attainment gap in Scotland narrowed slightly in comparison to the 2009 survey. While this is welcomed news, the impact of disadvantage on attainment was still substantial. Policy responses and the evidence gap Currently, the Scottish Government’s policy group, Improving Performance to Raise Attainment (IPRA), is supporting demonstration projects in schools and taking evidence for recommendations to the Cabinet Secretary for Education and Lifelong Learning. The new Child Poverty Strategy for Scotland (2014-17) also emphasises addressing the attainment gap. Various policies (e.g. Curriculum for Excellence, Formative Assessment, Early Years Collaborative) and programmes (e.g. Early Intervention Programme, Schools of Ambition, Good Practice Advice to Schools) have been implemented in Scotland in recent years. However, this review found very little research on some of these and insufficient data, evaluation or evidence to build useful practical knowledge of what works. Across Scotland, the quality and quantity of attainment data for primary and early secondary school pupils vary widely. This makes data-driven project design and evaluation difficult. Many schools and local authorities pay for external assessments of literacy and numeracy, but sometimes results arrive too late to be useful. These are major limitations. More reliable – and easily accessible – evidence is needed. Education Scotland currently provides some information about which projects local authority managers judge successful. But Scotland needs more ambitious ways of identifying which approaches have the greatest impact and how to adapt them to local circumstances. What approaches do work? Various interventions have reduced the attainment gap. This study explores eleven types of action, drawn from Scotland, the rest of the UK and abroad (mainly North America), and Box 1 suggests actions that specific bodies can take to help improve attainment for children from low-income households in Scotland. - High-quality, full-day preschool education. Numerous studies show that early provision of this kind is effective. Full-day preschool produces significantly higher literacy and numeracy for children from low-income families. However, quality of provision matters more for disadvantaged children. The effect of full-day attendance may not last if quality is low. - Parental involvement programmes, helping parents support their children’s learning at home, appear promising. International evidence provides pointers but evidence of what works best in Scotland is needed. - Literacy teaching works. PISA surveys show that increasing reading engagement could mitigate 30 per cent of the attainment gap. Reading also has long-term effects on vocabulary and achievement in other curricular areas. - Children working together in small groups (co-operative learning) can work if thoroughly taught across the school and facilitated by teachers. Teachers benefit from coaching in group-work methods. - Nurture groups and programmes to increase social, emotional and behavioural competencies show promise. However, the impact on attainment needs robust evaluation. - Academically focused, after-school activities: many projects run extracurricular activities for children from low-income households (e.g. sports, music, dance, ICT and study skills). However, integrated academically focused activities, such as study support, have a significant impact on attainment. - Peer tutoring, meta-cognitive training (helping children understand and improve their own learning) and one-to-one tutoring using qualified teachers, trained adults or trained peer tutors have improved literacy and numeracy in Scotland. - Mentoring (usually matching a volunteer mentor with a disadvantaged student) can have a significant impact. But evidence is inconclusive and there is a need for further evaluation in Scotland. - Professional development can boost attainment but needs to be evidence-based, intensive, long-term, contextualised, and incorporate systematic monitoring of impact and continued support for teachers. - Targeted funding works in the context of collaboration between schools, better school leadership, strong school-level data, and systematic evaluation to monitor impact. Targeted funding can also raise awareness of the attainment gap. - Evidence-based, whole-school reforms: Whole-school reforms make a difference when they incorporate a focus on improving attainment, a shared strategic plan for academic, social and emotional learning, significant staff development, and consistent monitoring of impact. Curriculum for Excellence has the potential to provide a framework to achieve this. Conclusion: What can be done in Scotland? Increasing and maintaining the focus on equity requires focused policy-making and practice. The education community in Scotland needs to get better at creating and sharing knowledge in ways that focus on outcomes for children in poverty. Better evaluation will help practitioners distinguish between proven, promising and unproven approaches and decide how to make curriculum design and planning decisions that raise attainment for economically disadvantaged groups. Several bodies shape what happens in Scottish schools, although none directly controls curriculum design, content or implementation. A strong, shared focus on reducing the attainment gap over time requires deeper understanding of how poverty affects attainment. About this project These findings are based on an evidence review of the educational attainment gap between children from poorer and better-off households in Scotland. It was written by Edward Sosu and Sue Ellis of the School of Education, University of Strathclyde.
<urn:uuid:87772386-c7a1-4aaf-a10d-3aee2bdb91f8>
CC-MAIN-2015-11
http://www.jrf.org.uk/publications/closing-attainment-gap-scottish-education
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00071-ip-10-28-5-156.ec2.internal.warc.gz
en
0.9496
1,782
3.90625
4
A unique and exciting relationship between the public and private sector exists in the southern portion of Martin County, Florida. Here, the Hobe Sound Nature Center, Inc. and the Hobe Sound National Wildlife Refuge offer visitors, schools and organizations the opportunity to explore and learn about Florida's natural areas. The Hobe Sound National Wildlife Refuge was established in 1969, when residents of Jupiter Island donated 229 acres to the United States Fish and Wildlife Service. Additional donations have brought the total to nearly 1,000 acres today. The Fish and Wildlife Service manages the land to provide habitat and protection for a variety of wildlife and plant native to this coastal area. The Refuge includes three and one-half miles of barrier island beach, sand dunes and mangroves on Jupiter Island and a sand pine scrub forest on the mainland. The beach is one of the most productive sea turtle nesting areas in the United States, with the endangered leatherback, green and threatened loggerhead sea turtle using the beach for their nesting. Other wildlife species inhabit this environment, including brown pelicans, ospreys, least terns and many shorebirds. Wading birds may also be found along the beach and the mangrove areas. The sand pine scrub habitat, preserved between the U.S. 1 corridor and the Indian River Lagoon, is Florida's oldest and most endangered habitat. It is home to many vanishing plant and animal species, including scrub jays, gopher tortoises, indigo snakes, four-petaled pawpaw and dancing lady orchids. The Refuge borders an estuarine area, where seagrass beds occur. The estuary provides food and shelter which are critical to the manatee, an endangered species. At the headquarters of the Refuge, you will find the office of the Hobe Sound Nature Center, Inc., a private, non-profit organization. This environmental learning facility was established by Mr. Jackson Burke and Mrs. Elizabeth Kirby for the Jupiter Island Garden Club, Inc. The Club's vision became a reality in 1973, when the Center first opened its doors to educate people of all ages about Florida's fragile environment. The Center enjoys a cooperative agreement with the U.S. Fish and Wildlife Service which allows it to conduct education and awareness programs on site, while the Service provides and maintains the facility. The Jupiter Island Garden Club continues to sponsor the Nature Center and remains one of its major funding sources. In 1982, a new staff was hired by the Nature Center Board of Directors and charged with the responsibility of expanding and improving existing programs. One of the first projects put into operation was "Friends of the Nature Center." Membership in this organization entitles "Friends" to receive the quarterly publication, Mangrove News, schedules of programs and activities and interpretive information about Florida's environment, while helping to fund various programs. The next step was to design and operate an Exhibit Hall geared to Refuge issues and open to the public. The Elizabeth W. Kirby Interpretive Center opened to the public in 1985 and features exhibits on the estuaries, sand pine scrub, manatees, sea turtles and much more. In addition, the Spring and Fall Program Series was initiated to present to the public, especially new residents, information about the local environment. These programs include both field trips to other