text
stringlengths
255
485k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
20
294
file_path
stringlengths
125
138
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
62
102k
score
float64
2.52
5.06
int_score
int64
3
5
Cremation to a Child When a deceased family member or friend is cremated or already has been cremated, your child may want to know what cremation is. In answering your child's questions about cremation, keep your explanation of what cremation involves simple and easy to In explaining cremation to your child, avoid using words that may have a frightening connotation such as "fire" and "burn." Instead, in a straightforward manner, tell your child that the deceased body, enclosed in a casket or container, is taken to a place called a crematory where it goes through a special process that reduces it to small particles resembling fine gray or white sand. Be sure to point out that a dead body feels no pain. Let your child know that these cremated remains are placed in a container called an urn and returned to the family. If cremation has already taken place and the container picked up, you may want to show it to the child. Because children are curious, your child may want to look at the contents. If your child makes such a request, look at them yourself first so that you can describe what they look like. Share this with your child. Then let the child decide whether to proceed further. If possible, arrange for a time when you and your child can be with the body before cremation is carried out. If handled correctly, this time can be a positive experience for the child. It can provide an opportunity for the child to say "good-bye" and accept the reality of death. However, the viewing of the body should not be forced. Use your best judgment on whether or not this should be done. Depending on the age of your child, you may wish to include him or her in the planning of what will be done with the cremated remains. Before you do this, familiarize yourself with the many types of cremation memorials available. Some of the many options to consider include burying the remains in a family burial plot, interring them in an urn garden that many cemeteries have, or placing the urn in a columbarium niche. Defined as a recessed compartment, the niche may be an open front protected by glass or a closed front faced with bronze, marble, or granite. (An arrangement of niches is called a columbarium, which may be an entire building, a room, a bank along a corridor, or a series of special indoor alcoves. It also may be part of an outdoor setting such as a garden wall.) Although your child may not completely understand these or other options for memorialization, being involved in the planning helps establish a sense of comfort and understanding that life goes on even though someone loved has died. If you incur any difficulties in explaining death or cremation to your child, you may wish to consult a child guidance counselor who specializes in these areas.
<urn:uuid:86312c44-0859-4dd2-ab08-2fb2175adf0b>
CC-MAIN-2013-20
http://ruestmanharrisfuneralhome.com/grief-support/explaining-cremation-to-children.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942344
637
3.203125
3
Australian Bureau of Statistics 6202.0 - Labour Force, Australia, Jun 2012 Quality Declaration Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 12/07/2012 |Page tools: Print Page Print All RSS Search this Product| UNDERSTANDING THE AUSTRALIAN LABOUR FORCE USING ABS STATISTICS In order to understand what is happening in Australian society, or our economy, it is helpful to understand people’s patterns of work, unemployment and retirement. ABS statistics can help to build this picture. Fifty years ago, the majority of Australians who worked were men working full-time. Most worked well into their 60s, sometimes beyond, and if they were not working most were out looking for work until that age. The picture now is very different. Far more people work part-time, or in temporary or casual jobs. Retirement ages vary much more, with a greater proportion of men not participating in the labour force once they are older than 55. Nowadays. 45% of working Australians are women, compared with just 30% fifty years ago. These are profound changes that have helped shape 21st Century Australia. This note explains some of the key labour force figures the ABS produces that can be used to obtain a better picture of the labour market. Every month, the ABS runs a Labour Force Survey across Australia covering almost 30,000 homes as well as a selection of hotels, hospitals, boarding schools, colleges, prisons and Indigenous communities. Apart from the Census, the Labour Force Survey is the largest household collection undertaken by the ABS. Data are collected for about 60,000 people and these people live in a broad range of areas and have diverse backgrounds - they are a very good representation of the Australian population. From this information, the ABS produces a wide variety of statistics that paint a picture of the labour market. Most statistics are produced using established international standards, to ensure they can be easily compared with the rest of the world. The ABS has also introduced new statistics in recent years that bring to light further aspects of the labour market. It can be informative to look at all of these indicators to get a grasp of what is happening, particularly when the economy is changing quickly. One thing to remember about the ABS labour force figures is that when a publication states that, for example, 11.4 million Australians are employed, the ABS has not actually checked with each and every one of these people. In common with most statistics produced, the ABS surveys a sample of people across Australia and then scales up the results – based on the latest population figures - to give a total for the whole country. Because the figures are from a sample, they are subject to possible error. The Labour Force Survey is a large one, so the error is minimised. The ABS provides information about the possible size of the error to help users understand how reliable the estimates are. The above diagram shows the break down of the civilian population into the different groups of labour force participation. Each pixel represents about 1000 people as at September 2011. According to established international standards, everyone who works for at least one hour or more for pay or profit is considered to be employed. This includes everyone from teenagers who work part-time after school, to a partially retired grandparent helping out at the school canteen. While it is unreasonable to expect a family to survive on the income of an hour of work per week, one could also argue that all work, no matter how small, contributes to the economy. This definition of 'one hour or more' - which is an international standard - means that ABS' employment figures can be compared with the rest of the world. Now it is, of course, easy to argue that someone who works 2 or 3 hours per week is not really “employed”. But a definition is required. And any cut-off point is open to debate. Imagine if ABS defined being ‘employed’ as working 15 hours a week. Would it be reasonable to argue that someone who works 14.5 hours is unemployed, but 15 hours is not? It is also a mistake to assume that all persons who work low hours would prefer to work longer hours, and are therefore 'hidden' unemployment. Most people who work less than 15 hours a week are not seeking additional hours, although of course there are some who are. The issue of underemployment is further discussed below. Rather than open up such discussions, the ABS prefers to use the international standard and the ABS also encourages people to consider other indicators to form a better picture of what is happening. Alongside the total employed figures, full-time and part-time estimates are provided to better inform on the different kinds of employment, and a detailed breakdown by the number of hours worked is also provided to allow for customised definitions of 'employment.' Commentators often refer to the rise in employment as the number of new jobs created each month. This can be misleading, because the ABS doesn't actually measure the number of jobs. This might sound like semantics, but if a person in the Labour Force Survey who is employed gains a second part-time job at the same time as their main job, this would have no impact on the employment estimate - the Labour Force Survey does not count jobs, it counts people. It is also important to bear in mind that if the relative growth in population is greater than the number of new people in employment, there might actually be an increase in the employment figure, but a lower percentage of people with jobs. It is often informative to look at the proportion of people in employment. This measure, called the employment to population ratio, is the number of employed people expressed as a percentage of the civilian population aged over 15. This removes the impact of population growth to give a better picture of labour market dynamics over time. AGGREGATE MONTHLY HOURS WORKED Instead of counting how many people are working, another way of looking at how much Australians are working is to count the total number of hours worked by everyone. This is measured by a statistic produced by the ABS called Aggregate monthly hours worked, and it is measured in millions of hours. This can sometimes be more revealing of what is happening in the labour market, particularly in a weakening economy where a fall in hours worked can usually be seen before any fall in the number of people employed. PEOPLE WHO ARE NOT WORKING: THE UNEMPLOYED AND OTHERS There are many reasons why Australians do not work. Some have retired and are not interested in going back to work. Some are staying home to look after children and plan on going back to work once the kids have grown older. Some are out canvassing for work every day while others have given up looking. The ABS separates all of these people into those who are unemployed and those who are not by asking two simple questions: If you were given a job today, could you start straight away? and Have you taken active steps to look for work? Only those who are ready to get back into work, and are taking active steps to find a job, are classed as unemployed. Some people might like to work, but are not currently available to work - such as a parent who is busy looking after small children. Other people might want to work but have given up actively looking for work - such as a discouraged job seeker who only half-heartedly glances at the job adds in the newspaper but doesn't call or submit any applications. These people are not considered to be unemployed, but are regarded as being marginally attached to the labour force. They can be thought of as 'potentially unemployed' when, or if, their circumstances change, but are regarded as being on the fringe of labour force participation until then. It is important to note that the ABS unemployment figures are not the same as the data that Centrelink collects on the number of people receiving unemployment benefits. The ABS bases its figures on asking people directly about their availability and steps to find work. In this way, policy decisions about, for example, the criteria for the receipt of unemployment benefits have no impact on the way that the unemployment figures are measured. LABOUR FORCE AND PARTICIPATION RATE The size of the labour force is a measure of the total number of people in Australia who are willing and able to work. It includes everyone who is working or actively looking for work - that is, the number of employed and unemployed together as one group. The percentage of the total population who are in the labour force is known as the participation rate. The unemployment rate is the percentage of people in the labour force who are unemployed. This is a popular measure around the world for tracking a country’s economic health as it removes all the people who are not participating (such as those who are retired). Because the unemployment rate is expressed as a percentage, it is not directly influenced by population growth. The underemployment rate is a useful companion to the unemployment rate. Instead of looking at the people who are unemployed, the underemployment rate captures those who are currently employed, but are willing and able to work more hours. It highlights the proportion of the the labour force who work part-time but would prefer to work full-time. This is sometimes referred to as the 'hidden' potential in the labour force. The underemployment rate can be an important indicator of changes in the economic cycle. During an economic slow down, some people lose their jobs, become unemployed and contribute to a rising unemployment rate. But while this is happening, there might well be others who remain working but have their hours reduced; for example from full-time to part-time. As long as they want to work more hours, they are classed as underemployed, and contribute to the underemployment rate. LABOUR FORCE UNDERUTILISATION RATE The labour force underutilisation rate combines the unemployment rate and the underemployment rate into a single figure that represents the percentage of the labour force that is willing and able to do more work. It includes people who are not currently working and want to start, and those who are currently working but want to - and can - work more hours. It provides an alternative – and more complete - picture of labour market supply than the unemployment rate, as changes in the underutilisation rate capture both changes in unemployment and underemployment, indicating the spare capacity in the Australian labour force. For any queries regarding these measures or any other queries regarding the Labour Force Survey estimates, contact Labour Force on Canberra 02 6252 6525, or via email at [email protected]. These documents will be presented in a new window. This page last updated 8 August 2012
<urn:uuid:77aefa6d-4f8b-4540-8e05-f5552dfb8c0e>
CC-MAIN-2013-20
http://www.abs.gov.au/AUSSTATS/[email protected]/Previousproducts/6202.0Main%20Features999Jun%202012?opendocument&tabname=Summary&prodno=6202.0&issue=Jun%202012&num=&view=
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964134
2,209
2.75
3
Daily Planet's Ingram discusses prion disease 0 Discovery Channel's Daily Planet co-host Jay Ingram visits Grande Prairie today to offer behind-the-scenes details of a mysterious and contagious series of diseases. The lecture takes place at the Grande Prairie Regional College at 7 p.m., where Ingram discusses fatal prion diseases. "Here at this very microscopic level, strange things are happening and just now we are beginning to figure out what they are," he said. The most well-known form of a prion disease is bovine spongiform encephalopathy (BSE), widely known as the mad cow disease. Prion diseases spread when malformed proteins attach themselves to healthy tissue. Unlike other infectious ailments, they are incurable. "It is a protein that has gone wrong," said Stefanie Czub, a scientist with the University of Calgary and the Canadian Food Inspection Agency who will be present at the lecture. "For other infectious diseases we have a cure or the body heals itself quite efficiently.prion diseases, once infected, they are invariably fatal." A prion disease of current concern to Western Canadians is chronic wasting disease (CWD), affecting deer and elk in southern Saskatchewan and Alberta. Unlike mad cow disease, which infects the animal's brain, spinal cord and central nervous system, chronic wasting disease spreads to several parts of the animal, and is even present in urine and saliva. Animals infected become very thin, and can carry the disease for two years before these signs become evident. Prion diseases can only be formally diagnosed by sampling infected tissue. "With all these diseases, it takes quite a long time for the symptoms to show," Ingram said. "You could hunt and kill a deer and eat it, and it might have the chronic wasting disease prions in it." "The ultimate diagnosis can only be done on a piece of tissue, not in blood," Czub said. Twenty deer have been identified in Alberta with CWD since monitoring of the disease began in 2005. While the cause of mad cow disease is generally believed to be the use of recycled beef and bone meal material in livestock feed, which became a common practice in the 1980s, CWD's cause remains unknown. "Nobody really knows," Ingram said. "It could be that an infected deer goes to a salt lick, licks it, and the prions are in the saliva." Ingram said that the disease is currently not an issue for the Peace Country, but infected deer and elk are bringing it into southern Alberta as they travel along the valleys of the South Saskatchewan and Red Deer Rivers. "If chronic wasting disease spreads far enough north, especially in Saskatchewan, that it intersects with the caribou migration routes, and if caribou are susceptible, then you've got a huge problem on your hands," Ingram said. The medical community is taking a close look at CWD due to the similarities prion diseases have with the degenerative Alzheimer's, Parkinson's and Lou Gehrig's diseases. "The way that they spread is somewhat similar," Ingram said. "In Alzheimer's and Parkinson's and Lou Gehrig's disease, you get an accumulation in the brain of junk basically; they're called plaques, these sort of dark deposits if you look at brain tissue after autopsy." "They are all part of the so-called protein-misfolding diseases," Czub said. "One might be a very good model for the other, so we need to keep that in mind. Especially with this enormous increase in Alzheimer's in the future to be expected. One in three over the age of 65 is going to develop Alzheimer's disease in the next 10 years." Hosted by the Alberta Prion Research Institute, Ingram's lecture is open to the public free of charge in the Collins Recital Hall, room L106 today at 7 p.m.
<urn:uuid:271c79de-3e52-44db-a7a4-497b51f1ab1d>
CC-MAIN-2013-20
http://www.dailyheraldtribune.com/2011/03/31/daily-planets-ingram-discusses-prion-disease
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962426
806
2.515625
3
Protect your investment Protected cropping can be as beneficial for small fruit production as it is for vegetables. Yields of some berries may be two to three times greater in protected cultivation than outside in the field. Build customer loyalty by having fresh fruit first in the spring, long into fall, and by growing the highest quality berries. Strawberry plants, which are damaged by temperatures below 12F/-11C, require winter mulch. Although hay and straw are the traditional mulching materials, many strawberry growers use row covers because they require less labor to install and remove. Heavier row covers, weighing 1.25 oz./sq.yd. or more, are recommended. Fall-bearing raspberries and blackberries that normally stop producing at the first frost will continue fruiting for months longer in an unheated hoophouse. They will fruit again earlier in spring than those in the field, commanding a much higher sales price. Strawberry transplants from runners produced over the summer can be planted in an unheated hoophouse in September. They will produce fruit in the fall, continuing until December, and then fruit again in early spring. Strawberry plasticulture is supplanting the traditional matted row system on many farms. Plant on black plastic mulch from mid-July to September and cover with row cover in fall. Fruits are harvested the following spring. Protect fruits from marauding birds with Johnny's bird netting which won't damage fruit or bend branches. Getting started with fruit By Lynn Byczynski For many market growers, fruits are the final frontier of horticultural expertise. Growing fruit is an interesting challenge for a vegetable grower because fruits require different systems for planting, cultivating, harvesting and post-harvest handling. But there are many reasons to take up the challenge. - The primary reason is that people love fruit. Farmers market customers flock to vendors with berries and grapes for sale. CSA members develop stronger ties to farms that can supply a wide range of fresh produce. Chefs who tout their connections to local farmers are delighted to be able to list local fruit on their dessert menus. At home, even the pickiest eaters are usually happy to snack on berries and grapes. - Consumption of berries and grapes is rapidly increasing worldwide, thanks to recent discoveries about the health benefits of these fruits. The pigments that give berries and red or purple grapes their deep colors contain phytochemicals that help prevent cancer, cardiovascular disease, and age-related mental decline. People feel good about eating grapes and berries! - From the farmer's and gardener's perspective, berries and grapes are easier to grow than ever before. New varieties, production practices, and products are increasing the options for growers in every region. Berries are popular crops for the hoophouse, for example, because protection from wind and rain produces extraordinary yields of high-quality fruits. Plastic and paper mulches reduce the need for year-round weeding of these perennial plants. And because Johnny's offers plants in small quantities, growers can trial numerous commercial varieties without spending a lot of money. - Although most berry and grape plants won't produce fruit for 1 to 3 years after planting, the wait is worthwhile. Commercial growers can charge a premium for fresh, ripe fruits. And home gardeners can save money by growing their own. - What do you need to get started with fruits? First, if you aren't sure about the suitability of your climate for small fruits, contact your state Extension service for recommendations. Some regions of the country may not have enough cold (chilling hours) for certain varieties, while others may be too cold for the plants or too hot for the fruits. Good soil preparation is essential for successful fruit production. So is an irrigation system. Most small fruits don't compete well with weeds, so a mulch of hay, straw, or wood chips is beneficial. Grapes need a strong trellis, which should be erected when the vines are planted. A living mulch in the paths between rows will help reduce weed pressure and improve soil fertility. You’ll find products and information about living mulches in the cover crops section on the web and in the catalog. By Lynn Byczynski Growing grapes may appear complicated to the beginner, and with good reason. Although grapes will grow anywhere, there are many kinds of training and trellising systems, and choosing the right one requires some study before planting. Training and trellising go hand-in-hand because the kind of structure you build to hold your grape vines will affect how you prune them. The structure, in turn, depends somewhat on the type of grapes you grow because some are more vigorous and need stronger supports. In general, a grape trellis needs to be able to support the weight of the crop and withstand high winds. It also should be designed to last 20 years, as that's how long you can expect your vines to produce. Home gardeners planting just a few vines can use a fence that fits into the landscape or, better still, an arbor that provides shade in summer as well as support for the grape vines. To get good fruit production from an arbor planting, pruning becomes the key. Texas Extension has a nicely illustrated manual on arbor training. Commercial growers with larger aspirations need to set up a trellis in the field. The main ingredients for a vineyard trellis are strong end posts with braces, earth anchors, or deadmen; posts along the length of the trellis to support the wires; and high-tensile galvanized steel wire to support the vines. The most common type of trellis is the single curtain trellis with either one or two wires and posts every 16 to 24 feet apart, depending on the training system. With this type of trellis, various training styles are possible. Another popular type of trellis, especially in northern areas, is the double curtain, which allows the vines to spread horizontally across two wires. The recommended trellis and training system varies by climate. Northern growers with shorter growing seasons usually choose training systems that expose more leaf surface to the sun, but those can be inappropriate to warm climates. To learn more about the best training and trellising system for your location, check the list below of state viticulture guides and choose the state nearest your own. Or, contact your state Extension service for recommendations. California: Viticulture and Enology Home Page Colorado: Grape Growers Guide Idaho, Oregon, Washington: Northwest Berry & Grape Information Network Iowa: Viticulture Home Page Kansas: Commercial Grape Production Michigan: MSU Grape Information Missouri: Home Fruit Production: Grape Training Systems New York: Cornell Viticulture Ohio: Midwest Grape Production Guide Oklahoma: Viticulture and Enology Pennsylvania: Wine Grape Network South Dakota: Viticulture in South Dakota Texas: Winegrape Network Vermont: Cold Climate Grape Production Wisconsin: Growing Grapes By Lynn Byczynski Strawberries are one of the most popular fruits in American gardens and market farms. They can be grown in many places, from hanging baskets to fields to hoophouses. The trick is to match the growing system to the type of strawberry you want to grow. Some varieties need plenty of space, whereas others can be grown in containers. June-bearing varieties initiate fruit buds in fall and blossom the following spring. They are the earliest type to fruit. They produce one crop and then spend their energy sending out runners (also called daughter plants) that will fruit the following year. June-bearing strawberries are usually grown in a matted row system, in which the mother plants are planted in spring, spaced 18-24" apart in rows that are 3-4' apart. The first year, flowers are pinched off to stimulate the plants to send out runners that fill in the spaces within the row and between the rows. Plants produce fruit the second spring. A variation of this system is to prune runners to one or two per plant so that they stay in a line and don't spread out between the rows. This obviously requires a lot more labor, but may result in better yields because of reduced competition. Matted-row systems can be renovated to keep plants producing for many years. Another system is called the ribbon row system, in which strawberry crowns are planted in fall and allowed to bloom and fruit the following spring. As runners form, they are removed to increase fruit size. Once the crop is done, runners are allowed to develop and fill in the bed to a matted row system. Day-neutral varieties produce fruit all summer. They can be grown as annuals: plant early in spring and pinch off flowers for two months to let the plants get established, and then let them fruit the rest of the summer. Day-neutral strawberries are good for container production on a deck or patio. Some varieties, including 'Seascape', will fruit on unrooted runners so they make attractive hanging baskets, with the runner plants cascading over the sides of the basket. Day-neutral strawberries can also be grown in a hill system, with 12 inches between plants. Alpine strawberries produce small but intensely flavorful berries. They do not send out runners and are usually grown from seed. They are a good choice for strawberry pots and other containers, or as edging in the vegetable garden. They also can be grown with less than full sun, so they are a good choice for many home gardeners. Region-specific growing information is available from most state Extension services. ATTRA has a publication on Organic Production of Strawberries. By Lynn Byczynski Strawberry quality, yield, and earliness is greatly improved in a hoophouse. Penn State researchers found that in their climate, hoophouse strawberries produced fruit 3 weeks earlier in spring than those grown outside, with about a 25% yield increase. Most commercial hoophouse strawberries are grown using an annual plasticulture system that includes raised beds, drip irrigation, plastic mulch, and floating row cover. Plugs are planted in late summer on beds covered with plastic mulch, with drip tape beneath the mulch. As the weather gets cold, the young plants are covered with floating row cover to maintain the warmer soil temperatures needed for establishment. The plants grow slowly during winter in the protected environment of the hoophouse; then, as the weather warms, they flower and produce berries for several weeks. The crop is then finished for the year. Strawberry plants can either be removed to make way for other crops; or they can be left to produce a second year if berry prices or other factors justify tying up the space for a year. Plugs are available from outside suppliers, or they can be produced on the farm in summer. To grow your own, detach unrooted daughter plants (runners) from the mother plant in July and stick them in potting mix in 72-cell flats under intermittent mist until roots protrude from the bottom of the cell. Then place on a greenhouse bench and grow until September, when they can be planted into the hoophouse. Plants that are rooted in July are likely to flower and fruit in fall in warmer climates, but that won't affect their yield the following spring. For more information on hoophouse strawberries: Growing Strawberries in High Tunnels in Missouri Production of Vegetables, Strawberries, and Cut Flowers Using Plasticulture is a book about all aspects of horticultural plastics, and includes extensive information about hoophouse strawberries.
<urn:uuid:36ed1ab0-6236-4c74-aec9-8f12de0eb6cf>
CC-MAIN-2013-20
http://www.johnnyseeds.com/t-catalog_extras_fruits.aspx?source=BlogJSSAdv0212
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940725
2,392
3.421875
3
January 11, 2012 Imagine this scenario. You have a great career and you are a star employee. You are talented, a problem solver and go out of your way to help co-workers. You do your job and make it all look easy. Despite your dedication, one day a new person is hired. They have the same education, experience, and skills that you have. There is only one difference: he gets paid more. In spite of all the progress our nation has made in civil rights over the past fifty years, men still get paid more than women for no other reason than gender. Now is the time to change that. The Paycheck Fairness Act, a long overdue amendment to the Equal Pay Act of 1963, (S. 182) was introduced by Congress in 2011 with the support of President Obama, who in a statement called the legislation “ a common-sense bill that will help ensure that men and women who do equal work receive the equal pay that they and their families deserve.” Nearly fifty years ago, the Equal Pay Act of 1963 passed, promising that men and women would receive equal pay for equal work. However, the wage gap continues despite women’s increased education, greater level of experience, and less time spent raising children. When President John F. Kennedy signed the Equal Pay Act into law, women earned, on average, 60 cents for every dollar earned by men. In the forty-eight years that have passed, the pay gap has closed by less than 20 cents. In 2010, women earned 77 cents on every dollar earned by men. Women of color fared even worse--African American women earned only 67 cents, and Latinas just 58. Seventy-seven cents on the dollar is not fair. Now is the time to take action to close the pay gap. The Paycheck Fairness Act would close loopholes, strengthen business incentives to end pay discrimination, prohibit retaliation against workers who share wage information, and bring the Equal Pay Act in line with other civil rights laws. Passing this act does not just affect women, it affects everyone. More families are depending on women as breadwinners. The share of couples that both work rose to 66 percent in 2010, according to U.S. Census Bureau data. The number of women who were the only working spouse also rose, with an estimated 4 million families depending on mom to bring home the bacon. The number of dads who were the only working spouse dropped, and the number of stay-at-home dads rose higher. The wage gap has long-term effects on the economic security of women and families. In 2009 a typical college educated woman earned $36,278/year for fulltime work, while a comparable educated man earned $47,127- a difference of $10,849. This amount of money can be a great help to a family struggling during a recession. With $10,849, you could buy a year's worth of groceries ($3,210), pay for a semester of college tuition ($6,548), pay three months of rent and utilities ($2,265) six months of health insurance ($1,697), or cover six months on a student loan ($1,602). The current economic crisis is heavily affecting families, and the latest data shows that gender roles are becoming more flexible and egalitarian. Shouldn’t pay reflect this shift? The answer is a resounding yes. We can’t afford to wait another fifty years for paycheck equality. The future of our economy and the well-being of our families depend on it. When women are paid fairly, whole families win. It is our civic duty to take action by writing or calling our Senators and Representatives and urging them to pass the Paycheck Fairness Act now.
<urn:uuid:8390a3a0-bfd8-4dc5-bcd5-47f3d9e8d5c1>
CC-MAIN-2013-20
http://www.madewomanmag.com/index.php?option=com_k2&view=item&id=163:news-%7C-equal-pay-for-equal-work-can-we-afford-to-wait-another-50-years?Itemid=169
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970004
768
3.453125
3
Feral cats occur right across the continent in every habitat type including deserts, forests and grasslands. Total population estimates vary from 5 million to 18 million feral cats. Each feral cat kills between 5-30 animals per day. Taking the lower figure in that range (five) – and multiplying it by a conservative population estimate of 15 million cats – gives a minimum estimate of 75 million native animals killed daily by feral cats. It is clear that cats are playing a critical role in the decline of our native fauna. They are recognised as a primary cause of several early mammal extinctions and are identified as a factor in the current declines of at least 80 threatened species. AWC has developed a practical strategy designed to minimise their impacts and facilitate the development of a long-term solution. This includes: - GROUND COVER: impairing the hunting efficiency of cats in grasslands and woodlands by manipulating ground cover through: - minimising the frequency and extent of late-season wildfires;and - reducing the density of feral herbivores. - DINGOES AS A BIOLOGICAL CONTROL: reducing the density of cats and affect hunting behaviour by promoting a stable Dingo population. - FERAL CAT-FREE AREAS: establishing feral cat-free areas to protect core populations of species most vulnerable to cats. AWC’s Scotia contains the largest cat-free area on the mainland; in total, AWC manages more feral cat-free land on mainland Australia than any other organisation. - STRATEGIC CONTROL: strategic implementation of control measures such as shooting and baiting to protect highly threatened species. - RESEARCH: generating scientific knowledge that will help design a long-term solution enabling the control of cats and their impacts across landscapes and, ideally, the eradication of feral cats. We need your help in the battle to save our wildlife from feral cats. Please make a tax deductible donation to support practical land management that will limit the impact of cats. Your donation will help protect native animals at risk from feral cats, such as the Bilby, the Mala and a host of our small northern mammals. To donate, please click here. To learn more about this project, please read pages 4-7 of the Summer 2012-2013 issue of Wildlife Matters here. Find out more at Australian Wildlife Conservancy
<urn:uuid:0c1505c4-4643-4374-9795-7d8a55f28cbc>
CC-MAIN-2013-20
http://www.shapeourworld.com.au/in-the-field/page/3
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.908985
479
3.890625
4
Vanity Top Finishes Vanity Top Composition Geologically speaking, rocks are classified into 3 main categories: igneous, sedimentary, and metamorphic. Our sinks are made of all natural stones including granite, travertine, and cream marfil. Granite is a type of igneous rock, travertine is sedimentary while cream marfil is metamorphic. Cream Marfil is a type of marble, which is a metamorphic rock resulting from the metamorphism of limestone. Limestone is a sedimentary rock, formed mainly from the accumulation of organic remains (bones and shells of marine microorganisms and coral) from millions of years ago. The calcium in the marine remains combined with carbon dioxide in the water in turn forms calcium carbonate, which is the basic mineral structure of all limestone. When subjected to heat and pressure, the original limestone experiences a process of complete recrystallization (metamorphism), forming what we know as marble. The characteristic swirls and veins of many colored marble varieties, for example, cream marfil, are usually due to various mineral impurities. Cream marfil is formed with a medium density with pores. Travertine is a variety of limestone, a kind of sedimentary rock, formed of massive calcium carbonate from deposition by rivers and springs, especially hot bubbly mineral rich springs. When hot water passes through limestone beds in springs or rivers, it dissolves the limestone, taking the calcium carbonate from the limestone to suspension as well as taking that solution to the surface. If enough time comes about, water evaporates and calcium carbonate is crystallized, forming what we know as travertine stone. Travertine is characterized by pores and pitted holes in the surface and takes a good polish. It is usually hard and semicrystalline. It is often beautifully colored (from ivory to golden brown) and banded as a result of the presence of iron compounds or other (e.g., organic) impurities. Travertine is mined extensively in Italy; in the U.S., Yellowstone Mammoth Hot Springs are actively depositing travertine. It also occurs in limestone caves. Granite is a very common type of intrusive igneous rock, mainly composed of three minerals: feldspar, quartz, and mica, with the first being the major ingredient. Granite is formed when liquid magma?molten rock material?cools beneath the earth?s crust. Due to the extreme pressure within the center of the earth and the absence of atmosphere, granite is formed very densely with no pores and has a coarse-grained structure. It is hard, firm and durable.
<urn:uuid:a5a63392-3468-4388-85e9-d51ad43f7fd5>
CC-MAIN-2013-20
http://www.vintagetub.com/asp/product_detail.asp?item_no=GM-2206-40-BB
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706153698/warc/CC-MAIN-20130516120913-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939076
550
3.34375
3
Thomas Nelson Publishers has a new line of biographies homeschoolers and writers are going to love, called Christian Encounters. Written at an adult level, they make a great resource for parents and excellent texts for older homeschool students. Each biography includes an online reading guide with probing questions that can be printed, discussed and answered. These are ideal for a homeschool research project, or reading group. Peter Leithart, biographer of Jane Austen, has taught Theology and Literature at New Saint Andrews College since 1998, and since 2003 has served as pastor of Trinity Reformed Church in Moscow, Idaho. He writes a delightful 153-page treatise of Austen that all “Janeites” (Jane Austen fans) will appreciate. Far from clinical, Leithart’s humor and factual insights paint a well-rounded portrait of the young author that’s both entertaining and endearing. The book bursts its seams with information I had never before learned about this beloved author. Jane Austen (16 December 1775 – 18 July 1817), is one of the most beloved and widely-read English novelists. Her realism makes her an important resource of English history. Her major works include: Sense and Sensibility (1811); Pride and Prejudice (1813); Mansfield Park (1814); Emma (1815); Northanger Abbey (1817) and Persuasion (1817). Homeschoolers will enjoy including her life and this fine book in any well-rounded study of England during the Regency Period. Writers will enjoy visiting the astonishingly ordinary but fascinating life of one of the most popular romance novelists in the history of English literature.
<urn:uuid:7769b466-2100-47e4-a76e-a9d25a37c2b4>
CC-MAIN-2013-20
http://envisionpublishing.tumblr.com/archive/2010/3
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943916
350
2.609375
3
A patch is a piece of software designed to fix problems. Hot patching is a mechanism of applying the patch to an application without requiring to shutdown or restart the system or the program concerned. This addresses the problems related to unavailability of service provided by the system or the program. We came across a situation where a DLL is loaded by one of the critical processes in a system and that process demands high availability. The DLL has exported functions that are supposed to perform the core operations within the process. We identified a critical flaw in one of the exported functions from the DLL. One constraint we had while trying to fix the problem was to avoid any down time of this critical process. We solved this problem by using the hot patch mechanism. We used an external process to inject a DLL [Hot patch]. This DLL has the corrected version of the defective function and also a hook to GetProcAddress function. As we know, calling GetProcAddress returns the address of the exported function from the specified DLL. By hooking into the GetProcAddress API, we monitored the requests to the exported function. When we find that the request was made for the flawed function, we just returned the address of the updated function which was part of the injected DLL. By intercepting the calls of GetProcAddress API, we redirected the requests from the flawed function to the corrected function. We could resolve this problem by using the concepts like DLL injection and API hooking. Hot Patch Structure This hot patching structure has the following binaries: - Hot Patch DLL: This DLL has only exported functions that are updated and will be used as replacement for the flawed functions. This also has the hooking logic to hook to GetProcAddress API exported by Kernel32.DLL. - Updater.exe: This process injects the hot patched DLL into the target process. How to Inject DLL into a Remote Process One method of injecting a DLL into a remote process requires a thread in the remote process to call LoadLibray of the desired DLL. Since we can't control the threads in a process other that our own, the solution would be to create a new thread in the target process. This enables us to have full control over the code that this thread is going to execute. We can create a thread in a remote process using the following Windows API: HANDLE hProcess, </span /> PSECURITY_ATTRIBUTES psa, PDWORD pdwThreadId ); After creating a new thread in the target process, we need to make sure that there is a call to LoadLibrary API that will load the DLL into the target process. Following is the complete set of steps for injecting a DLL into the target process: VirtualAllocEx API to allocate memory equal to the size of DLL full file path in the remote process: VirtualAllocEx(hProcess, NULL, dwSizeOfFilePath, MEM_COMMIT, PAGE_READWRITE); WriteProcessMemory to copy the DLL's full file path in the allocated space [Step 1]: (void</span />*)szDLLFilePath, dwSizeOfFilePath,NULL); CreateRemoteThread API to create thread in the remote process passing in the address of LoadLibary API and also the memory location of the DLL's full file path. hProcess, </span /> NULL, (LPTHREAD_START_ROUTINE) ::GetProcAddress(hKernel32,"</span />LoadLibraryA"</span />), pDLLFilePath, </span /> 0</span />, VirtualFreeEx function to free the memory allocated in step 1: ::VirtualFreeEx( hProcess, pDLLFilePath, dwSize, MEM_RELEASE ); How to Perform API Hooking using Import Section Using module’s import section to perform hooking is quiet robust and easy to implement. To hook to a particular function, all we need to do is change the address of the flawed function in the module's import section. We are trying to Hook to the GetProcAddress API exported by Kernel32.dll. Following is the complete set of steps for API hooking: - Locate the Module’s import section by calling - Loop through import section for the DLL which contains API that we want to hook. In this case, we would be searching for Kernel32.dll. - Once the DLL module is located, get the address to the array of IMAGE_THUNK_DATA structure that contains the information about the imported symbols: pThunk = (PIMAGE_THUNK_DATA)((PBYTE)hModule + pImportDesc-></span />FirstThunk); - Once the address of the exported is located, use the following APIs to update the address to the new function that needs to be hooked: WriteProcessMemory(GetCurrentProcess(), ppfn, &pNewFunction, sizeof</span />(pNewFunction), NULL); VirtualProtect(ppfn, sizeof</span />(pNewFunction), dwOldProtect,&dwOldProtect); When Are We Going to Perform this Hooking Immediately after injecting the DLL into the remote process, LoadLibary calls the DLLMain of the injected DLL with DllMain( HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved) switch</span />( ul_reason_for_call ) case</span /> DLL_PROCESS_ATTACH: HookTheAPI(); </span /> break</span />; Implementing Our Own GetProcAddress MyGetProcAddress will intercept all the calls made to GetProcAddress APIs to monitor if there is any request for the faulting function and if so, return the address of the corrected function. FARPROC WINAPI MyGetProcAddress(HMODULE hmod, PCSTR pszProcName) pOldFunAdd = GetProcAddress(GetModuleHandle("</span />MySubsystem.dll"</span />), "</span />Foo"</span />); pNewFunAdd = GetProcAddress(GetModuleHandle("</span />MySubsystem.HP.dll"</span />), "</span />"</span />Foo"</span />); pRetFunAdd = GetProcAddress(hmod, pszProcName); if((NULL != pOldFunAdd) && (NULL != pNewFunAdd)) // if the request is of that Faulting Function if(pOldFunAdd == pRetFunAdd ) pRetFunAdd = pNewFunAdd; // Return address of // corrected function return pRetFunAdd ; The attached binaries demo the hot patching implemented using the DLL Injection and Function Hooking. To keep the thing simple and for easy understanding, I am demonstrating with a very basic functionality. Please ignore the code optimizations for now: - MySubsystem.DLL: This DLL exports following functions RandomNumber: Returns a random number SleepTime: Specifies the time to sleep before making the other call to - MyProcess.exe: This process loads the MySubsystem.DLL and displays the RandomNumbers in console after sleeping for the specified amount of time as returned by MySubsystem.DLL. - Change Request: Displays the random numbers which are even. Odd number should not be displayed on the console. This has to be accomplished without restarting the process MyProcess.exe. - MySubsystem.HP.DLL: This is a HOT Patch DLL that contains the corrected MyRandomNumber as per the request. This also has the implementation for Hooking and Hooked function - Updater.exe: This process injects the MySubsystem.HP.DLL into MyProcess.exe Run MyProcess.exe to see that RandomNumbers which are both even and odd are getting displayed. Run the updater.exe and you will see only even numbers getting displayed. All the odd numbers are skipped. One limitation for this approach is that the functions that are exported can be hot patched. - 6th October, 2010: Initial version
<urn:uuid:484ee5ee-b4ac-47b3-aa40-115ba57265c3>
CC-MAIN-2013-20
http://www.codeproject.com/Articles/116253/Hot-Patching-Made-Easy?PageFlow=FixedWidth
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.841218
1,787
3.234375
3
Recent medical reports suggest that ingested aluminum has a direct link to Alzheimer's, attention deficit disorder, bone degeneration, kidney dysfunction, and even Parkinson's disease. Studies have also shown that aluminum salts can be absorbed from the intestines and concentrated in various human tissues. Most baking powder products, a staple in some households, contain toxic levels of aluminum. With all this known, you probably would wonder why aluminum is allowed in baking powder and why anyone would use it. The baking powders that contain aluminum are ‘double-acting’ indicating that although some of the leavening power is released when the mix is prepared, the greater leavening takes place when the item is baked. This produces a very fine, light texture, and is appreciated particularly in commercial baking, where mixes often sit for long periods before they go into the oven. But it isn’t necessary for your baking. For a lighter texture, just bake the mix immediately. Also, if you've ever experienced a bitter, "tinny" flavor when biting into a muffin, that's because of the baking powder used—and often the overuse of it. Using aluminum free baking powder not only will keep you from ingesting aluminum, but will also take away that bitter flavor. April 10, 2011 at 9:41 pm My son is allergic to corn. There is only one brand of baking powder (that I know of) that does not have cornstarch in it. Does this have cornstarch? January 24, 2012 at 10:35 pm Try the Arrowroot powder. xx April 1, 2012 at 2:33 pm RE: Baking Powder - Make your own. It's easier to find aluminum-free baking soda than baking powder: 1 teaspoon baking soda 2 teaspoons cream of tartar 1 teaspoon corn starch (optional - can use arrowroot instead of corn starch) Mix the baking soda and cream of tartar together until well combined. Use immediately. Yield: One tablespoon of baking powder. To store baking powder: Add a teaspoon of corn starch to the mixture, and stir. This will absorb any moisture from the air, and prevent the baking powder from reacting before you need it. Store in an air-tight container.