natural areas and audio visual presentations at the Nature Center. School groups and other organizations visit the Center to take part in specially designed environmental education awareness programs. Popular topics include Florida's myriad threatened habitats and endangered species, native wildlife and estuarine life cycles. Outreach programs are also available and the Center staff often goes into the community to present their very enlightening programs. A highly successful program sponsored by the Hobe Sound Nature Center occurs during the summer months. Our summer environmental camp for students ages 6 to 12 has been held every summer since 1973. Its excellent reputation has drawn students from three counties and even youngsters visiting relatives in the area. Field trips, arts and crafts, interpretive programs, hands-on experiences and other activities enable the participants to enjoy their summer while learning about Florida's wildlife and what they can do to protect it. Another summertime program begun in 1982 is nighttime interpretive "sea turtle walks," held from late May to mid July. These walks begin with a presentation in the Center's classroom and end with a visit to the Hobe Sound Public Beach to witness the egg-laying of the threatened loggerhead sea turtle. A special permit is issued to the Nature Center by the Florida Department of Environmental Protection in order to provide people with this unique opportunity to observe this natural phenomenon. The 20 to 22 walks now offered each summer are always booked way in advance and demand for these programs can never be satisfied. The Hobe Sound Nature Center, Inc. wishes to remain in the forefront of enviromental education. Its programs have taught, trained, and influenced an entire generation of environmentally sensitive people. If we wish to continue enjoying our fragile Hobe Sound environment, we must continue to support the growth of the Hobe Sound Nature Center, Inc. In 1990, the Hobe Sound Nature Center Foundation, Inc. was established. This tax exempt foundation was created for the sole purpose of supplementing the monies available for the Nature Center itself.
<urn:uuid:638289b5-025d-4478-8f72-2046dfc859dc>
CC-MAIN-2015-11
http://hobesoundnaturecenter.com/about_us/history
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936460576.24/warc/CC-MAIN-20150226074100-00143-ip-10-28-5-156.ec2.internal.warc.gz
en
0.94576
1,071
2.859375
3
From Wikipedia, the free encyclopedia - View original article In rhetoric, litotes (pron.: //, US // or //) is a figure of speech in which understatement is employed for rhetorical effect, principally via double negatives. For example, rather than saying that something is attractive (or even very attractive), one might merely say it is "not unattractive". Litotes is a form of understatement, always deliberate and with the intention of emphasis. However, the interpretation of negation may depend on context, including cultural context. In speech, it may also depend on intonation and emphasis; for example, the phrase "not bad" can be said in such a way as to mean anything from "mediocre" to "excellent". The first time this word is mentioned is in a letter from Cicero in 56 B.C. In this letter the meaning of the word is "simplicity (or frugality) of life". Over time the meaning and the function of the word changed. It went from meaning simple to using the idea of understatement which involves double negatives. The idea was that you wanted to say something as impressive and unambiguous as possible. The pattern for early litotes was to start with two words, mainly a positive and a negative connected by a particle. This would give the word two meanings. After the redundancy is felt the positive part can be omitted. Due to the feeling of the phrase the reader will then have to work with the author or speaker to understand what the author is trying to convey. In Old Norse, there were several types of litotes that got the same point across. These points are denied negatives, denied positives (this is probably the most used method), creating litotes without negating anything, and creating litotes using a negative adjective. |Litotes:||As a means of saying:| |"[...] no ordinary city." Acts 21:39 (NIV)||"[...] a very impressive city."| |"That [sword] was not useless / to the warrior now." (Beowulf lines 1575–1576)||"The warrior has a use for the sword now."| |"He was not unfamiliar with the works of Dickens."||"He was acquainted with the works of Dickens."| |"She is not as young as she was."||"She's old."| |"He's no oil painting."||"He's ugly."| |"You are not wrong."||"You are correct."| In Classical Greek, instances of litotes can be found as far back as Homer. In Book 24 of the Iliad, Zeus describes Achilles like this: "οὔτε γάρ ἔστ᾽ ἄφρων οὔτ᾽ ἄσκοπος …" (line 186), "he is neither unthinking, nor unseeing", meaning that he is both wise and prudent. In French, "pas mal" (not bad) is used similarly to the English, while "il n'est pas antipathique" ("he is not disagreeable") is an example, actually meaning "il est très sympathique" ("he is nice"), though you don't want to admit it. Another typical example is "Ce n'est pas bête!" ("It's not stupid"), generally said to admit a clever suggestion without showing oneself as too enthusiastic. (As with all litotes, this phrase can also be used with its literal meaning that the thing is not stupid but rather may be clever or occupy the middle ground between stupid and clever.) One of the most famous litotes of French literature is to be found in Pierre Corneille's Le Cid (1636). The heroine, Chimène, says to her lover Rodrigue, who just killed her father: "Va, je ne te hais point" ("Go, I hate you not"), meaning "I love you". In Chinese, the phrase "不错" (literally "not wrong") is often used to present something as very good or correct (i.e., distinct in meaning from the English "not bad" or the general use of the French "pas mal"). Also, the phrase "不简单" (literally "not simple") is used to refer to an impressive feat. Similarly, in Dutch, the phrase "niet slecht" (also literally meaning "not bad") is often used to present something as very good or correct. In Italian, meno male (literally "less bad") is similar to the English expression, "So much the better" – used to comment that a situation is more desirable than its negative (cf. Winston Churchill's comment, since transformed into a snowclone, that "democracy is the worst form of government except for all the others"). In Latin, an example of litotes can be found in Ovid's Metamorphoses: "non semel" (bk. 1 ln. 692, "not one occasion"), meaning "on more than one occasion". Some common words are derived from litotes: "nonnulli" from "non nulli" ("not none") is understood to mean "several", while "nonnumquam" from "non numquam" ("not never") is used for "sometimes". In Spanish, it is usual to say "No es nada tonto" ("It's not at all foolish"), as a form of compliment (i.e., to say something was smart or clever). In Turkish, it is quite common to say "Hiç fena değil!" ("Not so bad") as a form of compliment. |Look up litotes in Wiktionary, the free dictionary.|
<urn:uuid:503dd8fd-e142-4529-8c57-76fd6fc477f9>
CC-MAIN-2015-11
http://blekko.com/wiki/Litotes?source=672620ff
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461848.26/warc/CC-MAIN-20150226074101-00222-ip-10-28-5-156.ec2.internal.warc.gz
en
0.94847
1,210
3.640625
4
The cells in our cortex are essentially machines ready to be influenced by the world as we are born. A blank slate, if you will. While there is some genetically programmed organization there from embryological development, all areas in the cortex pretty much do the same thing as far as pattern recognition (see YT video of Jeff Hawkins’ (On Intelligence, Hierarchical Temporal Memory)). What makes certain areas of our cortex perform different functions has more to do with which sense organs they are attached to than them having some intrinsic difference. The three-dimensional organizational structure of the cortex all over is responsible for higher and higher levels of recognizing and relating perceptual patterns. Our brains, more than any other animals', can abstract concepts from this “ocean” of perceptions, due to our exceptionally large cortex. We can do this by a unique way of considering more than just a few perceptions at a time. We group them into “concepts”, which allows for all versions of a specific type of perception to be considered with a word, such as first order concept “chair”. This is performed mentally by retaining only the essential characteristics and omitting the measurements, or possible different varieties, of these characteristics. We then attach a phoneme to this thought, and language is born. When the memory of a chair is recalled, it is recalled partly by stimulation of the same neurons, in the occipital cortex, which are stimulated when you actually see a chair as well as some in the auditory cortex responsible for storing the pattern of sound associated with “chair” and in the pre-motor cortex to speak it. These can be drastically different patterns from situation to situation, as the cortex relays this information to other neurons around, above and below, to higher “association” areas, which further organize this information. There are some neurons/groups of neurons which must be accessed, in order to think of, look at or talk about a chair. These neurons all attach to other areas which are stimulated by thinking of a “higher” order concept like furniture, as information travels “up” the organizational structure in the cortex, and also attach to other areas which are stimulated by thinking of or seeing parts of chairs, or the “lower” perceptual aspects of it, like the colors, shapes and lines, as the information travels “down” the organizational structure. So, as the concept of a chair “comes to mind”, it necessarily sends electrical signals to all those neurons it is attached to, as each neuron has thousands of dendtritic connections to other neurons. They store the sequences of stimulation molecularly and this is perceived by us as learning and memory. Every time any neuron is fired, so are many others. The direction of the flow of information is dictated by many factors. Many different areas of the brain are inputting to many other areas. The thought we perceive and execute comes from the strongest connections influenced by the goal one has been thinking of, the stimulation entering the brain, the memories that are already there and even the temperature in the room is a factor, albeit usually a very small one. There is not one set of thoughts occurring at any one time. There are always multiple groups of neurons being stimulated and not reinforced or reinforced a little or only a moderate amount, we only perceive the few our attention can handle. The ones outside of our "crow epistemology", or too many to focus on, 4 or 5 in humans (see Ayn Rand’s The Objectivist Epistemology), are simply what is traditionally referred to as our subconscious. The subconscious is not an alternate person or mysterious conscious made up of only your primal desires, it is simply all those other patterns that get stimulated but not enough to directly influence the flow of information noticeably. It is what remembers things wile you are not thinking of them. There is actually a lot of “thinking” that goes on without it gaining the full attention of one’s consciousness. This process of electrochemical neurotransmission functions always as long as your brain is alive. Pattern recognition pathways are stimulated and the reinforced ones dominate and lead to decisions and actions. Those patterns that we like and repeat, say concerning what we want most out of life, or think about most strongly, get more and more related to new stimuli as it enters into our cortex. This process is affected, also, by other things, like, say what we are in the presence of or what we are thinking of at the time, which may or may not be similar to or anything like what we are ultimately interested in. In this way there is no single you that makes decisions and directs the flow of information in your brain. We all have specific identities of course, and for the purpose of functioning in the world, I am me, and my cortex thinks and acts in a certain way, different than all others. But, like Youtuber Nick, TheModernMystic, likes to say, “There is no ‘I’”. But, unlike Nick, I do believe that I exist, it is just that my identity lies inside my ever changing brain, this complex process of interacting pattern recognition stimuli. You cannot choose which information or patterns to call upon to make a decision, you must use yours. The illusion of freewill is there because it feels like we caused the decision magically. But this is not so. Each memory or electrochemical neural pattern must have been stimulated by another. No thoughts are created ex nihilo. There is only perceptions and how they interact with the stored information in the cortex that results in action and identity.
<urn:uuid:48e8adb2-42c9-4074-a86e-4efb61b2428b>
CC-MAIN-2015-11
http://www.atheistnexus.org/profiles/blogs/metacognition-1
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.962083
1,157
3.484375
3
The lifetime payoff for people with a college degree clearly makes higher education a worthy investment, but you still have to find a way to cover those costs of earning your college degree. Once you’ve calculated the costs of tuition, books, fees, housing and other miscellany, you can start whittling away at that figure with the various kinds of financial aid that are out there. Borrowing can be a smart way to pay for school as long as you understand how student loans work, how they’re different from other types of debt, and how long it will take you to pay them off. Then you can determine how much you can afford to borrow, based on what your eventual salary will be. One good option, if you’re going the student loan route, is to look into federal student loans. Federal Perkins Loans are low-cost loans which don’t require you to make payments on interest while you’re still in school. Stafford loans, another federal program, are also offered with very low interest rates. Stafford loans can be subsidized (the interest is paid by the federal government while you’re in school) or unsubsidized (The interest accrues while you’re in school, but you don’t have to start payments until after graduation). To qualify for either type of federal student loan, you must fill out the FAFSA application for federal student aid. Certain types of federal student loans can be forgiven under some circumstances. For instance, if you earn your master’s degree in education, and paid for some or all of the cost with Perkins loans, you are likely eligible for loan forgiveness if you teach at a low income school for a certain number of years. Private student loans are also available from banks and other financial institutions. These often have different terms than federal loans, but they can help you finance your education if you don’t qualify for other aid. 529 College Savings Plans Qualified college savings plans, called 529 plans, have tax advantages. So, if you and planning to study in a few years, and your family wants to prepare for the cost of college now, you can benefit from tax savings to help you build up your college fund. Some states offer one or more types of 529s, but the most common one is the college savings plan, which allows you to save money, tax-free, in a special account that earns a return on investments, much like a mutual fund. The money in the fund can then be spent on things like tuition, books, housing and other costs that come with attending school. You can benefit from other education-related tax benefits, too, like the American Opportunity Tax Credit and the Lifetime Learning Credit, both of which allow you (or your parents if you are their qualified dependent) to receive a tax credit for things like tuition. Grants are financial aid awards which —unlike loans— you won’t have to pay back. Many organizations offer grants for students in various circumstances. Federal Pell Grants are needs-based grants provided to low-income students. The amounts can vary based on your economic situation, but you can receive a maximum of $5,500 a year, which can cover quite a bit of the average tuition cost for a student. Other grants, such as National SMART Grants and TEACH Grants can help you supplement your financial aid even further. In addition to federal grants, you can find state grants and even corporate grants to help you finance your degree. It is always worth applying for as many scholarships as you can, because they also don’t need to be paid back. All sorts of organizations offer scholarships based on a range of different criteria, including financial need, scholarly merit, ethnic heritage and other attributes. National scholarship funds give out a lot of money every year, but you should definitely talk to your guidance counselor or the financial aid office at Strayer about local scholarships you may be eligible for. Some employers are looking to cultivate the people in their organizations by helping them gain more education in hopes that those new skills will be useful to the company. Tuition reimbursement programs will help you cover the cost of tuition and other expenses, depending on your company’s policies. Check with your HR department to see if tuition reimbursement might be a way for you to pay for college. Tips for Saving for College Whether or not you get financial aid or student loans to cover your tuition costs, you can always do a bit of belt-tightening to try and save money for school. Here are a few ideas. Live at home. A lot of people want to live the college dream of dorm life and living on campus, but it’s an expensive dream (anywhere from $8,000 to $10,000 per semester on average). You can cut out a lot of those costs by living at home. And students studying at accredited online colleges can even avoid much of their commuting costs. Cut your leisure spending. Instead of heading to the movies every weekend, or going out to lunch every day, why not grab a movie rental and start brown-bagging it instead? You can save hundreds of dollars a month that way. Ditch your car. Now, going without a vehicle might not be practical for everyone, but it certainly can free up a lot of money for school. The costs of lending, maintenance, gas and insurance can really be a drain on your budget. If you can get by with a monthly mass transit pass, you can close the financial gap in a hurry. How are you planning to finance your college degree? Share you comments below.