<urn:uuid:0a9bedf6-a1b9-4a26-b26d-3189f27d2ad6>
CC-MAIN-2013-20
http://www.morethanalive.com/Baking-Powder-Aluminum-Free?id=Ky5TPaXu
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00001-ip-10-60-113-184.ec2.internal.warc.gz
en
0.933287
464
2.6875
3
Eric Weisz, better known to the world as Harry Houdini, was born on this date in 1874. Famous for his feats as an escape artist and magician, Houdini also became one of the most crusading anti-spiritualists of the 1920s. Because of his familiarity with the illusions of stage magic and sleight of hand, Houdini was particularly adept at spotting the trickery that the so-called psychics and spirit mediums then hawking their services as conduits to the afterlife to the credulous grieving public commonly used. (Can you imagine anyone being foolish enough to fall for such predatory charlatanry today?) That turn in Houdini’s career led him to collaborate with Scientific American on a lengthy exposé of spiritualism. Scientific American had offered a $5,000 reward to any medium who could satisfy its panel of investigators, which included Houdini, two of the magazine’s editors (J. Malcolm Bird and Austin C. Lescaboura) and others, that his or her paranormal gifts were genuine. Unfortunately, although the magazine’s panel did reveal many frauds during the few years of its tenure, the whole episode ended very badly. The problem—which in retrospect is quite evident to anyone who has read through the Scientific American archives of that time, as I did—was that at least one of the editors, Malcolm Bird, was not so secretly a believer in the afterlife and very much wanted a psychic to succeed. Matters came to a head in 1924 when the team was evaluating a psychic whom it called “Margery” in print, though we now know her to be Mina Crandon, the comely young wife of a Boston socialite and surgeon. You can read Houdini’s own account of the messy business that resulted, but in short: Mina Crandon’s seance tricks, perhaps aided by her personal charm, bamboozled Bird and the rest Scientific American group with the exception of Houdini, who was not initially at their meetings. They were prepared to award her the prize but Houdini protested that he needed to see for himself. At the seance, Houdini saw through the deception and called “Margery” on it, much to the annoyance of Bird, who angrily resisted exposing her con game. The arguments that followed led to the dissolution of the ghostbusting squad, and the $5,000 was never awarded. What Houdini’s account does not say, but which I have heard as a perhaps unreliable rumor, is that the dispute between Houdini and Bird actually turned into a physical brawl. (Ahh, the two-fisted SciAm editors of yesteryear….) Also, when I attended James Randi’s The Amaz!ing Meeting in Las Vegas in 2003 and talked about these events, magician and mad debunker Penn Jillette told me that he had heard directly from Mina Cranston’s granddaughter that Mina had been sleeping with several members of the team, including Bird. (Oh, the scandal!) That just might help to account for Bird’s umbrage at Houdini’s harsh quashing of Mina’s scam. But that is not the anti-spiritualist episode I would like to talk about today. Rather, turn to a particular occasion when Houdini was trying to disabuse Sir Arthur Conan Doyle of his own spiritualist inclinations. Conan Doyle was not the paragon of rationality and reason that one might assume the creator of Sherlock Holmes would be: he had a soft spot for mediums. (It tends to make one think of Holmes’s famous dictum that “when you have eliminated the impossible, whatever remains, however improbable, must be the truth” in a somewhat different light.) Nevertheless, because Houdini and Conan Doyle had come to be friends, Houdini wanted to open the author’s eyes to the psychic frauds, and so he staged a demonstration that he hoped would do the trick. Michael Shermer recently described what happened in his February “Skeptic” column for Scientific American: In the spring of 1922 Conan Doyle visited Houdini in his New York City home, whereupon the magician set out to demonstrate that slate writing—a favorite method among mediums for receiving messages from the dead, who allegedly moved a piece of chalk across a slate—could be done by perfectly prosaic means. Houdini had Conan Doyle hang a slate from anywhere in the room so that it was free to swing in space. He presented the author with four cork balls, asking him to pick one and cut it open to prove that it had not been altered. He then had Conan Doyle pick another ball and dip it into a well of white ink. While it was soaking, Houdini asked his visitor to go down the street in any direction, take out a piece of paper and pencil, write a question or a sentence, put it back in his pocket and return to the house. Conan Doyle complied, scribbling, “Mene, mene, tekel, upharsin,” a riddle from the Bible’s book of Daniel, meaning, “It has been counted and counted, weighed and divided.” How appropriate, for what happened next defied explanation, at least in Conan Doyle’s mind. Houdini had him scoop up the ink-soaked ball in a spoon and place it against the slate, where it momentarily stuck before slowly rolling across the face, spelling out “M,” “e,” “n,” “e,” and so forth until the entire phrase was completed, at which point the ball dropped to the ground. Houdini then explained that he had done the whole thing through simple trickery and implored Conan Doyle to give up his spiritualist beliefs. Alas, he failed: not only did Conan Doyle continue to believe in mediums but he suspected that Houdini knowingly or unknowingly used his own supernatural gifts in the performance of his escape acts. Here is my question for the hive mind: How did Houdini do it? Magicians are of course famously reluctant to reveal how they do their tricks, and it’s not clear that Houdini showed the secret to Conan Doyle. (Perhaps that’s why Conan Doyle refused to be convinced.) Rather than ask a magician to break his professional code, I thought I would ask you readers to suggest how Houdini accomplished his “ghostly” slate writing. Here are my own uninformed guesses about elements of the trick, which still probably don’t quite cohere into a full explanation. - My sense is that the slate hung from wherever it was placed by wires attached to its four corners so that it could swing freely but also hang level. I suspect that a marionette-like arrangement of those wires could in theory allow a ball to be rolled across the slate’s surface as required. - Conan Doyle’s cutting into one of the cork balls to prove it had not been tampered with does not preclude his selected ball from being tampered with or replaced subsequently, when he is not looking. - Sending Conan Doyle down the street to write his secret message would give him a sense of privacy, but of course it also would allow Houdini (and unknown cronies?) a chance to reset the slate and the balls as they chose. - Any good pickpocket could probably remove that page with Conan Doyle’s message from his pocket, look at it and return it without him being the wiser. That’s my best hypothesis about how Houdini did it. What’s yours? Update (added 3/25, 8:23 a.m.): Via Twitter, P. Kerim Friedman tells me that these two books (here and here) may hold the answer, although those explanations aren’t immediately available online. So I’d still like to hear your theories. The How Did Houdini Trick Conan Doyle? by Retort, unless otherwise expressly stated, is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License.
<urn:uuid:bf72aa02-e812-4485-a117-2222459f46fe>
CC-MAIN-2013-20
http://blogs.plos.org/retort/2011/03/24/how-did-houdini-trick-conan-doyle/comment-page-1/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.97732
1,726
2.984375
3
Bullying Among Elementary Schoolchildren - New Studies on Bullying. // Techniques: Connecting Education & Careers;May2005, Vol. 80 Issue 5, p15 Reports on a study focusing on bullying among school children by the Committee for Children (CFC) in the U.S. Initiatives undertaken by school administrators to reduce aggressive student behavior; Proposition for the integration of anti-bullying and social and emotional skills into classrooms;... - Bullying Prevention. Feldman, Sandra // Teaching Pre K-8;Mar2004, Vol. 34 Issue 6, p6 Discusses information on handling bullying among children in a school environment. Importance of parents' cooperation in handling bullying among their children in schools; Strategies in helping students deal with bullying among peers. - A Bully's Tale. // Education Canada;Summer2005, Vol. 45 Issue 3, p43 The article presents a personal narrative of experiences of being bullied when the author was a student. She relates how she was bullied, both physically and psychologically, during her elementary years. She relates how she was able to stop the bullying only after she herself used violence. She... - trying to fit in. Brodkin, Adele M. // Scholastic Parent & Child;Sep2008, Vol. 16 Issue 1, p48 The article offers tips on how parents and teachers can help a child not to be neglected in school. A six-year-old boy who is not as ease with physical activities, experienced being left out by other boys. An expert explains that young children exhaust their own fears of being an outsider by... - Free State educators' experiences and recognition of bullying at schools. de Wet, Corene // South African Journal of Education;Feb2006, Vol. 26 Issue 1, p61 In South Africa little research has been conducted into bullying and particularly into South African educators' experiences of school bullying. In an attempt to address this hiatus in the literature on bullying, I report on an investigation into Free State educators' experiences and recognition... - BULLYING. Scarpaci, Richard T. // Kappa Delta Pi Record;Summer2006, Vol. 42 Issue 4, p170 This article discusses the prevalence of bullying among school children in the U.S. in 2006. In approaching this problem, research has suggested that reduction of bullying is best accomplished through a school-wide effort. The role of teachers in addressing this problem is indicated. In... - BULLYING HURTS. Feltes, Kimberly // Scholastic Action;3/16/2009, Vol. 32 Issue 11, p16 The article addresses the growing problem of bullying in schools and offers tips on how to deal with it. - sticky SITUATION. // Scholastic News -- Edition 5/6;5/7/2007, Vol. 75 Issue 23/24, p14 A hypothetical situation about a boy being bullied by his classmates is presented. - Next in the Teachers' Lounge …. Leete, Patricia // Teaching Young Children;Apr/May2012, Vol. 5 Issue 4, p31 The article presents the author's insights regarding the issue of bullying in school.
<urn:uuid:6fff3ad3-744d-4e46-b0da-b4ab44333549>
CC-MAIN-2013-20
http://connection.ebscohost.com/c/articles/19353212/bullying-among-elementary-schoolchildren
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.934175
655
3.453125
3
Green Power is electricity generated from renewable energy sources that are environmentally friendly such as solar, wind, biomass, and hydro power. New York State and the Public Service Commission have made a commitment to promote the use of Green Power and foster the development of renewable energy generation resources. GREEN POWER IN NEW YORK Electricity comes from a variety of sources such as natural gas, oil, coal, nuclear, hydro power, biomass, wind, solar, and solid waste. Green Power is electricity generated from renewable energy sources such as: Solar: Solar energy systems convert sunlight directly into electricity. Biomass: Organic wastes such as wood, other plant materials and landfill gases are used to generate electricity. Wind: Modern wind turbines use large blades to catch the wind, spin turbines, and generate electricity Hydropower: Small installations on rivers and streams use running or falling water to drive turbines that generate electricity. NY’s ENERGY MIX |The pie chart below shows the mix of energy sources that was used to generate New York’s electricity in 2003. Buying Green Power will help to increase the percentage of electricity that is produced using cleaner energy sources.| You have the power to make a difference For only a few pennies more a day, you can choose Green Power and make a world of difference for generations to come. - Produces fewer environmental impacts than fossil fuel energy. - Helps to diversify the fuel supply, increasing the reliability of the NY State electric system and contributing to more stable energy prices. - Reduces use of imported fossil fuels, keeping dollars spent on energy in the State’s economy. - Creates jobs and helps the economy by spurring investments in environmentally-friendly facilities. - Creates healthier air quality and helps to reduce respiratory illness. If just 10% of New York’s households choose Green Power for their electricity supply, it would prevent nearly 3 billion pounds of carbon dioxide, 10 million pounds of sulfur dioxide, and nearly 4 million pounds of nitrogen oxides from getting into our air each year. Green Power helps us all breathe a little easier. Your Energy…Your Choice Your electric service is made up of two parts, supply and delivery. In New York’s competitive electric market, you can now shop for your electric supply. You can support cleaner, sustainable energy solutions by selecting Green Power for some or all of your supply. No matter what electric supply you choose,your utility is still responsible for delivering your electricity safely and reliably, and will provide you with customer service and respond to emergencies. What happens when you choose to buy Green Power? The Green Power you buy is supplied to the power grid that delivers the electricity to all customers in your region. Your Green Power purchase supports the development of more environmentally-friendly electricity generation. You are helping to create a cleaner, brighter New York for future generations. You will continue to receive the safe, reliable power you’ve come to depend on. Switching to Green Power is as easy as: 1. Use the list below to contact the Green Power service providers in your area. 2. Compare the Green Power programs. 3. Choose the Green Energy Service Company program that is right for you. Using New York’s power to change the future Energy conservation, energy efficiency and renewable energy are critical elements in New York’s economic, security and energy policies. New York State is committed to ensuring that we all have access to reliable electricity by helping consumers use and choose energy wisely. Recently, the state launched two initiatives – one designed to educate the public about the environmental impacts of energy production, and one to encourage the development of Green Power programs. The Environmental Disclosure Label NY RENEWABLE ENERGY SERVICE INITIATIVES The New York State Public Service Commission is supporting development of renewable energy service programs in utility service territories across the state. These programs are spurring the development of new sources ofrenewable energy and the sale of Green Power to New York consumers. As a result, Green Power service providers are now offering a variety of renewable energy service options. Most New York consumers now have the opportunity to choose Green Power. Suppliers Offering Green Energy Products Green Power can be arranged through the following suppliers (may not operate in all utility territories.) PSC has created the following list of providers and does not recommend particular companies or products. |Agway Energy Services||1-888-982-4929||www.agwayenergy.com| |Amerada Hess||1-800-HessUSA (437-7872)||www.hess.com (Commercial and Industrial only) |Community Energy, Inc.||1-866-Wind-123 |Constellation New Energy||1-866-237-7693||www.integrysenergy.com (Commercial and Industrial only) |Energy Cooperative of New York||1-800-422-1475||www.ecny.org| |Green Mountain Energy Company||1-800-810-7300||www.greenmountain.com| |Integrys Energy NY||1-518-482-4615 |Juice Energy, Inc||1-888-925-8423||www.juice-inc.com| |NYSEG Solutions, Inc.||1-800-567-6520||www.nysegsolutions.com| |Pepco Energy Services, Inc. (NYC commercial and industrial only) |Just Energy (GeoPower – Con Ed territory)||1-866-587-8674||www.justenergy.com| |Just Energy (GeoGas – Con Ed, KeySpan, NFG territories)||1-866-587-8674||www.justenergy.com| |Central Hudson Gas and Electric||1-800-527-2714||www.centralhudson.com| |National Grid||1-800-642-4272 (upstate) 1-800-930-5003 (Long Island) |New York State Electric and Gas||1-800-356-9734||www.nyseg.com| |Orange and Rockland||1-877-434-4100||www.oru.com| |Rochester Gas and Electric||1-877-743-9463||www.rge.com| |Long Island Power Authority(LIPA)||1-800-490-0025||www.lipower.org|
<urn:uuid:c5ac2c27-7304-41b9-936a-59bd96158c32>
CC-MAIN-2013-20
http://ecoanchornyc.com/resources/clean-energy-programs/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.807671
1,372
3.5625
4
All About Canada: he Canada Site is the primary Internet portal for information on the Government of Canada, its programs, services, new initiatives and products, and for information about Canada. Canadian Health: Healthy living means making positive choices that enhance your personal physical, mental and spiritual health. You make these choices when you: Eat nutritiously, choosing a variety of foods from all of the food groups as suggested by Canada’s Food Guide; Canadian Fitness: Current estimates from the 2000/01 Canadian Community Health Survey indicate that 33% of Canadians aged 20 + have a body mass index over 25 and are thus considered overweight. The trend is toward increased overweight: 26% of women aged 20-64 were considered overweight in 2000, compared with 14% in 1985. General Nutrition: Providing science-based dietary guidance is critical to enhance the public’s ability to make healthy choices in the effort to reduce obesity and other food related diseases. Since dietary needs change throughout the lifespan, specialized nutrition information is provided about infants, children, teens, adult women and men, and seniors.
<urn:uuid:807f857d-a7c3-4816-ae69-85682ea04dd9>
CC-MAIN-2013-20
http://myblahg.com/canadian-reference-sheet
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944609
220
2.765625
3
- About LENS - About Neurofeedback - LENS Treated Disorders - David Dubin - LENS Videos - Contact Us Archive for author David Dubin Los Angeles based LENS Neurofeedback provider and blogger. More posts by David Dubin Dr. David Dubin After Einstein’s death, his brain was preserved for future study. Scientists were naturally curious to see how the brain of this genius compared with the brain of a person of ordinary intelligence. Would there be an abundance of neurons (grey matter) or some unusual wiring of the neurons that distinguished his brain? When the brain was dissected, however, the only difference was that the numbers of cells that were not neurons (white matter) was dramatically increased. It is also true that, from evolutionary point of view, as brains became larger and “smarter”, what increased was not the percentage of neurons but of white matter. What does this mean? When most of us--scientists and lay people alike—imagine the brain, we think of neurons, those cells carrying information in the form of electrical impulses. Neurons are ‘brains of the brain’, so to speak, and the rest of the cells were thought to be there only for support. But neurons account for only 15 percent of the brain, while these so-called ‘support’ cells occupy 85 percent. The group name for white matter cells, glia—derived from the world ‘glue’—reflects their lowly status. First seen clearly by anatomists in the late 1800’s, Glia were initially thought to be little more than structural support for neurons, because, like scaffolding, glial cells literally hold neurons in place. It was later found that glia can speed transmission of electrical signals and also deliver energy to neurons and remove neuronal waste products. While appearing to be a little more interesting than originally thought, glia still seemed about as sexy as wire insulation, food delivery and waste management devices. Unlike neurons, there is no electrical activity within glia to send messages and information. It was therefore assumed that glia were deaf and dumb, incapable of communicating with either neurons or other glia, and therefore not particularly compelling as a focus of research. A good analogue would be the under-appreciated dark matter in astronomy. Dark matter is undetectable because it emits no electromagnetic radiation as the matter in the “visible” universe does. The existence of dark matter was eventually inferred from its gravitational effects on visible matter. While we had believed that the visible universe is the universe, the ordinary matter of our visible universe accounts for less than five percent of the total; dark matter accounts for more than 20 percent. Today, the pace of knowledge about glia has begun to accelerate, as outlined in an exciting new book, The Other Brain, by Dr. R. Douglas Fields[i] (the title refers to the 85 percent of the brain that is glial). Fields is a neuroscientist specializing in glial cell research, and the information in his book is so new that it isn’t found in standard medical textbooks. Two review articles in the May, 2010 issue of the research journal Nature Neuroscience attest to how much still needs to be learned, and how potentially revolutionary are the implications. So, are glial cells really dumb as a doorknob? First, we are just now learning that glial cells do communicate, not through synapses but through “gap junctions”. These gap junctions are protein channels connecting one cell to another, like a spaceship docking at the mother station. Glia can pass messages among themselves by using calcium as a chemical messenger instead of sending an electric signal as neurons do. In his research, Fields showed that after a 15-second delay, changes in response to a neuronal firing were seen in the surrounding glial cells. As Fields puts it, glial cells are “listening in” on what neurons are doing, something virtually no one in neuroscience thought possible. Contrary to all established dogma, it is now known that glia not only communicate directly from one cell to an adjacent one, but also with cells very far away. Glia are even able to “jump” over barriers like a ping pong ball going over a net. And whereas neurons transmit their signals in linear lines, like telephone wires, glia communicate, as Fields puts it, by “broadcasting signals widely, like cell phones.” Glia are also critical to the growth of neurons. Neuron cells grown in the lab without accompanying glial cells were found to have many fewer synapses than neurons grown with glial cells. Glia seem to play a central role in the number of synapses a neuron develops. Contrary to what scientists thought, glia also have neurotransmitters; in fact, the same ones that neurons do. And there are receptors for these neurotransmitters both inside and on the outer surface of glial cells. Glial cells have receptors for glutamate, the principal stimulating neurotransmitter in the cortex, and GABA, which acts as a “brake” to calm down neurons. In other words, glia can excite or depress neurons and stimulate or calm the brain, just like medications. And, unlike neurons, glia can move. They have enormous cellular “fingers” like the elastic Mr. Fantastic of comic book fame, and can move between and on neurons. This constantly changes the circuitry of the brain. These glial fingers also form around synapses. They secrete substances that remodel tissue or stimulate neuron growth during development and repair of the brain making it likely that they function in a similar role during learning in the healthy brain. Glia repair injury, defend against disease, nurse neurons back to health and act as guide dogs for the re-growth of injured nerve fibers. Glia detect and react to bacteria and viruses, “gobble up” pathogens and release toxic chemicals to kill bacteria. And new research suggests that immature glial cells can act like stem cells and mature glia can stimulate stem cells dormant in the adult brain to form replacement neurons and glia. This could have implications for repair of the nervous system, including new possibilities for treating spinal cord injuries. This is about as far removed from mere insulation, food delivery and waste management services as can be imagined. Glia are a lot smarter than we thought they were. A 2005 study shows a correlation between organization of fibers made of glial cells and IQ. Finding a greater proportion of glial cells in Einstein’s brain is not so surprising after all. We still know very little about glia—even the basics such as how many kinds of glial cells there are and what they look like in detail. Their discovery, however, broadens our appreciation of the complexity of the brain. The brain, with its 100 billion neurons and an average of 10,000 synapses per neuron, has more potential connections than the atoms of our galaxy! We don’t know yet if diet, exercise, supplements and other factors affect glial cells. However, the implications for health and illness—seizures, infections, cancer, addictions, mental illness and diseases such as Parkinson’s and multiple sclerosis may be far-reaching and profound. As Fields says near the end of his book, “Here are cells that can build the brain of a fetus, direct the connection of its growing axons to wire up the nervous system, repair it after it is injured, sense impulses crackling through axons and hear synapses speaking, control the signals neurons use to communicate with one another at synapses, provide the energy source and substrates for neurotransmitters to neurons, couple large areas of synapses and neurons into functional groups, integrate and propagate the information they receive from neurons through their own private network, release neurotoxic or neuroprotective factors, plug and unplug synapses, move themselves in and out of the synaptic cleft, give birth to new neurons, communicate with the vascular and immune systems, insulate the neuronal lines of communication, and control the speed of impulse traffic through them. And some people ask, ‘Could these cells have anything to do with higher brain function?’ How could they possibly not?” [i] FIELDS, R. Douglas, The Other Brain, Simon & Schuster, December 2009, 384 p. People with obsessive-compulsive disorder, or OCD, have recurrent thoughts and behaviors that can be crippling. What follows is a discussion of the biology of the disorder and several aspects of treatment. Obsessive compulsive disorder is not a single disorder; rather, it’s of a cluster of conditions. In OCD, sufferers might obsess and be anxious and compulsive about hoarding, cleaning, ordering and checking. Patients can also exhibit body dysmorphic disorder (BDD), where they imagine possessing a defect in physical appearance. Other diseases that overlap with OCD include Tourette’s syndrome and hypochondria. OCD also has a genetic component and runs in families; relatives of someone with OCD are 8 times more likely to present symptoms. The areas of the brain that appears involved with OCD are the orbito-frontal cortex (OFC), a center for decision-making, and the thalamus, which filters and relays information. In these brain regions, the neurotransmitter glutamate is responsible for neuronal signaling. It’s thought that the deficit of glutamate production and function might contribute to the condition of OCD and other counter-productive behavior, including making decisions based on inappropriately perceived danger. Obsessive Compulsive Disorder Treatment The neurotransmitter serotonin may play an important role in whether someone gets obsessive compulsive disorder. Researchers have found a defect in the gene that makes a protein that “mops up” serotonin from between neurons. When there’s too much of this protein there is not enough serotonin, and that’s what is found in some with OCD. This is why Serotonin Re-uptake Inhibitors (SRIs) such as Prozac, which makes serotonin more available to the brain, are perhaps the most popular OCD treatment. Another commonly used OCD treatment is exposure and response prevention (ERP), where the patient is exposed to stimuli that trigger the repetitive behavior but do not allow the patient to actually perform the compulsive behavior. Eventually the patient can learn that nothing bad happens when they don’t act out their compulsion. Unfortunately, ERP is a stressful treatment for patients to endure. And significant numbers of patients drop out of treatment. Various drugs, such as the SRIs, are now being used in conjunction with ERP. Anxiety usually is significant part of obsessive compulsive disorder. While anxiety does not appear to be the actual cause of OCD, anxiety can drive persistent thoughts and behaviors. A reduction in anxiety can be important in the treatment of OCD. Various modalities for treating anxiety include medication, neurofeedback (both traditional and LENS Neurofeedback), and/or behavioral approaches. When anxiety is successfully brought under control, there are not only fewer obsessive thoughts, but those obsessive thoughts that do persist become less prominent. Instead being the dominant focus, compulsive become background music as opposed to a loud concert. These thoughts demand less attention and this makes it easier to control compulsive behavior.
<urn:uuid:d3e20eda-53a0-4cb8-966e-a395b0cb0d95>
CC-MAIN-2013-20
http://thedubinclinic.com/author/Ddubin89/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955086
2,356
2.921875
3
Managing the Generations By Kerry L. Roberts and Pauline M. Sampson Generational differences are common in schools; after all, for the most part students and their teachers have always come from different generations. We’d like to call attention to another kind of generational difference in districts: those among school board members, administrators, and teachers. For many reasons, including economics and changing demographics, many districts have three or even four generations working for it. We note this because people born in different generations see and perceive situations, values, and work differently, and they communicate differently. This is a broad generalization, of course, but the era in which you grow up does influence your outlook, philosophy, and work habits. Understanding generational differences can help school board members and superintendents lead more effectively. They can make the differences work to the advantage of the district and to improve student achievement. Subscribers please click here to continue reading. If you are not a subscriber, please click here to purchase this article or to obtain a subscription to ASBJ.
<urn:uuid:342d57d2-8a3d-4571-8638-a3719af26196>
CC-MAIN-2013-20
http://www.asbj.com/TopicsArchive/SchoolGovernance/Managing-the-Generations.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.957249
219
3.0625
3
Earth System Science Partnership (ESSP) The ESSP is a partnership for the integrated study of the Earth System, the ways that it is changing, and the implications for global and regional sustainability. The urgency of the challenge is great: In the present era, global environmental changes are both accelerating and moving the earth system into a state with no analogue in previous history. To learn more about the ESSP, clink on links to access Strategy Paper, brochure and a video presentation by the Chair of the ESSP Scientific Committee, Prof. Dr. Rik Leemans of Wageningen University, The Netherlands. The Earth System is the unified set of physical, chemical, biological and social components, processes and interactions that together determine the state and dynamics of Planet Earth, including its biota and its human occupants. Earth System Science is the study of the Earth System, with an emphasis on observing, understanding and predicting global environmental changes involving interactions between land, atmosphere, water, ice, biosphere, societies, technologies and economies. ESSP Transitions into 'Future Earth' (31/12/2012) On 31st December 2012, the ESSP will close and transition into 'Future Earth' as it develops over the next few years. During this period, the four global environmental Change research programmes (DIVERSITAS, IGBP, IHDP, WCRP) will continue close collaboration with each other. 'Future Earth' is currently being planned as a ten-year international research initiative for global sustainability (www.icsu.org/future-earth) that will build on decades of scientific excellence of the four GEC research programmes and their scientific partnership. Click here to read more. Global Carbon Budget 2012 Carbon dioxide emissions from fossil fuel burning and cement production increased by 3 percent in 2011, with a total of 34.7 billion tonnes of carbon dioxide emitted to the atmosphere. These emissions were the highest in human history and 54 percent higher than in 1990 (the Kyoto Protocol reference year). In 2011, coal burning was responsible for 43 percent of the total emissions, 34 percent for oil, 18 percent for gas and 5 percent for cement. For the complete 2012 carbon budget and trends, access the Global Carbon Project website. GWSP International Conference - CALL for ABSTRACTS The GWSP Conference on "Water in the Anthropocene: Challenges for Science and Governance" will convene in Bonn, Germany, 21 - 24 May 2014. The focus of the conference is to address the global dimensions of water system changes due to anthropogenic as well as natural influences. The Conference will provide a platform to present global and regional perspectives on the responses of water management to global change in order to address issues such as variability in supply, increasing demands for water, environmental flows, and land use change. The Conference will help build links between science and policy and practice in the area of water resources management and governance, related institutional and technological innovations and identify ways that research can support policy and practice in the field of sustainable freshwater management. Learn more about the Conference here. Global Carbon Project (GCP) Employment Opportunity - Executive Director The Global Carbon Project (GCP) is seeking to employ a highly motivated and independent person as Executive Director of the International Project Office (IPO) in Tsukuba, Japan, located at the Centre for Global Environmental Research at the National Institute for Environmental Studies (NIES). The successful candidate will work with the GCP Scientific Steering Committee (SSC) and other GCP offices to implement the science framework of the GCP. The GCP is seeking a person with excellent working knowledge of the policy-relevant objectives of the GCP and a keen interest in devising methods to integrate social and policy sciences into the understanding of the carbon-climate system as a coupled human/natural system. Read More. Inclusive Wealth Report The International Human Dimensions Programme on Global Environmental Change (IHDP) announces the launch of the Inclusive Wealth Report 2012 (IWR 2012) at the Rio +20 Conference in Brazil. The report presents a framework that offers a long-term perspective on human well-being and sustainability, based on a comprehensive analysis of nations' productive base and their link to economic development. The IWR 2012 was developed on the notion that current economic indicators such as Gross Domestic Product (GDP) and the Human Development Index (HDI) are insufficient, as they fail to reflect the state of natural resources or ecological conditions, and focus exclusively on the short-term, without indicating whether national policies are sustainable. Future Earth: Global platform for sustainability research launched at Rio +20 Rio de Janeiro, Brazil (14 June 2012) - An alliance of international partners from global science, research funding and UN bodies launched a new 10-year initiative on global environmental change research for sustainability at the Forum on Science and Technology and Innovation for Sustainable Development. Future Earth - research for global sustainability, will provide a cutting-edge platform to coordinate scientific research which is designed and produced in partnership with governments, business and, more broadly, society. More details. APN's 2012 Call for Proposals The Asia-Pacific Network for Global Change Research (APN) announces the call for proposals for funding from April 2013. The proposals can be submitted under two separate programmes: regional global change research and scientific capacity development. More details. State of the Planet Declaration Planet Under Pressure 2012 was the largest gathering of global change scientists leading up to the United Nations Conference on Sustainable Development (Rio +20) with over 3,000 delegates at the conference venue and over 3,500 that attended virtually via live web streaming. The plenary sessions and the Daily Planet news show continue to draw audiences worldwide as they are available On Demand. An additional number of organisations, including 150 Science and Technology Centres worldwide streamed the plenary sessions at Planet Under Pressure-related events reaching an additional 12,000 viewers. The first State of the Planet Declaration was issued at the conference. Global Carbon Budget 2010 Global carbon dioxide emissions increased by a record 5.9 per cent in 2010 following the dampening effect of the 2008-2009 Global Financial Crisis (GFC), according to scientists working with the Global Carbon Project (GCP). The GCP annual analysis reports that the impact of the GFC on emissions has been short-lived owing to strong emissions growth in emerging economies and a return to emissions growth in developed economies. Planet Under Pressure 2012 Debategraph Debategraph and Planet Under Pressure Conference participants and organisers are collaborating to distill the main arguments and evidence, risks and policy options facing humanity into a dynamic knowledge map to help convey and inform the global deliberation at United Nations Rio +20 and beyond. Join the debate! (http://debategraph.org/planet) Integrated Global Change Research The ESSP and partners - the German National Committee on Global Change Research (NKGCF), International Council for Science (ICSU) and the International Social Science Council (ISSC) is conducting a new study on 'Integrated Global Change Research: Co-designing knowledge across scientific fields, national borders and user groups'. An international workshop (funded by the German Research Foundation) convened in Berlin, 7 - 9 March 2012, designed to elucidate the dimensions of integration, to identify and analyse best practice examples, to exchange ideas about new concepts of integration, to discuss emerging challenges for science, and to begin discussions about balancing academic research and stakeholder involvement. The Future of the World's Climate The Future of the World's Climate (edited by Ann Henderson-Sellers and Kendal McGuffie) offers a state-of-the-art overview - based on the latest climate science modelling data and projections available - of our understanding of future climates. The book is dedicated to Stephen H Schneider, a world leader in climate interpretation and communication. The Future of the World's Climate summarizes our current understanding of climatic prediction and examines how that understanding depends on a keen grasp of integrated Earth system models and human interaction with climate. This book brings climate science up to date beyond the Intergovernmental Panel on Climate Change (IPCC) Fourth Assessment Report. More details. Social Scientists Call for More Research on Human Dimensions of Global Change Scientists across all disciplines share great concern that our planet is in the process of crossing dangerous biophysical tipping points. The results of a new large-scale global survey among 1,276 scholars from the social sciences and the humanities demonstrates that the human dimensions of the problem are equally important but severely under-addressed. The survey conducted by the International Human Dimensions Programme on Global Environmental Change (IHDP-UNU) Secretariat in collaboration with the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the International Social Science Council (ISSC), identifies the following as highest research priority areas: 1) Equity/equality and wealth/resource distribution; 2) Policy, political systems/governance, and political economy; 3) Economic systems, economic costs and incentives; 4) Globalization, social and cultural transitions. Food Security and Global Environmental Change Food security and global environmental change, a synthesis book edited by John Ingram, Polly Ericksen and Diana Liverman of GECAFS has just been published. The book provides a major, accessible synthesis of the current state of knowledge and thinking on the relationship between GEC and food security. Click here for further information. GECAFS is featured in the latest UNESCO-SCOPE-UNEP Policy Brief - No. 12 entitled Global Environmental Change and Food Security. The brief reviews current knowledge, highlights trends and controversies, and is a useful reference for policy planners, decision makers and stakeholders in the community. GWSP Digital Water Atlas The Global Water System Project (GWSP) has launched its Digital Water Atlas. The purpose and intent of the Digital Water Atlas is to describe the basic elements of the Global Water System, the interlinkages of the elements and changes in the state of the Global Water System by creating a consistent set of annotated maps. The project will especially promote the collection, analysis and consideration of social science data on the global basis. Click here to access the GWSP Digital Water Atlas. The ESSP office was carbon neutral in its office operations and travel in 2011. The ESSP supported the Gujarat wind project in India. More details. The Global Carbon Project has published an ESSP commissioned report, "carbon reductions and offsets" with a number of recommendations for individuals and institutions who want to participate in this voluntary market. Click here to learn more and to download the report from the GCP website. The ESSP is a joint initiative of four global environmental change programmes:
<urn:uuid:120b0d29-fee9-445b-a798-b67b2cbeb131>
CC-MAIN-2013-20
http://www.essp.org/index.php?id=10&L=0%252F%252Fassets%252Fsnipp%20%E2%80%A6%2F%2Fassets%2Fsnippets%2Freflect%2Fsnippet.reflect.php%3Freflect_base%3D
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.894252
2,191
2.984375
3
Tips for helping children behave (especially in public) I thought it was time to write down some of the tips I’ve acquired that concern children and behavior, as I’ve learned what I have about the brain and how it works. What I learned is that while you are thinking about something, you feel as you do about it. If you want to change how you feel, changing your thoughts helps us do that immediately. Just as I say, “ Imagine the tip of your left pinky finger… where the nail meets the skin…” Do you think of it? Did you think of your pinky because I mentioned it? You did that because that is how quickly our brain responds. Tip 1. Keep a picture or small item (from a special time or event) that represents something special to the child with you. Yes. Helping a child regain composure during a meltdown may be painful and embarrassing, not to mention the discomfort your child perceives at that time. There seems to be great debate over how to handle a situation like a meltdown like let them ride it out or leave immediately or yell or whatever… if you have tried these techniques I’d like you to pause and ask yourself how helpful your response was in the moment. Keeping a picture of a grandparent or a party or a vacation or an item or toy that they really want for their birthday or special holiday… (Big breath…) you get the picture… it helps take your child’s thoughts to a more pleasant place. You can make this even more effective by asking them questions about it, even if you know the answers ; ) Ask questions like, “Hey remember this? Where/who is this again? Do you remember that thing in the picture…? What do you think happened right before this? What is your favorite thing about this? Can you make up a sentence/song/rhyme/or draw a picture about the picture? Can you spell something in the picture? These questions will take their focus to something better. Once they’ve calmed down and appear to be past the issue, ask them what happened and explain why that behavior isn’t helpful or necessary. Tip 2. A simple game of ‘I spy’ with extra OMG This tip is great if you find yourself out and are caught empty handed without anything handy to keep your kids busy. Look around you and spot something ANYTHING that either you don’t see often or haven’t seen in awhile (not a person) and get excited while smiling and saying, “OMG you are never going to find what I am looking at! It is soooo _____________” This usually leads to a game of I spy which can be changed as your child develops I spy colors… I spy words that start with ___... I spy numbers … Tip 3. Text Message back and forth I noticed a long time ago how technology has changed the interpersonal dynamic. Being more of a “find the solution girl”, I established some rules like no cell phone at the table for meals. Please know my daughter was 4 when I did this knowing that when she is grown she will have a phone and I probably will want to use our dining times to connect. I figured our meals are relatively short and whatever needed me could wait the 30 minutes. Also, it was a perfect opportunity to demonstrate the behavior I hope to create. This is what led me to texting with my child. I remember when she was beginning to read that I looked for every practical experience for her to do so… signs, menus, airport terminals… everything. But sometimes there is nothing to read and nowhere to go as you get stuck waiting in line or for an appointment or for whatever presents a time where you can text and you need to keep kids busy and have fun… text them. Hand them your phone and say here… and let them read your message for them. Then let them respond to you via text. Hand the phone back and forth…after a few texts you may be happy to learn what you do… and you will both have fun while doing it. Tip 4. Start them on a story. This is one I use all the time and changes just as much as I use it. I simply start a story using something that I see for example… “Once there was this really cool girl who sat down to write some really helpful stuff for parents…” then they have to look around and continue the story using something they see. Example “But that girl decided to step away from her desk and go play with the fairies living in her backyard…” Start stories about the cars you see driving or the foods you see in the market or the stars in the sky… about the waves in the ocean and the mermaids that live deep below. When you run out of time for your part and you’ve got them interested, tell them to draw a picture of it or write a story about it. How smart and well behaved your children are now. Thanks for reading. You do make a difference in your child’s life. Much Love.
<urn:uuid:f9d8d1b0-2683-4967-8c9a-42f8d9002ae5>
CC-MAIN-2013-20
http://www.serioushypnotherapy.com/blog/2012/05/10/Tips-for-helping-children-behave-especially-in-public.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.966947
1,065
2.734375
3
Ten common myths about teaching Educators discuss the nation’s biggest misconceptions about teachers and their profession It seems everyone has an opinion about teachers and their profession these days … and most of them aren’t teachers. Perhaps it would be a different matter if the conceptions of teaching were like those of NASA engineers: smart, genius! Or maybe like those of firefighters: brave, self-sacrificing! However, in our nation’s current climate, saying the word “teacher” is like Forrest Gump opening a box of chocolates: you never know what you’re going to get, as teachers too often are seen as a convenient scapegoat for the perceived problems that are plaguing public education. eSchool News recently asked readers: “If you could clear up one misconception about teachers and/or teaching, what would it be?” Our goal was not only to help others understand these misconceptions, but also to learn how teachers feel they are perceived by others. Here are 10 misconceptions about teachers and teaching that emerged from readers (responses edited for brevity): 1. Those who can’t do, teach. “The one misconception I would like to clarify is around the phrase, ‘Those who can cannot do, teach.’ While many educators are active contributors to the particular area in which they have domain expertise (i.e. Science, Language Arts, History), K-12 educators … have committed themselves to developing skills in how to engage and foster growth of young people around the content and processes that comprise that area of expertise. It is the very special practitioner [who] makes a good educator; however, good educators need to have enough knowledge of their areas of expertise to cultivate excitement, curiosity, and spark the passion to commit to a vocation or avocation. Maybe a better phrase is, ‘Those who teach create those who do.’” —Michael Jay “One of my favorites is, ‘Those who can’t, teach.’ Teachers must be well educated in their field of study, of course, but that is only the beginning. Teachers need much pedagogical preparation on topics including educational psychology, classroom management, assessment, curriculum instruction, communication skills, and budgeting. And that is all before a teacher steps into a classroom. The requirements for a qualified teacher include all of the skills needed for the 21st-century workplace.” —Mary Montag, teacher, St. Teresa’s Academy
<urn:uuid:b6d4b73b-f52e-4f5e-8efa-0e9a60f8728c>
CC-MAIN-2013-20
http://www.eschoolnews.com/2011/08/05/ten-common-myths-about-teaching/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.971118
522
2.78125
3
Vienna Philharmonic asks historians to look into alleged Nazi past Historian says orchestra demonstrated sympathy for Austria's Nazi leadership during Holocaust. The Vienna Philharmonic has asked three historians to research the orchestra's alleged Nazi past. The announcement on January 22 came after Harald Walser, a historian and Parliament member for the Austrian Greens, said in an interview that the orchestra demonstrated sympathy for the country’s Nazi leadership during World War Two. Historians Fritz Truempi, Oliver Rathkolb and Bernadette Mayrhofer will look into the "politicization" of the Vienna Philharmonic from 1938 to 1945, the fate of its Jewish musicians during that time and its relations with Nazis afterward, according to an orchestra statement, the French news agency AFP reported. Their report is due in March. Walser has called for forming a committee of inquiry into the role of the philharmonic during those years and said the orchestra has not released all its documents from the Nazi era or has destroyed some of them. He cited a listing on the philharmonic’s official website that describes a concert delivered on New Year’s Day of 1939 as a “sublime homage to Austria,” when it actually was a celebration of the country's unification with Nazi Germany in 1938. The New Year's Concert of the Vienna Philharmonic takes place each year on the morning of January 1 in Vienna and is broadcast to an estimated audience of 50 million in 73 countries. Walser claims that after the war, an emissary of the Vienna Philharmonic gave a new copy of its honor ring in 1966 to Nazi war criminal Baldur von Schirach, who was responsible for the deportation of tens of thousands of Austrian Jews to death camps, following his release from Berlin’s Spandau Prison for war criminals. Von Schirach had received the original ring in 1942. Six Jewish musicians from the philharmonic were murdered by the Nazis in Austria and 11 were deported to death camps, according to reports.
<urn:uuid:7370bf47-b62f-4518-872f-1b4a3eec04e5>
CC-MAIN-2013-20
http://www.haaretz.com/jewish-world/jewish-world-news/vienna-philharmonic-asks-historians-to-look-into-alleged-nazi-past-1.496118
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.970053
424
2.71875
3
Kidney Disease of Diabetes On this page: - The Burden of Kidney Failure - The Course of Kidney Disease - Diagnosis of CKD - Effects of High Blood Pressure - Preventing and Slowing Kidney Disease - Dialysis and Transplantation - Good Care Makes a Difference - Points to Remember - Hope through Research - For More Information The Burden of Kidney Failure Each year in the United States, more than 100,000 people are diagnosed with kidney failure, a serious condition in which the kidneys fail to rid the body of wastes.1 Kidney failure is the final stage of chronic kidney disease (CKD). Diabetes is the most common cause of kidney failure, accounting for nearly 44 percent of new cases.1 Even when diabetes is controlled, the disease can lead to CKD and kidney failure. Most people with diabetes do not develop CKD that is severe enough to progress to kidney failure. Nearly 24 million people in the United States have diabetes, 2 and nearly 180,000 people are living with kidney failure as a result of diabetes.1 People with kidney failure undergo either dialysis, an artificial blood-cleaning process, or transplantation to receive a healthy kidney from a donor. Most U.S. citizens who develop kidney failure are eligible for federally funded care. In 2005, care for patients with kidney failure cost the United States nearly $32 billion.1 African Americans, American Indians, and Hispanics/Latinos develop diabetes, CKD, and kidney failure at rates higher than Caucasians. Scientists have not been able to explain these higher rates. Nor can they explain fully the interplay of factors leading to kidney disease of diabetes—factors including heredity, diet, and other medical conditions, such as high blood pressure. They have found that high blood pressure and high levels of blood glucose increase the risk that a person with diabetes will progress to kidney failure. 1United States Renal Data System. USRDS 2007 Annual Data Report. Bethesda, MD: National Institute of Diabetes and Digestive and Kidney Diseases, National Institutes of Health, U.S. Department of Health and Human Services; 2007. 2National Institute of Diabetes and Digestive and Kidney Diseases. National Diabetes Statistics, 2007. Bethesda, MD: National Institutes of Health, U.S. Department of Health and Human Services, 2008. The Course of Kidney Disease Diabetic kidney disease takes many years to develop. In some people, the filtering function of the kidneys is actually higher than normal in the first few years of their diabetes. Over several years, people who are developing kidney disease will have small amounts of the blood protein albumin begin to leak into their urine. This first stage of CKD is called microalbuminuria. The kidney's filtration function usually remains normal during this period. As the disease progresses, more albumin leaks into the urine. This stage may be called macroalbuminuria or proteinuria. As the amount of albumin in the urine increases, the kidneys' filtering function usually begins to drop. The body retains various wastes as filtration falls. As kidney damage develops, blood pressure often rises as well. Overall, kidney damage rarely occurs in the first 10 years of diabetes, and usually 15 to 25 years will pass before kidney failure occurs. For people who live with diabetes for more than 25 years without any signs of kidney failure, the risk of ever developing it decreases. Diagnosis of CKD People with diabetes should be screened regularly for kidney disease. The two key markers for kidney disease are eGFR and urine albumin. eGFR. eGFR stands for estimated glomerular filtration rate. Each kidney contains about 1 million tiny filters made up of blood vessels. These filters are called glomeruli. Kidney function can be checked by estimating how much blood the glomeruli filter in a minute. The calculation of eGFR is based on the amount of creatinine, a waste product, found in a blood sample. As the level of creatinine goes up, the eGFR goes down. Kidney disease is present when eGFR is less than 60 milliliters per minute. The American Diabetes Association (ADA) and the National Institutes of Health (NIH) recommend that eGFR be calculated from serum creatinine at least once a year in all people with diabetes. Urine albumin. Urine albumin is measured by comparing the amount of albumin to the amount of creatinine in a single urine sample. When the kidneys are healthy, the urine will contain large amounts of creatinine but almost no albumin. Even a small increase in the ratio of albumin to creatinine is a sign of kidney damage. Kidney disease is present when urine contains more than 30 milligrams of albumin per gram of creatinine, with or without decreased eGFR. The ADA and the NIH recommend annual assessment of urine albumin excretion to assess kidney damage in all people with type 2 diabetes and people who have had type 1 diabetes for 5 years or more. If kidney disease is detected, it should be addressed as part of a comprehensive approach to the treatment of diabetes. Effects of High Blood Pressure High blood pressure, or hypertension, is a major factor in the development of kidney problems in people with diabetes. Both a family history of hypertension and the presence of hypertension appear to increase chances of developing kidney disease. Hypertension also accelerates the progress of kidney disease when it already exists. Blood pressure is recorded using two numbers. The first number is called the systolic pressure, and it represents the pressure in the arteries as the heart beats. The second number is called the diastolic pressure, and it represents the pressure between heartbeats. In the past, hypertension was defined as blood pressure higher than 140/90, said as "140 over 90." The ADA and the National Heart, Lung, and Blood Institute recommend that people with diabetes keep their blood pressure below 130/80. Hypertension can be seen not only as a cause of kidney disease but also as a result of damage created by the disease. As kidney disease progresses, physical changes in the kidneys lead to increased blood pressure. Therefore, a dangerous spiral, involving rising blood pressure and factors that raise blood pressure, occurs. Early detection and treatment of even mild hypertension are essential for people with diabetes. Preventing and Slowing Kidney Disease Blood Pressure Medicines Scientists have made great progress in developing methods that slow the onset and progression of kidney disease in people with diabetes. Drugs used to lower blood pressure can slow the progression of kidney disease significantly. Two types of drugs, angiotensin-converting enzyme (ACE) inhibitors and angiotensin receptor blockers (ARBs), have proven effective in slowing the progression of kidney disease. Many people require two or more drugs to control their blood pressure. In addition to an ACE inhibitor or an ARB, a diuretic can also be useful. Beta blockers, calcium channel blockers, and other blood pressure drugs may also be needed. An example of an effective ACE inhibitor is lisinopril (Prinivil, Zestril), which doctors commonly prescribe for treating kidney disease of diabetes. The benefits of lisinopril extend beyond its ability to lower blood pressure: it may directly protect the kidneys' glomeruli. ACE inhibitors have lowered proteinuria and slowed deterioration even in people with diabetes who did not have high blood pressure. An example of an effective ARB is losartan (Cozaar), which has also been shown to protect kidney function and lower the risk of cardiovascular events. Any medicine that helps patients achieve a blood pressure target of 130/80 or lower provides benefits. Patients with even mild hypertension or persistent microalbuminuria should consult a health care provider about the use of antihypertensive medicines. In people with diabetes, excessive consumption of protein may be harmful. Experts recommend that people with kidney disease of diabetes consume the recommended dietary allowance for protein, but avoid high-protein diets. For people with greatly reduced kidney function, a diet containing reduced amounts of protein may help delay the onset of kidney failure. Anyone following a reduced-protein diet should work with a dietitian to ensure adequate nutrition. Intensive Management of Blood Glucose Antihypertensive drugs and low-protein diets can slow CKD. A third treatment, known as intensive management of blood glucose or glycemic control, has shown great promise for people with diabetes, especially for those in the early stages of CKD. The human body normally converts food to glucose, the simple sugar that is the main source of energy for the body's cells. To enter cells, glucose needs the help of insulin, a hormone produced by the pancreas. When a person does not make enough insulin, or the body does not respond to the insulin that is present, the body cannot process glucose, and it builds up in the bloodstream. High levels of glucose in the blood lead to a diagnosis of diabetes. Intensive management of blood glucose is a treatment regimen that aims to keep blood glucose levels close to normal. The regimen includes testing blood glucose frequently, administering insulin throughout the day on the basis of food intake and physical activity, following a diet and activity plan, and consulting a health care team regularly. Some people use an insulin pump to supply insulin throughout the day. A number of studies have pointed to the beneficial effects of intensive management of blood glucose. In the Diabetes Control and Complications Trial supported by the National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK), researchers found a 50 percent decrease in both development and progression of early diabetic kidney disease in participants who followed an intensive regimen for controlling blood glucose levels. The intensively managed patients had average blood glucose levels of 150 milligrams per deciliter-about 80 milligrams per deciliter lower than the levels observed in the conventionally managed patients. The United Kingdom Prospective Diabetes Study, conducted from 1976 to 1997, showed conclusively that, in people with improved blood glucose control, the risk of early kidney disease was reduced by a third. Additional studies conducted over the past decades have clearly established that any program resulting in sustained lowering of blood glucose levels will be beneficial to patients in the early stages of CKD. Dialysis and Transplantation When people with diabetes experience kidney failure, they must undergo either dialysis or a kidney transplant. As recently as the 1970s, medical experts commonly excluded people with diabetes from dialysis and transplantation, in part because the experts felt damage caused by diabetes would offset benefits of the treatments. Today, because of better control of diabetes and improved rates of survival following treatment, doctors do not hesitate to offer dialysis and kidney transplantation to people with diabetes. Currently, the survival of kidneys transplanted into people with diabetes is about the same as the survival of transplants in people without diabetes. Dialysis for people with diabetes also works well in the short run. Even so, people with diabetes who receive transplants or dialysis experience higher morbidity and mortality because of coexisting complications of diabetes-such as damage to the heart, eyes, and nerves. Good Care Makes a Difference People with diabetes should - have their health care provider measure their A1C level at least twice a year. The test provides a weighted average of their blood glucose level for the previous 3 months. They should aim to keep it at less than 7 percent. - work with their health care provider regarding insulin injections, medicines, meal planning, physical activity, and blood glucose monitoring. - have their blood pressure checked several times a year. If blood pressure is high, they should follow their health care provider's plan for keeping it near normal levels. They should aim to keep it at less than 130/80. - ask their health care provider whether they might benefit from taking an ACE inhibitor or ARB. - ask their health care provider to measure their eGFR at least once a year to learn how well their kidneys are working. - ask their health care provider to measure the amount of protein in their urine at least once a year to check for kidney damage. - ask their health care provider whether they should reduce the amount of protein in their diet and ask for a referral to see a registered dietitian to help with meal planning. Points to Remember - Diabetes is the leading cause of chronic kidney disease (CKD) and kidney failure in the United States. - People with diabetes should be screened regularly for kidney disease. The two key markers for kidney disease are estimated glomerular filtration rate (eGFR) and urine albumin. - Drugs used to lower blood pressure can slow the progression of kidney disease significantly. Two types of drugs, angiotensin-converting enzyme (ACE) inhibitors and angiotensin receptor blockers (ARBs), have proven effective in slowing the progression of kidney disease. - In people with diabetes, excessive consumption of protein may be harmful. - Intensive management of blood glucose has shown great promise for people with diabetes, especially for those in the early stages of CKD. Hope through Research The number of people with diabetes is growing. As a result, the number of people with kidney failure caused by diabetes is also growing. Some experts predict that diabetes soon might account for half the cases of kidney failure. In light of the increasing illness and death related to diabetes and kidney failure, patients, researchers, and health care professionals will continue to benefit by addressing the relationship between the two diseases. The NIDDK is a leader in supporting research in this area. Several areas of research supported by the NIDDK hold great potential. Discovery of ways to predict who will develop kidney disease may lead to greater prevention, as people with diabetes who learn they are at risk institute strategies such as intensive management of blood glucose and blood pressure control. Participants in clinical trials can play a more active role in their own health care, gain access to new research treatments before they are widely available, and help others by contributing to medical research. For information about current studies, visit www.ClinicalTrials.gov. For More Information National Diabetes Information Clearinghouse 1 Information Way Bethesda, MD 20892-3560 National Kidney Foundation 30 East 33rd Street New York, NY 10016 Phone: 1-800-622-9010 or 212-889-2210 National Kidney and Urologic Diseases Information Clearinghouse The National Kidney and Urologic Diseases Information Clearinghouse (NKUDIC) is a service of the National Institute of Diabetes and Digestive and Kidney Diseases (NIDDK). The NIDDK is part of the National Institutes of Health of the U.S. Department of Health and Human Services. Established in 1987, the Clearinghouse provides information about diseases of the kidneys and urologic system to people with kidney and urologic disorders and to their families, health care professionals, and the public. The NKUDIC answers inquiries, develops and distributes publications, and works closely with professional and patient organizations and Government agencies to coordinate resources about kidney and urologic diseases. Publications produced by the Clearinghouse are carefully reviewed by both NIDDK scientists and outside experts. This publication is not copyrighted. The Clearinghouse encourages users of this publication to duplicate and distribute as many copies as desired. NIH Publication No. 08-3925 Page last updated: September 2, 2010
<urn:uuid:36a053bc-082c-49ae-841c-dc1010205aef>
CC-MAIN-2013-20
http://www.kidney.niddk.nih.gov/KUDiseases/pubs/kdd/index.aspx?control=Alternate
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.932766
3,214
3.28125
3
Deep Vein Thrombosis Exams and Tests When you first see the doctor, he or she will do a physical exam and ask questions about your medical history. These help your doctor decide what tests you need based on your risk for deep vein thrombosis (DVT). Your doctor will check: - Your heart and lungs. - Your legs for warmth, swelling, bulging veins, or changes in skin color. Your doctor may ask: - Do you have any swelling or pain in your legs? - Have you had a blood clot before? - What medicines do you take? - Have you had surgery recently or have you been on any long trips lately? Reference Ultrasound is the main test used to help diagnose DVT. It creates a picture of the flow of blood through the veins. If your doctor thinks you should have more tests, you might have two or three more ultrasounds over the next 7 to 10 days. More tests may be used when ultrasound results are unclear. These tests often aren't needed, but they may help diagnose or exclude a blood clot in the leg. These tests may include: Blood thinner testing If you are treated with anticoagulant medicines, you may need periodic blood tests to monitor the effects of the anticoagulant on the blood. Blood tests include: - Reference Activated partial thromboplastin time (APTT) to monitor treatment with heparin. - Reference Prothrombin time (PT), also referred to as INR, to monitor treatment with warfarin (Coumadin). Tests for clotting problems Special blood tests may help identify Reference inherited blood-clotting problems that can increase your risk of forming blood clots or help explain why you got a blood clot. These tests check for genetic conditions or specific proteins in your blood. Testing might be done if you have or had one or more of the following: - A blood clot in a vein that has no clear cause - A blood clot at age 45 or younger - A blood clot in a vein at an unusual location, such as the gastrointestinal region, the brain, or the arms - A first-degree family member (mother, father, brother, or sister) who has had a blood clot in a vein before age 45 or has had problems with blood clotting Screening for these problems in the general population is not routinely done. |By:||Reference Healthwise Staff||Last Revised: Reference August 17, 2012| |Medical Review:||Reference E. Gregory Thompson, MD - Internal Medicine Reference Jeffrey S. Ginsberg, MD - Hematology
<urn:uuid:b228b173-b4e9-46ba-9db3-537ce7908597>
CC-MAIN-2013-20
http://www.pamf.org/teen/healthinfo/index.cfm?A=C&type=info&hwid=aa68134&section=aa68254
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.919867
560
2.8125
3
To preserve our planet, scientists tell us we must reduce the amount of CO2 in the atmosphere from its current level of 392 parts per million ("ppm")to below 350 ppm. But 350 is more than a number—it's a symbol of where we need to head as a planet. At 350.org, we're building a global grassroots movement to solve the climate crisis and push for policies that will put the world on track to get to 350 ppm. Scientists say that 350 parts per million CO2 in the atmosphere is the safe limit for humanity. Learn more about 350—what it means, where it came from, and how to get there. Read More » Submit your success story from your work in the climate movement and we'll share the best ones on our blog and social networks! Stories from people like you are crucial tools in growing the climate movement. Help spread the word and look good while doing it—check out the 350 Store for t-shirts, buttons, stickers, and more.
<urn:uuid:ca6b4c4b-78a7-46de-b5b0-5091760e0798>
CC-MAIN-2013-20
http://350.org/en/about/blogs/story-endfossilfuelsubsidies
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.928506
206
3.078125
3
Since many ancestors of Americans were foreign born, naturalization records are another a source of genealogical information that you might want to investigate. Naturalization is the process through which a foreign born person becomes a citizen of the United States and is eligible to vote. Not all immigrants became citizens as it is not required. Many obtained their citizenship because of pride in their new country and a desire to participate in democratic elections, a privilege perhaps not accorded to them in their country of birth. Others became citizens for more materialistic reasons, such as the right to acquire free land through homesteading. During times of war, there was often hostility towards people from the enemy country and immigrants may have obtained citizenship to show their loyalty to the U.S., especially if they had children serving in the U.S. Was Your Ancestor Naturalized? Before beginning a search for a naturalization record, it may save hours of futile research if you try to determine if there is evidence that the individual you are researching did become a citizen. There are several ways to do this: Even with the above information, keep in mind the following caveats: - Location of Birth Was the person foreign born? Usually there's no need to be naturalized if born in the U.S. - Census The 1900 and 1910 censuses ask if a person is naturalized and 1920 further asks the year of naturalization. Indirectly, the 1820 and 1830 census provide a clue with the question "number of foreigners in each household not naturalized." - Homesteading Land The person had to have initiated the naturalization process to be eligible for free land through homesteading. - Voter Registration Lists Is he/she listed as a voter? - Occupation Did this person hold a job that required - Not all foreign born individuals applied for citizenship and a child born abroad is still a U.S. citizen if his/her parents are. During much of our history, the wife and children automatically became citizens when the husband/father took out citizenship papers. - Naturalization was one of many census questions. The person who provided the answer may not have known in fact if someone else had been naturalized. An individual may have said yes because he felt it was the right thing to say or he intended to begin the process. - A Declaration of Intent, not final papers, was all that was required - Not everyone who became a citizen registered to vote. Also, some states allowed people who had filed a Declaration of Intent to vote even if they had not received their final papers. What Is the Procedure? By now you might be getting the idea that naturalization documents are not necessarily as easy to use as some other records, such as the census. Generally, for most of our history there are two rules that apply to naturalizations: - It was a legal process handled through the courts. - It was usually a two-part procedure, the first being a Declaration of Intent indicating that the person intended to become a citizen (voluntary after 1952). This may have included as part of the document or as a separate certificate or record information on the individual's date and place of arrival into the United States. After a required period of residency (five years, with some exceptions) the individual would then file a Petition for Naturalization and, if granted, would receive a Certificate of Naturalization. Both or either the Declaration and/or the Petition may contain valuable genealogical information. The procedures and requirements differed greatly depending on the location and the time period. The first important information the researcher needs to establish is whether the naturalization was before 1906 or afterwards. In 1906 the naturalization process was simplified and taken over by the federal government. It is much easier to find out where to look and what to expect if it took place after 1906. Where are Records Located? Prior to 1906, naturalization could take place in any court having common law jurisdiction. The court could be federal, state, or local and be called by many names circuit, supreme, civil, equity, district, common pleas, chancery, superior. In some cases a municipal, police, criminal, or probate court did not actually have the right to handle naturalization but they issued certificates anyway. Prior to 1905, over 5,000 courts had been handling naturalization. By 1908 that number was reduced to just over 2,000 courts and the Department of Labor began issuing A Directory of Courts Having Jurisdiction in Naturalization Proceedings. This directory, available on microfilm through the Family History Library, can help you determine which court your ancestor may have used. Naturalizations can now be handled in either federal or local courts. Since 1929, most naturalizations have been at federal courts, but earlier records are more likely to be at a local court because it was closer to the individual. Prior to 1906, the biggest problem confronting a researcher is where to find the record. The two procedures did not have to take place in the same court so the immigrant could have filed a Declaration soon after his arrival in New York, or perhaps he lived in Ohio for a while and filed his Declaration there, hoping to qualify for free land. Then, after settling on land in South Dakota, he may have submitted his Petition to a local court. The Family History Library has microfilm copies of many pre-1930 records. If your ancestor lived in an urban area, there are many rolls of films relating to Chicago (1871-1930), New York (1792-1906), Philadelphia (1793-1911) and New England (1791-1906). The good news is that copies of all naturalization records from 1906 to 1956 are at the Immigration and Naturalization Service in Washington, DC. This does not guarantee success though. Since you are dealing with a government agency, be prepared for a long wait. I had a copy of one certificate of citizenship which gave the court, location, date, and name of the immigrant, but the INS was never able to locate the file. You may also be able to obtain copies of the file from the court, but some courts will refer you to INS in Washington. Naturalizations after 1956 are kept at the local INS office. Some records are being transferred to National Archives branches or state archives. See their page "Naturalization Records" for information about records at the National Archives. What Do the Records Contain? In 1906, the process was standardized and uniform forms were issued. The forms have been revised periodically, but generally contain at least the following information: - Declaration of Intention The court date and location; the individual's name, age, occupation, personal description, birth date and location, and residence; their date and vessel of arrival and last foreign residence. From 1929 to 1941, it asked for the spouse's name, marriage date and place, and birth information, plus names, dates, and places of birth and residence of each child. It also includes a picture of the applicant. After 1941, it requests the spouse's name (no details on birth) and doesn't mention children. After 1929, the last foreign residence is omitted. A separate Certificate of Arrival giving details of arrival was required for arrivals after 1906, with - Petition for Naturalization The court date and location; name, residence, occupation, birth date and place; immigration departure date and place; U.S. arrival port, date, and ship; date and place of Declaration of Intention; spouse's name, birth date and place; children's names, dates and places of birth; residence, witnesses, and oath of allegiance. From 1929 to 1941 it also asked race, marriage date and place, date of spouse's entry into the U.S. and naturalization information, last foreign residence, and name used on arrival. After 1941, a personal description was added, as well as details of any trips longer than six months out of the U.S. - The actual certificate This is the document given to the new citizen and the one a researcher is most likely to find in old family papers. It contains little information: court, date. and name of new citizen. It may contain other information, but the Declaration and Petition are the papers the researcher should try to locate. Prior to 1906 There is no predicting what you might find in naturalization papers prior to 1906. Until 1828, the immigrant had to report to a court to register. This report was supposed to contain information on the birthplace, age, and nationality. These alien registry books were separate volumes in many areas, especially in the northeast. The registry may be found in later records combined with the Declaration. After 1911, the immigrant was issued a certificate of arrival. A Declaration of Intention was usually required, again with exceptions. It may contain little more than the name of the immigrant, but may also have some of the details incorporated in the post-1906 form described above. These are also called "first papers." Early Petitions are part of the court record and may even be recorded in separate ledgers called "second papers" or "final record." Information varies greatly. Certificates of Naturalization were given to the new citizen. The information was recorded but duplicates of the certificate were not kept on file. Spouses and children may derive their citizenship from their husband/father and not have to go through the procedure themselves. Up until 1922, a foreign born woman who married an American citizen became naturalized upon marriage or, if her husband was foreign born, when he became a citizen. No separate filings were required. Prior to 1906, they usually were not even mentioned in the husband's petition. After 1922, a woman had to be naturalized on her own. However, from 1907 to 1922, if a woman married an unnaturalized alien, she took his citizenship. This created one particularly bizarre situation for a woman who was born in Poland in September 1901. In November of that same year she came to the U.S. with her parents. Her father obtained citizenship in 1906 and she automatically became a citizen as well. In 1918 she married a man who had immigrated from Russia in 1913, but was not yet a citizen. She lost her citizenship because of this rule. In November 1922, her husband became a citizen. This did not help her because on September 22, 1922, the law was changed to say that any alien woman who married an American does not become a U.S. citizen automatically. She applied on her own and again became a U.S. citizen in 1942! Children under the age of 21 automatically become citizens by the naturalization of a parent. However, there are many exceptions to this law regarding residence, whether or not a Declaration is required, what happens if the parent dies or becomes insane, adopted children, illegitimate children, step-children, and children born abroad. Obtaining citizenship generally has been made easier for aliens who served in the U.S. military. Filing of the Declaration of Intention was often not required and the period of residency eliminated or reduced. However, in 1894 the law was changed and during times of peace no one (except Indians) could serve in the military unless he or she was a U.S. citizen or had filed a Declaration of Intention. Aliens were allowed to serve during times of war and to become naturalized. Some states had laws forbidding aliens from owning land unless they had filed a declaration. Homesteaders were able to qualify for free public land after filing the declaration. The National Archives has homestead records prior to May 1, 1908 and Bureau of Land Management after that date. BLM can be accessed at http://www.blm.gov/nhp/index.htm. Obstacles to Research Besides identifying the court (or courts) that handled the various steps in the procedure, there are other pitfalls. Some immigrants filed the Declaration, perhaps for homesteading, but did not follow through with the final papers. If they could vote and obtain land with the Declaration only, they had no need to complete the process. Others were allowed to skip the declaration and only had to file the final petition. In addition, fraud occurred on a large scale. Thousands of fraudulent certificates were issued in 1868 in New York because votes were needed in an election. These certificates had no court records documenting the citizenship. If you cannot locate the naturalization record in the court where it was supposed to have occurred, your ancestor may have had a fraudulent certificate. For further information, see the National Archives and Records Administration Records" page; the LDS Research Outline on the U.S. (p. 38-41) and the excellent 43-page booklet American Naturalization Processes and Procedures 1790-1985 by John J. Newman (Indianapolis: Family History Section, Indiana Historical Society 1985).
<urn:uuid:ccabc7cf-f689-491d-aeaa-78ca824ea216>
CC-MAIN-2013-20
http://genealogy.com/genealogy/31_donna.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962552
2,808
3.96875
4
This WebQuest was designed to meet the 3rd grade TEKS for TEXAS in the Writing 3.1(C) revise selected drafts for varied purposes, including to achieve a sense of audience, precise word choices, and vivid images. Science 3.9(A) observe and identify characteristics among species that allow each to survive and reproduce. Social Studies 3.16(D & E) use various parts of a source, including the table of contents, glossary, and index, as well as keyword computer searches, to locate information;(E) interpret and create visuals including graphs, charts, tables, timelines, illustrations, and maps. Art 3.2(C) produce drawings, paintings, prints, constructions, ceramics, and fiberart, using a variety of art materials appropriately.
<urn:uuid:cc0ea27b-bec8-450a-9532-7d18584323b4>
CC-MAIN-2013-20
http://teacherweb.com/TX/UH/GreatWhiteSharkAttack-FactorFiction/h6.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.894822
179
3.375
3
The Syrian Flag : color in the Syrian flag refers to a definite meaning or a period as follows: 1. Red Color: The blood of the martyrs. 2. Black Color: The Abbasids. 3. White Color: The Umayyad. 4. The Green: The Rashidun or the Fatimid. 5. The two stars represent the previous union between Egypt and Syria. Syrian flag is also found as a Shield in the middle of the Syrian Eagle's heart which is derived from the Arabic history, which referred to the flag of "Khaled Bin Al Waleed" that was held at when he conquered Damascus in 635 AD. At the bottom of the Shield , there are two wheat spikes to represent the country's first crop and its agricultural nature. The eagle grabs in his claws a stripe that has the words "Syrian Arab Republic" written on it in Kufic (an Arabic type of writing). Syrian National Anthem: "Homat el Diyar" (translated Guardians of the Homeland) is the national anthem of Syria, with lyrics written by "Khalil Mardam Bey" and the music by "Mohammed Flayfel", who also composed the national anthem of the Palestinian National Authority, as well as many other Arab folk songs. was adopted in 1936 and temporarily fell from use when Syria joined the United Arab Republic with Egypt in 1958. It was decided that the national anthem of the UAR would be a combination of the then-Egyptian anthem and "Homat elDiyar" When Syria seceded from the union in 1961, the anthem was completely restored. Translation of Syrian National Anthem: Defenders of our home, Peace be upon you; The proud spirits had refused to subdue. The lion-abode of Arabism, A hallowed sanctuary; The seat of the stars, An inviolable preserve. Our hopes and our hearts, Are entwined with the flag, Which unites our country... Listen Syrian National Anthem...Click Here
<urn:uuid:1ab2892f-51f2-4783-ba84-816524174e3a>
CC-MAIN-2013-20
http://www.cometosyria.com/en/pages/National+Symbols+Syria/2/1
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.919722
454
3.1875
3
RIVERSIDE, Calif. – Biologists at the University of California, Riverside have found that voluntary activity, such as daily exercise, is a highly heritable trait that can be passed down genetically to successive generations. Working on mice in the lab, they found that activity level can be enhanced with "selective breeding" – the process of breeding plants and animals for particular genetic traits. Their experiments showed that mice that were bred to be high runners produced high-running offspring, indicating that the offspring had inherited the trait for activity. "Our findings have implications for human health," said Theodore Garland Jr., a professor of biology, whose laboratory conducted the multi-year research. "Down the road people could be treated pharmacologically for low activity levels through drugs that targeted specific genes that promote activity. Pharmacological interventions in the future could make it more pleasurable for people to engage in voluntary exercise. Such interventions could also make it less comfortable for people to sit still for long periods of time." In humans, activity levels vary widely from couch-potato-style inactivity to highly active athletic endeavors. "We have a huge epidemic of obesity in Western society, and yet we have little understanding of what determines variation among individuals for voluntary exercise levels," Garland said. Study results appear online Sept. 1 in the Proceedings of the Royal Society B. The researchers began their experiments in 1993 with 224 mice whose levels of genetic variation bore similarity to those seen in wild mouse populations. The researchers randomly divided the base population of mice into eight separate lines – four lines bred for high levels of daily running, with the remaining four used as controls – and measured how much distance the mice voluntarily ran per day on wheels attached to their cages. With a thousand mice born every generation and four generations of mice each year, the researchers were able to breed highly active mice in the four high-runner lines by selecting the highest running males and females from every generation to be the parents of the next generation. In the control lines, breeders were chosen with no selection imposed, meaning that the mice either changed or did not change over time purely as a result of random genetic drift. By studying the differences among the replicate lines, the researchers found that mice in the four high-runner lines ran 2.5-3-fold more revolutions per day as compared with mice in the four control lines. They also found that female and male mice evolved differently: females increased their daily running distance almost entirely by speed; males, on the other hand, increased speed but they also ran more minutes per day. The study is an example of an "experimental evolution" approach applied rigorously to a problem of biomedical relevance. Although this approach is common with microbial systems and fruit flies, it has rarely been applied to vertebrates due to their longer generation times and greater costs of maintenance. The results of such studies can inform biologists about fundamental evolutionary processes as well as "how organisms work" in a way that may lead to new therapeutic strategies. "This study of experimental evolution confirms some previous observations and raises new questions," said Douglas Futuyma, a distinguished professor of ecology and evolution at Stony Brook University, New York, who was not involved in the research. "It shows that 'there are many ways to skin a cat': different ways in which a species may evolve a similar adaptive characteristic – running activity, in this case. Garland and coauthors go further by beginning to explore the detailed ways in which an adaptive feature, such as muscle size or metabolic rate, may be realized and by showing sex differences in the response to selection. It would be fascinating to know, and challenging to find out, if any one of these different responses is adaptively better than others." Garland was joined in the research by Scott Kelly, Jessica Malisch, Erik Kolb, Robert Hannon, Brooke Keeney, Shana Van Cleave and Kevin Middleton, all of whom work in his lab. The study was supported primarily by a grant to Garland from the National Science Foundation. Details of the experimental set-up The mice run on wheels attached to their cages. Wheel running is a completely voluntary behavior for the mice. They can sit in their cages and not run at all. If they do run, they can get off the wheels at any time. For the experiments, each mouse was given access to the wheels for only six days of their lives. A computer recorded every minute how much distance (revolutions) the mice ran for the six days. The researchers selected breeders depending on how much distance the mice ran on days 5 and 6. About Theodore Garland Jr. Garland received his doctoral degree in biological sciences from UC Irvine. Before joining UCR in 2001, he was a faculty member at the University of Wisconsin-Madison. He is trained in comparative physiology and evolutionary biology, as well as quantitative genetics with emphasis on exercise physiology. He is co-editor of Experimental evolution: concepts, methods, and applications of selection experiments (University of California Press, 2009). On the editorial boards of several scientific journals, he is the author/coauthor of nearly 200 peer-reviewed publications. The University of California, Riverside (www.ucr.edu) is a doctoral research university, a living laboratory for groundbreaking exploration of issues critical to Inland Southern California, the state and communities around the world. Reflecting California's diverse culture, UCR's enrollment of about 18,000 is expected to grow to 21,000 students by 2020. The campus is planning a medical school and has reached the heart of the Coachella Valley by way of the UCR Palm Desert Graduate Center. The campus has an annual statewide economic impact of more than $1 billion. A broadcast studio with fiber cable to the AT&T Hollywood hub is available for live or taped interviews. To learn more, call (951) UCR-NEWS. AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.
<urn:uuid:6554a304-041a-4b0e-a425-a083b169c3a0>
CC-MAIN-2013-20
http://www.eurekalert.org/pub_releases/2010-09/uoc--cfe090110.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703682988/warc/CC-MAIN-20130516112802-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959553
1,241
3.484375
3
by George Heymann | @techeadlines Google has started a new page on Google Plus to share their vision of what its augmented reality glasses could be. They are soliciting suggestions from users on what they would like to see from Project Glass. “We think technology should work for you—to be there when you need it and get out of your way when you don’t. A group of us from Google[x] started Project Glass to build this kind of technology, one that helps you explore and share your world, putting you back in the moment. We’re sharing this information now because we want to start a conversation and learn from your valuable input. So we took a few design photos to show what this technology could look like and created a video to demonstrate what it might enable you to do.” Video after the break. Read the rest of this entry » Filed under: Android, General technology, Google, Media, Services, Augmented reality, eyeglasses, feature, featured, glasses, Google, Google Plus, Google Project Gass, google virtual reality glasses, New York Times, Project Glass, technology, turn by turn directions, UI, User interface, video chat, Virtual reality, Virtual reality glasses January 18, 2012 • 11:07 am $3 million grant from the Bill & Melinda Gates Foundation will fund development by Eric Klopfer MIT Education Arcade With a new $3 million grant from the Bill & Melinda Gates Foundation, the MIT Education Arcade is about to design, build and research a massively multiplayer online game (MMOG) to help high school students learn math and biology. In contrast to the way that Science, Technology, Engineering and Math (STEM) are currently taught in secondary schools — which often results in students becoming disengaged and disinterested in the subjects at an early age — educational games such as the one to be developed give students the chance to explore STEM topics in a way that deepens their knowledge while also developing 21st-century skills. Read the rest of this entry » Filed under: Gaming, Services, Software, 3 million dollar grant, Associate Professor, Augmented reality, Bill & Melinda Gates Foundation, Common Core, Common Core standards, Education, education arcade, education program, Eric Klopfer, Filament Games, game to help teach math and science, High school, Math, mit, MIT education arcade, MMOG, Next generation science, StarLogo TNG, STEM, Washington, Washington D.C. by George Heymann Blackberry no sooner made its official Blackberry Bold 9900 announcement and then T-mobile tweeted that it would be carrying the device. The 9900 will be T-mobile’s first 4G capable Blackberry. It is rumored to be available on T-Mobile in the June/July timeframe. The Blackberry Bold 9900/9930 will be a touch screen device with a 1.2 GHz processor, 8 GB of onboard memory, expandable to 32GB, HSPA+ 14.4 capable, 5 megapixel camera with flash, 720p HD video recording, dual-band WiFi, a built-in compass (magnetometer) and Near Field Communication (NFC) technology featuring the new Blackberry 7 OS. Press release after the break Filed under: Blackberry, Hardware, 4G, Augmented reality, BlackBerry, Blackberry Bold 9900, Blackberry Bold 9930, Evolution-Data Optimized, Evolved HSPA, Hertz, High-definition video, HSPA+, Research In Motion, T-Mobile, Touchscreen, Wi-Fi
<urn:uuid:b20020fa-bc3c-4a14-88d3-034f931ca310>
CC-MAIN-2013-20
http://technology-headlines.com/tag/augmented-reality/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.884436
752
2.984375
3
Skip to content Skip to navigation menu 24 August 2007 Cardiff scientists exploring the safe storage of hydrogen to power vehicles as an environmentally friendly alternative to petrol have made a promising new discovery. Having already developed an organic polymer capable of storing 1.7 per cent hydrogen by weight, Professors Neil McKeown from the School of Chemistry together with Peter Budd of the University of Manchester and David Book from the University of Birmingham can now report the creation of an organic polymer able to store around three per cent hydrogen by weight. The figure is almost double the amount of hydrogen the group’s preliminary polymers could store last year, and offers hope of producing an organic polymer in the future capable of storing enough hydrogen to successfully power a vehicle. Commenting on the development, Professor McKeown said: "We are excited to report this recent discovery by our research team of a polymer which can hold around three per cent hydrogen by weight. Although we still have a long way to go, it is clear that we are moving in the right direction, especially as we also have a number of promising new polymers to test. " In order to make hydrogen a viable alternative to petrol, a material which can store hydrogen at a weight of over six per cent is required. This figure is estimated by the American Department of Energy as the minimum required to make a fuel tank for hydrogen to power a vehicle for 300 miles. "In order to obtain a polymer that can store useful quantities of hydrogen we need to make a much more porous material," said Professor McKeown, "but one in which the holes are very small so as to fit snugly the small hydrogen molecules." Professor McKeown and his team are investigating a number of promising methods to enhance pororosity as they attempt to build on their current success and produce a material that can store and release hydrogen safely and effectively. They are also collaborating with Professor Kenneth Harris within the School of Chemistry to develop other types of hydrogen storage materials. Cardiff is the lead University in the research project, which is funded by the Engineering and Physical Sciences Research Council. The EU: What’s in it for Wales? New treatment for eczema trialled New drugs in development for treatment of osteoarthritis This is an externally hosted beta service offered by Google.
<urn:uuid:68437181-528a-4d8a-a7f4-44c2d39f8dbe>
CC-MAIN-2013-20
http://www.cardiff.ac.uk/news/articles/2702.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706499548/warc/CC-MAIN-20130516121459-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954436
474
3.171875
3
Respiratory distress syndrome (RDS) occurs most often in infants who are born too early. RDS can cause breathing difficulty in newborns. If it is not properly treated, RDS can result in complications. This may include pneumonia, respiratory failure, chronic lung problems, and possibly asthma. In severe cases, RDS can lead to convulsions and death. RDS occurs when infant's lungs have not developed enough. Immature lungs lack a fluid called surfactant. This is a foamy liquid that helps the lungs open wide and take in air. When there is not enough surfactant, the lungs do not open well. This will make it difficult for the infant to breathe. The chance of developing RDS decreases as the fetus grows. Babies born after 36 weeks rarely develop this condition. A risk factor is something that increases your chance of getting a disease or condition. Factors that increase your baby's risk of RDS include: - Birth before 37 weeks; increased risk and severity of condition with earlier prematurity - Mother with insulin dependent diabetes - Multiple birth - Cesarean section delivery - Cold stress - Precipitous delivery - Previously affected infant - Being male - Hypertension (high blood pressure) during pregnancy The following symptoms usually start immediately or within a few hours after birth and include: - Difficulty breathing, apnea - Rapid, shallow breathing - Delayed or weak cry - Grunting noise with every breath - Flaring of the nostrils - Frothing at the lips - Blue color around the lips - Swelling of the extremities - Decreased urine output The doctor will ask about the mother's medical history and pregnancy. The baby will also be evaluated, as outlined here: Amniotic fluid is fluid that surrounds the fetus. It may be tested for indicators of well-developed lungs such as: - Lecithin:sphingomyelin ratio - Phosphatidyl glycerol - Laboratory studies—done to rule out infection - Physical exam—includes checking the baby's breathing and looking for bluish color around the lips or on trunk - Testing for blood gases—to check the levels of oxygen and carbon dioxide in the blood - Chest x-ray —a test that uses radiation to take a picture of structures inside the body, in this case the heart and lungs Treatment for a baby with RDS usually includes oxygen therapy and may also include: A mechanical respirator is a breathing machine. It is used to keep the lungs from collapsing and support the baby's breathing. The respirator also improves the exchange of oxygen and other gases in the lungs. A respirator is almost always needed for infants with severe RDS. Surfactant can be given to help the lungs open. Wider lungs will allow the infant to take in more oxygen and breathe normally. One type of surfactant comes from cows and the other is synthetic. Both options are delivered directly into the infant's windpipe. Inhaled Nitric Oxide Nitric oxide is a gas that is inhaled. It can make it easier for oxygen to pass into the blood. The gas is often delivered during mechanical ventilation. Newborns with RDS may be given food and water by the following means: - Tube feeding—a tube is inserted through the baby's mouth and into the stomach - Parenteral feeding—nutrients are delivered directly into a vein Preventing a premature birth is the best way to avoid RDS. To reduce your chance of having a premature baby: - Get good prenatal care. Start as early as possible in pregnancy. - Eat a healthful diet. Take vitamins as suggested by your doctor. - Do not smoke. Avoid alcohol or drug use. - Only take medicines that your doctor has approved. If you are at high risk of giving birth to a premature baby: - You may be given steroids about 24 hours before delivery. Steroids can help your baby's lungs develop faster. - Your doctor may do an amniocentesis. This test will check the maturity of your baby's lungs. The results will help determine the best time for delivery. - Reviewer: Michael Woods - Review Date: 09/2012 - - Update Date: 00/91/2012 -
<urn:uuid:7d8d5dec-597e-4805-b78e-8e623e0c5fb5>
CC-MAIN-2013-20
http://medtropolis.com/your-health/?/11599/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.926661
904
3.4375
3
Communities in Kenya have adopted one another’s food preferences and recipes. With the exception of the Coast and Indian communities for whom food preparation is an elaborate process, nearly all other communities garnish their food by frying it. They also boil, bake in hot ashes and roast. Common foods include: It is a sticky mixture of flour and water and is accompanied by vegetables, meat, milk or milk mixed with blood especially for pastoralist communities. Traditionally, it is made from millet or cassava. But maize flour has increasingly taken pride of place. lt is used to prepare sauces and stews. Communities have different ways of preparing meat, but roast meat is widely eaten as a delicacy especially in urban areas. Animals slaughtered for meat depend on the location, with beef and mutton the most common. Camel and game are the preserve of communities with access to the animals. In the last quarter ofthe 20th century, maize replaced sorghum as the most important cereal in Kenya. lt is roasted and eaten as a snack and sold on the streets and in markets. Green boiled maize, often garnished with salt, is also common. Among the Somali, fresh maize (galeey) is fried in oil and eaten as a snack. Dry maize is also fried to make popcorn, popular with children. A mixture of green or dry maize and beans, cowpeas, pigeon peas or even groundnuts is also popular. lt is eaten as a main course or snack. Sometimes, it is pounded with Irish or sweet potatoes, bananas and green vegetables. A wide range of traditional and exotic fruits are consumed in Kenya, usually as snacks. Mango, citrus fruits, banana, jackfruit, papaya, melons, guava, passion fruit, custard apple and avocado pear are common. Many traditional fruits such as baobab, wild custard apple, carissa, dialium, flacourtia (Indian plum), marula, vangueria, tamarind, vitex and ‘jujube’ are picked in the wild. They are used as accompaniments for starchy food such as ugali. Common traditional vegetables include baobab, cowpeas, amaranth, vine spinach, Ethiopian kale, pumpkin leaves, spider plant and hibiscus. Kale (sukuma wiki) is now the most common vegetable in Kenya.