<urn:uuid:82ce1e20-c00b-4ec4-8f85-767d493b9701>
CC-MAIN-2015-11
http://www.strayer.edu/buzz/affordability/5-ways-to-pay-for-your-college-education/
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00139-ip-10-28-5-156.ec2.internal.warc.gz
en
0.965303
1,158
2.515625
3
February 9 - May 5, 2013 RELEASE YOUR INNER ROCK STAR The Durham Museum begins a remarkable 2013 schedule with a provocative exhibition from the Rock and Roll Hall of Fame. Women Who Rock: Vision, Passion, Power illustrates the importance of women in the world of popular music from the 1920s to present day. It highlights the flashpoints, the firsts, the best, and the celebrated and sometimes lesser-known women whose artistry advanced the progress of rock-and-roll music. Featuring more than 250 artifacts and performance videos, the exhibition moves through rock-and-roll eras, demonstrating how women have been engines of creation and change. Women played a central role in the development of the rock-and-roll genre, beginning with early blues artists, like Ma Rainey and Bessie Smith. Spirited rhythm-and-blues singers—such as Ruth Brown, LaVern Baker, and rockabilly queen Wanda Jackson—added their creative talents to popular music through its explosive growth in the ’50s. Girl groups, like the Shirelles and Supremes, dominated the charts in the early ’60s while Janis Joplin, Grace Slick, and Joni Mitchell carried the torch into the ’70s. Today, music is ruled by women from Lady Gaga to Alicia Keys, Rihanna to Carrie Underwood. In addition to being the writers and voices of beloved songs, many women have made their marks by playing instruments in their bands. Women Who features guitars played by Wanda Jackson, Nancy Wilson, Bonnie Raitt, and Taylor Swift; a drum played by Meg White; and Lady Gaga’s childhood piano. In addition to musical instruments featured artifacts i nclude clothing, handwritten lyrics and music, session cards, concert posters, photographs, dressing room notes, appointment notebooks, and a Tony award statuette. Women Who Rock Eras Suffragettes to Juke-Joint Mamas: The Foremothers/Roots of Rock In the 1920s, blues women like Ma Rainey and Bessie Smith were the first – and for a while, the only – artists to record the blues. Mother Maybelle Carter made the first country music recordings in 1927. American women of this era made great strides toward gaining equality and basic human rights for themselves and others in society, including attaining the right to vote and working toward social justice. The 20th Century was a wide-open opportunity for women to embrace the modern world, outside of the traditional bounds of the home. The narrative of these ground-breaking women will be presented along with the stories of trailblazers such as Mahalia Jackson, Sister Rosetta Tharpe and Billie Get Outta that Kitchen, Rattle Those Pots and Pans: Rock and Roll Emerges “How many of us know the names of the pioneer women songwriters/singers/musicians of the ‘50s?” is a question asked by Yoko Ono in her preface to She’s a Rebel: The History of Women in Rock and Roll. Two names that the Museum will highlight in the emergence of rock are Ruth Brown and Wanda Jackson, the voices of two predominant roots of rock – R&B and country/ rockabilly, along with LaVern Baker and Will You Love Me Tomorrow: The Early 1960s/Girl Groups Girl groups, though sometimes seen as puppets manipulated by unseen and mostly male handlers, were an authentic manifestation of the worldview of teenage girls – a group just coming into its own in the early 1960s and increasingly recognized for its growing economic power as consumers and arbiters of style. The girl groups reflected teenage girls’ explorations of their world, their limitations and their limitless potential. Groups like the Shangri-Las and the Ronettes give voice to those explorations and the possibilities that waited down the street or just around the corner. Revolution, the Counterculture and the Pill: The Late 1960s American society experienced a revolution in the late 1960s and early ‘70s, especially for African Americans and women. Janis Joplin was the finest white blues singer of her generation; female singer-songwriters like Carole King, Joni Mitchell and Laura Nyro bared their souls, and Aretha Franklin emerged as the Queen of Soul. Bonnie Raitt established herself as both a strong vocalist and brilliant guitarist. Highlighted artists will also include Tina Turner and Grace Slick, as well as country artists including Loretta Lynn. I Will Survive: The 1970s–Rockers to Disco Divas Women are in the center of the ‘70s mainstream, from Joan Jett and the Runaways, Heart and Fleetwood Mac to Donna Summer. The gains of the feminist movement throughout the ‘70s enabled women working in all areas of the music industry to assume more control over their careers. Dance this Mess Around: Punk and Post Punk Chrissie Hynde said, “That was the beauty of the punk thing: [Sexual] discrimination didn’t exist in that scene.” The DIY aspect of punk rock made it easier for a woman to find a place in music. Highlighted artists will include Yoko Ono, Siouxsie Sioux, Kate Pierson and Cindy Wilson of the B-52s, Deborah Harry, Tina Weymouth, Kim Deal and Marianne Causing a Commotion: Madonna and the Pop Explosion Madonna unapologetically celebrated and monetized her sexuality and physicality, paving the way for female performers to explore previously taboo roles and take control of their image and career. Highlighted artists will include Madonna, Cyndi Lauper, Britney Spears, Christina Aguilera, Gwen Stefani and Janet Jackson. Ladies First: The ‘90s and the New Millennium The 1990s was the era the riot grrrl, the rapper and Lilith Fair, reshaping traditional ideas of feminism and traditionally male-dominated areas of the music industry. Women have arguably become the leading voices of the industry, standing—army-booted, bare-footed, or high-heeled stiletto—toe to toe with any artist of today. Highlighted artists will include Bikini Kill, Meg White, Taylor Swift, Queen Latifah, Alicia Keys and Lady Gaga. Women Who Rock: Vision, Passion, Power is organized by the Rock and Roll Hall of Fame and Museum, Cleveland, Ohio. It is sponsored locally by the On Track Guild, Mutual of Omaha, the Durham Society, the Douglas County Commissioners, the Dixon Family Foundation, the Peter Kiewit Foundation, the Parker Family Foundation, and Mary, Kelly, and Sarah Wilson. Media support provided by KETV. Top photo, left to right: Aretha Franklin, Madonna, Patti Smith. Courtesy of Janet Macoska. Madonna's Blond Ambition Tour Bustier, 1990; Wanda Jackson's Acoustic Guitar c. 1958; Lady Gaga's meat dress. Images courtesy of Rock and Roll Hall of Fame and Museum.