<urn:uuid:b5f9c5d5-79ee-47f3-a1e8-641570913001>
CC-MAIN-2013-20
http://softkenya.com/food/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944667
499
3.171875
3
When someone tells that there was no successful French tank, especially in WWI - don't you believe him! The Renault FT or Automitrailleuse à chenilles Renault FT modèle 1917, inexactly known as the FT-17 or FT17, was a French light tank; it is among the most revolutionary and influential tank designs in history. The FT was the first operational tank with an armament in a fully rotating turret, and its configuration with the turret on top, engine in the back and the driver in front became the conventional one, repeated in most tanks until today; at the time it was a revolutionary innovation, causing armour historian Steven Zaloga to describe the type as "the world's first modern tank". Studies on the production of a new light tank were started in May 1916 by the famous car producer Louis Renault. The evidence strongly suggests that Renault himself drew up the preliminary design, being unconvinced that a sufficient power/weight ratio could be achieved for the medium tanks requested by the military. One of his most talented designers, Rodolphe Ernst-Metzmaier, prepared the final drawings. Though the project was far more advanced than the two first French tanks about to enter production, the Schneider CA1 and the heavy St. Chamond, Renault had at first great trouble getting it accepted. Even after the first British use of tanks, on 15 September 1916, when the French people called for the deployment of their own chars, the production of the light tank was almost cancelled in favour of that of a superheavy tank (the later Char 2C). However, with the unwavering support of Brigadier General Jean-Baptiste Eugène Estienne (1860–1936), the "Father of the Tanks", and the successive French Commanders in Chief, who saw light tanks as a more feasible and realistic option, Renault was at last able to proceed with the design. However, competition with the Char 2C was to last until the very end of the war. The prototype was slowly refined during the first half of 1917. Early production FTs were often plagued by radiator fan belt and cooling system problems, a characteristic that persisted throughout World War I. Only 84 were produced in 1917 but 2,697 were delivered before the end of the war. At least 3,177 were produced in total, perhaps more; some estimates go as high as 4,000 for all versions combined. However, 3,177 is the delivery total to the French Army; 514 were perhaps directly delivered to the U.S. Army and three to Italy - giving a probable total production number of 3,694. The tanks had at first a round cast turret; later either an octagonal turret or an even later rounded turret of bent steel plate (called Berliet turret after one of the many coproducing factories). The latter two could carry a Puteaux SA 18 gun, or a 7.92 mm Hotchkiss machine gun. In the U.S., this tank was built on a licence as the Six Ton Tank Model 1917 (950 built, 64 before the end of the war). There is a most persistent myth about the name of the tank: "FT" is often supposed to have meant Faible Tonnage, or, even more fanciful: Franchisseur de Tranchées (trench crosser). In reality, every Renault prototype was given a combination code; it just so happened it was the turn of "FT". Another mythical name is "FT-18" for the guntank. A 1918 maintenance manual describes the FT as the Char d'Assault 18HP, a reference to the horsepower of the engine. FTs captured and re-used by the Germans in World War II were re-designated Panzerkampfwagen FT 18. Either of these might have led to the confusion. Also in "FT 75 BS", the "BS" does not mean Batterie de Support but "Blockhaus Schneider", a reference to the short 75mm Schneider gun with which it was fitted. The FT was widely used by the French and the US in the later stages of World War I, after 31 May 1918. It was cheap and well-suited for mass production. It reflected an emphasis on quantity, both on a tactical level: Estienne proposed to overwhelm the enemy defences by a "swarm" of light tanks, and on a geostrategic level: the Entente was thought to be able to gain the upper hand by outproducing the Central Powers. A goal was set of 12,260 to be manufactured (4,440 of which in the USA) before the end of 1919. After the war, FTs were exported to many countries (Poland, Finland, Estonia, Lithuania, Romania, Yugoslavia, Czechoslovakia, Switzerland, Belgium, Netherlands, Spain, Brazil, Turkey, Iran, Afghanistan and Japan). As a result, FT tanks were used by most nations having armoured forces, invariably as their first tank type, including the United States. They took part in many later conflicts, such as the Russian Civil War, Polish-Soviet War, Chinese Civil War, Rif War and Spanish Civil War. FT tanks were also used in the Second World War, among others in Poland, Finland, France and Kingdom of Yugoslavia, although they were completely obsolete by then. In 1940 the French army still had eight battalions equipped with 63 FTs each and three independent companies with ten each, for a total organic strength of 534, all with machine guns. Many smaller units, partially raised after the invasion, also used the tank. This has given rise to the popular myth that the French had no modern equipment at all; in fact they had more modern tanks than the Germans; the French suffered from tactical and strategic weaknesses rather than from equipment deficiencies. When the German drive to the Channel cut off the best French units, as an expediency measure the complete French materiel reserve was sent to the front; this included 575 FTs. Earlier 115 sections of FT had been formed for airbase-defence. The Wehrmacht captured 1,704 FTs. A hundred were again used for airfield defence, about 650 for patrolling occupied Europe. Some of the tanks were also used by the Germans in 1944 for street-fighting in Paris. By this time they were hopelessly out of date. The FT was the ancestor of a long line of French tanks: the FT Kégresse, the NC1, the NC2, the Char D1 and the Char D2. The Italians produced as their standard tank the FIAT 3000, a moderately close copy of the FT: The Soviet Red Army captured fourteen burnt-out Renaults from White Russian forces, and rebuilt them at the Krasnoye Sormovo Factory in 1920. The Soviets claimed to have originally manufactured these Russkiy Reno tanks, but they actually produced only one exact copy, named 'Freedom Fighter Comrade Lenin'. When Stalin began the arms race of the Thirties, the first completely Soviet-designed tank was the T-18, a derivation of the Renault with sprung suspension: In all, the FT was used by Afghanistan, Belgium, Brazil, the Republic of China, Czechoslovakia, Estonia, Finland, France, Nazi Germany, Iran, Japan, Lithuania, the Netherlands, Poland, Romania, the Russian White movement, the Soviet Union, Spain, Sweden, Switzerland, Turkey, Norway, the United Kingdom, the United States and the Kingdom of Yugoslavia. Two interesting variants:
<urn:uuid:8802c369-de05-468a-876f-993aff93f25f>
CC-MAIN-2013-20
http://www.dieselpunks.org/profiles/blogs/renault-ft-tank
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.975053
1,545
2.859375
3
According to Wikipedia, the definition of Earth Day is “a day early each year on which events are held worldwide to increase awareness and appreciation of the Earth’s natural environment.” Earth Day, started in 1970, and is celebrated nationally and in over 175 countries world wide. Do you celebrate Earth Day in your home? My family and I love to celebrate our mother earth not only on Earth Day, but everyday. Each step we make in our home to become a greener family means we are doing that much more to reduce our carbon footprint. Cox Communications, my local cable company, wanted a way to reduce their carbon footprint as well so they started Cox Conserves in 2007. Launched in 2007, Cox Conserves is the company’s national sustainability program that is designed to reduce Cox Enterprises’ carbon footprint by 20 percent. Cox Conserves seeks to reduce Cox Enterprises’ energy consumption by embracing alternative energy, conserving natural resources and inspiring eco-friendly behavior. The program engages each of the company’s major subsidiaries (Cox Communications, Manheim, Cox Media Group and AutoTrader.com) and encourages Cox Enterprises’ more than 50,000 employees and their families to engage in eco-friendly practices. For more information, visit: http://www.coxconserves.com/ How does Cox Conserves make a difference right here in Las Vegas? How does Cox Conserves make a difference nationally? Alternative Energy – Cox actively identifies opportunities to harness solar energy and employ fuel cell technology, annually preventing more than 17,400 tons of greenhouse gases from entering the environment through its alternative energy projects. Energy Conservation- Across Cox Enterprises, programs are in place to conserve energy, including producing alternative energy, constructing eco-friendly buildings, greening the company fleet, conserving resources and recycling materials. Waste Management- Cox Enterprises employs a holistic approach to waste management including waste reduction, strategic partnerships for e-waste and customer engagement. Water Conservation- Cox’s water conservation efforts save more than 20 million gallons of water annually and return high-quality reusable water to the community. How can you celebrate Earth Day everyday? 5 Tips for a Green Home! - Reduce your junk mail stream by joining a no-send list. This is where my family is listed. - Use compact fluorescent light (CFL) bulbs. They use 2/3 less energy than standard incandescent light bulbs and last up to 10 times longer. If every household in the U.S. replaced one light bulb with a CFL, it would prevent enough pollution equal to taking more than 800,000 cars off the road for an entire year. This was one of the first things we did when we moved into a new home. - Buy bulk items. A family of four can save $2,000/year in the supermarket by choosing large sizes instead of individual serving sizes. This also reduces production of plastic wrappers and boxes. We love shopping our local super store. - Avoid using non-native plants that may be invasive in your area. We have desert landscaping to help reduce our use of water. - Skip pre-packaged items for school lunches and cut up your own cheese, meats and veggies to cut down on wasteful packaging. Treat the Earth well. It was not given to you by your parents, it was loaned to you by your children.” ~ Kenyan proverb Disclosure: This post was written on behalf of Cox Communications. All my thoughts and opinions are my own. Latest posts by Lolo (Posts) - A Chat With Rosita and Sesame Street’s Newest Neighbor Mando - May 15, 2013 - Favorite Moments from the Week | Wordless Wednesday Linky - May 14, 2013 - Arm & Hammer Tooth Tunes Toothbrush Review #ToothTunes1D - May 12, 2013
<urn:uuid:a914b035-07ca-495a-bfbf-c1284c8a7e78>
CC-MAIN-2013-20
http://www.crazyaboutmybaybah.com/celebrate-earth-day-cox-communications/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.931487
802
3.109375
3
Copyright (c) Arvin S. Quist INTRODUCTION TO CLASSIFICATION THE NEED FOR CLASSIFICATION A government is responsible for the survival of the nation and its people. To ensure that survival, a government must sometimes stringently control certain information that (1) gives the nation a significant advantage over adversaries or (2) prevents adversaries from having an advantage that could significantly damage the nation. Governments protect that special information by classifying it; that is, by giving it a special designation, such as "Secret," and then restricting access to it (e.g., by need-to-know requirements and physical security measures). This right of a government to keep certain information concerning national security (secrets) from most of the nation's citizens is nearly universally accepted. Since antiquity, governments have protected information that gave them an advantage over adversaries. In wartime, when a nation's survival is at stake, the reasons for secrecy are most apparent, the secrecy restrictions imposed by the government are most widespread,[*] and acceptance of those restrictions by the citizens is broadest.[†] In peacetime, there are fewer reasons for secrecy in government, generally the government classifies less information, and citizens are less willing to accept security restrictions on information. MAJOR AREAS OF CLASSIFIED INFORMATION The information that is classified by most democracies, whether in peacetime or wartime, is usually limited to information that concerns the nation's defense or its foreign relations--military and diplomatic information. Most of that information falls within five major areas: (1) military operations, (2) weapons technology, (3) diplomatic activities, (4) intelligence activities, and (5) cryptology. The latter two areas might be considered to be special parts of the first three areas. That is, intelligence and cryptology are "service" functions for the primary areas--military operations, weapons technology, and diplomatic activities. From a historical perspective, the classification of weapons technology became widespread only in the 20th century. Classification of information about military operations and diplomatic activities has been practiced for millennia. Examples of military-operations information that is frequently classified include information concerning the strength and deployment of forces, troop movements, ship sailings, the location and timing of planned attacks, tactics and strategy, and supply logistics. Obviously, if an enemy learned the major details of an impending attack, that attack would be less successful than if it came as a surprise to the enemy.* Information possessed by a government about an adversary's military activities or capabilities must be protected to preserve the ability to predict those activities or to neutralize those capabilities. If the adversary knew that the government had this information, the adversary would change those plans or capabilities. Military-operations information is usually classified for only a limited time. After an operation is over, most of the important information is known to the enemy. Weapons technology is classified to preserve the advantage of surprise in the first use of a new weapon,† to prevent an adversary from developing effective countermeasures against a new weapon,‡ or to prevent an adversary from using that technology against its originator (by developing a similar weapon). A major factor in that latter reason for classifying weapons technology is "lead time." Classifying advanced weapons-technology information prevents an adversary from using that information to shorten the time required to produce similar weapons systems for its own use. Consequently, assuming continued advancements in a weapons technology by the initial developer of that technology, the adversary's weapons systems will not be as effective as those of the nation that initially developed that technology, and the adversary will be at a disadvantage. With respect to lead time, when weapons systems can be significantly improved, then information on "obsolete" weapons is much less sensitive than information on newer weapons. Thus, information on muzzle-loading rifle technology was not as sensitive as that on breech-loading rifle technology, which was not as sensitive as information on lever-action rifle technology, . . . semiautomatic rifle . . . automatic rifle . . . machine gun. However, with respect to nuclear weapons, a "rogue" nation or terrorist group can probably achieve its objectives just as easily with "crude" kiloton nuclear weapons that might require a ship or truck to transport as with sophisticated megaton nuclear weapons that might fit into a (large) suitcase. Thus, "obsolete" nuclear-weapons technology should be continue to be protected, especially with respect to technologies concerning production of highly enriched uranium or other nuclear-weapon materials. Weapons technology includes scientific and technical information related to that technology. World War I marked the start of the "modern" period when science and technology affected the development of weapons systems to a greater degree than any time previously. That interrelationship became even more pronounced in World War II, with notable scientific and technological successes: the atomic bomb, radar, and the proximity fuse. World War II, particularly with respect to the atomic bomb, marked the first time that the progress of military technology was significantly influenced by scientists, as contrasted to advances by engineers or by scientists working as engineers. With respect to classification, the more that applied scientific or technical information is uniquely applicable to weapons, the more likely that this information will be classified. Generally, basic research is not classified unless it represents a major breakthrough leading to a completely new weapons system. An example of that circumstance was the rigid classification during World War II, and for several years thereafter, of much basic scientific research related to atomic energy (nuclear weapons). The need for secrecy in diplomatic negotiations and relations has long been recognized. A nation's ability to obtain favorable terms in negotiations with other countries would be diminished if its negotiating strategy and goals were known in advance to the other countries.* The effectiveness of military-assistance agreements between nations would be impaired if an adversary knew of them and could plan to neutralize them. In New York Times v. United States, the "Pentagon Papers" case, U.S. Supreme Court Justice Stewart recognized the importance of secrecy in foreign policy and national defense matters: It is elementary that the successful conduct of international diplomacy and the maintenance of an effective national defense requires both confidentiality and secrecy. Other nations can hardly deal with this Nation in an atmosphere of mutual trust unless they know that their confidences will be kept . . .. In the area of basic national defense the frequent need for absolute secrecy is, of course, self evident. During the term of the first president, it was established that some need for secrecy in diplomatic matters would remain even after negotiations were completed. President Washington, in 1796, refused a request by the House of Representatives for documents prepared for treaty negotiations with U.S. and gave the following as one reason for refusal: England The nature of foreign negotiations requires caution, and their success must often depend on secrecy; and even when brought to a conclusion a full disclosure of all the measures, demands, or eventual concessions which may have been proposed or contemplated would be extremely impolitic; for this might have a pernicious influence on future negotiations, or produce immediate inconvenience, perhaps danger and mischief, in relation to other powers. It has been said that President Nixon initially was not going to attempt to stop the New York Times and other newspapers from publishing the "Pentagon Papers." However, the executive branch was then in secret diplomatic negotiations with , and Henry Kissinger "is said to have persuaded the president that the Chinese wouldn't continue their secret parleys if they saw that China couldn't keep its secrets." Washington Intelligence information includes information gathering and covert operations. Collecting military and diplomatic information about other nations involves the use of photoreconnaissance airplanes and satellites, communication intercepts, the review of documents obtained openly, and other overt methods. However, information gathering also includes the use of undercover agents, confidential sources, and other covert methods. For those covert activities, secrecy is usually imposed on the identity of agents or sources, on information about intelligence methods and capabilities, and on much of the information received from the covert sources. Few clandestine agents could be recruited (or, in some instances, would live long) if their identity were not a closely guarded secret. Information provided by a clandestine agent must frequently be classified because, if a government knew that some of its information was compromised, it might be able to determine the identity of the person (agent) who provided the information to its adversary. Successful intelligence-gathering methods must be protected so that the adversary does not know the degree of their success and is not stimulated to develop countermeasures to stop the flow of information. Intelligence information from friendly nations is generally classified by the recipient country. Allies would be less willing to share intelligence information if they knew that it would not be protected against disclosure. Cryptology encompasses methods to code and transmit secret messages and methods to intercept and decode messages. Writing messages in code, or cryptography,* has been practiced for thousands of years. One of the earliest preserved texts of a coded message is an inscription carved on an Egyptian tomb in about 1900 B.C. The earliest known pottery glaze formula was written in code on a Mesopotamian cuneiform tablet in about 1500 B.C. The Spartans established a system of military cryptography by the 5th century B.C. Persia later used cryptography for political purposes. Cryptography began its steady development in western civilization starting about the 13th century, primarily in . By the early 16th century, Italy 's ruling Council of Ten had an elaborate organization for enciphering and deciphering messages. Venice Restrictions on cryptologic information are necessary to protect communications. Diplomatic negotiations could not successfully be conducted at locations other than the seat of government if safe communications could not be established. Cryptologic information must also be protected to prevent an adversary from learning of a nation's capabilities to intercept and decode messages. If an adversary learns that its communications are not secure, it will use another method, which will require additional time and effort to defeat.[‡] The Allies' World War II success in breaking the German codes contributed to shortening that war. That success was kept secret until 1974, about 34 years after the German code had been broken and about 29 years after World War II had ended. The U.S. Army's success in breaking a World War II U.S.S.R. code (the Venona project, which began in 1943 and continued until 1980) was not made public until about 1995. That was about 50 years after the first such message had been deciphered (and about 45 years after the U.S.S.R. had learned through espionage of the Army's success). U.S. BASIS FOR CLASSIFICATION IN THE UNITED STATES The need for governmental secrecy was directly recognized in the U.S. Constitution. Article I, Sect. 5, of the Constitution explicitly authorizes secrecy in government by stating that "Each House shall keep a Journal of its Proceedings, and from time to time publish the same, excepting such Parts as in their Judgment require Secrecy." Also included in the Constitution, in Article I, Sect. 9, is a statement that "a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time." A U.S. Court of Appeals has determined that the phrase "from time to time" was intended to authorize expenditures for certain military or foreign relations matters that were intended to be kept secret for a time. The Constitution does not explicitly provide for secrecy by the Executive Branch of the U.S. Government. However, the authority of that Executive Branch to keep certain information secret from most citizens is implicit in its executive responsibilities, which include the national defense and foreign relations. This presidential authority has been upheld by the Supreme Court in a number of cases. Judicial decisions have also relied on a common-law privilege for a government to withhold information concerning national defense and foreign relations. Congress, by two statutes, the Freedom of Information Act and the Internal Security Act of 1950, has implicitly recognized the president's authority to classify information (see Chapter 3). U.S. At this time in the , information is classified either by presidential authority, currently Executive Order 12958, or by statute, the Atomic Energy Act of 1954, as amended (Atomic Energy Act). Classification under Executive Orders and under the Atomic Energy Act is extensively discussed in Chapters 3 and 4, respectively. United States CLASSIFICATION AND SECURITY Classification has been variously described as the "cornerstone" of national security, the "mother" of security, and the "kingpin" of an information security system.,,, Classification identifies the information that must be protected against unauthorized disclosure. Security determines how to protect information after it is classified. Security includes both personnel security and physical security. The initial classification determination, establishing what should not be disclosed to adversaries and the level of protection required, is probably the most important single factor in the security of all classified projects and programs., None of the expensive personnel-clearance and information-control provisions (physical security aspects) of an information security system comes into effect until information has been classified; classification is the pivot on which the whole subsequent security system turns (excluding security for other reasons, such as to prevent theft of materials). 19 Therefore, it is important to classify only information that truly warrants protection in the interest of national security. Since the mid 1970s, several classification experts have remarked on the increasing emphasis by some government agencies on physical-security matters, which has been accompanied by a decreased emphasis on the classification function. One of the founders (and the first chairman) of the National Classification Management Society (NCMS), who was also an Atomic Energy Commission Contractor Classification Officer, has expressed concern about the tendency to emphasize the word "security" at the expense of the word "classification" with respect to security classification of information.17 In the mid 1980s another charter member of the NCMS pointed out that, although the status of classification still remained high in the Department of Energy (DOE), the situation had changed within the Department of Defense, where Classification Management had been organizationally placed under Security. Even the NCMS, founded as a classification organization, appears to be changing to become increasingly oriented towards security matters rather than classification matters. It is noteworthy that the marked emphasis by the U.S. Government in recent years on physical-security measures has not been accompanied by any significant increased emphasis on classification matters. The previous paragraph was written in 1989, and the trend described in that paragraph has continued. The classification function at DOE headquarters is now a part of the security organization as is the classification function at many DOE operations offices and DOE-contractor organizations. That function generally used to be part of a technical or other non-security organization. The NCMS has also continued to become more security-oriented. With respect to classification as a profession (or lack of recognition thereof), it is interesting to note some comments and a recommendation in the Report of the Commission on Protecting and Reducing Government Secrecy. In this 1997 report, that Commission noted the "all-important initial decision of whether to classify at all," and that "this first step of the classification management process . . . tends to be the weakest link in the process of identifying, marking, and then protecting the information." The Commission further stated that "the importance of the initial decision to classify cannot be overstated." However, the Commission then stated that "classification and declassification policy and oversight . . . should be viewed primarily as information management issues which require personnel with subject matter and records management expertise." Although recommending that "The Federal Government . . . [should] create, support, and promote an information systems security career field within the Government," the Commission made no similar recommendation for security classification of information as a profession or career. Res ipsa loquitur. [*] "When a nation is at war many things that might be said in time of peace are such a hindrance to its effort that their utterance will not be endured so long as men fight and that no Court could regard them as protected by any constitutional right" [Schenck v. United States, 249 U.S. 47, 52 (1919) (J. Holmes)]. [†] Since the September 11, 2001, terrorist attacks against the World Trade Center towers and the Pentagon, the United States considers itself to be in a war against terrorism. One consequence has been a significant shift in opinion, not only of the general public but also of some strong supporters of freedom-of-information matters, towards favoring more control of information that might aid terrorists. This increased control, especially pertaining to weapons of mass destruction, includes (1) establishing broader criteria for identifying information that is classified or "sensitive"; (2) permitting reclassification of declassified information, and (3) restricting further governmental distribution of documents already released to the public. *However, during the Greek and Roman eras in the Mediterranean, when the infantry was paramount and both sides were approximately equally equipped with respect to weapons, many battles were fought without attempts to maintain secrecy of troop movements or with respect to surprise attacks (B. and F. M. Brodie, From Crossbow to H-Bomb, Indiana University Press, Bloomington, Ind., 1973, p. 17). †"Secret" weapons have proven decisive in warfare. One example of the decisive impact of a new weapon was at the battle of Crecy in 1346. At this battle, the English used their "secret" weapon, the longbow, to defeat the French decisively. Although the French had a two-to-one superiority in numbers (about 40,000 to 20,000), the French lost about 11,500 men, while the English lost only about 100 men (W. S. Churchill, A History of the English-Speaking Peoples, Vol. 1, Dodd, Mead and Co., New York, 1961, pp. 332-351; B. and F. M. Brodie, From Crossbow to H-Bomb, Indiana University Press, Bloomington, Ind., 1973, pp. 37-40). ‡In World War II, the Germans developed an acoustic torpedo designed to home in on a ship's propellers. However, the Allies obtained advance information about this torpedo so that when it was first used by the Germans, countermeasures were already in place (B. and F. M. Brodie, From Crossbows to H-Bombs, Indiana University Press, Bloomington, Ind., 1973, p. 222). *In 1921, the United States, Britain, France, Italy, and Japan held a conference to limit their naval armaments. The United States had broken Japan's diplomatic code and thereby knew the lowest naval armaments that Japan would accept. Therefore, U.S. negotiators had merely to wait out Japan's negotiators to reach terms favorable to the United States (J. Bamford, The Puzzle Palace, Houghton, Mifflin Co., Boston, 1982, pp. 9-10). *The breaking of codes is termed cryptanalysis. [‡] Even "friendly" nations get upset if they know that one of their codes has been broken. As noted earlier in this chapter, the United States deciphered Japan's diplomatic code in 1921. Herbert O. Yardley, who was principally responsible for breaking this code, wrote a book, The American Black Chamber, published in 1931, which included information on this matter. Yardley's book did not contribute to developing friendly United States-Japanese relations. A consequence of this revelation was enactment of a U.S. statute that made it a crime for anyone who, by virtue of his employment by the United States, obtained access to a diplomatic code or a message in such code and published or furnished to another such code or message, "or any matter which was obtained while in the process of transmission between any foreign government and its diplomatic mission in the United States" (48 Stat. 122, June 10, 1933, codified at 18 U.S.C. Sect. 952.) B. and F. M. Brodie, From Crossbow to H-Bomb, Indiana University Press, Bloomington, Ind., 1973, p. 172. Hereafter this book is cited as "Brodie." Brodie, p. 233. New York Times v. United States, 403 U.S. 713, 728 (1971). J. D. Richardson, A Compilation of Messages and Papers of the Presidents. 1789-1897, U.S. Government Printing Office, Washington, D.C., Vol. I, at 194-195 (1896). Richard Gid Powers, "Introduction," in Secrecy--The American Experience, by Daniel Patrick Moynihan, Yale University Press, New Haven, Conn., 1998, p. 32. D. Kahn, The Codebreakers, MacMillan, Inc., New York, 1967, p. 71. Hereafter cited as "Kahn." Kahn, p. 75. Kahn, p. 82. Kahn, p. 86. Kahn, p. 106. Kahn, p. 109. See, for example, F. W. Winterbotham, The Ultra Secret, Harper & Row, New York, 1974. Halperin v. CIA, 629 F.2d 144, 154-162 (D.C. Cir., 1980). U.S. Constitution, Article II, sect. 2. See, for example, Totten v. United States, 92 U.S. 105 (1875); United States v. Reynolds, 345 U.S. 1 (1952); Weinberger v. Catholic Action of Hawaii, 454 U.S. 139 (1981). F. E. Rourke, Secrecy and Publicity: Dilemmas of Democracy, Johns Hopkins Press, Baltimore, 1961, pp. 63-64. D. B. Woodbridge, "Footnotes," J. Natl. Class. Mgmt. Soc. 12 (2), 120-124 (1977), p.122. R. J. Boberg, "Panel--Classification Management Today," J. Natl. Class. Mgmt. Soc. 5 (2), 56-60 (1969), p. 57. E. J. Suto, "History of Classification," J. Natl. Class. Mgmt. Soc. 12 (1), 9-17 (1976), p.13. James J. Bagley, "NCMS - Now and the Future," J. Natl. Class. Mgmt. Soc. 25, 20-29 (1989), p. 28. T. S. Church, "Panel--Science and Technology, and Classification Management," J. Natl. Class. Mgmt. Soc. 2, 39-45 (1966), p. 40. W. N. Thompson, "Security Classification Management Coordination Between Industry and DOD," J. Natl. Class. Mgmt. Soc. 4 (2), 121-128 (1969), p. 121. W. N. Thompson, "User Agency Security Classification Management and Program Security," J. Natl. Class. Mgmt. Soc. 8, 52-53 (1972), p. 52. Department of Defense Handbook for Writing Security Classification Guidance, DoD 5200.1-H, U.S. Department of Defense, Mar. 1986, p. 1-1. F. J. Daigle, "Woodbridge Award Acceptance Remarks," J. Natl. Class. Mgmt. Soc. 21, 110-112 (1985), p. 111. D. C. Richardson, "Management or Enforcement," J. Natl. Class. Mgmt. Soc. 23, 13-20 (1987). Report of the Commission on Protecting and Reducing Government Secrecy, S. Doc. 105-2, Daniel Patrick Moynihan, Chairman; Larry Combest, Vice Chairman, Commission on Protecting and Reducing Government Secrecy, U.S. Government Printing Office, Washington, D.C., 1997. Hereafter cited as the "Moynihan Report." Moynihan Report, p. 19. Moynihan Report, p. 35. Moynihan Report, p. 44. Moynihan Report, p. 111.
<urn:uuid:647c5d85-6ea3-4124-aa9a-e2a2146530fb>
CC-MAIN-2013-20
http://www.fas.org/sgp/library/quist/chap_1.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.94447
5,023
3.4375
3
Between the years 900 and 1100, Chinese painters created visions of landscape that depicted the sublimity of creation. Viewers are meant to identify with the human figures in these paintings. In Summer Mountains, travelers make their way toward a temple retreat. The central mountain sits in commanding majesty, like an emperor among his subjects, the culmination of nature’s hierarchy. The advanced use of texture strokes and ink wash suggests that Summer Mountains is by a master working about 1050, a date corroborated by collectors’ seals belonging to the Song emperor Huizong (r. 1101–25), whose paintings catalogue records three works entitled Summer Scenery by the otherwise unknown artist Qu Ding.
<urn:uuid:27ff06e7-c757-4bcd-a3a2-1fde3833a1d7>
CC-MAIN-2013-20
http://www.metmuseum.org/Collections/search-the-collections/60006974?high=on&rpp=30&pg=1&rndkey=20121113&ft=*&when=A.D.+1000-1400&where=China&pos=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700264179/warc/CC-MAIN-20130516103104-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940949
138
3.421875
3
By Allison Lichter Young children who can sit still and focus are more likely to graduate from college than children who are easily distracted, according to a new study from Oregon State University. Researchers made use of data that spanned 25 years, tracking a group of 430 preschool-age children through age 21. Parents were asked to rate their children on such behaviors as “playing with a single toy for long periods of time,” or “gives up easily” when a task or games gets hard. “We were interested in identifying early predictors of later success,” said Megan McClelland, early childhood research core director at OSU’s Hallie E. Ford Center for Healthy Children and Families, and a lead author on the study. “We know that early academic skills predict later academic stills,” she said. “But the ability to pay attention and focus are foundational skills that help kids persist through difficult tasks when they need to.” She was quick to add that academic skills are critical, and that “aptitude part is part of the equation.” Still, she said, “There are a lot of very smart people who have difficulty finishing tasks.” Of course, a lot transpires in a person’s life between age 4 and age 21. While researchers couldn’t control for all variables, McClelland said, they were able to control for some of the most important predictors of academic success: including parents’ education level, the child’s cognitive ability, and childhood vocabulary. Teachers and parents can help young children develop the qualities of persistence and self-discipline by adding new rules to some familiar games. For example, McClelland suggested playing “Red Light, Green Light,” but changing the rules so that “red” means go, and “green” means stop. “Kids ask me all the time, ‘Are you trying to trick me?’ I tell them, ‘No, we want you stop and think about what you’re doing first.’” Another simple activity to help build the concentration muscle is a dance game in which children are told they have to dance slowly when the music is fast, and dance quickly when the music is slow. “When kids have to control their bodies, it’s more challenging for them,” McClelland said. “They actually have to stop their movements and do something different. It requires a lot of thinking.” McClelland is also the mother of a 3-year-old son. She acknowledges it takes time to help kids practice ways to focus and get engaged in things they are interested in. “He will sit there for 15 or 20 minutes doing a Thomas the Train puzzle.” While putting it together, McClelland will sometimes ask ‘How many pieces have we used?’ to build her son’s aptitude for counting. But she says, “I’m also helping him focus and persist.”
<urn:uuid:0295a2c1-6262-45ee-87cd-36698973312a>
CC-MAIN-2013-20
http://blogs.wsj.com/juggle/2012/08/27/how-red-light-green-light-can-lead-to-a-college-dregree/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.972065
657
3.21875
3
"Chatter": Language and History in Kierkegaard Stanford University Press (1993) |Abstract||'Chatter' cannot always be taken lightly, for its insignificance and insubstantiality challenge the very notions of substance and significance through which rational discourses seek justification. This book shows that in 'chatter' Kierkegaard uncovered a specifically linguistic mode of negativity. The author examines in detail those writings of Kierkegaard in which he undertook complex negotiations with the threat - and also the promise - of 'chatter', which cuts across the distinctions in which the relation of language to reality - and above all, the reality of 'existence' - is stabilized, and it therefore releases historical understanding from its established conventions. Chatter situates as well as takes the measure of the seminal importance of Kierkegaard for many of today's unresolved debates about the relation of language and philosophy to history.| |Keywords||Language and languages Philosophy History Philosophy| |Buy the book||$13.00 used (48% off) $227.35 new Amazon page| |Call number||B4378.L35.F46 1993| |External links||This entry has no external links. Add one.| |Through your library||Configure| Similar books and articles Jon Stewart (2003). Kierkegaard's Relations to Hegel Reconsidered. Cambridge University Press. Johann Georg Hamann (2007). Writings on Philosophy and Language. Cambridge University Press. Angelo Mazzocco (1993). Linguistic Theories in Dante and the Humanists: Studies of Language and Intellectual History in Late Medieval and Early Renaissance Italy. E.J. Brill. Matthew Lauzon (2010). Signs of Light: French and British Theories of Linguistic Communication, 1648-1789. Cornell University Press. Michael Losonsky (2006). Linguistic Turns in Modern Philosophy. Cambridge University Press. David Emery Mercer (2001). Kierkegaard's Living-Room: The Relation Between Faith and History in Philosophical Fragments. Mcgill-Queen's University Press. Michael N. Forster (2011). German Philosophy of Language: From Schlegel to Hegel and Beyond. Oxford University Press. Antony Aumann (2011). The ‘Death of the Author’ in Hegel and Kierkegaard: On Berthold’s 'The Ethics of Authorship'. Graduate Faculty Philosophy Journal 32 (2):435-447. Sorry, there are not enough data points to plot this chart. Added to index2009-01-28 Recent downloads (6 months)0 How can I increase my downloads?
<urn:uuid:566f0d23-d552-4197-8608-efafd323f728>
CC-MAIN-2013-20
http://philpapers.org/rec/FENCLA
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.806494
556
2.78125
3
Using the same pool of data, the researchers identified a significant drop in overall daily calorie consumption as people got older. The median energy intake among men age 81 and older was 1,733 calories a day, compared to 2,668 calories per day ingested by men in the age group 19 to 30. For women, median energy intake showed a 28 percent reduction from the youngest to the oldest age group, from 1,844 calories a day to 1,325 calories daily. Based on the results, the scientists concluded that “new approaches to increasing the frequency and level of calcium supplement use to enhance calcium density may be necessary to reduce osteoporosis risks among older Americans.” Jane E. Kerstetter, a professor of allied health sciences at UConn and a co-investigator on the study, says that calcium plays a fundamental role in promoting bone health and forestalling osteoporosis. In light of evidence that energy (food) intake declines with aging, calcium-dense foods and calcium supplements become vital factors in maintaining adequate calcium intake across the lifespan. In November 2010, the Institute of Medicine issued new guidelines for daily calcium intake. The current guidelines recommend that men and women ages 19 to 50 consume 1,000 mg of calcium a day; however, after age 51 men are recommended to continue to consume 1,000 mg daily, while women are recommended to increase consumption to 1,200 mg daily. Kerstetter adds that calcium intake from the diet should come first and foremost. Typically, one serving of dairy (1 cup of milk, 6 ounces of yogurt, or 1.5 ounces of cheese) provides 300 milligrams of calcium. If a person consumes three servings of dairy daily they will ingest 900 milligrams of calcium, which is often supplemented by an additional 300 milligrams from a variety of other non-dairy foods if the person is on a well-rounded diet. A total of 1,200 milligrams of daily calcium is sufficient to meet recommended guidelines for most people, says Kerstetter. Those who can’t tolerate dairy products should consider calcium-fortified foods, such as orange juice or over-the-counter nutrition supplements containing calcium, which are best absorbed during meals due to increased acid production in the stomach. Or, dietitians also suggest choosing low-fat or fat-free lactose-free milk and drinking smaller amounts of milk at a time as key strategies to obtain dairy nutrients. However, individuals should consult a medical professional before starting a new calcium supplementation regimen. The lead author for the study was Kelsey Mangano, a registered dietitian and UConn doctoral student in the Department of Nutritional Sciences in the College of Agriculture and Natural Resources. Anne M. Kenny, a geriatrician at the University of Connecticut Health Center who studies osteoporosis, served as a co-investigator. Karl Insogna, a professor of internal medicine in the Department of Internal Medicine at Yale University and an endocrinologist specializing in bone diseases, also participated in the research.
<urn:uuid:9a6f20bf-c1b3-425c-8bcf-07ab01f7b16c>
CC-MAIN-2013-20
http://www.dairyherd.com/dairy-news/Older-Americans-need-more-calcium-122975133.html?cmntid=68147019&email=yes&page=2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930694
627
3.1875
3
Become a fan of h2g2 We should remember that... of the 6,000 stars [that] the average human eye could see in the entire sky, probably not more than thirty – or one-half of one percent – are less luminous than the Sun; that probably, of the 700-odd stars nearer than ten parsecs, at least 96% are less luminous than the Sun. There is not even ONE real yellow giant – such as Capella, Pollux, or Arcturus – nearer than ten parsecs1 and only about four main sequence A stars. – Dutch astronomer Willem Jacob Luyten (1899 - 1994) The closest star to us is, of course, our own Sun. It's unusual because it's a solitary yellow dwarf, while most of the stars nearby are in binary or even multiple systems. What makes our star really special though, is that it provides the energy for the only life in the Universe that we know of. Less Than Ten Light Years The nearest star to the Sun is Proxima Centauri (also known as alpha Centauri C), which is a red dwarf, and is 4.2 light years2 distant. It has two stellar companions, the yellow dwarf Rigil Kentaurus (alpha Centauri A) and an orange dwarf, alpha Centauri B. They take up joint second place in our list, at 4.35 light years. Barnard's Star, a red dwarf, is just under six light years away. Next comes Wolf 359, another red dwarf. Yet another red dwarf, Lalande 21185, was thought to be the fourth-closest star when its co-ordinates were published by Joseph-Jérôme Lefrançais de Lalande (1732 - 1807) in 1801. This was before Barnard's Star and Wolf 359 were discovered. Lalande 21185 cannot be seen by the naked eye because at 7th magnitude it is too dim; however, it counts as sixth-closest to the Sun at 8.3 light years. The seventh-closest is a star most denizens of Earth would recognise: Sirius (alpha Canis Majoris), with eighth place taken by its companion Sirius B, sometimes referred to as 'the Pup'. Sirius B is classified as a white dwarf, but it is one of the biggest known: in fact, its mass is comparable to that of our own Sun. Completing the top ten stellar neighbours are BL Ceti, a red dwarf flare star, and its binary partner UV Ceti3, which are 8.7 light years away from our Sun. Flare stars unleash bright flashes of light as well as streams of charged particles. Some of the stars studied have flares of such enormous intensity that they can increase the brightness of the star by up to 10%. The flares are only brief, like a camera flash, but would be detrimental to any nearby planets. Next in line is Ross 154, one of many discovered in 1925 by American astronomer Frank Elmore Ross (1874 - 1960). Ross 154 is a UV Ceti-type flare star 9.7 light years distant, and is the last of the stars within ten light years of our Solar System. |Star||Other Name or | |#1||Proxima Centauri||alpha Centauri C||Red dwarf||Centaurus||4.2| |#2||Rigil Kentaurus||alpha Centauri A||Yellow dwarf||Centaurus||4.35| |#2||alpha Centauri B||HD 128621||Orange dwarf||Centaurus||4.35| |#4||Barnard's Star||Proxima Ophiuchi||Red dwarf||Ophiuchus||5.98| |#5||Wolf 359||CN Leonis||Red dwarf||Leo||7.7| |#6||Lalande 21185||HD 95735||Red dwarf||Ursa Major||8.3| |#7||Sirius||alpha Canis Majoris||Blue-white| |#7||Sirius B||alpha Canis Majoris B||White dwarf||Canis Major||8.5| |#9||BL Ceti||Luyten 726-8 A||Red dwarf| |#9||UV Ceti||Luyten 726-8 B||Red dwarf| |#11||Ross 154||V1216 Sgr||Red dwarf| Between Ten and Twelve Light Years At 10.3 light years is another one on the Ross catalogue: Ross 248, a red dwarf flare star. Due to the wide variety of periods that this star flares (4.2 years, 120 days, and five other catalogued outbursts between 60 and 291 days apart), astronomers suspect that Ross 248 has an undetected companion which is causing the erratic flaring. Next on is Epsilon Eridani, which has a dust disc4 and a suspected extrasolar planet system, the closest detected up to the time of writing, 2012. The two candidate planets are not thought to be hospitable to life (as we know it) because their proposed orbits are so far from the star. If the planets do exist, they are likely to be frigid worlds like our outermost planet Neptune5. The French astronomer Nicolas Louis de Lacaille (1713 - 62) went on a 1751-4 expedition to the Cape of Good Hope, effectively a blank canvas sky for him to map. Using the planet Mars as a point of reference, his observations were the foundations for working out the lunar and solar parallax. Finding himself somewhat of a celebrity upon his return to Paris, de Lacaille hid from public attention in Mazarin College, writing up his findings. Barely taking care of himself, de Lacaille suffered from gout and was prone to over-working to the point of exhaustion. Unfortunately his catalogue, Coelum Australe Stelliferum, which described 14 new constellations and 42 nebulous objects among almost 10,000 southern stars, wasn't published until after he died at the age of just 49 years. One of those stars, Lacaille 9352, ranks as the 14th-closest to our Sun at 10.7 light years distance. EZ Aquarii is a triple star system situated at 11.3 light years away. EZ Aquarii A, B and C are all red dwarfs, and they may all be flare stars; however, not much is known about the smallest component (B). They are so dim (magnitude +13) that specialist equipment is required to view them. The system was labelled Luyten 789-6 by Dutch astronomer Willem Jacob Luyten, whose interest in astronomy had been sparked by viewing the predicted return of Halley's Comet in 1910, as an 11-year old schoolboy. In 1925 Luyten lost an eye in an accident but this tragedy did not wreck his chosen career. He was already working at the Harvard College Observatory, having been offered a post by the new director Harlow Shapley, whose own profile had been raised due to his participation in the Shapley-Curtis Debate of 1920. Luyten 'observed and measured more stellar images than anyone else', according to his biography at the National Academy of Sciences. He took up teaching at the University of Minnesota in 1931, and when he retired in 1967 he was given the title of Astronomer Emeritus which he held until his death at the ripe old age of 95. Procyon is a binary system which registers at +0.3 magnitude. The system consists of a yellow-white main sequence subgiant star, Procyon A, and a white dwarf companion, Procyon B, which was detected by Arthur von Auwers in 1862. |Star||Other Name or | |#12||Ross 248||HH Andromedae||Red dwarf| |#13||Epsilon Eridani||Sadira||Orange dwarf||Eridanus||10.5| |#14||Lacaille 9352||HD 217987||Red dwarf||Piscis Austrinus||10.7| |#15||Ross 128||FI Virginis||Red dwarf| |#16||EZ Aquarii A||Luyten 789-6 A||Red dwarf| |#16||EZ Aquarii B||Luyten 789-6 B||Red dwarf||Aquarius||11.3| |#16||EZ Aquarii C||Luyten 789-6 C||Red dwarf| |#19||Procyon A||alpha Canis Minoris||Yellow-white| |#19||Procyon B||alpha2 Canis Minoris||White dwarf||Canis Minor||11.4| The binary system 61 Cygni has two orange dwarf components of 6th magnitude at 11.41 light years away. Its distance was the first to be measured of any star. These two stars claim joint 21st place in our list of close stellar neighbours. Another pair of red dwarf stars, Struve 2398 A and B, positioned at just 11.5 light years distant, are the next nearest. They were studied by Russian-German astronomer Prof Friedrich von Struve (1793 - 1864), director of the Dorpat Observatory (now the Tartu Observatory) in Estonia, who listed them in his Catalogus novus stellarum duplicium (Double Star Catalogue) of 1827. Groombridge 34 are twin variable red dwarfs. Newly-discovered variable stars are given upper case capital letters, so Groombridge 34 A and B are also known as GX Andromedae and GQ Andromedae respectively. The Epsilon Indi system is fascinating because it contains the closest-known brown dwarfs. Brown dwarfs are approximately the same size as Jupiter6, but their mass is at least ten times greater, possibly up to 50×. These bodies are neither star nor planet, but 'failed' stars. Other titles have been proposed, as it's hardly encouraging to keep referring to them as 'failed stars'. Suggestions so far include planetar (which sounds like something from the science fiction genre) and substar (that 'sub' prefix isn't much of an improvement). Since 2004, planets have been discovered orbiting brown dwarfs, (although not, as yet, in the Epsilon Indi system), so their profile has been raised. Hopefully they are in line for a better class in the future. DX Cancri is a solo red dwarf flare star which expands to five times its usual brightness during flare activity. It is thought by some astronomers that DX Cancri is a member of the Castor Moving Group which was suggested in 1990 by JP Anosova and VV Orlov at the Astronomical Observatory in Leningrad State University, Russia. A moving group is the term for a collection of stars which share the same origin. Although they are not gravitationally bound to each other they are on the same path on their journey through the galaxy, like an unravelled, stretched-out cluster. The Castor Moving Group is named after the luminary of Gemini, and includes the stars Alderamin (alpha Cephei), Fomalhaut, Vega, psi Velorum and Zubenelgenubi (alpha Librae). Tau Ceti is one of the few nearby stars which are visible to the naked eye, albeit in the dim constellation Cetus, the Whale. Tau Ceti shot to fame in 1960, when Frank Drake launched Project Ozma, aiming to detect non-natural signals from space. Drake chose two stars which were similar to our Sun, Tau Ceti and Epsilon Eridani, for his project, which evolved to become SETI, the Search for Extra-terrestrial Intelligence. In December 2012, it was announced that five planets had been discovered orbiting Tau Ceti, with one of them possibly residing in the system's habitable zone. Red dwarf GJ 1061 in the southern constellation Horologium is the last of the stars within 12 light years. GJ 1061 is really small, even on the dwarf star scale: it registers just over ten percent of the Sun's mass. It is so dim (+13 mag) that you'd need a decent-sized telescope to view it, but just in case you ever get the opportunity, its co-ordinates are 03h 36m RA, −44° 30' 46" Dec. |Star||Other Name or | |#21||61 Cygni A||V1803 Cyg A||Orange dwarf||Cygnus||11.41| |#21||61 Cygni B||V1803 Cyg B||Orange dwarf||Cygnus||11.41| |#23||Struve 2398 A||NSV 11288||Red dwarf||Draco||11.5| |#23||Struve 2398 B||Gliese 725 B||Red dwarf| |#25||Groombridge 34 A||GX Andromedae||Red dwarf||Andromeda||11.6| |#25||Groombridge 34 B||GQ Andromedae||Red dwarf||Andromeda||11.6| |#27||Epsilon Indi||HD 209100||Orange dwarf +| two Brown dwarfs |#28||DX Cancri||LHS 248||Red dwarf| |#29||Tau Ceti||HD 10700||Yellow dwarf||Cetus||11.88| |#30||GJ 1061||LHS 1565||Red dwarf||Horologium||11.99| Nearby Stars in Fantasy and Science Fiction Stars which are close to our own Solar System have inspired imaginative writers going back hundreds of years. Here is just a sample: Proxima Centauri: the 1990s TV series Babylon 5 featured the planet Proxima III, which hosts an Earth Alliance colony. Alpha Centauri A: prolific author Isaac Asimov wrote about the water world Alpha of the Alpha Centauri A system in the Foundation and Earth book of his Foundation series. Alpha Centauri B: Witburg is a rocky planet orbiting Alpha Centauri B in the 2002 online role-playing game Earth & Beyond. Barnard's Star: Timemaster, a 1992 novel by Robert L Forward, bases its plot in the Barnard's Star system. Wolf 359: Star Trek fans will recognise Wolf 359 as the system where Starfleet's armada was practically wiped out by the hive-minded Borg. Lalande 21185: in the 1951 novel Rogue Queen penned by L Sprague de Camp, the planet Ormazd which orbits Lalande 21185 is investigated by Earth's space authority. Sirius: Micromégas is one of the earliest known science fiction stories, it was written in 1752 by François-Marie Arouet (better known by his pen name Voltaire). The Micromégas of the story was an extremely tall7 alien visitor to Earth who hailed from one of the planets in the Sirius system. Sirius B: in Seed of Light, a 1959 novel by Edmund Cooper, the Sirius A star is barren but Sirius B has a hospitable planet, Sirius B III, out of its five attendant worlds. The plot revolves around the people sent there to save the human race after the Earth has been devastated. BL Ceti: Larry Niven wrote A Gift From Earth in 1968, a part of his Known Space collection of multiple works. The plot involves the twin red dwarf stars BL Ceti and UV Ceti, which are important signposts for the eventual destination. UV Ceti: a space station called Eldorado, part of the 'Great Circle' route, is based at UV Ceti in the 1981 story Downbelow Station by CJ Cherryh. Ross 154: the planet Tei Tenga in the Ross 154 system is where the United Aerospace Armed Forces (UAFF) had a couple of military research bases in the video game Doom. Ross 248: Diadem is an icy world in orbit around Ross 248 in Alastair Reynolds's story Glacial. Following a failed attempt at human colonisation, an investigation a century later reveals that the planet is sentient and it uses cold-blooded annelids, burrowing through its ice-mantle, to 'think'. Epsilon Eridani: Les Grognards d'Éridan (The Napoleons Of Eridanus), written by French author Claude Avice in 1970, features a detachment of soldiers from the Napoleonic era who are abducted by aliens and transported to the Epsilon Eridani system to fight their battles for them. Also, Epsilon Eridani was the parent star of the planet Reach in the extremely successful Xbox game Halo: Reach. Lacaille 9352: in the fictional universe of the Hyperion Cantos dreamed up by Dan Simmons, the inhospitable planet Sibiatu's Bitterness orbits the star Lacaille 9352. Ross 128: Across the Sea of Suns, written in 1984 by Gregory Benford, features a race of alien aquatic creatures which live under the ice-mantle of the frozen world Pocks, a member of the Ross 128 system. EZ Aquarii A, B and C: the character Sheldon in The Big Bang Theory regularly lists 'the closest stars to me' when ascending and descending stairs. Once, in disguise, he spoke the words 'EZ Aquarii B, EZ Aquarii C,' while passing Amy on the stairs, and was dismayed that she recognised him. Procyon A/B: His Master's Voice was written by Polish author Stanislaw Lem in 1968. This book focuses on the attempts by highly intelligent Earthlings to understand a message from the Procyon system. 61 Cygni: The region surrounding 61 Cygni is known as the 'Darkling Zone' in the popular TV series Blake's 7. Groombridge 34: The Groombridge 34 system features in the Halo series of Xbox games. Epsilon Indi: New New York on Epsilon Indi III has a portal to the Earth, via a created wormhole, in the 1996 Starplex book by Robert J Sawyer. Tau Ceti: Time for the Stars, written in 1956 by Robert A Heinlein, explores the telepathic bond between twins over the vastness of space. Tau Ceti III, in the Star Trek universe, is a hospitable M-class planet. One of the bountiful fruits which grows there is the Kaferian apple. While they can be eaten raw, they are much more tasty stewed with Talaxian spices and served in a pie, as recommended in the vegetarian options at Quark's Bar on the space station Deep Space Nine.
<urn:uuid:622701f4-46ba-4d33-be1d-268e00f16e5d>
CC-MAIN-2013-20
http://www.h2g2.com/approved_entry/A87768382
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.924929
3,970
3.578125
4
Some people love them and some people hate them, but whatever your tastes you should probably know a little about the vignette effect in photography. A vignette photo has edges that fade to either white or black, typically gradually, although it can be an effect that is used dramatically as well. This effect can be created in camera with certain lenses that are known to produce it, sometimes undesirably. Vignettes can also be created in the darkroom during the printing process. However, in this day and age the most common way to create a vignette is during the post-processing phase in a photo editing program such as Photoshop. Generally in spite of our very wide field of view, our eyes don’t see with perfect focus at all points in a scene. We see the center of a scene with ideal light sensitivity and perfect focus and then focus and brightness will fall off increasingly toward the periphery. Therefore, a vignette more or less mimics the way our eyes actually see a scene. Although a photograph with precise focus and exposure throughout may be desirable in some scenarios, it can also seem very boring, artificial and even too contrived in others. Vignetting can act as a way to frame the intended subject in a photo in either a subtle or dramatic way and really make it stand out to great creative effect. By causing the periphery to gradually fade away, not only will the photo be more like actual vision, it can immediately draw the eye to the main subject and away from unimportant elements in the background or periphery. It can also be used as a finishing touch on a photo once the exposure and composition are perfect. Typically a vignette, as previously mentioned, is used in a gradual or subtle way since our eyes don’t actually make the borders of our vision very dark and fuzzy. When used in this way, a vignette will generally not be consciously detectable by the untrained eye. However, there are times when a more dramatic vignette is a useful effect, such as in a black and white landscape to add a touch of drama or in an intense portrait to create a darker mood. Older cheaper cameras such as Holgas often had poor optics, so many old photos have vignetting that was created in-camera unintentionally. This vintage look, which was previously not desirable, is now often intentionally recreated during post-processing with software like Photoshop. How to Create a Vignette in Photoshop There are a few ways to create a vignette in Photoshop but there are a few bits of information that are important to know first. A vignette should always be the very last step in the editing process. Deciding to crop the image post-vignette, for example, can cause the end result to be not desirable since a vignette is used to highlight the subject. If you are not completely sure that you are absolutely done editing your photo in other ways, you can choose to duplicate the original image layer so that you can go back to it if needed. The easiest way to create a vignette in Photoshop is to first create a new layer and select the elliptical marquee tool. Create a circle or oval shape in the desired area on your photo. Next you will need to choose to feather your selection anywhere from 50 to 80 pixels by going to Select>Modify>Feather. You can also choose the square marquee or even use the lasso tool to create a custom and creative shape. At this point you will go to Select>Inverse and fill the center of the selection with black or white depending on the look you ultimately want to achieve. If it is too dark at this point then you can easily lighten it by lowering the layer opacity. Another easy and quick way to add vignetting to your photos in Photoshop involves the use of the Lens Correction filter. First you need to open your photo and as previously mentioned, be sure to finish all photo edits prior to adding the vignetting. Open the Lens Correction filter via the following path Filters>Distort>Lens Correction. You will see various options within the Lens Correction menu but we are going to focus on the Vignette sliders. The Amount slider will make the vignette darker or lighter and the Midpoint slider will adjust the mid-point of the vignette. The first method of vignetting in Photoshop is definitely preferable if you want to place the vignetting in a custom place on the photo for creative effect, meaning not oval and dead center. However, the second method is great for a very precision vignette much like what would be created naturally with a lens. A Quick Note About Opinions on Vignettes One thing to be aware of is that there are photographers that “object” to the use of vignetting. Many see it as a form of cheating and as a way to make a bad photograph better. They argue that the composition itself should be what creates all of the emphasis on the subject and not a post-processing technique. However, the viewer of the photo, unless they possess a critical and trained eye, really doesn’t care about why they like a photo. They just do. Ultimately photography is indeed an art form and artists are as varied art itself. The most important thing is to produce the images that you want to produce. Rachael Towne is a photographer, digital artist and creator of photoluminary.com
<urn:uuid:470fb366-7f9e-4b0b-b930-8347e6141651>
CC-MAIN-2013-20
http://www.lightstalking.com/how-a-vignette-can-make-your-photographs-pop-and-how-to-do-it-in-photoshop
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946789
1,123
2.6875
3
In December 1992, Toutatis made a close approach to Earth. At the time, it was an average of about 4 million kilometers (2.5 million miles) from Earth. Images of Toutatis were acquired using radar carried out at the Goldstone Deep Space Communications Complex in California's Mojave desert. For most of the work, a 400,000-watt coded radio transmission was beamed at Toutatis from the Goldstone main 70-meter (230-foot) antenna. The echoes, which took as little as 24 seconds to travel to Toutatis and back, were received by the new 34-meter (112-foot) antenna and relayed back to the 70-meter (230-foot) station, where they were decoded and processed into images. The images of Toutatis reveal two irregularly shaped, cratered objects about 4 and 2.5 kilometers (2.5 and 1.6 miles) in average diameter which are probably in contact with each other. These "contact binaries" may be fairly common since another one, 4769 Castalia, was observed in 1989 when it passed near the Earth. Numerous surface features on Toutatis, including a pair of half-mile-wide craters, side by side, and a series of three prominent ridges -- a type of asteroid mountain range -- are presumed to result from a complex history of impacts. Toutatis is one of the strangest objects in the solar system, with a highly irregular shape and an extraordinarily complex "tumbling" rotation. Both its shape and rotation are thought to be the outcome of a history of violent collisions. "The vast majority of asteroids, and all the planets, spin about a single axis, like a football thrown in a perfect spiral, but Toutatis tumbles like a flubbed pass," said Dr. Scott Hudson of Washington State University. One consequence of this strange rotation is that Toutatis does not have a fixed north pole like the Earth. Instead, its north pole wanders along a curve on the asteroid about every 5.4 days. "The stars viewed from Toutatis wouldn't repeatedly follow circular paths, but would crisscross the sky, never following the same path twice," Hudson said. "The motion of the Sun during a Toutatis year, which is about four Earth years, would be even more complex," he continued. "In fact, Toutatis doesn't have anything you could call a 'day.' Its rotation is the result of two different types of motion with periods of 5.4 and 7.3 Earth days, that combine in such a way that Toutatis's orientation with respect to the solar system never repeats." The rotations of hundreds of asteroids have been studied with optical telescopes. The vast majority of them appear to be in simple rotation with a fixed pole and periods typically between one hour and one day, the scientists said, even though the violent collisions these objects are thought to have experienced would mean that every one of them, at some time in the past, should have been tumbling like Toutatis. Internal friction has caused asteroids to change into simple rotational patterns in relatively brief amounts of time. However, Toutatis rotates so slowly that this "dampening" process would take much longer than the age of the solar system. This means that the rotation of Toutatis is a remarkable, well-preserved relic of the collision-related evolution of an asteroid. On September 29, 2004, Toutatis will pass by Earth at a range of four times the distance between the Earth and the Moon, the closest approach of any known asteroid or comet between now and 2060. One consequence of the asteroid's frequent close approaches to Earth is that its trajectory more than several centuries from now cannot be predicted accurately. In fact, of all the Earth-crossing asteroids, the orbit of Toutatis is thought to be one of the most chaotic. High Resolution Goldstone Images These are 8 of the "high resolution" Goldstone images that are being used to produce a higher-resolution 3D model of Toutatis. (From Ostro et al., Science 270:80-83, 1995--© Copyright 1995 by the AAAS) High Resolution Image This is a close up of one of the high-resolution images of Toutatis. (From Ostro et al., Science 270:80-83, 1995--© Copyright 1995 by the AAAS) Topographic Map of Toutatis This is a topographic map of Toutatis. It is based upon the shape model of Phil Stooke which he produced using rendered images of the shape model by R.S. Hudson and S.J. Ostro and modified by him to fit the radar images. As with all maps, it is the cartographer's interpretation; not all features are necessarily certain given the limited data available. This interpretation stretches the data as far as possible. (Courtesy A. Tayfun Oner) Shaded Relief Map of Asteroid 4179 Toutatis This is a shaded relief map of asteroid 4179 Toutatis. As with all maps, it is the cartographer's interpretation and not all features are necessarily certain given the limited data available. This interpretation stretches the data as far as is feasible. (Courtesy Phil Stooke, NSSDC, and NASA) 4 Views of Toutatis This image shows four frames of asteroid Toutatis that were obtained on December 8-10 and 13, 1992. On each day, the asteroid was in a different orientation with respect to Earth. One large crater can be seen in the December 9 image (upper right) that measures about 700 meters (2,300 feet) in diameter. (Courtesy JPL/NASA) Computer Model of Toutatis These images show a computer model of the Earth-orbit-crossing asteroid Toutatis. These views of the asteroid show shallow craters, linear ridges, and a deep topographic "neck" whose geologic origin is not known. It may have been sculpted by impacts into a single, coherent body, or Toutatis might actually consist of two separate objects that came together in a gentle collision. (Courtesy Scott Hudson, Washington State University) Spin State of Toutatis This image shows the shape and non-principal-axis spin state of asteroid 4179 Toutatis rendered at a particular instant. The red, green, and blue axes are the principal axes of inertia; the magenta axis is the angular momentum vector; the yellow axis is the spin vector. If a flashlamp was attached to the short axis of inertia (the red axis) and flashed it every 15 minutes for a month, it would trace out the intricate path indicated by the small spheres stacked end-to-end. If this process was continued forever the path would never repeat. Toutatis's spin state differs radically from those of the vast majority of solar system bodies that have been studied. (© Copyright 1995 by the AAAS) Spin State of Toutatis on Nine Successive Days This image shows the non-principal-axis spin state of asteroid 4179 Toutatis at one-day intervals (from left to right, top to bottom). The red, green, and blue axes are the principal axes of inertia; the magenta axis is the angular momentum vector; the yellow axis is the spin vector. Toutatis does not spin about a single axis. Instead, its spin vector traces a curve around the asteroid's surface once every 5.41 days. During this time the object rotates once about its long axis, and every 7.35 days, on average, the long axis precesses about the angular momentum vector. The combination of these two motions with different periods give Toutatis its bizarre "tumbling" rotation. (Courtesy Scott Hudson, Washington State University)
<urn:uuid:5e6b2814-db1f-46bc-9374-445f6d3a9edb>
CC-MAIN-2013-20
http://www.solarviews.com/eng/toutatis.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706890813/warc/CC-MAIN-20130516122130-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.940871
1,623
3.78125
4
|Skip Navigation Links| |Exit Print View| |Creating and Administering Oracle Solaris 11 Boot Environments Oracle Solaris 11 Information Library| A boot environment is a bootable instance of the Oracle Solaris operating system image plus any other application software packages installed into that image. System administrators can maintain multiple boot environments on their systems, and each boot environment can have different software versions installed. Upon the initial installation of the Oracle Solaris release onto a system, a boot environment is created. You can use the beadm(1M) utility to create and administer additional boot environments on your system. Note - In addition, the Package Manager GUI provides some options for managing boot environments. Note the following distinctions relevant to boot environment administration: A boot environment is a bootable Oracle Solaris environment consisting of a root dataset and, optionally, other datasets mounted underneath it. Exactly one boot environment can be active at a time. A dataset is a generic name for ZFS entities such as clones, file systems, or snapshots. In the context of boot environment administration, the dataset more specifically refers to the file system specifications for a particular boot environment or snapshot. A snapshot is a read-only image of a dataset or boot environment at a given point in time. A snapshot is not bootable. A clone of a boot environment is created by copying another boot environment. A clone is bootable. Shared datasets are user-defined directories, such as /export, that contain the same mount point in both the active and inactive boot environments. Shared datasets are located outside the root dataset area of each boot environment. Note - A clone of the boot environment includes everything hierarchically under the main root dataset of the original boot environment. Shared datasets are not under the root dataset and are not cloned. Instead, the boot environment accesses the original, shared dataset. A boot environment's critical datasets are included within the root dataset area for that environment.
<urn:uuid:aafb080e-148d-4743-8055-0e389b1874a9>
CC-MAIN-2013-20
http://docs.oracle.com/cd/E23824_01/html/E21801/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.889114
402
2.75
3
||This article has multiple issues. Please help improve it or discuss these issues on the talk page. ||This article's factual accuracy may be compromised due to out-of-date information. (July 2012) ||This article needs additional citations for verification. (July 2012) ||An editor has expressed a concern that this article lends undue weight to certain ideas, incidents, controversies or matters relative to the article subject as a whole. (July 2012) Culinary arts is the art of preparing and cooking foods. The word "culinary" is defined as something related to, or connected with, cooking. A culinarian is a person working in the culinary arts. A culinarian working in restaurants is commonly known as a cook or a chef. Culinary artists are responsible for skilfully preparing meals that are as pleasing to the palate as to the eye. They are required to have a knowledge of the science of food and an understanding of diet and nutrition. They work primarily in restaurants, delicatessens, hospitals and other institutions. Kitchen conditions vary depending on the type of business, restaurant, nursing home, etc. The Table arts or the art of having food can also be called as "Culinary arts". Careers in culinary arts Related careers Below is a list of the wide variety of culinary arts occupations. - Consulting and Design Specialists – Work with restaurant owners in developing menus, the layout and design of dining rooms, and service protocols. - Dining Room Service – Manage a restaurant, cafeterias, clubs, etc. Diplomas and degree programs are offered in restaurant management by colleges around the world. - Food and Beverage Controller – Purchase and source ingredients in large hotels as well as manage the stores and stock control. - Entrepreneurship – Deepen and invest in businesses, such as bakeries, restaurants, or specialty foods (such as chocolates, cheese, etc.). - Food and Beverage Managers – Manage all food and beverage outlets in hotels and other large establishments. - Food Stylists and Photographers – Work with magazines, books, catalogs and other media to make food visually appealing. - Food Writers and Food Critics – Communicate with the public on food trends, chefs and restaurants though newspapers, magazines, blogs, and books. Notables in this field include Julia Child, Craig Claiborne and James Beard. - Research and Development Kitchens – Develop new products for commercial manufacturers and may also work in test kitchens for publications, restaurant chains, grocery chains, or others. - Sales – Introduce chefs and business owners to new products and equipment relevant to food production and service. - Instructors – Teach aspects of culinary arts in high school, vocational schools, colleges, recreational programs, and for specialty businesses (for example, the professional and recreational courses in baking at King Arthur Flour). Occupational outlook The occupation outlook for chefs, restaurant managers, dietitians, and nutritionists is fairly good, with "as fast as the average" growth. Increasingly a college education with formal qualifications is required for success in this field. The culinary industry continues to be male-dominated, with the latest statistics showing only 19% of all 'chefs and head cooks' being female. Notable culinary colleges around the world - JaganNath Institute of Management Sciences, Rohini, Delhi, India - College of Tourism & Hotel Management, Lahore, Punjab, Pakistan - Culinary Academy of India, Hyderabad, Andhra Pradesh, India - Culinary Academy of India, Hyderabad, Andhra Pradesh, India - ITM School of Culinary Arts, Mumbai, Maharashtra, India - Welcomgroup Graduate School of Hotel Administration, Manipal, Karnataka, India - Institute of Technical Education (College West) – School of Hospitality, Singapore - ITM (Institute of Technology and Management) – Institute of Hotel Management, Bangalore, Karnataka, India - Apicius International School of Hospitality, Florence, Italy - Le Cordon Bleu, Paris, France - École des trois gourmandes, Paris, France - HRC Culinary Academy, Bulgaria - Institut Paul Bocuse, Ecully, France - Mutfak Sanatlari Akademisi, Istanbul, Turkey - School of Culinary Arts and Food Technology, DIT, Dublin, Ireland - Scuola di Arte Culinaria Cordon Bleu, Florence, Italy - Westminster Kingsway College (London) - University of West London (London) - School of Restaurant and Culinary Arts, Umeå University (Sweden) - Camosun College (Victoria, BC) - Canadore College (North Bay, ON) - The Culinary Institute of Canada (Charlottetown, PE) - Georgian College (Owen Sound, ON) - George Brown College (Toronto, ON) - Humber College (Toronto, ON) - Institut de tourisme et d'hôtellerie du Québec (Montreal, QC) - Niagara Culinary Institute (Niagara College, Niagara-on-the-Lake, ON) - Northwest Culinary Academy of Vancouver (Vancouver, BC) - Nova Scotia Community College (Nova Scotia) - Pacific Institute of Culinary Arts (Vancouver, BC) - Vancouver Community College (Vancouver, BC) - Culinary Institute of Vancouver Island (Nanaimo, BC) - Sault College (Sault Ste. Marie, ON) - Baltimore International College, Baltimore, Maryland - California Culinary Academy, San Francisco, California - California School of Culinary Arts, Pasadena, California - California State, Pomona, California - California State University Hospitality Management Education Initiative - Chattahoochee Technical College in Marietta, Georgia - Cooking and Hospitality Institute of Chicago - Coosa Valley Technical College, Rome, Georgia - Culinard, the Culinary Institute of Virginia College - Cypress Community College Hotel, Restaurant Management, & Culinary Arts Program in Anaheim - Classic Cooking Academy, Scottsdale, Arizona - Center for Kosher Culinary Arts, Brooklyn, New York - Culinary Institute of America in Hyde Park, New York - Culinary Institute of America at Greystone in St. Helena, California - The Culinary Institute of Charleston, South Carolina - L'Ecole Culinaire in Saint Louis, Missouri and Memphis, Tennessee - Glendale Community College (California) - International Culinary Centers in NY and CA which include: - Institute for the Culinary Arts at Metropolitan Community College, Omaha, Nebraska - Johnson & Wales University, College of Culinary Arts - Kendall College in Chicago, Illinois - Lincoln College of Technology - Manchester Community College in Connecticut - New England Culinary Institute in Vermont - Orlando Culinary Academy - Pennsylvania Culinary Institute - The Restaurant School at Walnut Hill College, Philadelphia, Pennsylvania, - Scottsdale Culinary Institute - Secchia Institute for Culinary Education: Grand Rapids Community College, Grand Rapids, MI - The Southeast Culinary and Hospitality College in Bristol, Virginia - Sullivan University Louisville, Kentucky - Los Angeles Trade–Technical College - Texas Culinary Academy - Central New Mexico Community College, Albuquerque, NM - AUT University (Auckland University of Technology) - MIT (Manukau Institute of Technology) - Wintec, Waikato Institute of Technology See also - McBride, Kate, ed. The Professional Chef/ the Culinary Institute of America, 8th ed. Hoboken, NJ: John Wiley & Sons, INC, 2006. Further reading - Beal, Eileen. Choosing a career in the restaurant industry. New York: Rosen Pub. Group, 1997. - Institute for Research. Careers and jobs in the restaurant business: jobs, management, ownership. Chicago: The Institute, 1977. External links
<urn:uuid:00d77b91-d37a-448b-b548-f3b5d33be8b6>
CC-MAIN-2013-20
http://en.wikipedia.org/wiki/Culinary_art
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.874122
1,685
2.84375
3
Consider this article on why white rice would actually be better for you than brown. One of the USRDA "My Plate" and food pyramid biggest fallacies is the over-reliance on grain. However, if you are going to have grain, have a grain that isn't going to hurt you as bad. As far as eating for health, look at your macro-nutrients first. - Protein: Unless you have renal problems, protein should be one of the higher proportions of food in your diet. Minimum is 1g per kg of lean weight if you do no exercise. If you do exercise, you will be better served by 1g per pound of lean weight or more. NOTE: 4 Calories per gram of protein. - Fat: There are several fat soluble vitamins you need--not the least of which is Vitamin D. If you stay with monounsaturated and saturated fats you will do well. You just want to make sure you balance of Omega-3 to Omega-6 fats are favorable. NOTE: 9 Calories per gram of fat. - Carbohydrates: Way to over-emphasized in modern diets, but still very necessary. These usually contain the water-soluble vitamins we need. NOTE: 4 Calories per gram of carbohydrates. A diet that consists of an even split 33% of Calories from each macronutrient is actually a pretty well balanced diet. Another good split is 30/30/40 (protein/fat/carbs). As far as carbohydrates go, the more you de-emphasize grains and emphasize green vegetables the better your diet will be. Meat is not bad. Fish is probably one of the best choices, usually anti-inflammatory (which reduces blood cholesterol), but prefer a filet over fish balls. Fruits are also good in moderation. Eggs are also good. To put things in perspective, most sources of meat include about 20g of protein per 4oz (closed fist portion) of meat. As far as meat selection goes, if you favor grass-fed (or natural diet) sources of meat, the fats will have a more favorable balance of Omega-3 to Omega-6 fats. This will improve your health overall. The biggest thing I see in your diet, is it seems to emphasize carb sources over protein sources, and possibly not enough fat. As to your exercise, you will need to do something more than just upper body if your goal is to lose fat and gain muscle. You want to stimulate your whole body. You can do that with body-weight exercises. Burpees, squat-stands, etc. engage your lower half, and can help improve on the work you are doing with the upper half.
<urn:uuid:71f06586-57da-4f24-84e0-183d06498878>
CC-MAIN-2013-20
http://fitness.stackexchange.com/questions/5235/how-healthy-is-my-diet-for-maintaining-health-and-become-more-fit
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.952763
555
2.75
3
With the arrival of cold weather, the Occupational Safety and Health Administration is reminding employers to take necessary precautions to protect workers from the serious, and sometimes fatal, effects of carbon monoxide exposure. Recently, a worker in a New England warehouse was found unconscious and seizing, suffering from carbon monoxide poisoning. Several other workers at the site also became sick. All of the windows and doors were closed to conserve heat, there was no exhaust ventilation in the facility, and very high levels of carbon monoxide were measured at the site. Every year, workers die from carbon monoxide poisoning, usually while using fuel-burning equipment and tools in buildings or semi-enclosed spaces without adequate ventilation. This can be especially true during the winter months when employees use this type of equipment in indoor spaces that have been sealed tightly to block out cold temperatures and wind. Symptoms of carbon monoxide exposure can include everything from headaches, dizziness and drowsiness to nausea, vomiting or tightness across the chest. Severe carbon monoxide poisoning can cause neurological damage, coma and death. Sources of carbon monoxide can include anything that uses combustion to operate, such as gas generators, power tools, compressors, pumps, welding equipment, space heaters and furnaces. To reduce the risk of carbon monoxide poisoning in the workplace, employers should install an effective ventilation system, avoid the use of fuel-burning equipment in enclosed or partially-enclosed spaces, use carbon monoxide detectors in areas where the hazard is a concern and take other precautions outlined in OSHA's Carbon Monoxide Fact Sheet. For additional information on carbon monoxide poisoning and preventing exposure in the workplace, see OSHA's Carbon Monoxide Poisoning Quick Cards (in English and Spanish). Under the Occupational Safety and Health Act of 1970, employers are responsible for providing safe and healthful workplaces for their employees. OSHA's role is to ensure these conditions for America's working men and women by setting and enforcing standards, and providing training, education and assistance. For more information, visit www.osha.gov.
<urn:uuid:40df5e82-b168-431d-8ad7-1b394f553e9b>
CC-MAIN-2013-20
http://blog.easysafetyschool.com/2013_02_01_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.936825
421
3.1875
3
Sitting around a table at Meyers Center BOCES in Saratoga, students, teaching assistants, and teachers were busy crocheting. They weren’t making afghans or shawls– but rather, they were turning plastic into possibility. Little did they know they were also making history. Profiles of 17 human rights defenders from around the globe, with links to accompanying lesson plans. Browse the curriculum. Download the complete 158-page guide or individual lesson plans. Speak Truth to Power: Voices from Beyond the Dark brings the voices of human rights defenders into your classroom. Find out how you can support your students in their efforts to defend human rights. The Speak Truth to Power project will enter the video documentary world with a contest challenging middle and high school students in New York to create a film based on the experience of courageous human rights defenders around the world. It is with great sadness that the family of Professor Wangari Maathai announces her passing away on 25th September, 2011, at the Nairobi Hospital, after a prolonged and bravely borne struggle with cancer. New to the STTP site this month is a lesson plan based on the work of Congressman John Lewis, who has dedicated his life to protecting human rights, securing civil liberties, and building what he described as “The Beloved Community” in America.
<urn:uuid:dbc6de6c-81b1-40fb-93b4-d106a9d2ff8b>
CC-MAIN-2013-20
http://blogs.nysut.org/sttp/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964008
282
2.875
3
How many times did you hear that today? Probably a lot. But why are adults so hung up on hand washing? Why are they so in love with lather? Washing your hands is the best way to stop germs from spreading. Think about all of the things that you touched today — from the telephone to the toilet. Maybe you blew your nose in a tissue and then went outside to dig around the dirt. Whatever you did today, you came into contact with germs. It's easy for a germ on your hand to end up in your mouth. Think about how many foods you eat with your hands. You can't wear rubber gloves all day long, but you can wash your hands so those germs don't get a chance to make you or someone else sick. When germs go down the drain, they can't make anyone sick. So when are the best times to wash your hands? when your hands are dirty before eating or touching food (like if you're helping cook or bake, for example) before and after visiting a sick relative or friend Now you have the when and the why of hand washing. But did you know that a lot of people don't know how to get their paws perfectly clean? The next time you're told to step up to the sink and scrub up, remember these handy hints: Use warm water (not cold or hot) when you wash your hands. Use whatever soap you like. Some soaps come in cool shapes and colors or smell nice, but whatever kind gets you scrubbing is the kind you should use. Antibacterial soaps are OK to use, but regular soap works fine. Work up some lather on both sides of your hands, your wrists, and between your fingers. Don't forget to wash around your nails. This is one place germs like to hide. Wash for about 10 to 15 seconds — about how long it takes to sing "Happy Birthday." (Sing it quickly two times or just once if you go nice and slow.)
<urn:uuid:3a9dc7bc-4ea5-4b87-af56-e7bd90e24c7d>
CC-MAIN-2013-20
http://kidshealth.org/PageManager.jsp?lic=432&dn=CoventryCaresOf_Nebraska&article_set=10624&cat_id=124
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964987
418
2.5625
3
Cyclopædia of Political Science, Political Economy, and the Political History of the United States GEORGIA, one of the thirteen original United States. Its territory was originally included in the charter of 1662-3 to the lords proprietors of the Carolinas, but was set apart by a royal charter of June 9, 1732, to a company organized by James Oglethorpe to provide homes in America for indigent persons. The boundaries of the new colony were laid down in the charger as follows: "All those lands, countrys and territories situate, lying and being in that part of South Carolina, in America, which lies from the most northern part of a stream or river there, commonly called the Savannah, all along the sea coast, to the southward, unto the most southern stream of a certain other great water or river called the Alatamaha, and westerly from the heads of the said rivers respectively in direct lines to the south seas." this boundary was more precisely defined by the state constitution of 1798 as beginning at the mouth of the Savannah, running up that river and the Tugalo to the headwaters of the latter, thence straight west to the Mississippi, down that river to parallel 31° north latitude, thence east on that parallel to the Appalachicola or Chattahoochee, along that river to the Flint, thence straight to the head of the St. Mary's river, along that river to the Atlantic, and thence along the coast to the place of beginning. June 20, 1752, the charter was surrendered, and the colony be came a royal province. —The first state constitution was adopted by a state convention, Feb. 5, 1777. It changed the name of parish to that of county, gave the choice of the governor to the legislature, fixed the governor's term at one year, and forbade the election of any person as governor for more than one year in three. A new constitution was formed by a state convention which met at Augusta, Nov. 4, 1788, and was ratified by another convention at the same place, May 6, 1789. Among other changes, it prolonged the governor's term to two years, and directed the senate to elect the governor from three names to be selected by the house. By an amendment adopted by a new state convention at Louisville, May 16, 1795, Louisville was made the permanent seat of government. Another constitution was adopted in state convention at Louisville, May 30, 1798. It abolished the African slave trade, but forbade the legislature to emancipate slaves without the consent of their owners, or to prevent immigrants from other states from bringing their slaves with them. Various amendments to this constitution were made up to and including the secession convention of 1861, the only one necessary to specify here being that of Nov. 17, 1824, which transferred the election of governor to the people. The changes produced by the rebellion will be given hereafter. —The territory originally claimed by Georgia, extending from the Atlantic coast to the Mississippi, was diminished in 1798 by the formation of Mississippi territory, from which the states of Mississippi and Alabama were afterward formed. (See —In presidential elections the electoral votes of Georgia have always been cast for democratic candidates, except in 1840 and 1848, when they were cast for Harrison and Taylor respectively, the whig candidates. In 1789 and 1792 the Georgia electors voted for Washington for the presidency and for various democrats for the vice-presidency. (See —The state elections until 1830 were undisputedly democratic, and all political struggles were entirely personal between different members of the same party. From 1796 until 1810 the claim of land companies to the Mississippi lands claimed by Georgia was the controlling issue in state politics, as was the case from 1825 until 1835 with the removal of the Creek and Cherokee Indians from the state. (See —After 1830 the state elections resulted almost as steadily in democratic success, but with much greater difficulty. Although but one governor, Crawford, was an avowed whig, the whig party in the state disputed every election vigorously, aided in electing at least one governor, Gilmer, in opposition to the national or regular democratic candidate, and frequently controlled the legislature, generally in years not affected by a presidential election. As a general rule the whig vote in the state may be reckoned at from 47 to 49 per cent. of the total, occasionally rising to a majority. —The formation of the so-called American party in the state reduced the opposition vote to about 40 per cent., and this proportion represents the opposition in 1860-61 both to the election of Breckinridge and to secession. The opposition to the latter measure, as elsewhere-mentioned, was to the advisability, not to the principle, of secession, and ceased when the majority and pronounced the decision. Indeed, the leader of the so-called union party of the state, A. H. Stephens, was almost immediately elected vice-president of the new southern confederacy. (See —In November, 1860, an act of the legislature provided for a special election for delegates to a state convention, which met at Milledgeville, Jan. 16, 1861. Jan. 16, by a vote of 208 to 89, an ordinance of secession was passed. It repealed the ordinance ratifying the constitution, and the acts ratifying the amendments to the constitution, dissolved the union between Georgia and the other states, and declared "that the state of Georgia is in the full possession and exercise of all those rights of sovereignty which belong and appertain to a free and independent state." The minority, however, signed the ordinance, as a pledge that they would sustain their state, with the exception of six; and these yielded so far as to place on the minutes a pledge of "their lives, fortunes and honor" to the defense of the state. Ten delegates were chosen by the convention to represent the state at the organization of the provisional government in Montgomery, and Georgia thus became one of the confederate states. The progress of the war developed a considerable opposition in Georgia to the confederate government. In the leaders it took the form of a sublimated state sovereignty, in opposition to the despotic acts of the executive; but in the mass of voters there seems to have been a strong undercurrent in favor of reconstruction in its first form, that is, re-entrance to the Union on terms. April 30, 1865, the Sherman-Johnson agreement ended the rebellion in Georgia. (See —June 17, 1865, James Johnson was appointed provisional governor of the state. Under his directions a convention met at Milledgeville, Oct. 25, repealed the ordinance of secession, voided the war debt, and adopted a new state constitution, Nov. 7, which was ratified by popular vote. It recognized the abolition of slavery by the federal government as a war measure, but reserved the right of its citizens to appeal to "the justice and magnanimity of that government" for compensation for slaves; it made the governor ineligible for re-election; it confined the right of suffrage to free white male citizens; and it enjoined upon the legislature the duty of providing by law for "the government of free persons of color." State officers were elected Nov. 15, 1865, the legislature met in December, and the state remained under the new form of government until March, 1867. (See —The election at which the constitution had been ratified had resulted in the choice of republican state officers, a republican senate, and a democratic house of representatives. In July the new state officers entered on their duties and the legislature ratified the congressional changes in the constitution, but during this and the next month the legislature proceeded to declare negroes ineligible to membership in it, and to admit to membership several persons who, it was alleged, were disqualified to hold office by the 14th amendment. During the year the state supreme court decided in favor of the eligibility of negroes to office, but the action of the legislature provoked an unfavorable feeling to Georgia in congress, and was construed as an effort to avoid the terms of reconstruction. In December, therefore, the Georgia senators were not admitted, and did not obtain their seats until January and February, 1871; the representatives had been admitted July 25, 1868. The Georgia electors, in obedience to a state law passed under the confederacy and not repealed in 1880, voted Dec. 9, 1868, the second Wednesday of December, instead of the first, as required by the federal statute. On this nominal ground a vigorous effort was made in February, 1869, to reject the vote of Georgia, but it was counted "in the alternative." (See —Nothing, however, could save Georgia from re-reconstruction. The act of Dec. 23, 1869, authorized the governor to reconvene the legislature, with only such members as the reconstruction acts allowed, prohibited the exclusion of qualified members, authorized the use of the army and navy to support the governor, and imposed upon the legislature the ratification of the proposed 15th amendment as a condition precedent to the admission of senators and representatives from Georgia. The seats of the representatives also were thus vacated until January and February, 1871. The organization of the legislature in January and February, 1870, was only effected with great difficulty by the governor, and his irregular course of action was condemned by the senate investigating committee; but the organization was finally accomplished, the conditions fulfilled by the legislature, and the state admitted by act of July 15, 1870. The first election under the new regime took place Dec. 20—22, 1870, and resulted in the choice of democratic state officers, and of five democratic and two republican representatives in congress. At the next election for congressmen, 1872, the state having been re-districted, the republicans lost one congressman and gained one. At the next election, 1872, the democrats elected all the nine congressmen: in two districts the republican vote entirely disappeared, and in all the others it was much reduced. Since that time the state has been democratic in all elections, state and national, and the political contest has been confined to factions of the dominant party. The peculiar state law, requiring electors to vote on thesecondWednesday of December, excited some comment in 1881, but the undisputed republican majority in the presidential election of 1880 allowed the state's electoral votes to be admitted without objection. —A new constitution was formed by a convention which met at Atlanta, July 11, 1877, and was ratified by popular vote, Dec. 5. Its only noteworthy changes were its location of the state capital at Atlanta, and its limitation of the right of suffrage by prohibiting any one convicted of a penitentiary offense, and not pardoned, from registering, voting or holding office. —The most prominent citizens of the state in national politics have been William H. Crawford, Herschel V. Johnson, and Alexander H. Stephens. (See those names.) Reference should also be made (see also list of governors) to John M. Berrien, democratic United States senator 1825-9, attorney general under Jackson (see —The name of Georgia was given to the colony in 1732 in honor of King George II. The prosperity of the state and its vast possibilities of future growth have encouraged its citizens to give it the popular name of the empire state of the south. —GOVERNORS George Walton (1789-90); Edward Telfair(1790-3); Geo. Matthews (1793-6); Jared Irwin (1796-8); James Jackson (1798-1801); Josiah Tatnall (1801-2); John Milledge (1802-6); Jared Irwin (1808-9); David B. Mitchell (1809-130; Peter Early (1813-15); David B. Mitchell (1815-17); William Rabun (1817-19); John Clark (1819-23); George M. Troup (1823-7); John Forsyth (1827-9); George R. Gilmer (1829-31); Wilson Lumpkin (1831-5); William Schley (1835-7); George R. Gilmer (1837-9); Charles J. McDonald (1839-43); George W. Crawford (1843-7); G. W. B. Towns (1847-15); Howell Cobb (185103); Herschel V. Johnson (1853-7); Joseph E. Brown (1857-65); James Johnson (provisional, 1865); Chaekwa J. Jenkins (1863-7); John Pope and G.G. Meade (military governors, March, 1867-June, 1868); Rufus B. Bullock (June, 1868-October, 1871); Benjamin Coley (acting, October 1871-January, 1872); James M. Smith (chosen by special election, January, 1872-January, 1877); Alfred H. Colquitt (1877-83). Return to top
<urn:uuid:b031c313-cfeb-4595-9c33-88a53ee5aca7>
CC-MAIN-2013-20
http://www.econlib.org/library/YPDBooks/Lalor/llCy498.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967282
2,702
3.640625
4
For the past decade I’ve been developing forensic techniques for determining if an image is a forgery. The general philosophy that I have adopted is to first concede that there is no single technique that can detect all forms of digital manipulation. I have, therefore, been developing a number of different forensic tools each tailored to detecting specific forms of photo manipulation – some of these techniques operate on subtle pixel-level statistics that are invisible to the human eye, and others operate on geometric properties that can sometimes be seen with a trained eye. For example, in the image shown below, the bottle’s cast shadow is clearly incongruous with the shape of the bottle (as is the shadow on this cover of Time Magazine). Such obvious errors in a shadow are easy to spot, but more subtle differences can be harder to detect. Shown below are two images in which the bottle and its cast shadow are slightly different (the rest of the scene is identical). Can you tell which is consistent with the lighting in the rest of the scene? The geometry of cast shadows is dictated by the 3-D shape and location of an object and the illuminating light(s). It turns out, perhaps somewhat surprisingly, that there is a simple and intuitive 2-D image-based geometric analysis that can verify the authenticity of shadows. Locate any point on a shadow and its corresponding point on the object, and draw a line through them. The best points to use are the corners of an object for which it is easier to match shadow and object. Repeat for as many clearly defined shadow and object points as possible. As you do this, you will find that all of the lines should intersect at one point – the location of the illuminating light. Here is the basic intution for why this image-based construction works. Since light travels in a straight line, a point on a shadow, its corresponding point on the object, and the light source must all lie on a single line. Therefore, the light source will always lie on a line that connects every point on a shadow with its corresponding point on an object. Because under the rules of perspective projection, straight lines project to straight lines, this basic geometry is preserved in the 2-D image of a scene. Notice that this constraint holds regardless of the shape or orientation of the surface onto which a shadow is cast. Shown below are the results of this simple geometric analysis, which clearly reveals the second bottle to be the fake. In practice, there are some limitations to a manual application of this geometric analysis. Care must be taken to select appropriately matched points on the shadow and the object. This is best achieved when the object has a distinct shape (the corner of a cube or the tip of a cone). In addition, if the dominant light is the sun, then the lines may be nearly parallel, making the computation of their intersection vulnerable to slight errors in selecting matched points. And, it is necessary to remove any lens distortion in the image which causes straight lines to be imaged as curved lines which will then no longer intersect at a single point. We are developing a suite of forensic tools that will automate and simplify the detection of fakes, one of which will almost certainly rely on the analysis of shadows. [CGI model credit to Jeremy Birn, Lighting and Rendering in Maya]
<urn:uuid:4a423d77-d325-4d6a-93f2-cad37d917e0c>
CC-MAIN-2013-20
http://www.fourandsix.com/blog/2011/6/22/photo-forensics-from-shadows.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.943355
679
3.015625
3
Archive for the ‘transcendental geometry’ tag The modern mathematician finds the space of three dimensions, in which our visible universe is containled, entirely too contracted for his conceptions, and is obliged to imagine a space of “n” dimensions in order that his fancy may find room to disport itself. But it is a new idea, on the part of the novelist, to make the conceptions of transcendental geometry the basis for an amusing story. The very short article goes on to compare “Flatland” with “Through the Looking Glass” and their use of geometry as speculative and imaginative. In trying to find more about this term, it appears that sadly the intelligent design crowd has laid claim to it. The most I could find (in an admittedly short search) was this related Wikipedia article on “Complex Geometry“: In mathematics, complex geometry is the study of complex manifolds and functions of many complex variables. Application of transcendental methods to algebraic geometry falls in this category, together with more geometric chapters of complex analysis.