<urn:uuid:00bb3928-8b65-48c7-b88e-75f075899f7c>
CC-MAIN-2015-11
http://www.durhammuseum.org/experience/exhibits/temporary/exhibit-details.aspx?ID=239
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936469305.48/warc/CC-MAIN-20150226074109-00165-ip-10-28-5-156.ec2.internal.warc.gz
en
0.91927
1,568
2.59375
3
In these modern times, remixing is seen as merely another way of reinterpreting someone's work. Just like jazz or rock artists reworking old standards or classics in their own way, so, too, do remixers apply a modern method of interpreting people's songs, compositionsor, their entire oeuvre. According to Wikipedia "the remix is an alternative version of a song, different from the original version. A remixer uses audio mixing to compose an alternate master recording of a song, adding or subtracting elements, or simply changing the equalization, dynamics, pitch, tempo, playing time or almost any other aspect of the various musical components." That approach, where existing tracks can be used for the creation of something new, has been happening for some time, and the world of classical music hasn't really been that much different from any other genre of music. It is a well-known fact that composer Beethoven has based variation sets on Handel, while Brahms has used patters from Bach, not to mention the use of melodies from classical music by the pop world. All this indicates that remixers actually follow trends that have been around for centuries. Technological developments in musical instruments and production tools have allowed great opportunities for remixers. In the '90s and '00s, remixes ranged from subtle reinterpretations of recordings to completely new and often unrecognizable versions of songs. But, more often than not, the results have been bad and the remix was more the result of a passing trend than a lasting musical statement. The typical approach has been to grab a single idea from a given song or a composition and to manipulate and reshape it in a very predictable and uniform way. Most often, those remix projects are nothing more than collections of accidently assembled remixers, without any common thread or direction. That is why there is only a handful of remix projects, like David Sylvian 's Good Son Vs The Only Daughter (SamadhiSound, 2005) and Steve Reich Remixed (Nonesuch, 1999), that have actually worked as regular records. Much like all those countless label samplers and compilations, the remix album seldom extends its usefulness beyond a couple of listens. This actually makes Rework_Philip Glass Remixes even more remarkable and delightful In what this group of remixers has managed to achieve with its reworking of composer Philip Glass ' work. The record collects an illustrious cast of remixers, under the guidance of pop star Beck and produced by Hector Castillo. Glass was intrigued by the prospects of how other people would approach his compositions, and asked Beck to assemble a cast of remixers to reshape his work. This shouldn't come as surprise, as Glass has often been open to new musical experiences, collaborating with other artistsalbeit mostly from various other styles and genres than his own. Nor has Glass possessed any inhibitions about working with electronic artists from different eras. Even one-time collaborator, electronic artist Aphex Twin, has remixed Glass' own reworking of singer David Bowie's title track from Heroes (Virgin, 1977) on Heroes Symphony (Point Music, 1997), by stitching Bowie's voice to the instrumental passages. Today, Glass' work has been sampled over and over and he is seen as a guru to a plethora of artists. The assembled lineup for this task offers no clues as to what to Expect, but Rework_Philip Glass Remixes brims and sparkles with ideas and sounds. All of the remixers have approached Glass' work with great respect and make very interesting changes and alterations to the original sound architectures. The remix of "Music in Twelve Parts, Pt 1" by remixer My Great Ghost, has totally redesigned and revamped this composition by adding loops of processed repetitive voices which build up into a section driven by a laidback pulsating beat, while the follow-up, "Rubric" transforms the urgency of the original track from the seminal Glassworks (Sony, 1983), totally reconstructing it by altering the tempo, adding bass synth, a funky keyboard riff and segments of Glass' trademark repetitive keyboard run-ons. Even Beck, the curator of this project and no stranger to remixes of his own work, has approached this task by building the mega-mix "NYC: 73-78," a masterpiece consisting of 20 Glass compositions brought together in a very brave and consistent manner. On the other hand, Cornelius only reprises the famous "Opening from Glassworks," but his version is taken at a slightly slower tempo and temperament. What makes this record so interesting and beautiful is the narrative that runs through it, the entire recording sounding like one continuous mix of some of the most varied and moving music. Rework_Philip Glass Mixes stands as a recording in its own right and merits repeated close listening. There is an elegant and careful reimagining and reworking in evidence, with the result being very accessible and inviting. Track Listing: CD1: Music in Twelve Parts, Part 1; Rubric Remix; Knee 1 Remix; Alight Spiral Ship; Warda's Whorehouse - Inside Out Version; Warda's Whorehouse; Etoile Polaire - Litter Dippe; Floe '87 Remix; Opening from Glassworks. CD2: NYC:73-78, Protest Remix; Mad Rush Organ Remix; Island Personnel: My Great Ghost; Tyondai Braxton; Nosaj Thing; Dan Deacon; Amon Tobin; Silver Alert; Memory Tapes; Cornelius; Beck; Johann Johannsson; Pantha du Prince; Peter Broderick.