<urn:uuid:e4ea8058-f45d-43b9-b74f-066e5d708d65>
CC-MAIN-2013-20
http://www.jeffreythompson.org/blog/tag/transcendental-geometry/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.951813
225
2.609375
3
Child and Adolescent Suicide Left untreated, depression can lead some youth to take their own lives. Suicide is the third leading cause of death for 15- to 24-year-olds and the sixth leading cause of death for 5- to 14-year-olds. Attempted suicides are even more common. Warning signs of suicide Four out of five teens that attempt suicide give clear warnings. If you suspect that a child or adolescent is suicidal, look for these warning signs: - Threats of suicide—either direct or indirect. - Verbal hints such as “I won’t be around much longer” or “It’s hopeless. - Obsession with death. - Overwhelming sense of guilt, shame or rejection. - Putting affairs in order (for example, giving or throwing away favorite possessions). - Sudden cheerfulness after a period of depression. - Dramatic change in personality or appearance. - Hallucinations or bizarre thoughts. - Changes in eating or sleeping patterns. - Changes in school performance. What Should Parents and Other Adults Do if They Think a Child Is Suicidal? - Ask the child or teen if he or she feels depressed or thinks about suicide or death. Speaking openly and honestly allows the child to confide in you and gives you a chance to express your concern. Listen to his or her thoughts and feelings in a caring and respectful manner. - Let the child or teen know that you care and want to help. - Supply the child or teen with local resources, such as a crisis hotline or the location of a mental health clinic. If the child or teen is a student, find out if there are any available mental health professionals at the school and let the child know about them. - Seek professional help. It is essential to seek expert advice from a mental health professional that has experience helping depressed children and teens. - Alert key adults in the child’s life—family, friends, teachers. Inform the child’s parents or primary caregiver, and recommend that they seek professional assistance for their child or teen. - Trust your instincts. If you think the situation may be serious, seek immediate help. If necessary, break a confidence in order to save a life. This will connect you with a crisis center in your area. Covenant House Nine Line This is a 24-hour teen crisis line. American Academy of Child and Adolescent Psychiatry American Association of Suicidology
<urn:uuid:6b3bb5b0-a748-401b-86e5-9e42c1689192>
CC-MAIN-2013-20
http://www.nmha.org/farcry/go/information/get-info/children-s-mental-health/child-and-adolescent-suicide
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.883241
516
3.3125
3
Alternative Instruction Program The Alternative Instruction Program (AIP) provides an appropriate educational setting for students with diagnosed learning disabilities and/or attention disorders. While the standard-sized classroom works well for many students, the learning needs of some are better met in a small group environment providing more frequent interaction and closer supervision. For admission into the AIP, the student must have a recent or updated diagnosis of a learning disability and/or attention disorder. Other data will also be taken into consideration as part of the admissions process such as standardized test scores, academic ability, observations, input from classroom teachers, work samples, and emotional or behavioral factors. Student progress in AIP is assessed regularly to ensure that enrollment in the program adequately meets the student’s educational needs.
<urn:uuid:cf1d568c-c515-45f6-b3e5-3f8c70e9bf37>
CC-MAIN-2013-20
http://www.stpaulsmobile.net/page.aspx?pid=413
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700958435/warc/CC-MAIN-20130516104238-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.93521
153
2.703125
3
The history of Cornell University’s South Asia Collection dates from 1868 when Cornell’s President Andrew D. White went to Europe armed with formidable lists of books and apparatus to be collected. He made large purchases of scientific and literary works. One of the most important of his acquisitions was the library of one of the founders of historical linguistics, Franz Bopp (1791-1867). Fully one-third of Bopp’s approximately five thousand volume collection was comprised of Indological subject matter. Since the beginning, Cornell University has continued to build on the initial strength of the Bopp library, acquiring complete collections of most of the important serials and monographs in this field. Today, with material from India, Pakistan, Sri Lanka, Bangladesh and Nepal, the South Asia Collection is the fourth largest in the United States and the largest intershelved collection combining both Indic and Western languages. Collections in rural sociology, anthropology, communications, education, regional planning and art history are also noteworthy among the South Asia Collection. The holdings include the Gandhi Memorial Library, which Cornell received as a gift in 1949. The South Asia Collection has grown steadily with gifts from the government of India and individuals in this country, as well as substantial library acquisitions.
<urn:uuid:9bb51eb4-4dc7-45cd-9558-f689805d5eb4>
CC-MAIN-2013-20
http://asia.library.cornell.edu/ac/SouthAsia/Collection-History
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.946441
257
2.703125
3
Darryl D’Monte continues his reportage of the Climate Action Network International meet on in Bangkok where, he says, two NGOs put forward blueprints that could be templates on which the new climate treaty is based Two NGOs -- the World Wide Fund for Nature (WWF) and a consortium led by Greenpeace -- have put forward blueprints that could be templates on which the new climate treaty, due to be negotiated in Copenhagen in December, is based. WWF employs the concept of greenhouse development rights (GDRs), which have earlier also been propagated by the Stockholm Environment Institute and others. This August, it released a report titled ‘Sharing the effort under a global carbon budget’. WWF says: “A strict global carbon budget between now and 2050 based on a fair distribution between rich and poor nations has the potential to prevent dangerous climate change and keep temperature rise well below 2 degrees Celsius.” The report is based on research and shows different ways to cut global emissions by at least 80% globally, by 2050, and by 30% by 2030, compared to 1990 levels. Both the EU and US have agreed to this 2050 target but differ drastically on the intermediate goals, which have a vital bearing on keeping global temperatures from rising above 2 degrees C, beyond which there will be catastrophic climate changes. “In order to avoid the worst and most dramatic consequences of climate change, governments need to apply the strictest measures to stay within a tight and total long-term global carbon budget,” said Stephan Singer, director of global energy policy at WWF. “Ultimately, a global carbon budget is equal to a full global cap on emissions.” According to the analysis, the total carbon budget -- the amount of tolerable global emissions over a period of time -- has to be set roughly at 1,600 Gt CO2 eq (gigatonnes of carbon dioxide equivalent) between 1990 and 2050. As the world has already emitted a large part of this, the budget from today until 2050 is reduced to 970 Gt CO2 eq, excluding land use changes. The report evaluates different pathways to reduce emissions, all in line with the budget. It describes three different methodologies which could be applied to distribute the burden and the benefits of a global carbon budget in a fair and equitable way. - Greenhouse development rights (GDRs), where all countries need to reduce emissions below business-as-usual based on their per capita emissions, poverty thresholds, and GDP per capita. - Contraction and convergence (C&C), where per capita allowances converge from a country’s current level to a level equal for all countries within a given period. - Common but differentiated convergence (CDC), where developed countries’ per capita emissions converge to an equal level for all countries and others converge to the same level once their per capita emissions reach a global average. The report says that by 2050, the GDR methodology requires developed nations as a group to reduce emissions by 157% (twice what they are contemplating). “Given that they cannot cut domestic emissions by more than 100%, they will need to finance emission reductions in other countries to reach their total.” While the greenhouse development rights method allows an increase for most developing countries, at least for the initial period, the two other methods give less room for emissions increase. Under the C&C and CDC methodology, China, for example, would be required to reduce by at least 70% and India by 2-7% by 2050, compared to 1990. The poorest countries will be allowed to continue to grow emissions until at least 2050 under the GDR methodology, but will be required to reduce them after 2025 under the two remaining allocation options. The Greenpeace proposal, which has WWF and other partners, was released at an earlier UN climate meet in Bonn this year. It also talks of a global carbon budget. Industrial countries would have to phase out their fossil fuel energy consumption by 2050. The trajectory would be as follows: 23% between 2013 and 2017, 40% by 2020 (twice the EU commitment), and 95% by 2050. Globally, deforestation emissions would need to be reduced by three-quarters by 2020, and fossil fuel consumption by developing countries would have to peak by 2020 and then decline. The proposal envisages that industrial countries will provide at least $160 billion a year from 2013 to 2017, “with each country assuming national responsibility for an assessed portion of this amount as part of its binding national obligation for the same period”. The main source of this funding, which could prove controversial, would be auctioning 10% of industrial countries’ emissions allocations. There would also be levies on aviation and shipping, since both add to global warming. Greenpeace proposes a Copenhagen climate facility which would apportion $160 billion as follows: - $56 billion for developing countries to adapt to climate change. - $7 billion a year as insurance against such risks. - $42 billion in reducing forest destruction and degradation. - $56 billion on mitigation and technology diffusion. Talks at Bangkok are deadlocked between the G77 and China that want to continue with the Kyoto Protocol, and the US which wants a new treaty. The EU is open to a continuation of the old treaty with a new track to include the US (which has not ratified Kyoto), as well as emerging developing countries. Where and how such proposals will dovetail with the document now being negotiated is by no means clear, and it will be nothing less than a catastrophe for the entire planet if Copenhagen ends in a stalemate. Infochange News & Features, October 2009
<urn:uuid:6325c38b-7f5b-4153-9540-46ea973e92c7>
CC-MAIN-2013-20
http://infochangeindia.org/environment/news/greenhouse-development-rights-and-global-carbon-budgets.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.950729
1,164
3.234375
3
The Ancient Forests of North America are extremely diverse. They include the boreal forest belt stretching between Newfoundland and Alaska, the coastal temperate rainforest of Alaska and Western Canada, and the myriad of residual pockets of temperate forest surviving in more remote regions. Together, these forests store huge amounts of carbon, helping tostabilise climate change. They also provide a refuge for large mammalssuch as the grizzly bear, puma and grey wolf, which once ranged widelyacross the continent. In Canada it is estimated that ancient forest provides habitat forabout two-thirds of the country's 140,000 species of plants, animalsand microorganisms. Many of these species are yet to be studied byscience. The Ancient Forests of North America also provide livelihoods forthousands of indigenous people, such as the Eyak and Chugach people ofSouthcentral Alaska, and the Hupa and Yurok of Northern California. Of Canada's one million indigenous people (First Nation, Inuit andMétis), almost 80 percent live in reserves and communities in boreal ortemperate forests, where historically the forest provided their foodand shelter, and shaped their way of life. Through the Trees - The truth behind logging in Canada (PDF) On the Greenpeace Canada website: Interactive map of Canada's Borel forest (Flash) Fun animation that graphically illustrates the problem (Flash) Defending America's Ancient Forests
<urn:uuid:8b41dac0-bc58-4cef-9f95-8333e7c91598>
CC-MAIN-2013-20
http://www.greenpeace.org/international/en/campaigns/forests/north-america/?tab=0
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.906006
298
3.9375
4
Many manufacturing plants employ compressed air systems in one capacity or another, and, for the most part, these systems provide similar output. While all compressed air might be the same, the engineering of that air is not. The needs of a petrochemical plant are quite different from those of an automobile manufacturing plant. Application-specific engineered air addresses those different needs. Engineered air describes compressed air tailored to meet specific industry needs—100 percent oil-free, particulate filtered, and reliable. It goes beyond the simple output of compressed air at a specified pressure pounds per square inch. Engineered air provides the right type of air for the right application. A good example of this concept put into practice is work done at a North American ethylene plant. Ethylene processing plants use compressed air systems in a number of ways. Air powers pneumatic tools used in general maintenance, and it is employed for other plant operations, such as blow-down and dry-out. Blow-down uses compressed air to clear pipes and vessels of debris and blockage, while dry-out uses compressed air to remove moisture from pipes prior to ethylene processing. Ethylene plants also use compressed air combined with steam to remove the coke build-up in the cracking furnaces. Scheduled periodic removal of this solid build-up allows the overall ethylene processing operations to run more efficiently. Recently, a world-scale North American ethylene plant was undergoing a major expansion project that required a specially designed compressor system to handle the additional requirements. With this major expansion underway, it was vital that this new system provide absolutely reliable engineered air. In order to ensure the most dependable compressed air source possible, the compressor package included a custom-designed compressor with a high-tech control system, meeting requirements for durability and reliability, accessibility and maintainability, and high level of control (Fig. 1). The base design for this customized system also had to meet stringent API 672 standards for packaged, integrally geared centrifugal air compressors for petroleum, chemical, and gas industry services. Durability and reliability A baseload ethylene plant is the lynchpin of any petrochemical manufacturing complex. Ethylene is the building block and feedstock for all the downstream feeder plants. A baseload plant is expected to run continuously, maximizing efficiencies and minimizing costs. Downstream plants totally rely on the plant to provide a continuous supply of feedstock—in this case ethylene. This is one of the key reasons the compressor system had to be designed to be extremely durable. To ensure this durability, the customized air compressor features self-adjusting tilting pad journal bearings that can adapt to load changes, providing stability, as well as double-acting thrust bearings to accommodate all load conditions. In addition, the system features stainless steel impellers, resistant to corrosion and erosion. All of the compressor systems had to run reliably also. An unplanned shutdown would have an adverse impact on the entire petrochemical complex manufacturing capabilities. The compressor was built with a redundant oil system, helping eliminate the possibility of system failure, allowing the ethylene plant to meet its availability targets (Fig. 2). Within an air compressor, the oil pump is the heart of the lubrication system; it is what keeps the machine running smoothly. If the pump breaks down, the machine comes to a grinding halt. To avoid this, we included not one, but two full capacity, full pressure pumps in the design—one motor-driven auxiliary and the other a shaft-driven main. During regular operations, the shaft-driven main is operating, while the motor-driven auxiliary is on perpetual standby for emergency situations, providing additional overall package protection. Without this redundant system, in the event of an oil system malfunction, the entire compressor system needs to be shut down. The redundant system eliminates downtime and provides a reliable source of engineered air. Accessibility and maintainability In order to keep the plant’s compressor system running efficiently and reliably, it was essential to design the unit for maximum accessibility and maintainability. While requiring additional time and attention from plant engineers, scheduled cleaning and maintenance are a sound investment. As with all other plant operating systems, compressed air systems that have a planned maintenance program are less likely to have unexpected breakdowns. Simply put, less downtime allows for more production. In addition, consistent cleaning and maintenance practices help keep wear and tear to a minimum. This ultimately saves money in replacement parts. The intercooler design is an example of the ease-of-maintenance design philosophy. Within a compressor intercooler, both U-shaped and straight intercooler tubes are industry practice. However, straight tubes are easier to clean than those with a U-bend design. An engineer can simply remove the water piping, unbolt the water box, and rod the tubes in place. Rodding is not possible with U-bend tubes found in some compressors. In addition, intercooler tubes with a water-in-tube design are easier to clean and maintain than those with an air-in-tube design that require wire brush or chemical bath cleaning. This compressor features straight intercooler tubes with water-in-tube design for this very reason. The longer it takes to clean the intercooler, the longer engineered airflow is down. Another example of important compressor components that benefit from diligent inspection and maintenance are journal and thrust bearings. These bearings help provide a stable and near frictionless environment to support and guide the rotating shaft. Properly installed and maintained, these bearings can last for extended periods of time. However, regularly scheduled inspections and maintenance keep them running reliably. The ethylene plant’s compressor features horizontally split bearings, which are easy to maintain, inspect, and replace. An engineer simply removes the top half of the gear case to service. No other disassembly is required. Interchangeability of parts is another factor taken into consideration when designing the ethylene plant’s compressor system. Interchangeability contributes heavily to ease of maintenance. Interchangeable parts save time and money. Multiple stage air compressors use a bull gear and pinion system to power the impellers at each stage of air compression. The quality of the bull gears used directly determines whether they are interchangeable. The customized compressor uses high precision AGMA Quality 13 gears. The American Gear Manufacturers Association (AGMA) provides established gear quality ratings, ranging from 3-15. These numbers signify the quality levels, or standards, developed by the AGMA that differ per application. AGMA Quality Level 13 gears, otherwise known as aircraft-quality gearing, are generally regarded as high-precision gears. They provide lower noise levels and, under normal operating conditions, have a longer performance life. More importantly, though, they provide interchangeability. If the gear is AGMA Quality Level 12 or below and any one of the three pieces needs to be replaced, all three pieces—one gear and two pinions—need to be replaced. However, with Level 13 gears, rather than remove and replace all three pieces, the plant engineer needs to swap out only the component in question. This saves time and money in unnecessary replacement parts. High level of control The operation of multiple compressors feeding into a single plant air system needs to be coordinated, monitored, and controlled in order to accommodate various applications. An initial investment in innovative monitoring technology can ultimately pay for itself. With that in mind, the customized compressor can be accommodated with a PLC-based automatic sequencer, which permits up to eight compressor units to communicate with one another and operate in sequence according to a programmed schedule. High-tech PLC-based automatic sequencers are capable of monitoring and matching compressor supply to demand. For example, they can select which compressors to use at any given time, shutting down those compressors not necessary to plant operations, even choosing back-up units if needed. By turning multiple compressors into one, an automatic sequencer can ensure stable system pressure, which allows the entire operation to run as efficiently as possible, saving both time and money. In addition, a PLC-based modular control system allows for remote monitoring and diagnostic checks on the compressed air systems, helping to predict and prevent any systems malfunctions that could result in stoppage of engineered air. This can save money on repairs and replacements, as well as lost production time. The most cost-effective systems, like the FS-Elliott Regulus control system, provide state-of-the-art technology and ease-of-use. The ideal control system should feature an easy-to-operate touch screen with a graphic color display. These features allow operators to view easy-to-understand graphics while monitoring the plant engineered air systems. An advanced system also provides easy adjustment of set-points and control mode changes using the touch screen. These flexible controls are fully adaptive, changing to meet the plant’s application-specific needs. The control system also stores and logs operating data used for trend monitoring and preventive maintenance. This feature permits engineers to monitor and predict trends in their engineered air systems and act before problems arise. Extended monitoring of vital parameters is important for equipment protection, saving money in maintenance and avoiding repairs. Ethylene plants are extremely energy conscious. A systems operation closer to surge lines saves power and minimizes wasteful unloading, while lower set-points and precise control minimizes energy usage. The advanced control system is able to make more efficient use of the ethylene plant’s manpower. With easy-to-use remote control and monitoring capabilities, this system can reduce the tasks of the ethylene plant operators, allowing them to shift focus to other plant responsibilities. An engineered air system is created with specific plant applications in mind, to increase reliability and efficiency. The custom-engineered compressor we installed at the ethylene plant was designed with the following key points in mind: • Durability and reliability—A robust engineered design combined with key system redundancies. • Accessibility and maintainability—Moving parts designed with ease of access and maintenance in mind. • High level of control—High-tech control systems provide for efficient operation and allow plant operations to predict and prevent possible problems.
<urn:uuid:863d52a7-c90a-4ece-af73-83a6b85a033c>
CC-MAIN-2013-20
http://www.mt-online.com/july2005/compressor-configuration-supports-maintenance-and-reliability-needs?Itemid=90
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930301
2,094
2.625
3
At the heart of the celebration of Thanksgiving is the idea of 'giving thanks' but the main attraction of this festival is the tradition of family gathering for sharing the Thanksgiving dinner and eating turkey on this holiday. It is well known that the turkey has a delicious history and it is considered as the favorite bird of the Americans. But there are even more interesting and fun facts about this bird, which can surprise you. Here we are with our collection of various facts about turkey as Turkey Trivia. Turkeys originated in North and Central America. Usually the turkeys are found in hardwood forests with grassy areas but they are capable of adapting themselves to different habitats. Turkeys spend the night in trees. You can easily see a turkey on a warm clear day or during light rain. Turkeys fly to the ground at first light and feed until mid-morning. Feeding resumes in mid-afternoon. Turkeys start gobbling before sunrise and generally continue through most of the morning. The field of vision of wild turkey is so good that it is about 270 The wild turkey has excellent hearing. A spooked turkey can run at speed up to 20 miles per hour. A wild turkey can run at speed of up to 25 miles per hour. A wild turkey can fly for short distances at up to 55 miles per hour. Domesticated turkeys or the farm-raised turkeys cannot fly. Turkeys were one of the first birds to be domesticated in the America. The male turkeys are called 'tom', the female turkeys are called 'hen' and the baby turkeys are called 'poult'. The male turkeys gobble whereas female turkeys make a clicking noise. The male turkeys gobble to attract the female turkeys for mating. The gobble is a seasonal call made during the spring and fall. A mature turkey generally has around 3,500 feathers. The Apache Indians considered the turkey timid and wouldn't eat it or use its feathers on According to an estimate, during the Thanksgiving holiday more than 45 million turkeys are cooked and around 525 million pounds of turkey is About ninety-five percent of American families eat turkey on the Thanksgiving Day whereas fifty percent eat turkey on Christmas holiday. Almost fifty percent of Americans eat turkey at least once every 2 According to the National Turkey Federation about twenty-four percent of Americans purchase fresh turkeys for Thanksgiving and seventy percent purchase frozen turkeys. North Carolina is the number one producer of turkeys. It produces around 61 million turkeys per year. Minnesota and Arkansas are second and third number producers of turkey. The part of the turkey that is used in a good luck ritual is known as The red fleshy growth from the base of the beak that hangs down over the beak is called 'snood'. It is very long on male turkeys.
<urn:uuid:28acfa4a-0db4-426a-bb67-f29d077c98f7>
CC-MAIN-2013-20
http://www.thanksgivingnovember.com/turkey-facts.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953793
607
3.15625
3
Blue Ocean Research & Conservation Discovering the Ocean Our scientific research has focused recently on an often overlooked yet ecologically important part of many ecosystems–sponges. Numbering over 8000 species, they are common to many aquatic habitats from the Ross Shelf in Antarctica, Lake Baikal in Russia, rocky reefs in South Africa, to coral reefs throughout the Caribbean. Sponges are critical to coral reef survival. Sponges filter and clean the water, provide shelter for commercially important species like juvenile lobsters, and are eaten by many fish and turtles. On many coral reefs, sponges outnumber corals, with sponges providing three-dimensional structure that creates habitat and refuge for thousands of species. Because of their large size and kaleidoscope colors, sponges help fuel the popular and lucrative diving and tourism industries. As climate change results in warmer, more acidic oceans, all marine life is potentially affected. It is well-known that coral health declines under these conditions, but the effect on sponge growth and survival is unknown. Significant declines in sponge health and biomass would be catastrophic to coral reefs, reducing water quality and severely impacting thousands of species from symbiotic microbes to foraging hawksbill turtles. A major loss of sponges would not only negatively impact marine life, but also local communities that depend on reefs for coastal protection and food. Blue Ocean’s research scientist, Dr. Alan Duckworth, studied the effects of warmer, more acidic waters on the sponge Cliona celata, which bores into the shells of scallops and oysters, weakening and eventually killing them. Alan hypothesized that because climate change will result in shellfish having weaker shells, these sponges could cause greater losses of shellfish. This study has been done in collaboration with Dr. Bradley Peterson of Stony Brook University. Alan’s other area of study was the first climate change experiment focused on tropical sponges. It investigated the effects of warmer, more acidic water on the growth, survival, and chemistry of several Caribbean coral reef sponges. This study was based at the Discovery Bay Marine Lab in Jamaica and chemical analysis of sponge samples was completed by Dr. Lyndon West from Florida Atlantic University. Putting Teeth in Shark Conservation The goal of this fellowship is to help small, island nations by strengthening their ability to identify illegal shark fishing and enforce recently established shark sanctuaries. It will help provide much needed scientific research, training, outreach and DNA-testing tools which can then be used to help protect valuable marine sanctuaries worldwide.
<urn:uuid:eeb90433-e247-4f67-89ff-aa11c0db8add>
CC-MAIN-2013-20
http://blueocean.org/programs/blue-ocean-research/?imgpage=1&showimg=491
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939833
525
3.703125
4
A jet owned by the German Air Research Center, which is equipped with devices and sensors to analyze the ash emitted by the volcano in Eyjafjallajökull glacier in Iceland, arrived in the country yesterday. “The jet can tell us about the distribution of the ash and it can, to a certain degree, fly into the ash cloud, although it cannot be exposed to too much ash,” Haraldur Ólafsson, professor in meteorology at the University of Iceland, told Morgunbladid. On their way to the country, the crew of the test jet didn’t notice much ash above Iceland’s southwestern corner. The jet took a few dives above Eyjafjallajökull to collect samples, which will be analyzed today. Ólafsson said it is clear that the ash level will be low. The jet will go on another expedition today and is expected to return to Germany on Sunday. The cost of the expeditions, approximately ISK 30 million (USD 233,000, EUR 175,000), will only be covered by Iceland to a small extent—the largest part will be paid for by the German Ministry of Transport and the British Meteorological Office. Ólafsson explained that significant interests are at stake. “In the past days the forecasts that have come from the British Met Office have been rather bleak and more pessimistic than what considered reasonable compared to the current situation of the eruption”. “The reason [for the testing] is that it is costly to close the airspace and it is very important to have confirmation of whether there is a real danger,” Ólafsson said, adding that the risk factor of ash in the atmosphere has never been analyzed directly before. “It has been evaluated visually. People have measured the height of the ash plume on radars and visually from airplanes,” Ólafsson explained. “Significant uncertainty lies in these measurements, which explains why the forecasts have been questionable”.
<urn:uuid:a9c031d3-4730-400b-b4cd-d65af94eebe9>
CC-MAIN-2013-20
http://luishipolito.blogspot.com/2010_04_30_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958443
428
2.796875
3
The European Union runs into roadblocks in its plans for Kosovo WHEN the Austro-Hungarian empire declared war on Serbia in July 1914, few could have imagined that the result would be the demise not only of the Habsburg empire, but also of the Russian and Ottoman ones. Nobody believes that Serbia's challenge to the European Union over Kosovo will be anything like as dramatic; most Serbs want to join the EU, not destroy it. Yet 100 days after Kosovo declared independence, Serbia has done a lot better than anybody expected in thwarting the EU's plans for it. Serbia still regards Kosovo as a province, but the ethnic Albanians, who constitute over 90% of its 2m people, declared its independence in February. So far 41 countries have recognised Kosovo, including America and 20 of the EU's 27 members. But five of these are microstates like Nauru and the Marshall Islands. And such big hitters as Brazil, China, India and Russia have not recognised the new country. Nor have Spain, Egypt or even most Muslim countries. Since the end of the war in 1999, Kosovo has come under the jurisdiction of the United Nations. Legally the last word in its government accordingly lies with the head of the UN mission in Pristina. When Kosovo declared its independence, the EU authorised the establishment of a big new police and justice mission named EULEX. With the Americans and others, it also set up the office of the international civilian representative (ICR), investing him with sweeping powers. On June 15th Kosovo's new constitution is due to come into force. It foresees no role at all for the UN. But legal and technical problems mean that the EULEX mission has been postponed. As for the ICR, whose (Dutch) head, Pieter Feith, is also the EU's special representative in Kosovo, one UN official scoffs, “He and his team are here as tourists. What are they doing? They can't take over the role they were assigned, as we are still here.” Since independence the Belgrade government has consolidated its grip on Serbian areas of Kosovo, including almost all of the region north of Mitrovica. It even held local elections, condemned as illegal by the UN, the EU and the ICR. EULEX and the ICR will be unable to operate in these areas. De facto, Kosovo is thus divided not only into Serb and ethnic-Albanian areas, but also into places where the UN will keep operating and the ethnic-Albanian areas where EULEX and the ICR will probably take over. For the EU, says one diplomat, “It is a face-saving operation now. Their plan has been derailed.” As the June 15th deadline nears, meeting after meeting is taking place to try to resolve the impasse. The UN's future role is now utterly unclear because, as the joke has it, everyone is “waiting for Ban”. Under pressure from all sides, the UN secretary-general, Ban Ki-moon, has done little beyond prohibiting the transfer of cars, buildings and equipment to EULEX and the ICR. The Russians recently warned him that any notion that he might try to resolve the problem without the approval of the UN Security Council (and thus of Russia) was “out of the question”. Attempts are now being made to square the circle by seeing if EULEX could somehow come under the UN's legal authority, but so far no progress towards a deal has been made. What is becoming distressingly obvious to Kosovo's Albanians is that, despite declaring independence, their future is still tied to Serbia's. Keen to gain more recognition, they are making little fuss. But Mr Feith says “they need to be given some comfort that their interests are being taken care of.” If they don't get it, he sees trouble ahead.
<urn:uuid:e1eb904f-58e0-4961-a924-9b16e32ee522>
CC-MAIN-2013-20
http://savekosovo.org/default.asp?p=10&sp=507
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.976693
810
2.546875
3
Considering the fact that half of you reading this right now are probably wearing one, It’s only right to start this week off with the most commonplace of all acronymic items– the OCBD (oxford cloth button down.) While the latter half is attributed to the shirt’s button down collar, Oxford Cloth itself has a far less straightforward explanation. As the last remaining fabric from a series of four, Oxford cloth’s story is one of inexplicable survival. In the late nineteenth century a Scottish Mill designed and produced four cloths, one for each of the world’s most distinguished universities. While Harvard, Yale, and Cambridge all had their respective cloths lost to history, for reasons unknown Oxford endured becoming one of the most widespread fabrics in the world. Oxford cloth is created by weaving together two yarns that are of the same color but just a shade different, giving it a marled texture that breaks from the ordinary aesthetic of a solid dress shirt. Oxford Cloth shirts were originally perceived to be a piece of formal wear and were exclusively worn as part of a suit. This all began to change in 1896, when John E. Brooks, (the grandson of Henry Sand Brooks, the founder of Brooks Brothers’) went to England and noticed that polo players were wearing shirts with button down collars to keep them secured during games. Brooks brought the design back to the states, and Brooks Brothers combined the button down collar with oxford cloth to create the OCBD. They remained a relatively formal shirt until the 1930′s, when tennis and polo players began wearing Oxford cloth button downs during their games. While these were still unequivocally upper class sports, they nonetheless placed the Oxford shirt in an entirely new context, and by the 50′s Ivy League undergrads were wearing OCBD’s. For the students, and their limited wardrobes, the versatile shirts were a major asset. OCBD’s could not only be worn untucked on weekends, or with a jacket when going out, the shirts relaxed basket weave also allowed them to be worn pretty much year round. Today, practically every company produces their version of the OCBD, and they’re somewhat of a collectors item, not because they’re rare but because you can never collect too many.
<urn:uuid:3b3f48d0-8498-4c5d-bfbb-b21e74196693>
CC-MAIN-2013-20
http://wax-wane.com/2012/05/14/ocbd-the-enduring-everyday-shirt/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.968079
471
2.734375
3
|BEING PREPARED - READ ONLINE| Winter storms may include strong winds, heavy snow, sleet, freezing rain, ice and/or extreme cold. Storms often knock out power, down trees, and make roads impassable for days. The weight of snow and ice can collapse buildings. Winds descending off mountains can reach 100 miles per hour. Ice jams in rivers can lead to flooding, and snow in the mountains can become an avalanche. Winter storms are called deceptive killers because most deaths are only indirectly related to the storm. Nearly seventy percent of all deaths from ice and snow are due to traffic accidents on icy roads. The remainder are from exposure of people caught out in the storm, hypothermia, dehydration, and heart attacks from over exertion. What constitutes extreme cold varies in different areas of the country. In southern and coastal areas, both the people and the buildings are unused to winter weather. Extreme cold may mean temperatures just below freezing (32 degrees Fahrenheit) because it damages crops, bursts pipes, brings down power lines and threatens people living in houses with inadequate heat. In the north and Midwest, winter storms are expected and few would consider it extreme cold unless the temperatures are below zero. The safest place to be in a winter storm is in a building. If you live in an area that has severe winters, your house should be prepared. Start with an outdoor thermometer that is easily readable from inside the house. As winter approaches, install storm windows or staple over windows with strong plastic sheeting to improve insulation. Windows should also have heavy draperies that can keep out the cold. Insulate outside walls, attics and crawl spaces. Weather strip all doors. Wrap or insulate water pipes to prevent freezing. Remove and store hoses and cover the hose nipples until spring. Make sure your furnace is working properly and check all fireplaces or other secondary heating systems. As a bonus, all this will save you money on your heating bills. As a winter storm approaches, there are additional preparations. Make sure that you have food and water for a week because it may be difficult to get out for several days after the storm passes. Fill your car with gas and check your emergency supplies. If you live in an area where winter storms are unusual, you may need to bring in hoses, wrap pipes and cover windows to improve your insulation. During the storm, stay inside. Even if you lose power and heat, you will be safer in the house than in a car. Wear several layers of loose fitting, light weight, warm clothing so you can adjust to the temperature in the house. Wear socks and shoes. Get out mittens and a hat that covers your ears to use if you need them. Eat regularly and drink plenty of water, broth or juice to avoid dehydration. Avoid alcohol and caffeine since they make hypothermia and dehydration worse. Reduce the temperature in the house to conserve fuel: 65F in the day and 55F at night. There will be very high demand on the natural gas and electricity distribution systems. If you use oil, your tank could run dry before you can get it refilled. When using alternative heat from a fireplace, wood stove or space heater, follow all fire safety rules and ventilate properly to prevent carbon monoxide poisoning. Keep a fire extinguisher or bucket of water near the fire in case it gets out of control. Open cabinet doors under sinks to keep the pipes warm and let all faucets drip a little to keep the water lines from freezing. If a pipe freezes, use a hair dryer to thaw it out gently, never a torch. Heat only the areas of your house that you are using. If you lose heat, move everyone into one room to conserve what heat you can. Use an interior room with few doors or windows. A bedroom or dining room is usually a good choice. Seal off drafts by putting blankets over windows and towels under doors. Walk around or exercise to generate body heat and maintain circulation. Sleep in shifts. At least one person should stay awake at all times to make sure the others are alright. Watch for signs of hypothermia such as slurred speech, disorientation, or uncontrollable shivering. Let the authorities know that you are in trouble so they can get to you as quickly as possible after the storm. Try to make sure your car will continue to work if you need it. Winterize your car in the fall. Keep the battery and ignition system in top condition, and keep the battery terminals clean. In long periods of severe cold, cars will be hard to start in the morning. If you don’t have an engine warmer, you can keep the car warm the same way you keep a person warm. Every few hours, start the car and run it until it is warm. Make sure the garage door is open to avoid carbon monoxide. When the car is warm, turn it off and close the garage. Put blankets over the hood and radiator. This holds in the engine heat and keeps the car warm enough to restart. Use public transportation instead of your car, if public transportation is available. If you must drive in a winter storm, be very well prepared. If the car is parked outside, clean the ice and snow off the hood, roof, trunk and lights, as well as the windows. Warm up the car outside, never in the garage. Plan your route carefully, stay on main roads and plan alternatives if some roads are impassable. Call ahead so you are expected. Give your route and estimated time of arrival. If possible, travel with at least two people in the car and travel only in daylight. If you have a choice of vehicles, take the one that is most brightly colored. Drive for the road conditions: do not speed; be cautious about passing; and remember that patches of ice can be virtually invisible. Make sure the car is fit for the road. In bad conditions, you should have snow tires or chains. Keep the car at least half full of gasoline and top it off before the storm hits. This reduces the chance of icing in the fuel line. Wear polarized sunglasses to reduce glare. Carry a cell phone and keep in touch with those at your destination. Keep emergency supplies in the car all winter long. Along with the usual car emergency kit, you should have supplies for being stranded in the snow. These include several gallons of water, high calorie non-perishable foods, blankets, a change of clothes for keeping dry, a bright colored flag for the antenna or window, sand or cat litter for traction, a shovel, a windshield scraper, and a large coffee can with lid and toilet paper for sanitation. If you get stuck in the snow, turn the steering wheel from side to side to clear away some of the snow. Accelerate slowly and see if you can get the car moving again. If this does not work, use the shovel to dig out the drive wheels and put some sand or litter under them for traction. If neither of these works, you are stuck. If you have to stop, stay in your vehicle. You will quickly become disoriented in snow and cold. Try to find a place where you are partially protected by an overpass or tree line. Make the car as visible as possible: set out flares or triangles; lift the hood; put a brightly colored cloth or flag on the antenna or window; clear snow off the roof. Leave the overhead light on so you can be seen at night unless this appears to be running down the battery. In remote areas, spread a large cloth or the trunk mat on top of the snow to attract the attention of rescue planes. Clear the snow away from the exhaust pipe, open the two front windows about 2 inches and run the engine and heater for 10 minutes out of every hour. This is usually enough to keep the occupants warm while conserving fuel and reducing the risk of carbon monoxide poisoning. Listen to the radio, charge the cell phone and turn on the emergency flashers while the motor is running. Roll the windows up just before turning off the engine. If you feel drowsy or nauseated, turn the engine off immediately. Conserve as much body heat as possible. Wear all the dry clothing you have available. Huddle together if there is more than one person in the car. Use maps and newspapers as added insulation under the blankets. If they are dry, put the floor mats under you on the seat to insulate your back side. Keep your hands and feet inside your clothing and cover your head and ears. Keep your circulation going and generate body heat by doing isometric exercises. Contract muscles in your arms and legs rhythmically. Clap your hands and move your legs. Sing and dance to the music in your seat. If there are two people in the car, alternate brief periods of sleep. You need to reawaken and exercise periodically. Don’t go outdoors in a winter storm unless it is absolutely necessary. If you must go out, prepare very carefully. Stretch and warm up before going out. If you are shoveling snow, pushing a car, or walking in deep snow, you are doing heavy exercise. Avoid over exertion and take frequent breaks to warm up. Do not work up a sweat as this can lead to chilling and hypothermia. If you develop chest pain or shortness of breath stop immediately and go inside since these may be signs of a heart attack. Walk carefully. Falling on ice can cause disabling injuries. If you are caught outside in a snow storm, the first thing to do is find shelter. If you can get to a building or a car, go immediately. If you are too far away from existing shelters, try to build a shelter. Prepare a lean-to, wind-break or even a snow cave for protection from the wind. Build a fire in the open for heat and as a signal to rescuers. If you can place rocks around the fire they will absorb and radiate heat to keep you warmer. Curl up and cover all exposed parts of your body to preserve heat and prevent frostbite of your fingers and toes. Stay as dry as possible. In extreme cold, do not let yourself go to sleep. If you feel drowsy, start exercising. This will wake you up and increase your body heat. Once the snow storm has passed, do whatever you can to make yourself visible to rescuers. Dig out your car or tent so it shows up against the snow. Get out from under trees. Use a bright cloth as a flag. Stamp out “HELP” or “SOS” in the snow. Write the message with tree limbs or stones or anything that will show up against the snow. Don’t over exert yourself and don’t try to walk out. Let help come to you.
<urn:uuid:c2a8943d-5474-4fef-823c-53dee1fe336e>
CC-MAIN-2013-20
http://www.dr-kate.com/prepare/winter.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942737
2,222
3.578125
4
You have always heard that in ancient times salt was like gold, but why is that? Salt is the original preserving mean. Meat cured in salt doesn’t spoil, cheese soaked in brine lasts longer, and those foods could then be stored for long travels, colder months, or times of famine. Cervia, a small town on the Adriatic coast of Italy whose main trade has traditionally been in salt, has always been considered a prized domain by the Pope State exactly for this reason. Salt has been for a very long time a state monopoly in Italy, so all production was sent to be repackaged at a central government facility. Only in the past five years the salt monopoly has been lifted, allowing salt producing facilities to brand their products. So, instead of getting whatever salt you can get at the Sali e Tabacchi store (the designated monopoly outlet where you buy all tobacco products and lottery tickets- and where you used to buy salt as well!) you can pick a local salt, from a given salt pond. Since Cervia is about 2 miles from my hometown, smack in the heart of Romagna, I am partial to Cervia’s salt! The salt ponds in Cervia are fortunately alive and well. They survived modernization and mechanization, and some of the ponds are still harvested by hand, making for an extraordinary open air museum of salt heritage! Sal Fiore (flower salt, the same fleur de sel of French celebrity) is a fine sea salt, still called sale del papa (Pope’s salt), as traditionally the first harvested salt was delivered to Rome to be used on the Pope’s table. Given this important historic background, the salt producers in Cervia decided to brand their salt as Sale Dei Papi, the Popes’ salt. An important name! In 2004, Slow Food recognized Salina Camillone (a salt pond, pictured above) as a Presidia, to preserve the production, harvesting methods and the quality of the product. Two salts are then recognized as the diamond head of Cervia’s production: the Salina Camillone salt and the Salfiore di Romagna, the Popes’ Salt. Both Salina Camillone salt and Sal Fiore are completely natural: they dry by sunlight, and no additivies or anti-caking agents are added to the final product- not even iodine, as sea salt naturally has it! Sal Fiore is a fine salt, the first one to be harvested in the traditional method, and it’s a perfect finishing salt, as its crunchy texture and sharp sea taste make for an interesting touch on salads and steamed vegetables. The salt from Salina Camillone is instead very coarse, harvested by hand in limited uquantities every day, from June till September. The Camillone salt pond has been harvested in the same way since Roman times, and the salt it produces is somewhat more humid than other sea salts, making for a terrific ingredient in salt crust recipes. Cervia’s salt is still an artisanal product, not widely available on the shelves- even in Italy! You can find it mainly online, at the official website of the Saline di Cervia, or at this other small online shop, based on the East Coast, Olive Nation. Corti Brothers also carries it online, and the website carries an extensive history of the product! Filed under: Traditional Foods
<urn:uuid:461f9da8-f203-4916-9fa3-4ff7a74bdf9c>
CC-MAIN-2013-20
http://www.italyinsf.com/2008/10/15/the-salt-of-the-popes/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.953429
722
2.6875
3
August 20, 2012 - coddle (verb) - What does it mean? - : to treat with extreme care : pamper - How do you use it? - "Big Ma was not one for coddling any of us, but now she turned from the stove and, wiping her hands on her long white apron, sat down on the bench and put her arm around Little Man." (Mildred D. Taylor, _Roll of Thunder, Hear My Cry_) - Are you a word wiz? The "pamper" sense of "coddle" comes from an earlier meaning that had to do with a special kind of careful treatment given to something delicate. What do you think was treated so carefully?We're not going to coddle you, just tell you that A is the right answer. When "coddle" first came to be part of the English language around 1600, the word meant to cook something slowly and gently in water that is just below the boiling point. Usually eggs are what's being cooked when "coddle" is used in this sense today, but when "coddle" was first being used, other foods, especially fruit, were also cooked by coddling. Because coddling is a very gentle way to cook something, such gentle treatment led to the extended meaning of "to treat with extreme care, pamper."
<urn:uuid:92291440-6656-4b85-926f-62b7ed483777>
CC-MAIN-2013-20
http://www.wordcentral.com/buzzword/buzzword.php?month=08&day=20&year=2012
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707435344/warc/CC-MAIN-20130516123035-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978531
294
2.75
3
From cave paintings to the internet NOV 03 2008 A fantastically extensive timeline of recorded information "from cave paintings to the internet". It's an expanded version of the timeline that appears in the book, From Gutenberg to the Internet (more info), which seems really interesting. From Gutenberg to the Internet presents 63 original readings from the history of computing, networking, and telecommunications arranged thematically by chapters. Most of the readings record basic discoveries from the 1830s through the 1960s that laid the foundation of the world of digital information in which we live. These readings, some of which are illustrated, trace historic steps from the early nineteenth century development of telegraph systems -- the first data networks -- through the development of the earliest general-purpose programmable computers and the earliest software, to the foundation in 1969 of ARPANET, the first national computer network that eventually became the Internet. The readings will allow you to review early developments and ideas in the history of information technology that eventually led to the convergence of computing, data networking, and telecommunications in the Internet. (via design observer)
<urn:uuid:4e7a8e6d-f7ba-4ecd-b3f2-a50a7b624a82>
CC-MAIN-2013-20
http://kottke.org/08/11/from-cave-paintings-to-the-internet
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.92552
219
2.671875
3
The riveting story of the two crusading lawyers who led the legal battle to end segregation, one case and one courtroom at a time. The Supreme Court’s decision inBrown v. Board of Educationis widely considered a seminal point in the battle to end segregation, but it was in fact the culmination of a decades-long legal campaign.Root and Branchis the epic story of the two fiercely dedicated lawyers who led the fight from county courthouses to the marble halls of the Supreme Court, and, in the process, laid the legal foundations of the civil rights movement. Charles Hamilton Houston was the pioneer: After becoming the first African-American on theHarvard Law Review, he transformed the law school at all-black Howard University into a West Point for civil rights advocacy. One of Houston’s students at Howard was a brash young man named Thurgood Marshall. Soon after Marshall’s graduation, Houston and Marshall opened the NAACP’s legal office. The abstemious, proper Houston and the folksy, easygoing Marshall made an unlikely duo, but together they faced down angry Southern mobs, negotiated with presidents and senators, and convinced even racist judges and juries that the Constitution demanded equal justice under law for all American citizens. Houston, tragically, would die before his strategy came to fruition in the Brown suit, but Marshall would argue the case victoriously and go on to become the first African-American Supreme Court justice—always crediting his mentor for teaching him everything he knew. Together, the two advocates changed the course of American history.
<urn:uuid:26f231c5-78b0-4482-94e2-d50166564117>
CC-MAIN-2013-20
http://ls2content.tlcdelivers.com/content.html?customerid=735&requesttype=text-summary&button=false&isbn=9781596916067&upc=
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.956707
323
3.4375
3
Nordic Cool 2013: Literature Panel: The Secret Behind the Northern Lights In this interactive session, Norwegian solar physicist Pål Brekke utilizes photos and video footage from NASA satellites to discuss the visual phenomenon known as the Northern Lights. - Sat., Mar. 2, 2013, 10:30 AM - Terrace Gallery Please use the event calendar to search for current events. For the duration of Nordic Cool 2013, the Terrace Gallery will become the Cool Club, an extension of the Nordic Design Illustrated exhibition. The Cool Club will feature the iconic Arne Jacobsen Series 7 chairs, on loan from Fritz Hansen, the Embassy of Denmark in Washington, D.C., and Furniture from Scandinavia, and a new curtain made from fabric by Marimekko. For thousands of years, people in the northern part of the world have marveled at the spectacular and fearful displays that occasionally light up the northern sky. Award-winning Norwegian solar physicist Pål Brekke has published several popular books about the Sun and the aurora borealis, including the most recent, Our Explosive Sun and The Northern Lights: A Guide. One of the foremost scholars on the subject, Mr. Brekke has spoken multiple times to full houses at the Smithsonian and elsewhere. In this interactive session, he will utilize photos and video footage from NASA satellites to discuss the visual phenomenon known as the Northern Lights. This panel will be moderated by Joseph M. Davila, an Astrophysicist in the Solar Physics Branch at NASA's Goddard Space Flight Center in Greenbelt, MD. Part of Nordic Cool 2013. Joseph M. Davila, USA (Moderator) Joseph M. Davila is an award-winning astrophysicist in the Solar Physics Branch of the Laboratory for Astronomy and Solar Physics at NASA-Goddard Space Flight Center. Dr. Davila earned a BS in Mechanical Engineering from Lamar University, Beaumont, TX in 1972, a BS in Physics from the University of California, Irvine in 1978 and a PhD in Astronomy from the University of Arizona in 1982. His research interests have included the linear and non-linear theory of hydromagnetic waves; hydromagnetic instabilities due to energetic particle beams, resonance absorption in inhomogeneous plasmas, the acceleration of high speed wind streams in solar and stellar coronal holes, and plasma heating in closed magnetic structures. Dr. Davila has also published research on the acceleration of cosmic rays, the transport of energetic particles within the Galaxy, the modulation of Galactic cosmic rays by the solar wind, and the propagation of solar cosmic rays in the interplanetary medium. Pål Brekke, Norway Pål Brekke received a Dr. Scient degree in 1993 from the University of Oslo and he participated on behalf of Norway in the pre-launch activities for the NASA/ESA Solar and Heliospheric Observatory (SOHO) mission. After the launch of SOHO in December 1995, he was part of the science operation team at NASA Goddard Space Flight Center. In 1999, he joined the European Space Agency (ESA) as the SOHO Deputy Project Scientist stationed at NASA/Goddard Space Flight Center. While there he was also responsible for outreach and media activities making SOHO into one of the most well-known current satellite projects with more than 60 million hits per month on their web page. Currently, he works as a senior advisor at the Norwegian Space Centre in Oslo and as an adjunct professor at the University Center at Svalbard (UNIS). He is a Norwegian delegate to the ESA Science Programme Committee and a delegate to the International Living with a Star. He is the recipient of a Fulbright Fellowship, ESA's Exceptional Achievement Award, and the Laurels for Team Achievements from the International Academy for Astronautics. He is an internationally known lecturer and author of several popular science articles and books - the latest Our Explosive Sun (Springer 2012). He will be coming out with a new book in January tailored toward tourists, visitors, and anyone hunting the northern lights, The Northern Lights: A Guide. This is a FREE event. General Admission tickets will be distributed, two (2) per person on a first-come-- first-serve basis, in front of the theater, 30 minutes before the performance begins. The Nordic Cool 2013 Literature Series is curated by Danish Arts Council, Norwegian Literature Abroad, Swedish Arts Council (Kulturrådet), Finnish Literature Exchange, and Icelandic Literature Foundation. Nordic Cool 2013 is presented in cooperation with and Denmark, Finland, Iceland, Norway, and Sweden. The Honorable Bonnie McElveen-Hunter, Marilyn Carlson Nelson, and Barbro Osher Major support is provided by the Honorable Bonnie McElveen-Hunter, Mrs. Marilyn Carlson Nelson and Dr. Glen Nelson, the Barbro Osher Pro Suecia Foundation, David M. Rubenstein, and the State Plaza Hotel. International Programming at the Kennedy Center is made possible through the generosity of the Kennedy Center International Committee on the Arts.
<urn:uuid:feb90f0d-69e2-4c84-9430-0b51c8e78f31>
CC-MAIN-2013-20
http://www.kennedy-center.org/events/?event=ZNLPA
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.907998
1,048
2.65625
3
Dover Castle, Kent - England Located at the shortest crossing between the UK and continental Europe, Dover Castle played a prime role in England's historical fortunes. Invading from France, William the Conqueror built the first castle in 1066 - an earthwork structure with a motte. Henry II did most to shape the building between 1179 and 1188, adding defences radiating out from the keep to produce Europe's first concentric castle. Henry II’s work was carried out with the help of Maurice the Ingeniator, and was completed by King John, resulting in a four-storey keep, a three-towered forebuilding and impregnable defensive walls. From 1216-17 the castle was besieged by the French, standing up to the test, but Henry III strengthened the defences further. The outer curtain wall was completed, stretching to the edge of the cliff, and Constable's Gate was constructed - a cluster of different sized towers designed to command all angles of attack. In the 18th century, Colonel William Twiss added extra gun positions, and constructed Constable's Bastion, Canon's Gateway and numerous barracks and storehouses. Further additions were made in the 1850s, and Dover Castle played an vital role in the two world wars as a site for anti-aircraft guns and radar. The army remained in the castle until 1958, and in 1963 handed it over to the Ministry of Works for preservation. The entry to Dover Castle, which includes two chapels, is the magnificent forebuilding. The significance of the three-towered forebuilding , can be fully appreciated, stretching along the eastern wall of the keep. It was around this stronghold that the concentric castle was developed and work was completed in the mid-13th century. Looming over the busy port, the centrepiece of Dover Castle is the Great Tower - the largest keep in Britain - a four storey building housing a basement, a first floor and a second floor spanning two stories. The outer curtain wall, with twenty individual towers, creates an outer bailey stretching to the edge of the cliff. The Great Tower and forebuilding, viewed from the west demonstrate the vast size of Dover Castle, perched atop the cliffs overlooking the English Channel. Beneath the castle is a network of tunnels, a barracks during the Napoleonic Wars and a military command centre during World War II.
<urn:uuid:435a68c8-5b3b-4763-9a92-931d3c1eaaf0>
CC-MAIN-2013-20
http://www.mostbeautifulplaces.com/castles/dover-castle-kent-england
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967164
483
3.6875
4
Robin Yapp, Contributor December 10, 2012 | 5 Comments Saudi Arabia's newly announced commitment to introducing solar-powered desalination plants marks a welcome and significant step in advancing the technology. In October 2012, Abdul Rahman Al-Ibrahim, governor of the country's Saline Water Conversion Corporation (SWCC), which procures the majority of its extensive municipal desalination assets, announced plans to establish three new solar-powered desalination plants in Haqel, Dhuba and Farasan. SWCC is the biggest producer of desalinated water worldwide, accounting for 18% of global output. Energy-intensive desalination plants have traditionally run on fossil fuels, but renewables, particularly solar power, are now beginning to play a part. Around half the operating cost of a desalination plant comes from energy use, and on current trends Saudi Arabia and many other countries in the region would consume most of the oil they produce on desalination by 2050. The dominant desalination technology at present, with around 60% of global capacity, is Reverse Osmosis (RO), which pushes brine water through a membrane that retains the salt and other impurities. Thermal desalination uses heat as well as electricity in distillation processes with saline feedwater heated to vaporise, so fresh water evaporates and the brine is left behind. Cooling and condensation are then used to obtain fresh water for consumption. Multi Stage Flash (MSF), the most common thermal technique accounting for around 27% of global desalination capacity, typically consumes 80.6 kWh of heat energy plus 2.5-3.5 kWh of electricity per m3 of water. Large scale RO requires only around 3.5-5 kWh/m3 of electricity. According to the International Renewable Energy Agency (IRENA), desalination with renewable energy can already compete cost-wise with conventional systems in remote regions where the cost of energy transmission is high. Elsewhere, it is still generally more expensive than desalination plants using fossil fuels, but IRENA states that it is 'expected to become economically attractive as the costs of renewable technologies continue to decline and the prices of fossil fuels continue to increase.' Solar Reducing Costs SWCC has taken a long view and aims to gradually convert all its desalination plants to run on solar power as part of a drive unveiled by the Saudi government earlier this year to install 41 GW of solar power by 2032. The Al-Khafji solar desalination project, near the border with Kuwait, will become the first large-scale solar-powered seawater reverse osmosis (SWRO) plant in the world, producing 30,000 m3 of water per day for the town's 100,000 inhabitants. Due for completion at the end of 2012, it has been constructed by King Abdulaziz City for Science and Technology (KACST), the Saudi national science agency, using technology developed in conjunction with IBM. Innovations include a new polymer membrane to make RO more energy efficient and protect the membrane from chlorine - which is used to pretreat seawater - and clogging with oil and marine organisms. The use of solar power will bring huge cuts to the facility's contribution to global warming and smog compared to use of RO or MSF with fossil fuels, according to the developers. Al-Khafji is the first step in KACST's solar energy programme to reduce desalination costs. For phase two, construction of a new plant to produce 300,000 m3 of water per day is planned by 2015, and phase three will involve several more plants by 2018. Historically, desalination plants have been concentrated in the Persian Gulf region, where there is no alternative for maintaining the public water supply. The region has excellent solar power prospects, suggesting that coupling of the two technologies may become commonplace. A pilot project to construct 30 small-scale solar desalination plants by the Environment Agency Abu Dhabi has already seen 22 plants in operation, each producing 25 m3 of potable water per day. But population increases and looming water scarcity have also prompted widespread investment in desalination. It is now practised in some 150 countries including the US, Europe, Australia, China and Japan and it is becoming an increasingly attractive option both financially and for supply security. Over the past five years the capacity of operational desalination plants has increased by 57% to 78.4 million m3 per day, according to the International Development Agency. Sharply falling technology costs have been a key driver of the trend and an EU-funded project is examining the case for expanding solar-powered desalination. Solar power may even offer a solution to an impending crisis in Yemen, where water availability per capita is less than 130 m3/year. Yemen's capital Sana'a, with a population of two million, faces running out of groundwater before 2025. It is estimated that a solar plant powered by a 1250 MW parabolic trough to desalinate water from the Red Sea and pump it 250 km to Sana'a could be constructed for around $6 billion. Around 700 million people in 43 countries are classified by the UN as suffering from water scarcity today - but by 2025 the figure is forecast to rise to 1.8 billion. With the global population expected to reach nine billion by 2050 and the US secretary of state openly discussing the threat of water shortages leading to wars, desalinated water has never been more important. Demand for desalinated water is projected to grow by 9% per year until 2016 due to increased consumption in the Middle East and North Africa (MENA) and in energy-importing countries such as the US, India and China.Population growth and depletion of surface and groundwater means desalination capacity in the MENA region is expected to grow from 21 million m3/day in 2007 to 110 million m3/day in 2030, according to the International Energy Agency. US President John F Kennedy, speaking in 1962, said: 'If we could produce fresh water from salt water at a low cost, that would indeed be a great service to humanity, and would dwarf any other scientific accomplishment.' In the half century since, the need for innovation to satisfy humanity's demand for clean water has become ever more urgent. While technological advances continue to improve the efficiency of desalination methods, it is vital that the sources of power used by desalination plants also continue to evolve. To add your comments you must sign-in or create a free account. With over 57,000 subscribers and a global readership in 174 countries around the world, Renewable Energy World Magazine covers industry, policy, technology, finance and markets for all renewable technologies. Content is aimed decision makers...
<urn:uuid:fdd0471b-1300-4783-b88d-a84868202b69>
CC-MAIN-2013-20
http://www.renewableenergyworld.com/rea/news/article/2012/12/solar-energy-and-water-solar-powering-desalination?cmpid=rss
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937564
1,390
3.53125
4
Please visit this url for more educational videos: World War I (abbreviated as WW-I, WWI, or WW1), also known as the First World War, the Great War, and the War to End All Wars, was a global military conflict that embroiled most of the world's great powers, assembled in two opposing alliances: the Triple Entente and the Triple Alliance. Over 70 million military personnel were mobilized in one of the largest wars in history. The main combatants descended into a state of total war, pumping their entire scientific and industrial capabilities into the war effort. Over 15 million people were killed, making it one of the deadliest conflicts in history. The immediate or proximate cause of war was the assassination on 28 June 1914 of Archduke Franz Ferdinand of Austria, heir to the Austro-Hungarian throne, by Gavrilo Princip, a Serbian nationalist. Austria-Hungary's resulting demands against the Kingdom of Serbia activated a sequence of alliances. Within weeks the major European powers were at war; their global empires meant that the conflict soon spread worldwide. By the war's end, four major imperial powers—Germany, Russia, Austria-Hungary, and the Ottoman Empire—had been militarily and politically defeated, with the latter two ceasing to exist as autonomous entities. The revolutionized Soviet Union emerged from the Russian Empire, while the map of central Europe was completely redrawn into numerous smaller states. The League of Nations was formed in the hope of preventing another such conflict. The European nationalism spawned by the war, the repercussions of Germany's defeat, and the Treaty of Versailles would eventually lead to the beginning of World War II in 1939.
<urn:uuid:4a21bb3c-4551-4351-b7a5-c036d55e1a00>
CC-MAIN-2013-20
http://www.speedylive.net/live/gj2v7-0tAC0/World-War-I
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.965014
344
3.609375
4
THREE-PHASE ROTATING FIELDS The three-phase induction motor also operates on the principle of a rotating magnetic field. The following discussion shows how the stator windings can be connected to a three-phase ac input and have a resultant magnetic field that rotates. Figure 4-4, views A-C show the individual windings for each phase. Figure 4-4, view D, shows how the three phases are tied together in a Y-connected stator. The dot in each diagram indicates the common point of the Y-connection. You can see that the individual phase windings are equally spaced around the stator. This places the windings 120° apart. Figure 4-4. - Three-phase, Y-connected stator. The three-phase input voltage to the stator of figure 4-4 is shown in the graph of figure 4-5. Use the left-hand rule for determining the electromagnetic polarity of the poles at any given instant. In applying the rule to the coils in figure 4-4, consider that current flows toward the terminal numbers for positive voltages, and away from the terminal numbers for negative voltages. Figure 4-5. - Three-phase rotating-field polarities and input voltages. The results of this analysis are shown for voltage points 1 through 7 in figure 4-5. At point 1, the magnetic field in coils 1-1A is maximum with polarities as shown. At the same time, negative voltages are being felt in the 2-2A and 3-3A windings. These create weaker magnetic fields, which tend to aid the 1-1A field. At point 2, maximum negative voltage is being felt in the 3-3A windings. This creates a strong magnetic field which, in turn, is aided by the weaker fields in 1-1A and 2-2A. As each point on the voltage graph is analyzed, it can be seen that the resultant magnetic field is rotating in a clockwise direction. When the three-phase voltage completes one full cycle (point 7), the magnetic field has rotated through 360°. ROTOR BEHAVIOR IN A ROTATING FIELD For purposes of explaining rotor movement, let's assume that we can place a bar magnet in the center of the stator diagrams of figure 4-5. We'll mount this magnet so that it is free to rotate in this area. Let's also assume that the bar magnet is aligned so that at point 1 its south pole is opposite the large N of the stator field. You can see that this alignment is natural. Unlike poles attract, and the two fields are aligned so that they are attracting. Now, go from point 1 through point 7. As before, the stator field rotates clockwise. The bar magnet, free to move, will follow the stator field, because the attraction between the two fields continues to exist. A shaft running through the pivot point of the bar magnet would rotate at the same speed as the rotating field. This speed is known as synchronous speed. The shaft represents the shaft of an operating motor to which the load is attached. Remember, this explanation is an oversimplification. It is meant to show how a rotating field can cause mechanical rotation of a shaft. Such an arrangement would work, but it is not used. There are limitations to a permanent magnet rotor. Practical motors use other methods, as we shall see in the next paragraphs. The construction of the synchronous motors is essentially the same as the construction of the salient-pole alternator. In fact, such an alternator may be run as an ac motor. It is similar to the drawing in figure 4-6. Synchronous motors have the characteristic of constant speed between no load and full load. They are capable of correcting the low power factor of an inductive load when they are operated under certain conditions. They are often used to drive dc generators. Synchronous motors are designed in sizes up to thousands of horsepower. They may be designed as either single-phase or multiphase machines. The discussion that follows is based on a three-phase design. Figure 4-6. - Revolving-field synchronous motor. To understand how the synchronous motor works, assume that the application of three-phase ac power to the stator causes a rotating magnetic field to be set up around the rotor. The rotor is energized with dc (it acts like a bar magnet). The strong rotating magnetic field attracts the strong rotor field activated by the dc. This results in a strong turning force on the rotor shaft. The rotor is therefore able to turn a load as it rotates in step with the rotating magnetic field. It works this way once it's started. However, one of the disadvantages of a synchronous motor is that it cannot be started from a standstill by applying three-phase ac power to the stator. When ac is applied to the stator, a high-speed rotating magnetic field appears immediately. This rotating field rushes past the rotor poles so quickly that the rotor does not have a chance to get started. In effect, the rotor is repelled first in one direction and then the other. A synchronous motor in its purest form has no starting torque. It has torque only when it is running at synchronous speed. A squirrel-cage type of winding is added to the rotor of a synchronous motor to cause it to start. The squirrel cage is shown as the outer part of the rotor in figure 4-7. It is so named because it is shaped and looks something like a turnable squirrel cage. Simply, the windings are heavy copper bars shorted together by copper rings. A low voltage is induced in these shorted windings by the rotating three-phase stator field. Because of the short circuit, a relatively large current flows in the squirrel cage. This causes a magnetic field that interacts with the rotating field of the stator. Because of the interaction, the rotor begins to turn, following the stator field; the motor starts. We will run into squirrel cages again in other applications, where they will be covered in more detail. Figure 4-7. - Self-starting synchronous ac motor. To start a practical synchronous motor, the stator is energized, but the dc supply to the rotor field is not energized. The squirrel-cage windings bring the rotor to near synchronous speed. At that point, the dc field is energized. This locks the rotor in step with the rotating stator field. Full torque is developed, and the load is driven. A mechanical switching device that operates on centrifugal force is often used to apply dc to the rotor as synchronous speed is reached. The practical synchronous motor has the disadvantage of requiring a dc exciter voltage for the rotor. This voltage may be obtained either externally or internally, depending on the design of the motor.
<urn:uuid:363dc39d-8ac8-406b-a4c3-88174d91ba49>
CC-MAIN-2013-20
http://www.tpub.com/neets/book5/18b.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.937578
1,439
3.625
4
As a holistic veterinarian, I feel it is incredibly important to take the whole animal into consideration when it comes to nutrition. And, whenever practical, my preference is to provide nutrients, minerals and vitamins in their natural forms. In this post, I’d like to talk to you specifically about vitamin E, to review both the strengths and weaknesses of natural and synthetic forms. Vitamin E is an incredibly complex and important nutrient that, among other things, functions as an antioxidant. Antioxidants are naturally occurring nutrients that promote health by slowing the destructive aging process of cells (a breakdown called “peroxidation”). In peroxidation, damaged molecules known as free radicals steal pieces from other cells, like fat, protein or DNA. The damage can spread, damaging and killing entire groups of cells. While peroxidation can be useful to destroy old cells or germs and parasites, when left unchecked, free radicals produced by peroxidation also damages healthy cells. Antioxidants can help to stem the tide of peroxidation, thus stabilizing free radicals. Antioxidants like vitamin E are crucial to the health of companion animals of any age. They can improve the quality of the immune response and the effectiveness of vaccines in young pets, and help maintain a vital immune system in seniors. More...
<urn:uuid:11a10a44-dfd3-4d35-9924-b3f0c23607a5>
CC-MAIN-2013-20
http://blog.lifesabundance.com/?tag=/nutrition&realname=20055446
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.918686
283
2.921875
3
Today, existing insulin pumps are about the size of a pager. The new ST- enabled Debiotech miniaturized MEMS device is about one quarter the size of these existing pumps and can be worn as a nearly invisible patch on the skin. The small size frees the patient from concerns with holding the pump in place and concealing it under clothing. The insulin Nanopump, developed by Debiotech and industrialized by ST, represents the first use of microfluidic MEMS technology in diabetes treatment. Functional samples have already been produced and the two partners expect that a fully industrialized product, in the form of a disposable cartridge, will be available in selected markets in 2008. Debiotech will remain responsible for the commercialization of the product through its licenses with major players in the medical device market.The press release states that the Nanopump can control it's output down to the nanoliter level and has capabilities of detecting occlusions, bubbles and other malfunctions. A browse through their website shows that this is not the only innovation they're working on that affects diabetics. They're also developing a micro-needle array built using MEMS technology to allow for improved hypodermic drug delivery.
<urn:uuid:91b76dd2-a302-4d6f-9bb6-9b0b8805563a>
CC-MAIN-2013-20
http://mydiabeticlife.blogspot.com/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.939511
250
2.5625
3
Examples of analysis sections An example from a law field report about a courtroom observation Click here to see the description section of this law field report. | The legal processes I observed in the district court hearing reflect to a certain extent Australian social values. Their purpose is to attempt to maintain an efficient court system and create justice before the law. Processes such as rules of evidence which ensure only the most applicable evidence is heard have been developed over many years, thus demonstrating an influence of past and future cases. Similarly, the doctrine of precedent ensures that similar cases have similar results. Procedural grounds for objections protect witnesses from harassment and potential confusion. Therefore, all of these legal processes create an environment in which changing social values will bring about complementary changes in court decisions. ||The meaning and theoretical significance of the observations described are explored Footnote 1: adapted from Woodward-Kron, R., Thomson, E. & Meek, J. (2000) A text based guide to academic writing. CD-Rom. Dept. Of Modern Languages, University of Wollongong. An example from an education field report about a classroom practicum experience | As I help the students I am conscious of the scaffolding Vygotsky described taking place. I observed other people such as teachers and parents scaffolding with their children. It was, therefore, interesting to realise that I was doing the same as I walked around the classroom helping the children with their tasks. Scaffolding helps the children to reach their zone of proximal development which in turn helps them to achieve more complex tasks. I have found my practical experience in the classroom has been full of examples supporting the theories of Piaget and Vygotsky and to a lesser extent Erikson. It is also good to see that these theories actually have real world application to child development. |Exploring the significance of practical experience and observations from a theoretical perspective Reflection about what the field experience has meant for theoretical understanding This is the analysis section from a history field report about historical monuments. Click here to see the description section of this history field report. The Bulli Coal Mining Company had 331 employees: this represented approximately 20% of the population of Bulli. Given the small size of the Bulli community, the population was calculated at 1352 persons in the 1891 census (Mitchell & Sherington, 1984: 42), and its dependence on the Bulli Coal Mining Company, the impact of a disaster of this magnitude was enormous. Henry Parkes and his government realising the hardship being experienced by the community, particularly the bereaved families, gave “official support to a public fund and established a board to distribute the money after investigating the needs of those bereaved” (Mitchell & Sherington, 1984: 58). The impact of the disaster is reflected in the structure of the monument. The monument was intended to last the test of time. Its shape, an obelisk, is unlike anything else in the area. This fact combined with the historical use of the obelisk, principally in ancient Egypt, suggests the memorial was considered important to the community. No reference is made on the monument, however, in regard to the date of the dedication or to who unveiled it which is significant given the government support of a disaster relief fund for the Bulli community in the wake of the disaster. Analysis of the event the monument commemorates Conclusion drawn about the structure and shape of the monument given Footnote 2: adapted from Flello, J. unpublished manuscript. An example from an education field report about a classroom practicum experience. (This example contains a mixture of description and analysis within a single paragraph. This is an alternative approach to having these two types of different writing in separate sections.) | Both childcare centres encouraged the children to think critically and reflectively about themselves and the wider community; for example, I observed an incident at centre 2 (14/5), where the teacher helped the children with an equity of access issue in the playground. Several children wanted to play on the slide and gym equipment but one child continually walked up the slide disrupting the pattern of play. The group of children began to speak loudly and harshly to him and threatened to kick him. The teacher was able to facilitate a resolution to this problem by getting the children to examine what was happening and think of alternative actions. There were all, in effect, being empowered to deal with the injustice they were facing in the playground rather than resorting to physical violence or giving up and playing elsewhere, as some children were about to do. ||Topic sentence: a general theoretical conclusion is drawn Conclusion illustrated by an example observed in the field Description of the observed event Theoretical perspective used to analyse the event Footnote 3: adapted from McNabb, Learning Skills Centre, University of Melbourne. Comments and questions should be directed to [email protected]
<urn:uuid:a6372497-ce4e-420a-b2eb-a0df9edadeb9>
CC-MAIN-2013-20
http://unilearning.uow.edu.au/report/5bii2.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.954646
1,005
2.640625
3
Before we may design a crystal filter it is necessary to know the crystal's data. Unfortunately this information is not in the datasheet - or we have no datasheet because the crystals were bought on a market some decades ago ... Fig.1: A crystal, it's symbol and equivalent circuit Fortunately these values may be measured using a small adapter - which may be built on the fly. We measured our crystals using the circuit below : Fig.2: Measurement Adapter Fig.3: Measurement Adapter Schematics The Capacitors used are Mica (Glimmer) obtained from www.reichelt.de With a jumper either the short or one of the series capacitors ( 15 pF or 33 pF ) may be selected. The tree positions of the jumper result in 3 different Transmission curves when using a Network Analyser or Spectrum Analyser with built in generator. ( of course you may use a generator and a hf-voltmeter or anything equivalent ... ) The Amplitude response looks somehow like this : Fig.4: Measured Amplitude Response S21 You will notice, that the maximum (fs) will move while the minimum (fp) remains constant. With the short selected we measure the lowest frequency where Transmission is maximum. The maximum ( with 33 pF selected ) is next and then the maximum ( with 15 pF selected ).
<urn:uuid:8aead03e-f6ea-47e0-ad7b-61350144bc90>
CC-MAIN-2013-20
http://www.changpuak.ch/electronics/calc_17.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.859535
295
2.640625
3
"We consider it essentially the child's personal time and don't feel it should be taken away for academic or punitive reasons," said Dr. Robert Murray, who co-authored the new policy statement for the American Academy of Pediatrics. Recess helps students develop communication skills, such as cooperation and sharing, and helps counteract the time they spend sitting in class, according to the statement. "The cognitive literature indicates that children are exactly as we are as adults. Whenever they're performing a complicated or complex task, they need time to process the information," said Murray, a professor at Ohio State University in Columbus. "Kids have to have that time scheduled. They're not given the opportunity to just get up and walk around for a few minutes," he added. Previous research, according to the statement's authors, found children pay closer attention and perform better mentally after recess. Last January, a review of 14 studies found kids who get more exercise from - among other things - recess and playing on sports teams tend to do better in school (see Reuters Health story of January 3, 2012 here: http://reut.rs/UcJhV0.) But a 2011 survey of 1,800 elementary schools found about a third were not offering recess to their third grade classes (see Reuters Health story of December 5, 2011 here: http://reut.rs/UcOqwt.) Murray told Reuters Health that schools in Japan offer children about 10 minutes of free time after every 50 minutes of class, which he said makes sense. "I think you can feel it if you go to a lecture that after 40 to 50 minutes of a concentrated activity you need to take a break," he said. Currently, the American Heart Association calls for at least 20 minutes of recess every day, but Murray said recess needs depend on the child. "Most schools - on average - are working on the framework of 15 to 30 minute bursts of recess once or twice a day," he said. There is, however, consensus on when in the day children's recess should take place. The U.S. Centers for Disease Control and Prevention and the U.S. Department of Agriculture both recommend schools schedule recess before lunch. Previous studies have found that children waste less food and behave better for the rest of the day when their recess is before their scheduled lunch, the pediatricians' statement notes. The statement also says schools should not substitute physical education classes for recess. "Those are completely different things and they offer completely different outcomes," said Murray. "(Physical education teachers are) trying to teach motor skills and the ability of those children to use those skills in a bunch of different scenarios. Recess is a child's free time." The pediatricians also warn against a recess that is too structured, such as having games led by adults. "I think it becomes structured to the point where you lose some of those developmental and social emotion benefits of free play," said Murray. "This is a very important and overlooked time of day for the child and we should not lose sight of the fact that it has very important benefits," he added. SOURCE: http://bit.ly/HjQ8dI Pediatrics, online December 31, 2012.
<urn:uuid:e292a359-b62c-4c1e-837e-0d5762b73d96>
CC-MAIN-2013-20
http://www.kwch.com/news/healthwatch/sns-rt-us-schools-recessbre8bu028-20121230,0,4540302.story
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.974729
666
3.0625
3
Choose Privacy Week Privacy is a particularly slippery and amorphous issue, about which people hold a wide variety of opinions and beliefs, particularly in the post-9-11 world in which we live. Libraries and library workers think about privacy issues a lot - and want our customers to think critically about privacy issues, too. Personal privacy issues touch everyone at virtually every stage of life, and even into death (e.g., access to the Social Security Death Index online), raising a universe of hard questions to be answered. Sponsored by the ALA’s Office for Intellectual Freedom (OIF), Choose Privacy Week is an annual initiative inviting library users of all ages and backgrounds into a national conversation about privacy rights in a digital age. The theme for this year's Choose Privacy Week is "Freedom from Surveillance." Libraries have been interested in maintaining the privacy of individuals. Beaufort County Library Board of Trustees adopted the American Library Association Core of Ethics years ago. It's part of our core values as library workers. Why? Because freedom of speech is meaningless without the freedom to read. Click here [http://www.privacyrevolution.org/images/uploads/Trina_UserHandout.pdf] for handout explaining why librarians and libraries insist upon empowering our customers to explore, research, and make choices based upon their individual needs. Q: Where are the lines drawn between "right of privacy" and "right to know" today ? The major source used in the preparation of this entry was http://www.privacyrevolution.org/. Please explore the website - and think hard about where you stand on the issue of individual privacy rights.
<urn:uuid:040af783-8ae6-440d-9e1a-b658efa60102>
CC-MAIN-2013-20
http://beaufortcountylibrary.org/content/choose-privacy-week
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.930436
344
2.546875
3
3.1 Systematic Errors Systematic errors are uncertainties in the bias of the data. A simple example is the zeroing of an instrument such as a voltmeter. If the voltmeter is not correctly zeroed before use, then all values measured by the voltmeter will be biased, i.e., offset by some constant amount or factor. However, even if the utmost care is taken in setting the instrument to zero, one can only say that it has been zeroed to within some value. This value may be small, but it sets a limit on the degree of certainty in the measurements and thus to the conclusions that can be drawn. An important point to be clear about is that a systematic error implies that all measurements in a set of data taken with the same instrument are shifted in the same direction by the same amount - in unison. This is in sharp contrast to random errors where each individual measurement fluctuates independently of the others. Systematic errors, therefore, are usually most important when groups of data points taken under the same conditions are being considered. Unfortunately, there is no consistent method by which systematic errors may be treated or analyzed. Each experiment must generally be considered individually and it is often very difficult just to identify the possible sources let alone estimate the magnitude of the error. Our discussion in the remainder of this chapter, therefore, will not be concerned with this topic.
<urn:uuid:9094e6b4-5afe-4ecd-b518-999222f1de45>
CC-MAIN-2013-20
http://ned.ipac.caltech.edu/level5/Leo/Stats3_1.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.924133
279
3.71875
4
This week’s illustration post focuses on perhaps the most popular illustrated genre of the Renaissance: the emblem book. Emblem books were a genre developed in the early 16th century as digestible and curious works which combined an image, a motto and an explanatory text. This genre remained popular on the continent well into the 17th century, although, strangely, it never found any real footing in the U.K. The illustrations were most commonly woodcuts and the mottoes Latin, however Greek and vernacular mottoes were common as well. The intention of most emblem books was to deliver a moral lesson through text and image, but often the connection between these two elements is obscure. There are many projects that have developed over the last decade to provide a digital repository for these books worth exploring (Emblematica Online [Univeristy of Illinois and Herzog August Bibliothek], University of Glasgow and the Emblem Project Utrecht are good examples). Although St Andrews 17th century holdings remain largely unexplored, I did come across a wonderful example of a Spanish emblem book published at the height of the genre’s popularity. This week’s post features the emblems from Sebastián de Covarrubias y Orozco’s Emblemas morales (1610). This work was published under the direction of Don Francisco Gómez de Sandoval, 1st Duke of Lerma, shortly after Covarrubias had recovered from a serious illness. This is perhaps Covarrubias’s most popular publication on emblems, but he is most well-known for his Tesoro de la lengua castellana o española (1611). From the beginning of this book it is quite obvious that the author’s roots, both as a canon in the Catholic Church and as a keen lexicographer, are quite influential. However, Covarrubias does stray off into the weirder and esoteric world of the emblem books of the day: dragons, serpents, snake-eating deer and oversized-tops (above, which look like the ship from Flight of the Navigator to this blogger). Covarrubias also draws on everyday scenes of fishermen and farmers toiling in the field to root this emblem book in the real-world. I’ve sampled here some of my favourites from this book, however a full scan is available at Emblematica Online. This work was not Covarrubias’s first foray into the world of emblem books, in 1589 he published a work, also entitled Emblemas morales, which provides almost 100 pages worth of text about emblems and their origins and then provides 100 examples afterword (none of which are repeated in his 1610 work). This work was republished in 1604 with the same text but with new woodcuts. Covarrubias’s 1610 Emblemas morales, however, is a completely new work, featuring new emblems and mottoes with shorter verse explanations.