<urn:uuid:d5b3a30f-b2b3-434b-93de-5d533dc12229>
CC-MAIN-2015-11
http://www1.allaboutjazz.com/various-artists-rework--philip-glass-remixes-by-nenad-georgievski.php
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00206-ip-10-28-5-156.ec2.internal.warc.gz
en
0.94706
1,169
2.65625
3
After President George W. Bush's visit to southern California, the post-Katrina Federal Emergency Management Agency is getting good reviews for its help to the hundreds of thousands who fled this week's wildfires. But while the Bush administration appears to have improved its record on disaster response, a series of poor budgeting and policy moves in the US Forest Service may have made the fires harder to fight, contributing to more than $1 billion in property damage and the loss of at least 7 lives. Shrinking budgets and an insistence on private contracting appear to have made it more difficult for local communities in the San Diego area to fight the wildfires in their earlier stages, allowing the flames to spread. A review of Bush administration budget proposals by the Huffington Post showed that the flow of money from the US Forest Service to help state and local communities fight wildfires faced chronic cuts since President Bush was elected. During Bush's first year in office, the Forest Service's State Fire Assistance program for wildland fire management was funded at approximately $56 million per year. But the President's budget proposal for 2008 only requests $35 million from Congress, an 18% cut from what it spent in the current year, already well below the earlier levels. Assistance to volunteer firefighting forces increased to a level of about $12 million during 2007, but only after Congressional intervention. At first, the Forest Service had requested only $7.8 million. After the budget mushroomed to the higher level, the administration proposed a 38% cut for next year, reducing the budget to help volunteer firefighters to $8 million, less than the level it was funded at in 2001. A senior Senate staffer who works on land management issues explained why the budget cuts hindered wildfire preparedness. "When the National Fire Plan came out in 2000, a main emphasis was on local preparedness through a significant infusion of grants for more local firefighting equipment," the aide explained to the Huffington Post. "A significant amount of that money has disappeared as a result of the administration's budget policies. You can have lots of funding going into big federal accounts, but local fire departments get to the fire first, and they carry a lot of the load, particularly when fires are not burning on federal lands. From what I've heard in the news, there has been concern about the local fire departments' preparedness in the areas the fires have burned, and that is the situation those grants are targeted at." Forest Service staff did not respond to requests for comment on why the budgets were cut. In addition to the budget cuts, a significant change in policy across the Bush administration made it more difficult to call up federal Forest Service firefighters in crisis situations like the one that destroyed so many homes in southern California. The White House's insistence on the outsourcing of government services has been vigorously applied to the Forest Service. A lone, obscure sentence within the Office of Management and Budget's explanation of the Fiscal Year 2008 budget request for the Forest Service hints at the reasoning for this policy. "Specifically, the Budget will reduce overhead, business management, and other indirect costs by one-third to improve efficiency and program delivery," the report stated. The shift to outsourcing government work within the Forest Service has had a unique effect. Traditionally, almost every employee who worked within the Forest Service in even the lowliest of functions, was trained in firefighting and could be sent out to defeat the wildfires. But with more and more work in the Forest Service outsourced, and accelerating retirements among Forest Service personnel, there are fewer and fewer workers to call up and form a firefighting militia in a crisis. The heavy reliance on contractors has therefore made it harder to fight wildfires like those that burned in southern California's chaparral. In other instances, the service's reliance on contractors extended to even the firefighters themselves. A 2004 Government Accountability Office report described the disastrous scenario that emerged during 2002's so-called "Biscuit Fire" in Oregon. In that setting, the Forest Service hired contractors who brought in untrained personnel who hindered the firefighting effort. "Fire managers participating on the Biscuit Fire said that poorly trained and inexperienced contracted crews presented significant operational concerns," the report noted. "They cited examples of contracted crews that were unable to carry out planned firefighting operations." Contractors also brought in non-English speaking crews, which adversely affected firefighting operations. "There were instances where crew and squad bosses for contracted crews were unable to communicate in English with government supervisors, as required in the interagency crew agreement," the GAO noted. "The lack of fluency in English caused safety concerns and resulted in crews being assigned to far less technical tasks than planned." The senate staffer told the Huffington Post that such instances showed how the principle of outsourcing Forest Service work ignored the practical effects of such policies. "Sometimes contracting out to the private sector makes sense," the Senate aide pointed out. "But the administration pushes this ideology believing that it always makes sense, and they do not think about the big picture when it comes to fighting fires." It's not clear precisely who forged the directives that cut Forest Service budgets and outsourced the agency's personnel in many settings. But some observers of the Forest Service's work had one culprit in mind: forestry industry-friendly Bush appointees within the Department of Agriculture office that sets the policy and budgeting for the Forest Service. Mark E. Rey, who serves as the Under Secretary for Natural Resources and Environment at the USDA, worked in senior positions at various timber industry trade groups for 20 years, such as the American Forest and Paper Association, the American Forest Resource Alliance, the National Forest Products Association, and the the American Paper Institute. He went on to serve as Chief of Staff to Senator Larry Craig during his time as chairman of the Senate Committee on Energy and Natural Resources. President Bush appointed him to his current position in 2001. He helped establish the Bush administration's "Healthy Forests Initiative," which conservationists accuse of allowing logging companies to knock over stands of old growth forest with the justification that they are helping to control fires. Moreover, his former counselor and current deputy, Melissa Simpson, also worked for retired Colorado Rep. Scott McInnis. During that time she played a key role in legislating the Healthy Forests Initiative in the form of the 2003 Healthy Forests Restoration Act. According to her bio at the USDA website, Simpson works on setting Forest Service policy. One California-based conservation advocate said that the policy set by these officials contributed to the Forest Service's poor planning for wildfires like the ones that broke out in Southern California. "From the point of view of scientists and firefighters, the policy we've got in place to deal with these fires is making them worse, on and on," said Scott Greacen, the executive director of the Environmental Protection Information Center. "There are things we should be doing that we aren't doing, and it's not that we're not spending money. We need to be spending it differently. " The USDA also did not respond to requests for comment on who was responsible for setting Forest Service policy.
<urn:uuid:15965070-a02f-4288-9eea-eee347855f1c>
CC-MAIN-2015-11
http://www.huffingtonpost.com/2007/10/26/before-fires-bush-cut-fir_n_69980.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462700.28/warc/CC-MAIN-20150226074102-00023-ip-10-28-5-156.ec2.internal.warc.gz
en
0.968573
1,444
2.65625
3
The Lost Art of Silat (LA Silat) makes an active and conscious effort to rediscover and use the true values of: Adat(Respect), Hormat(Honor), Warriorship, and Loyalty; values that seem to have been lost by some Silat groups. With a focus on the detailed teaching of fighting principles, LA Silat will uphold the integrity and validity of the Art without compromising self-respect and personal honor. Our purpose is to share and learn, to critique skill level, and to encourage students to develop in ways which maximize their potential to be the best they can be. History of Pukulan Pentjak Silat Sera/Bukti Negara The verbal history of Pukulan Pentjak Silat Serak as told to me by Pendekar Paul de Thouars is as follows: Sera was founded by a man named Pak Sera. He was a member of the Badui tribe, of the Indonesian people, referred to as the “White-Robed” Baduis. They were the inner group; the “Blue-Robed” Badui were the outer group. (The White-Dressed Badui natives lived as the nucleus and the Blue Badui surrounded them — outside like a circle) Pak Sera was well known for his wisdom and his fighting abilities. The White Badui people lived in a jungle region which others feared to tread. Since the Badui were well known as warriors, and believed to possess the knowledge of many magical gifts, they were greatly feared and left alone. Cultural and religious practices mandated a strict, secret code of living, and no one was allowed to penetrate the outer circle of the Blue Badui to contact the inner circle of White Badui. The Blue Badui formed a protective shield around the White Badui, and it was the Blue Badui only that traded and communicated with those on the outside. Pak Sera was a man with multiple disabilities. He walked with a limp and could fight with only one leg and one arm. Through his genius, and ability to see beyond his own eyes, he developed one of the most devastating fighting systems the world has ever seen. Actually, the world has not really seen it. Only a few have had the opportunity, and even less have trained in it. Pak Sera created Sera based on a leverage system of math and science. His timing and structurally sound body levers are extremely efficient. Pak Sera shared the Art of Sera with Mas Djoet, a member of the inner Badui tribe. Mas Djoet added the Guardian hand system. The Guardian hand systematically has one hand always backing up the other for defense, trapping and striking. It is a simple, complicated, sophisticated and deadly addition to Sera, and truly is an ingenious adjunct to Sera/Bukti Negara. In time, Mas Djoet met Johann DeVries, a missionary who loved the Indonesian people. They became close friends and Mas Djoet taught Johann DeVries Sera. Pendekar Paul deThouars was born around 1930 in East Java (There are no written records in the jungle) and his training in Sera began around 1936. His Uncle John DeVries was his teacher until his death in 1972. 1985 marks the beginning of the devastating modern Silat art of Bukti Negara. According to Pendekar Paul deThouars, he created Bukti Negara for the elderly, the weak, and those who could not endure the harsh training required by Sera students. Pendekar gave Bukti Negara to the United States as a modern day version of Silat for their very own. He began teaching his own Serak students the basics of Bukti Negara. It would have been a system that only those close to Pendekar could learn. However, Dan Inosanto, a skilled martial artist in his own right, was introduced to Pendekar by Jan (John) De Jong, the now deceased uncle of Guru Stevan Plinck. At that time, Dan Inosanto had already begun traveling and doing seminars all over the country. After training privately with Pendekar in Serak and Bukti Negara, and realizing the value of the art, he began introducing Bukti Negara to the public at his seminars. Maha Guru Dan Inosanto paved the way for others to teach this deadly Art. Senior Gurus Stevan Plinck, Cliff Stewart, Cass Magda and the Pendekar himself have taught seminars worldwide. Pak Serak was said to have studied 9 systems of Silat and mastered 3 to help form his own system of Serak. Mas Djut added the Guardian Hand System. Theo Schryn, John De Vries, Ernest de Vries and Ferdie de Vries all learned Sera/Serak, but each taught it a little differently, still without changing the Art itself. Pendekar Paul deThouars added to the Art a Platform Langka , two-man Sambuts, and Bukti Negara. We at LA Silat continue this tradition of enhancing and “upgrading” the System without changing it. As leaders in the Art may we grow and prosper with only great respect and reverence for all people and things that come into our lives. May all of us have a newfound appreciation for the Art with deeper understanding for what can be achieved now and in the future. - Pukulan/Poekoelan: Striking with a reason or purpose - Pent: Exact/Precise - Jak: Use - Silat: To Fight Compiled by Guru Pangkat Tua Clifford Stewart
<urn:uuid:345d3aca-5e0a-45dd-822d-0334bf239e83>
CC-MAIN-2015-11
http://www.cliffstewart.com/martial-arts/pentjak-silat-sera
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00179-ip-10-28-5-156.ec2.internal.warc.gz
en
0.96663
1,175
2.71875
3
Also in this chapter: For this assessment, the analyses of 13 modelling groups have been reviewed39. Of these, nine groups have performed a global analysis and four have focused on either Annex I or a subset of other countries. These groups have made different assumptions about how the conditionality of pledges plays out in global emissions. Hence, adjustments have been made to the various estimates, in order to facilitate a meaningful comparison. The adjustments made are briefly explained in Box 3a and detailed in the appendices available online. The aim has been to construct a set of pledge cases with estimates of different 2020 emission levels. To estimate emissions expected in 2020 we have to make assumptions about the policy choices of governments. Since these choices are uncertain we specify four different cases, each giving a different combination of choices (Box 3a). The results for emissions are as follows (and are summarised in Figure 2): As a reference point, without pledges global greenhouse gas emissions may increase from 45 GtCO2e in 2005 to around 56 GtCO2e in 2020 (with a range44 of 54-60 GtCO2e) according to business-as-usual projections. It is worth noting that there is the possibility of higher global emissions if international offsets are counted towards both industrialized and developing countries’ pledges (the so-called “double counting” of offsets). It should also be noted that in some countries the impact of existing domestic policies or national plans could lead to lower emissions than the conditional pledges submitted to the Copenhagen Accord. International climate finance could also leverage further mitigation and lower emissions. All these issues have been analysed and found to have a significant effect on 2020 emissions. However, they are not included in any of these cases but are discussed as additional factors in Section 3.4 below. From the analysis of these four cases it is interesting to note that the international policy options being discussed in the UNFCCC negotiations, and inherent in these cases, can significantly reduce the level of emissions in 2020. The most ambitious of the cases (case 4) is expected to be 7 GtCO2e lower than business-as-usual emissions (range of 6-9 GtCO2e lower). For Annex I countries, in the least ambitious case (“unconditional pledges, lenient rules”), emissions are estimated to be 6 per cent above 1990 levels (range of 1-12 per cent above) or equivalent to business-as-usual emissions in 2020. In fact, in many cases the use by Annex I countries of surplus units and “lenient LULUCF credits” provides more overall emission units than needed. This could result in higher emissions after 2020 if those units were to be banked for use in the following period. In the most ambitious case (“conditional pledges, strict rules”), Annex I emissions in 2020 are expected to be 16 per cent below 1990 levels (range of 15-18 per cent below) and 20 per cent below business-as-usual emissions (range of 17-26 per cent). For non-Annex I countries, in the least ambitious case (“unconditional pledges”) emissions are estimated to be 7 per cent lower than business-as-usual emissions (range of 6-8 per cent lower). In the most ambitious case (“conditional pledges”), non-Annex I emissions are 9 per cent lower than business-as-usual (range of 8-9 per cent lower). This implies that the aggregate Annex I countries’ emission goals are less ambitious than the 25-40 per cent reduction by 2020 (compared with 1990) suggested in the IPCC Fourth Assessment Report (IPCC 2007a). Collectively the non-Annex I countries’ goals are less ambitious than the 15-30 per cent deviation from business-as-usual which is also commonly used as a benchmark (den Elzen and Höhne 2008, 2010). Whilst these values are helpful as a benchmark, it should be noted that, as described in chapters 2 and 4, various other emission pathways are consistent with the 2° C and 1.5° C temperature limits. The cases presented in Figure 2 will be taken forward into the next chapter, which compares global emissions projections for 2020 with the emission pathways associated with limiting temperature rise to 2° C or 1.5° C. There are many possible combinations of the uncertainties considered in the preceding section that may lead to different 2020 emissions. However, the four cases presented above represent a reasonable summary of the potential low and high ambition outcomes that may be associated with the pledges. Several options exist for policymakers to influence the final global 2020 emission level by delivering on their highest announced ambition and ensuring that accounting rules do not displace mitigation, and by finding ways to deliver further ambition either domestically, through finance or in sectors not currently covered. All emissions in this figure and chapter refer to GtCO2e (gigatonnes or billion tonnes of carbon dioxide equivalent)—the global warming potential-weighted sum of the six Kyoto greenhouse gases, that is, CO2, CH4, N2O, HFCs, PFCs and SF6, including LULUCF CO2 emissions. n = number of studies; High = maximum of full range; Low = minimum of full range; 20th-80th = 20th and 80th percentile values of the range 1. The data presented in the table have been harmonised to a common emissions level in 2005 (45 GtCO2e) in order to make these data more comparable to results in Chapter 2. 2. The range in 1990 emissions stems from the use of different data sources and assumptions especially for non-Annex I countries. 3. In the set of studies examined in this report, nine modelling groups have analysed the impact of pledges at the global level, while four have analysed only a subset of countries.
<urn:uuid:1d1159dd-bc7c-4162-9a40-82e3183084ad>
CC-MAIN-2015-11
http://www.unep.org/publications/ebooks/emissionsgapreport/chapter3.asp?c=3.2
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463679.20/warc/CC-MAIN-20150226074103-00207-ip-10-28-5-156.ec2.internal.warc.gz
en
0.928991
1,219
3.1875
3
More than one million Americans currently live with Parkinson’s disease (PD), a number expected to triple over the next decades as the U.S. population ages.1 Parkinson’s is a chronic, progressive neurological disease that manifests in a variety of physical, cognitive, and psychological symptoms. Many early symptoms of PD, which is diagnosed in stages, are so subtle and varied that the disease may go unnoticed for years. As it takes time to develop obvious motor symptoms, such as hand tremors, early detection is essential both to confirm a PD diagnosis and to begin treatment.2 While there are no definitive biomarkers for PD, physicians know to be on the lookout for early symptoms if patients have a family history of the disease. According to Dr. Lawrence Severt, Attending Neurologist at Beth Israel Hospital in New York, physicians look for early evidence of non-motor or pre-motor symptoms, factors that may influence a PD diagnosis, long before motor symptoms appear. “While there are many other pre-motor symptoms that researchers are currently considering, the following four symptoms have been statistically validated as early indicators of a potential PD diagnosis,” Severt says. “They are a diminished sense of smell, a long history of constipation, REM-sleep behavior disorder (body movements during REM-sleep when only the eye muscles should move), and a history of anxiety and depression.”3 Other non-motor symptoms may include: - Speaking in a low-volume voice (hypophonia) - Changes in speech (slurring, hesitation, or speaking monotonously) - Difficulty finding words (dysarthria) - Low blood pressure when standing - Painful foot cramps - Emotional changes in personality - Problems with skin - Increased sweating - Increased urination urgency/frequency - Erectile dysfunction Parkinson’s disease is primarily a movement disorder. It is one of a spectrum of progressive neurological disorders that reduce the production of chemical messengers in the brain called neurotransmitters. Parkinson’s disease depletes the neurotransmitter dopamine. Nerve cells use dopamine to send messages that control muscle movement, so a brain that is low in dopamine has less control over muscle function. That lack of control leads to a host of motor symptoms that affect movement. As dopamine in the brain decreases, PD symptoms progressively worsen. Parkinson’s cardinal symptoms affect movement and muscle control and become more noticeable as the disease progresses. Both movement and neurological symptoms are apparent when 80 percent of the brain’s dopamine is exhausted. There are four main motor symptoms of PD. They include tremor (trembling in the hands, arms, legs, jaw, or head); muscle rigidity (stiffness of the limbs and/or torso); bradykinesia (slow movement); and poor balance/posture that may affect gait. Not everyone with PD will have all the cardinal motor symptoms; similar symptoms are common in other neurological disorders. Motor symptoms may begin on just one side of the body at first and progress to both sides as the disease worsens.4 Additional motor symptoms may include some or all of the following: - Loss of automatic movements, such as smiling and blinking - “Masked” face, or a lack of expression - Shuffling gait - Trouble rising from seated position - Difficulty swallowing and/or eating - Stooped posture/impaired balance - Decreased arm swinging when walking - Small handwriting (micrographia) - Freezing, or walking in quick small steps (festination) - Trouble moving, turning in bed - Slowed daily activities - Staying in the same position for long periods There are also many motor symptoms of PD associated with vision that relate to the muscle movements of the eyeball. A person with PD might have trouble focusing, experience blurred or double vision, and/or suffer from eyestrain or chronic dry eye (due to a lack of automatic blinking). Other vision-related PD symptoms may include trouble opening the eyes (apraxia), eyelid spasms (blepharospasm), and/or excessive blinking. In addition to vision changes, people with PD often combat significant cognitive impairments. Sometimes those changes interfere with thinking. Problems with memory and the ability to pay attention, solve problems, or make quick decisions are all common PD symptoms. Some of those changes may be less obvious because they occur gradually. Cognitive symptoms will likely be more noticeable in the later stages of the disease. If they are discovered early, they are typically confined to specific domains of brain function. Below are examples of specific domains that are influenced by decreasing dopamine: - Executive functions: People with PD may have trouble forming concepts, making plans, or reaching goals. It may also be more difficult for them to anticipate the consequences of their actions. - Slowed thinking: Typical daily tasks are challenging for people with PD. Problems are more difficult to solve. Following directions, as in recipes, is more difficult. People with PD also sometimes have trouble accessing specific words. - Impaired memory: Those with PD often have difficulty remembering, storing, and accessing information. - Difficulty paying attention: People with PD often find it difficult to follow complex scenarios, such as fully understanding a multi-person conversation. - Impaired ability to understand spatial relationships: PD may impair patients’ ability to determine where they are in space in relation to everything else. That impairment may affect their ability to operate a moving vehicle. It is not uncommon for cognitive symptoms to also include elements of dementia, confusion, depression, anxiety, and even hallucinations. Stages of Parkinson’s Disease Although Parkinson’s disease is categorized in five stages, the course of its progression is individualized. This is especially true as advancements in treatment effectively slow its course. It is not uncommon to skip stages, or to have a variety of non-motor, motor, cognitive, and psychological symptoms (depression, anxiety, insecurity) at the same time. The pace at which PD worsens varies greatly. Various treatments including medication, surgery, and lifestyle changes can effectively slow the progression of the disease. In PD, Stage I, motor symptoms are confined to one side of the body. In PD, Stage 2, motor symptoms appear on both sides of the body, but balance remains intact. In PD, Stage 3, balance becomes more challenging. In PD, Stage 4, motor functions are severely disabled but walking independently is still possible. Finally, in PD, Stage 5, people are wheelchair-bound or bedridden.
<urn:uuid:d69d71f6-1f8a-43cc-a6b3-df4f90c0e296>
CC-MAIN-2015-11
http://www.healthline.com/health/parkinsons/symptoms
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462426.4/warc/CC-MAIN-20150226074102-00006-ip-10-28-5-156.ec2.internal.warc.gz
en
0.937011
1,374
3.296875
3