<urn:uuid:6cea4446-4497-43e9-b997-e865a9cad4e8>
CC-MAIN-2013-20
http://standrewsrarebooks.wordpress.com/2013/01/28/52-weeks-of-inspiring-illustrations-week-32-the-emblem-book-of-sebastian-de-covarrubias-y-orozco-1610/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958051
628
2.84375
3
S7 Technical Assistance Eastern prairie fringed orchid (Platanthera leucophaea) Determining whether eastern prairie fringed orchid (Platanthera leucophaea) may be present in a proposed project area in the following northeastern Illinois counties: Cook, DuPage, Kane, Lake, McHenry and Will. |Photo by Mike Redmer As part of Step 1 of the S7 process, you checked the Illinois species list and found that eastern prairie fringed orchid is present in the county where your proposed project is located. The next step is to determine whether eastern prairie fringed orchid "may be present" in the action area of your proposed project. Below is guidance to help you make that determination. Habitat: The eastern prairie fringed orchid (orchid) occurs in a wide variety of habitats, from wet to mesic prairie or wetland communities, including, but not limited to sedge meadow, fen, marsh, or marsh edge. It can occupy a very wide moisture gradient of prairie and wetland vegetation. It requires full sun for optimal growth and flowering, which ideally would restrict it to grass and sedge dominated plant communities. However, in some plant communities where there are encroaching species such as cattail and/or dogwood, the orchid may be interspersed or within the edge zones of these communities and thus can sometimes occur in partially shaded areas. The substrate of the sites where this orchid occurs include glacial soils, lake plain deposits, muck, or peat which could range from more or less neutral to mildly calcareous (Bowles et al. 2005, USFWS 1999). In some cases, the species may also occur along ditches or roadways where this type of habitat is present. Processes that maintain habitats in early or mid-successional phases may be important in providing the sunny, open conditions required by the orchid (USFWS 1999). Sedge meadow and marsh habitats that support this orchid are usually early- or mid- successional because of past grazing, drainage, or soil disturbance. Patch disturbances that expose the soil to this orchid’s seeds, and reduce competition from established plants, may be needed for seedling establishment. Hawkmoths are the pollinators of this orchid species. In Illinois the hawkmoth, Sphinx eremitus is a confirmed pollinator although there may be others. Eumorpha pandorus and Eumorpha achemon have been confirmed as pollinators in other states. Host plants for the caterpillars of Sphinx eremitus include various species of beebalm (Monarda spp.), mints (Mentha spp.), bugleweed (Lycopus spp.) and sage (Salvia spp.). Follow the steps below to determine whether the eastern prairie fringed orchid may be present in the action area of your proposed project. This guidance is specific to Cook, Lake, McHenry, DuPage, Kane, and Will counties in northeastern Illinois. 1) Define the action area – all areas to be affected directly or indirectly by the Federal action and not just in the immediate area involved in the action. (For example: downstream areas, adjacent off-site wetlands, etc.) 2) Does the action area support any wet to mesic prairie or wetland communities including, but not limited to sedge meadow, fen, or marsh edges? If the answer is yes, go to number 3 (below). If the answer is no, conclude that “the eastern prairie fringed orchid is not present,” document your finding for your records or provide this information to the federal action agency. No further consultation is required. 3) Conduct a floristic quality assessment for the proposed project site during the growing season or use a previous assessment that is not more than three years old and was conducted during the growing season. 4) If any wetland in the action area is determined to be high quality, (a Floristic Quality Index of 20 or greater and/or a Native Mean C of 3.5 or greater) proceed to number 5 (below) or contact the Chicago Field Office for further consultation. Wetlands that are not high quality will not support eastern prairie fringed orchid. For those wetlands, conclude that “the eastern prairie fringed orchid is not present,” document your finding for your records or provide this information to the federal action agency. No further consultation is required for those wetlands. 5) Compare the plant species list generated for each high quality wetland with our Associate Plant Species List for the Eastern Prairie Fringed Orchid. If four or more associates are listed, then proceed to number 6. If not, high quality wetlands that support three or less eastern prairie fringed orchid associate plant species are unlikely to support eastern prairie fringed orchids. Conclude that “the eastern prairie fringed orchid is not present” and document your finding for your records or provide this information to the federal action agency. No further consultation is necessary for those wetlands. 6) The eastern prairie fringed orchid may be present in your action area. You may either assume that the eastern prairie fringed orchid is present and proceed to Step 2 of the Section 7 Consultation Process or conduct a field search during the bloom date of the orchid; June 28 through July 11. Because northeastern Illinois orchid populations bloom sporadically rather than all plants blooming at the same time, searches should be conducted on a minimum of three non-consecutive days within this time period. Please notify the Chicago Field Office before conducting your survey. 7) If you assume that the eastern prairie fringed orchid may be present in the action area or a field search proves that the orchid is present, the next step in the S7 Consultation Process is to determine whether the proposed action may affect any eastern prairie fringed orchids. Go to Step 2 of the S7 Consultation Process to begin that determination. Please contact the U.S. Fish and Wildlife Service’s Chicago Illinois Field Office if you for more information or if you have any questions. Chicago Illinois Field Office 1250 South Grove, Suite 103 Barrington, Illinois 60010 Phone: 847/381-2253, ext. 20 1Swink, F. and G. Wilhelm. 1994. Plants of the Chicago Region, 4th ed. Indiana Academy of Science, Indianapolis. 921pp. Step 1 of the Section 7 Process Section 7 Technical Assistance
<urn:uuid:32572c52-4ace-40ed-8aca-40c4ad13e96f>
CC-MAIN-2013-20
http://www.fws.gov/midwest/endangered/section7/s7process/plants/epfos7guide.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.897309
1,392
2.8125
3
A species on the brink – Freshwater Pearl Mussel They can live for over a century, they have one of the most bizarre life-cycles of any species you’re likely to find and they’re one of the reasons why the Romans invaded Britain. What’s more is that their future is in our hands. The freshwater pearl mussel might not have the glamour of some other iconic ‘Scottish’ species like the golden eagle or red squirrel, but they’re incredibly important. Scotland holds around half of the world’s population of this fascinating creature and they are currently balancing on a knife-edge. Populations are found in some of the rivers flowing into Loch Ness. Freshwater pearl mussels are very slow-growing and live at the bottom of clean, generally fast-flowing rivers. These animals, which spend the early part of their life harmlessly attached to the gills of trout and salmon before settling onto a suitable substrate are now extinct across most of their former range. Highland rivers are a stronghold for the species. As their name suggests, they very occasionally bear a pearl, and this has in many ways led to their downfall. The taking of mussels by ‘pearl-fishers’ has been the main reason for the massive declines in these populations, but they have also been affected by pollution and river-engineering works. The freshwater pearl mussel was given full legal protection in 1998 but unfortunately illegal activity still continues. Every year we still come across significant ‘kills’ where piles of hundreds of empty shells mark the scene of a few hours illegal fishing, where a whole population of this globally threatened species can be wiped out in a couple of hours. These threats to the species have meant that the freshwater pearl mussel is a UK Wildlife Crime priority. This means that the Police work closely with Scottish Natural Heritage, anglers, bailiffs, river users and a wide-range of other organisations to help tackle these crimes by improving awareness, collection of intelligence and better enforcement to safeguard the species. However, whilst the police and other organisations do their best to help tackle wildlife crime in this way they can’t do it alone, and the help of the public can be absolutely crucial. Pearl fishing is often carried out in remote locations, or very early in the morning when there is less chance of being detected, and often during the summer when daylight hours are long and the rivers are low. Fishing is often carried out by wading out into rivers and using glass-bottomed buckets to find the mussels and a cleft stick to recover them. If anyone sees or suspects that pearl fishing is taking place we urge people to report it to their local police station and Wildlife Crime Officer as soon as possible. At the same time there are numerous projects aimed at active conservation of the species, including a recent £3.5 million project funded by the European Commission’s LIFE+ fund and secured by Scottish National Heritage and 14 other organisations. The project will improve habitats for the species, encourage simple and effective positive management of rivers where they are present, improve awareness and understanding of the species as well as helping address wildlife crime issues. So it’s not all doom and gloom for this remarkable species, and everybody has a role in ensuring it’s survival – let’s hope that we can bring the freshwater pearl mussel back from the brink. If you would like more information on the species visit SNH’s website at http://www.snh.gov.uk/about-scotlands-nature/species/invertebrates/freshwater-invertebrates/freshwater-pearl-mussel/
<urn:uuid:26afdc2d-f05f-43e0-89e9-7e76e8af37f3>
CC-MAIN-2013-20
http://www.visitlochness.com/blog/category/environment/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955203
764
3.25
3
Science in fiction affects our ability to understand science in real life. For instance, you might already be familiar with the idea that detective shows on TV, particularly forensics shows like CSI, might be influencing what juries expect to see in a courtroom. This is called the "CSI effect" and it's hotly debated. Some prosecutors think it has a real impact on jury decisions—if they don't get the fancy, scientific evidence they've been conditioned to expect then they won't convict. Meanwhile, though, empirical evidence seems to show a more complicated pattern. Surveys of more than 2000 Michigan jurors found that, while people were heavily expecting to see some high-tech forensic evidence during trials, that expectation probably had more to do with the general proliferation of technology throughout society. More interestingly, that broad expectation didn't seem to definitively influence how jurors voted during a specific trial. In other words: The jury is still out. (*Puts on sunglasses*) A FRONTLINE documentary that airs tomorrow centers around an interesting corollary on this issue: Whether or not shows like CSI influence juries to expect more technology, they do present a wildly inaccurate portrait of how accurate that technology is. The reality is, many of the tools and techniques used in detective work have never been scientifically verified. We don't know that they actually tell us what they purport to tell us. Other forensic technologies do work, but only if you use them right—and there's no across-the-board standard guaranteeing that happens. Even ideas you think you can trust implicitly—like fingerprint evidence—turn out to have serious flaws that are seriously under-appreciated by cops, lawyers, judges, and juries. Brandon Mayfield, an Oregon lawyer, was at the center of international controversy in 2004 after the FBI and an independent analyst incorrectly matched his prints to a partial print found on a bag of detonators from the Madrid terrorist bombings. Dror asked five fingerprint experts to examine what they were told were the erroneously matched prints of Mayfield. In fact, they were re-examining prints from their own past cases. Only one of the experts stuck by their previous judgments. Three reversed their previous decisions and one deemed them “inconclusive.” Dror’s argument is that these competent and well-meaning experts were swayed by “cognitive bias”: what they knew (or thought they knew) about the case in front of them swayed their analysis. The Mayfield case and studies like Dror’s have changed how fingerprints are used in the criminal justice system. The FBI no longer testifies that fingerprints are 100 percent infallible. The Real CSI episode of FRONTLINE airs tomorrow, April 17th. Check out the FRONTLINE website for more information. Image: Fingerprint developed with black magnetic powder on a cool mint Listerine oral care strip, a Creative Commons Attribution (2.0) image from jackofspades's photostream.
<urn:uuid:53d9f9ca-a68a-4f55-8689-52b30171000c>
CC-MAIN-2013-20
http://boingboing.net/tag/frontline-2
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.969858
615
2.9375
3
The Chesapeake Bay TMDL, Maryland's Watershed Implementation Plan and Maryland's 2012-2013 Milestone Goals The Chesapeake Bay TMDL: A Pollution Diet for the Chesapeake Watershed The Chesapeake Bay is a national treasure constituting the largest estuary in the United States and one of the largest and most biologically productive estuaries in the world. Despite significant efforts by federal, state, and local governments and other interested parties, pollution in the Chesapeake Bay prevents the attainment of existing water quality standards. The pollutants that are largely responsible for impairment of the Bay are nutrients, in the form of nitrogen and phosphorus, and sediment. The United States Environmental Protection Agency (EPA), in coordination with the Bay watershed jurisdictions of Maryland, Virginia, Pennsylvania, Delaware, West Virginia, New York, and the District of Columbia (DC), developed and, on December 29, 2010, established a nutrient and sediment pollution diet for the Bay, consistent with Clean Water Act requirements, to guide and assist Chesapeake Bay restoration efforts. This pollution diet is known as the Chesapeake Bay Total Maximum Daily Load (TMDL), or Bay TMDL. MDE took part in an ongoing, high-level decision-making process to create the essential framework for this complex, multi-jurisdictional TMDL that will address nutrient and sediment impairments throughout the entire 64,000 square mile Chesapeake Bay watershed. MDE participated in numerous inter-jurisdictional and inter-agency workgroups and committees over the last three years to provide technical expertise and guidance for developing the Bay TMDL in a manner consistent with the State’s water quality goals and responsibilities. In particular, MDE worked to ensure that the Bay TMDL addressed the nutrient and sediment impairments in all of Maryland’s tidal waters listed as impaired by those pollutants on the State’s Integrated Report of Surface Water Quality. MDE took the lead on developing an allocation process that will enable the State to meet a key requirement for the Bay TMDL and Maryland’s Watershed Implementation Plan: the sub-allocation of major basin loading caps of nutrient and sediment to each of 58 “segment-sheds” in Maryland – the land areas that drain to each impaired Bay water quality segment – and to each pollutant source sector in those areas. Maryland’s Watershed Implementation Plan for the Bay TMDL Concurrent with the development of the Bay TMDL, EPA charged the Bay watershed states and DC with developing watershed implementation plans in order to provide adequate “reasonable assurance” that the jurisdictions can and will achieve the nutrient and sediment reductions necessary to implement the TMDL within their respective boundaries. Maryland’s Phase I Plan provides a series of proposed strategies that will collectively meet the 2017 target (70% of the total nutrient and sediment reductions needed to meet final 2020 goals). After more than a year of cooperative work, MDE and the Departments of Natural Resources, Agriculture, and Planning released a Draft Phase I Plan for public review in October 2010 and, following extensive consideration of hundreds of public comments, submitted Maryland’s Final Phase I Watershed Implementation Plan to EPA on December 3, 2010. Maryland’s Phase II Plan provides a series of proposed strategies that will collectively meet the 2017 target (60% of the total nutrient and sediment reductions needed to meet final 2025 goals). This was changed from Phase I due to concerns that the implementation was not achievable with that timeframe. Maryland worked many partners in local jurisdictions to develop Phase II Watershed Implementation Plans with more detailed reduction targets and specific strategies to further ensure that the water quality goals of the Bay TMDL will be met. See Maryland's Development Support for the Chesapeake Bay Phase II WIP webpage. MDE is continuing to work with its partners in local jurisdictions to implement the Phase II WIP. See the Implementing Maryland’s WIP: Making Progress toward Bay Restoration Goals webpage. Please direct questions or comments concerning this project to Tom Thornton with Maryland's TMDL Program at (410) 537-3656 or email at [email protected]. |Acrobat® Reader is required to view and print the PDF files. If you do not have it click on the icon to the right.
<urn:uuid:94db5292-934e-4b80-b87c-67c8f1d93091>
CC-MAIN-2013-20
http://mde.maryland.gov/programs/Water/TMDL/ChesapeakeBayTMDL/Pages/programs/waterprograms/tmdl/cb_tmdl/index.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.905904
892
3.078125
3
Coffee is an important crop and is crucial to the economy of many developing countries, generating around US$70 billion per year. There are 115 species in the Coffea genus, but only two, C. arabica and C. canephora, are commercially cultivated. Coffee plants are attacked by many pathogens and insect-pests, which affect not only the production of coffee but also its grain quality, reducing the commercial value of the product. The main insect-pest, the coffee berry borer (Hypotheneumus hampei), is responsible for worldwide annual losses of around US$500 million. The coffee berry borer exclusively damages the coffee berries, and it is mainly controlled by organochlorine insecticides that are both toxic and carcinogenic. Unfortunately, natural resistance in the genus Coffea to H. hampei has not been documented. To overcome these problems, biotechnological strategies can be used to introduce an α-amylase inhibitor gene (α-AI1), which confers resistance against the coffee berry borer insect-pest, into C. arabica plants. We transformed C. arabica with the α-amylase inhibitor-1 gene (α-AI1) from the common bean, Phaseolus vulgaris, under control of the seed-specific phytohemagglutinin promoter (PHA-L). The presence of the α-AI1 gene in six regenerated transgenic T1 coffee plants was identified by PCR and Southern blotting. Immunoblotting and ELISA experiments using antibodies against α-AI1 inhibitor showed a maximum α-AI1 concentration of 0.29% in crude seed extracts. Inhibitory in vitro assays of the α-AI1 protein against H. hampei α-amylases in transgenic seed extracts showed up to 88% inhibition of enzyme activity. This is the first report showing the production of transgenic coffee plants with the biotechnological potential to control the coffee berry borer, the most important insect-pest of crop coffee.
<urn:uuid:aba0b0e9-feb3-47e1-9f9e-4844589417dd>
CC-MAIN-2013-20
http://pubmedcentralcanada.ca/pmcc/solr/reg?term=author%3A(%22Souza%2C+Djair+SL%22)&filterQuery=author_s%3ARocha%2C%5C+Thales%5C+L&sortby=score+desc
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.926353
433
2.890625
3
Close to standard |Points of interest|| Ancient Rakatan ruins Tandun III was originally surveyed approximately 12,293 BBY by Doctor Beramsh, who led an expedition from Ord Mantell. What Beramsh and his team discovered was a lush beautiful world with close to standard gravity and was suitable for both oxygen breathing humans and humanoids. Further exploration of the planet also revealed ruins of ancient population centers which Beramsh believed were constructed by the Rakata. Despite the survey report of ideal atmospheric conditions, its distance from the Hydian Way prevented Tandun III from ever being colonized. Historical records would indicate that a possible second survey was conducted generations later during Chancellor Finis Valorum's second term. At some point between 29 BBY and 19 BBY, the Republic Group took an Insignia of Unity that once stood on the podium of the Galactic Senate Rotunda. The group believed the insignia could be used as a symbol to restore Republic honor to the galaxy and brought it to Tandun III for safe-keeping. Enlisting the help of the Antarian Rangers, the Republic Group built a secret storehouse in one of the planet's ancient ruins and made the Stellar Envoy the key to accessing the facility. In 19 BBY the Republic Group and the Antarian Rangers were considered enemies of the Empire and thus the secret facility and the Insignia of Unity were left abandoned and forgotten for over six decades. During the Yuuzhan Vong's invasion of the galaxy, the Yuuzhan Vong settled the world and began Vongforming it to meet their needs. The land was transformed into cliffs of yorik coral, tampasis of s'teeni, with populations of scherkil hla, sparkbees, and other Yuuzhan Vong biots. Over the course of twenty years the Vongforming had taken its toll on the planet. Intact forests abundant with life still covered the southern hemisphere, while surface temperatures had rendered landmasses in the northern hemisphere unsuitable for all but the most extremophilic sentient species. Extensive regions of extreme volcanic and tectonic activity griped the planet in catastrophic forces that were likely to destroy it. The sky was filled with powerful winds and icy clouds that produced storms with sheets of rain, lightening, and hailstones. And while still breathable, dweebit beetles filled the atmosphere with high concentrations of carbon dioxide, methane, and sulfur. In 43 ABY the Solos, accompanied by Tobb Jadak and Flitcher Poste, came to Tandun III as part of their quest to uncover the history of the Millennium Falcon. They landed the Falcon inside of the abandoned Republic Group warehouse and discovered the Insignia of Unity. It was at that time that Lestra Oxic appeared and revealed that he had followed the Solos to Tandun III in order to claim the emblem for himself. He told all present the history behind how the emblem ended up at Tandun III and inspected it only to realize that the emblem before him was a fake. At the same time of the meeting, groundquakes increased in severity and volatility finally ending in the planet's strongest quake. Oxic and his associates, now accompanied by Jadak and Poste, left to continue the search for the true Insignia of Unity, as the Solos themselves fled the planet. It was shortly after the Millennium Falcon's return to space that Tandun III flared and erupted in a shock wave that hurtled enormous chunks of itself into the vacuum of space. Behind the scenesEdit C-3PO stated the first survey of the world took place around 12,293 BBY and that the expedition was launched from Ord Mantell. This is odd due to the fact that Ord Mantell was not colonized until 12,000 BBY. Additionally, C-3PO said Dr. Beramsh believed the ancient population centers were Rakatan in origin. Yet, the Rakata were unknown to the galaxy at large until the end of the Jedi Civil War in 3,956 BBY. He continued to claim that the world was not colonized most likely due to its distance from the Hydian Way which was pioneered in 3,705 BBY. Thus the reason why the world was never colonized in the thousands of years between its exploration and the founding of the Hydian Way remains a mystery.
<urn:uuid:a9a8cdf5-ec0d-4a29-9793-af0701a63e8d>
CC-MAIN-2013-20
http://starwars.wikia.com/wiki/Tandun_III
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.961923
908
2.59375
3
Information contained on this page is provided by NewsUSA, an independent third-party content provider. WorldNow and this Station make no warranties or representations in connection therewith. /National Children's Cancer Society) - The good news is that some drug shortages have been resolved, and many essential childhood cancer drugs are now more available. The root of the problem, however, persists. For the past two years, hospitals have been hit with significant shortages of many generic drugs for several diseases, including cancer. In 2011 alone, there were at least 250 different shortages. Pharmaceutical companies and drug manufacturers make less money off many of the older, generic drugs used for cancer treatment. But generally, most shortages are a result of manufacturing snags and production problems. Improvements are being made; cooperation between drug manufacturers and the FDA has helped prevent many new shortages. But at large, oncology drugs for both children and adults are severely lacking. Sandra Kweder, deputy director of the FDA's Office of New Drugs, wholeheartedly agrees, "With regard to oncology drugs we remain extremely concerned about the shortages," she said at a press conference held by the American Society of Clinical Oncology. Although there are ongoing shortages of anesthesia, pain medicines and antibiotics, the scarcity of cancer drugs means that any shortage has a huge impact. Last year broke records -- more than 200 cancer drugs were unavailable. When an Ohio plant was shut down due to manufacturing problems last November, production halted on several critical drugs, including a preservative-free version of methotrexate -- the key treatment for the common pediatric cancer acute lymphoblastic leukemia. "The childhood cancer community was very concerned," says Angie Hayes, Case Manager for The National Children's Cancer Society (NCCS). "Childhood cancer patients and families shouldn't have to delay treatment because hospitals and cancer treatment centers ran out of medication." The Fight Against Childhood Cancer Continues The NCCS has provided assistance to more than 30,000 children in the U.S. For 25 years, NCCS has grown and evolved with programs such as the Pediatric Oncology Program (POP), which has distributed over $54 million to families, and Beyond the Cure. This year alone, Beyond the Cure -- a survivorship program designed to educate children and their families about the challenges they may face as childhood cancer survivors -- has awarded $125,000 in college scholarships to 38 cancer survivors. To learn more about the resources offered by NCCS, visit www.theNCCS.org
<urn:uuid:8061ba9c-5adf-48d3-931f-1aa8d365e4d2>
CC-MAIN-2013-20
http://www.fox2127.com/story/19746077/patients-face-cancer-drug-shortages
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958588
525
2.609375
3
CURRENT CZECH NAME: Ostroh Ostroh Uhersky, Uhersky Ostroh, Ungarisch-Ostra, Ungarisch-Ostroh LOCATION: Ostroh is a small town in Moravia, located at 48.59 longitude and 17.23 latitude, 75 km E of Brno, 9 km ENE of Bzenec (seeMap - by Mapquest, then click on your browser's "Back" button to return to this page). HISTORY: The earliest known Jewish community in this town dates from 1592. In 1635 there were 22 Jewish houses. In 1671 there were 16 Jewish houses with more than 30 Jewish families, including Isak Schulklopper, Salamon Lateiner, Israel Isak, Mandl, Salamon Chaska, Benesch, Friedrich Kojeteiner, Schmidl, Jekl Fleischhacker, Salamon Mojses, Rabiner, Mojses Stanjetz, Jakob Gutman, Israel Strimpfstricker, and Loebl Isak. From 1798-1848 there were 89 Jewish families. In 1848 the community numbered 478 members, but dropped to 220 after the First World War. The Jewish population was 70 in 1930. The present town population is 5,000 - 25,000 with fewer than 10 Jews. Noteworthy historical events involving or affecting the Jewish community were the separation of a Jewish quarter in 1727 and the existence of a self-standing political community from 1890-1920. The old Jewish cemetery was established in 17th century, with the last known Jewish burial in 1862. The Jewish congregation was Conservative. Birth, Death and Marriage record books for Ostroh may be located at the Czech State Archives in Prague, Statni istredni archiv, tr. Milady Horokove 133, CZ-166 21 Praha 6, Czech Republic, tel/fax: +42 (2) 333-20274. Search JewishGen/Internet resources for Ostroh. NOTABLE RESIDENTS AND DESCENDANTS: According to the entry in the International Association of Jewish Genealogical Societies Cemetery Project database, Chaim Weizmann, president of the State of Israel, once lived in Ostroh. The following rabbis worked in Ostroh: Salomo Mose (1592); David b. Samuel Halevy (1659); Mose b. Hakadosch Elchanan from Fuerth (1655); Jesaja b. Sabatai Scheftel (1659); Joel b. Samuel from Krakau (1668); Mhrr Pinchas (after 1700); Mhrr Salomo (before 1719); Kolonimos b. mhrr Baruch (from 1720); Loeb Steiniz (d. 1760); Mhrr Pinchas b. mhrr Aaron (1766); Jakob Hirsch b. Mose Loeb (Biach) Feilbogen (1790-1853); Mose Loeb b. mhrr JA ha-Kohen Mueller (d. 1853); Dr. Joel Mueller; Dr. S. Wolfsohn; (1876-1878); Dr. Israel Taglicht (1883-1893); Dr. Emanuel Lenke; Dr. D. Herzog (1897-1900); Dr. Simon Friedmann; Dr. Michael Halberstamm (from 1919). Other notables include: Mordechai b. Schalom (community elder and author of the statutes of the chevra kadisha in 1650); Schalom b. Jecheskel (landowner 1668); Mandl Salamon Steinitzer (land deputy 1732); Michl b. R. Sch. David (judge); Mose Singer (judge 1835); Mandl Duschak (judge 1858); Loeb Winter (judge 1860); Jesajas Braun (judge 1864); Sal. Kihn (judge 1876); Salamon Winter (judge 1880-1888); Jonatan Lamberg (judge); Max Kihn (judge 1898); Dr. Eduard Stern (judge 1902); Jehuda Diamand (judge 1903); Sigmund Klein (judge 1909); Loeb Nussbaum; Samuel Kornblueh; Sal. Sommer; Jakob Hahn; Jakob Strauss; Jechiel Gruenbaum. Rabbi Dr. Moritz Grünwald was born 29 March 1853 in Ostroh. He studied at the Universities of Vienna and Leipzig. He founded the Jüdische Centralblatt in Belovar. In 1883 he became rabbi of Pisek and later Jungbunzlau. He was the chief rabbi of Sofia from 1893 until his death in London on 10 June 1895. The great-great- grandson of Amalie Reif (b. Ostroh), E. Randol Schoenberg, is a frequent contributor to Jewishgen's Austria-Czech SIG and the submitter of this page. Tom Beer has submitted an interesting story about his great-grandfather, Beer (b. Ostroh). CEMETERIES: There are two Jewish cemeteries in Ostroh. The older cemetery location is urban, on flat land, separate but near other cemeteries, and not identified by any sign or marker. It is reached by turning directly off a public road. It is open to all. The cemetery is surrounded by no wall or fence and there is no gate. The approximate size of cemetery before WWII and now is 0.1277 hectares. The cemetery contains no special memorial monuments. The cemetery contains no known mass graves. Within the limits of the cemetery there are no structures. The municipality is the present owner of the cemetery property, which is now utilized for recreation (park, playground, sports field). Adjacent properties are commercial or industrial. The cemetery boundaries have not changed since 1939. Private visitors come rarely to the cemetery. The cemetery was vandalized during World War II and between 1945 and 1981. No maintenance has been done. Now there is occasional clearing or cleaning by authorities. There is a slight threat posed by pollution and proposed The new cemetery is located at 1.5 km to the E, Veselska-Str. This Jewish cemetery was established in 1862. The last known Jewish burials were in the 1950s and 1960s. The cemetery location is urban, on flat land, separate, but near other cemeteries, and not identified by any sign or marker. It is reached by crossing the public property of the town cemetery. It is open to all. A continuous masonry wall surrounds the cemetery. There is a gate that does not lock. The approximate size of the cemetery is now 0.2777 hectares; before WWII it was about 0.47 hectares. There are 100-500 stones. The cemetery has no special sections. The tombstones and memorial markers are made of marble, granite and sandstone. The tombstones vary among flat shaped stones, finely smoothed and inscribed stones, flat stones with carved relief decoration and obelisks. The cemetery has tombstones with bronze decorations or lettering and metal fences around graves. Inscriptions on tombstones are in Hebrew, German and Czech. The cemetery contains special memorial monuments to Holocaust victims. There are no known mass graves. Within the limits of the cemetery are no structures. The present owner of the cemetery property is the local Jewish community of Brno. The adjacent properties are other cemeteries. The current Jewish cemetery boundaries are smaller now than in 1939 because of the town cemetery. Private visitors come occasionally to the cemetery. The cemetery has been vandalized occasionally, mostly between 1981-91. No maintenance has been done. Local/municipal authorities and Jewish groups from within the country did restoration work, finally completed in 1991. Now there is occasional clearing or cleaning by authorities. There is a moderate threat posed by pollution, vegetation and vandalism; and slight threats are posed by uncontrolled access, weather erosion, and existing and proposed nearby development. These surveys were completed on 1.3.1992 by Ing. Arch. Jaroslav Klenovsky, Zebetinska 13, 623 00 Brno. CONTACTS: Town officials: Magistrate Jiri Chmelar, Mestsky urad Hradistska 305, 687 24 uhersky Ostroh, tel. 0632/91116. Regional officials: PhDr. Jana Spathova, Okresni urad, Referat Kultury, 686 01 Uherske Hradiste, tel. 0632/432. Interested parties: Slovacke muzeum, dir. PhDr. Ivo Frolec, Smetanovy sady, 686 01 Uherske Hradiste, tel. 0632/2262. Other sources: Bohumil Gelbkopf, Rybare 198, 687 24 Uhersky Ostroh, Tel. 0. SOURCES: Gedenkbuch der Untergegangenen Judengemeinden Mährens, Hugo Gold ed. (1974), pp.. 116-117; Die Juden und JudengemeindenMährens in Vergangenheit unde Gegenwart, Hugo Gold ed. (1929), pp: 563-570 (pictures); Jiri Fiedler, Jewish Sights of Bohemia and Moravia (1991), pp. 53-54; International Association of Jewish Genealogical Societies Cemetery Project, Czech Republic, Ostroh. SUBMITTER: E. Randol Schoenberg, 3436 Mandeville Canyon Road, Los Angeles, California 90049-1020 USA. Tel: 1-310-472-3122 (h), 1-213-473-2045 (w). Fax: 1-213-473-2222. Web Page: http://www.schoenberglaw.com Return to GemeindeView Return to Austria-Czech SIG Homepage
<urn:uuid:44402fd5-8293-4e40-b086-ef8eab40cc65>
CC-MAIN-2013-20
http://www.jewishgen.org/AustriaCzech/TOWNS/ostroh.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.843206
2,245
2.609375
3
The New Genetics of Mental Illness; June/July 2008; Scientific American Mind; by Edmund S. Higgins; 8 Page(s) Throughout history shamans, clerics and physicians have tried to pin down what goes awry when a person slips into sadness, insanity or psychosis. Theorists have variously blamed mental illness on an imbalance of bodily fluids, the movement of planets, unconscious mental conflict and unfortunate life experiences. Today many researchers believe that psychiatric disorders arise in large part from a person¿s genetic makeup. Genes, after all, are the blueprints for the proteins that create and control the brain. And yet genetics cannot be the whole story: identical twins, who have virtually the same DNA, do not always develop the same mental disorders. For example, if one identical twin acquires schizophrenia, the other stands just a 50 percent chance of also suffering from the disease. Indeed, abundant data suggest that psychiatric ailments typically result from a complex interplay between the environment and a number of different genes [see ¿The Character Code,¿ by Turhan Canli; Scientific American Mind, February/March 2008]. But only recently have scientists begun to grasp how the environment affects the brain to produce psychological changes.
<urn:uuid:919d6c46-6426-44db-bb78-2275e613a3a2>
CC-MAIN-2013-20
http://www.sciamdigital.com/index.cfm?fa=Products.ViewIssuePreview&ARTICLEID_CHAR=3046CF17-3048-8A5E-10E171E8100FFDE0
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.886588
249
3.46875
3
Our newest title Busy with Bugs Extremely Interesting Things to Do with Bugs Illustrated by Margaret Brandt National Best Books 2010 Award Children's Educational category USA Book News For kids who love bugs and bug adventures, Busy with Bugs is a guide for exploring the miniature world of tiny animals. This book buzzes with information, fun facts, and 160 extremely interesting things to do with bugs. It teaches children to explore the anatomy, behavior, life cycles, and habitats of bugs in their own backyards and school yards. Reference pages include a glossary packed with information, a lists of useful resources, and an invaluable guide to Find out more Creek Books is a small publisher committed to "teaching kids to care for the Earth." Our books are designed to motivate children to listen to, learn from, and love the world of nature. We believe that children who learn to love our Earth today will protect it tomorrow. On our web site, you can look at our books and find out how to order them. In you¡¯ll find fascinating information, and projects and activities to try at home or school. We are working to develop our site into an ideal place for kids ¡ª a place where they can have fun learning about our Earth. the Squirrel House, a photo journal about a family of squirrels which live at Trickle Creek. You'll find plans for building a squirrel house, other squirrel activities, and photos of baby squirrels. Cooper to download a complete teacher's guide (preK-2) for teaching about rainforests. You'll also find free paper dolls, coloring pages, bookmarks, a pattern for making a bromeliad and a poison-arrow frog, and an interview with Toni Albert, the author of Saving the Rain Forest with Cammie and Cooper. Buy the hardcover edition of I Heard the Willow Weep for $6.00. (Retail price: $15.95) This is the perfect book for Earth Day ¡ª and Earth Day is everyday! You'll find it in our Half-Price Warehouse.
<urn:uuid:39e97fe4-9d3b-42c5-a0f0-95c9b878e815>
CC-MAIN-2013-20
http://www.tricklecreekbooks.com/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.88037
467
2.65625
3
The latest weapon unleashed to battle California's growing energy demand comes in the form of free software. The State of California Energy Commission's Public Interest Energy Research (PIER) program is responsible for the development of a free software package dubbed the Sensor Placement and Orientation Tool (SPOT). The purpose of this software is to help designers establish correct photosensor placement relative to a given daylighting and electric lighting design. Daylighting systems, which use natural lighting to supplement electric lighting, are sensitive to photosensor placement and performance. However, until now, there have been no easy-to-use tools to help designers predict performance and determine optimum sensor positioning. Using an Excel worksheet interface, SPOT accounts for variables such as room geometry, surface reflectances, solar orientation, electric lighting layout, and window design to help determine the best location for photosensors. It also helps designers comply with the daylighting requirements in California's Title 24 energy code, which calls for separate controls for daylit areas and offers substantial energy budget credits for automatic daylighting controls. This software may be downloaded for free at www.archenergy.com/SPOT/index.html.
<urn:uuid:861d6521-280c-4c1c-a82a-cefc6a20e131>
CC-MAIN-2013-20
http://ecmweb.com/content/see-spot-run
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.890742
237
2.5625
3
Hop into roo before it's too late A call for Australians to eat kangaroos to combat climate change might be a case of tuck in now before it's too late, research by an Australian biologist suggests. Writing in the December edition of Physiological and Biochemical Zoology, Dr Euan Ritchie, of James Cook University in Queensland, says population numbers of the iconic Australian marsupial are at threat from climate change. Ritchie, from the School of Marine and Tropical Biology, says a rise in average temperatures in northern Australia of just 2°C could reduce suitable habitat for kangaroo populations by as much as 50%. His findings follow a recent call by economist, Professor Ross Garnaut, of the Australian National University, that Australians help fight climate change by swapping their beef-eating habits for a taste of Skippy. Ritchie, who admits to being a committed roo eater, says his findings should not deter people from kangaroo steaks and may even help the animal survive. "The species [of kangaroo] currently being harvested are very well monitored," he says. "So it means we will pick up differences [in range and population] very quickly and will be in a position to respond to that." According to the study, the kangaroo species under greatest threat is the antilopine wallaroo. Ritchie says it is more vulnerable because it has a very defined range across the tropical savannas of far northern Australia from Cape York in Queensland across to the Kimberleys of Western Australia. Using climate change computer modelling, Ritchie and co-author Elizabeth Bolitho, also of James Cook University, found the 2°C temperature increase, predicted by 2030, would shrink the antilopine's range by 89%. A 6°C increase, the upper end of temperature increase predictions to 2070, may lead to their extinction if they are unable to adapt to the arid environment which results, Ritchie says. He says the main threat of climate change is not on the kangaroo itself, but on the habitat that sustains its populations. Among the impacts that will affect their geographic range are increased prevalence of fires and changes to vegetation and the availability of water. He says a 0.4°C increase would reduce the distribution of all species of kangaroos and wallaroos by 9%. An increase of 2°C saw the geographic range of the kangaroos reduced by as much as 50%. Weathering the changes However the news is not all bad. By contrast to the antilopine, Ritchie says the eastern gray kangaroo is in a strong position to weather climate changes because of its predominance in the cooler eastern seaboard of Australia. And he says the red kangaroo and common wallaroo are better adapted to sustain hotter climates. Professor Lesley Hughes, of the Climate Change Ecology Group at Macquarie University in Sydney, backs Ritchie's findings. "Virtually every time we do bioclimatic modelling you get this result [of species under threat]," she says. However she says few studies "go up to 6°C" because "the more you extrapolate into the future the more doubt you have". Hughes adds however that a 6°C rise in temperature would "wipe out" most native Australian species.
<urn:uuid:5480eda0-6c9b-47da-84e6-b4482d8deaf3>
CC-MAIN-2013-20
http://www.abc.net.au/science/articles/2008/10/16/2392960.htm?site=science&topic=latest&listaction=unsubscribe
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955928
701
3.296875
3
Deep in a North Carolina marsh, a lone swamp sparrow sits on his perch in the middle of the water. He’s singing his usual song. But he’s also aggressively flapping one wing, trying to incite a nearby male into action. Onlookers are watching – just to see what happens. However, this is no ordinary territorial scuffle. This is bird research. The sparrow on the perch is a robot, and the chief, hip wader-clad onlooker – who is also in control of the robot’s movements – is Steve Nowicki, Ph.D., a biology, psychology, and neurobiology professor at Duke University. He’s testing whether the wing flap will actually prompt a fight. According to Nowicki, birdsong and signaling have a surprisingly close relationship with human speech. “It’s an unexpected and remarkable model for human speech control, development and perception,” he said. “Birds also learn their songs in much the same way humans learn to speak, and that’s an unusual trait. They have to learn their language from their parents.” His research, though, isn’t about merely studying how birds behave and communicate. He and his team watch signals and behaviors; they run simulations and analyze hormones; they record neurons and assemble protein sets. They’re deciphering how birds promote their survival and reproductive success. In short – they’re studying evolution, past and present. Nowicki, who is also dean and vice provost of undergraduate education, was almost the bird researcher who wasn’t. As a student at Tufts University in Boston, he was a declared music major. Late in his collegiate career, he discovered a love of biology – particularly the brain and behavior – and raced to complete a major in the subject. He then pursued his graduate degree in neurobiology at Cornell University. It was there he was first introduced to the siren song of birds. When it comes to communicating, birds have far less to say than humans. But they express themselves in equally complex ways, Nowicki said. “Humans use complicated signal communication, and we use an array of sounds to create words that have rich meanings,” he said. “When you look at sparrow songs – the number of notes per second and the frequency – it’s just as complicated as human speech. They’re just not saying much.” All the same, they’re getting their points across. Songs, signals and responses In addition to the aggressive response the swamp sparrow’s wing flap provokes, the absence or introduction of song or even a physical attribute can prompt birds to behave differently, Nowicki said. Birds, like most animals, are territorial and will, in most cases, defend their turf. But how will neighboring birds respond if a battle ensues? Will they come to help or avoid the fight? Will they treat the male differently if he loses to the interloper? Researchers can test this reaction, Nowicki said, by removing a bird from its environment, playing a recording of another male’s song, and, then, reintroducing the bird to see how the others respond. “It’s interesting to see what happens, because no one wants a floating male in the neighborhood,” he said. “Research has shown that with some birds, peer birds are more wary of the winner, but they might also try to encroach on a loser’s territory.” And, just as with other species, birds can use their physical attributes to signal to and communicate with each other. For example, a trait, such as a bright red neck and throat commonly seen in the male house finch, can broadcast a bird’s prowess or superior qualities. The red-throated male finch does attract more females, Nowicki said, but it isn’t because of the color. The pigment comes from a carotenoid-rich diet that gives these males a stronger immune system, making them better mates. Male song sparrows use their song repertoire in much the same way. The more songs they learn and exhibit, the more attractive they are to females. The reason, Nowicki said, is that birds with larger song selections appear to be smarter. They simply learn songs faster. “Males who sing better have better developed brains, and in theory that makes them better mates,” he said. “We’re still working out why having a better brain for learning song is better for the female, but it’s clear females prefer these males as their mates.” Impact on human activity Understanding the role and importance of birdsong and signaling doesn’t shed much light on the evolution of human communication, but knowing what songs and signals mean to birds can directly affect human choices and behavior. For example, researchers have evidence that stress directly affects a bird’s ability to develop song, which can ultimately impact pair bonding and mating. If scientists study the way birds living in both polluted and pristine environments sing, the data could play a role in accurately evaluating ecosystem health. This knowledge also can impact wildlife preservation efforts. It isn’t enough to allocate a certain amount of space to a population based only on the number of animals surveyed. There are often other factors at work, Nowicki said. In the case of the small warbler ovenbird, it’s important to know that females won’t be setting in an area with fewer than 10 males. This type of information can significantly alter conservation efforts, he said. Regardless of how the research of birdsong is used, Nowicki said, his work constantly reminds him of how intertwined birds and music are with our surroundings. “I keep coming back to birdsong not simply because it’s a good model,” Nowicki said. “When I wake up in the morning and hear birds singing, it’s part of the wonderful aesthetic world we live in, and my job to learn more about it is a privilege.”
<urn:uuid:9d5aedae-1c1e-4524-9e41-be13a6e09882>
CC-MAIN-2013-20
http://www.charlotteobserver.com/2013/02/03/3828440/what-songbirds-have-to-say.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.959024
1,291
3.015625
3
Philosophy and Religion The Philosophy and Religion Department at Montclair State University is home to the "big questions": the nature of truth, knowledge, art, morality, social justice, life, death, God, the universe, and Being itself. In our department, you will learn what human beings have thought about these big questions throughout history, and how they have sought to live their lives in relation to the answers. You will also be encouraged to address these questions yourself and make them relevant to your own life. The discipline of Philosophy puts you in conversation with thinkers from ancient times to the present who have asked questions such as: What is the nature of truth, and justice? Is there a natural law that governs the universe? How can I know reality—through reason or through sense experience? How is my mind related to my body? How do I make ethical judgments when there is no clear "right" or "wrong" answer? What makes something beautiful? Is democracy always the best form of government? The study of Religion aims to understand how people have lived out their central beliefs about this world and the next, the secular and the sacred, humanity and the divine. In itself, religion has been an arena for struggling with questions of meaning and reality. It has also been a powerful influence in law, government, family life, and the arts. One cannot adequately understand human experience or the clash of nations and empires without attending to the roles played by religion. For more information, contact:
<urn:uuid:2948dd71-b6c5-4b0c-89ec-71428203558b>
CC-MAIN-2013-20
http://www.montclair.edu/chss/philosophy-religion/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697974692/warc/CC-MAIN-20130516095254-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.958797
303
2.8125
3
Description from Flora of China Herbs, annual or perennial, all parts strongly aromatic (anise-scented). Stem erect, terete, gray-green or lurid-green, glabrous. Leaves petiolate, sheaths membranous-margined; blade pinnately decompound; ultimate segments linear. Umbels compound, terminal and lateral; bracts and bracteoles absent; rays numerous, upwards-spreading, unequal. Calyx teeth obsolete. Petals yellow, obovate, mid rib conspicuous, apex with narrowly inflexed lobule. Stylopodium conic; styles very short, reflexed. Fruit oblong, terete, glabrous; ribs 5, acute or round-obtuse; vittae 1 in each furrow, 2 on commissure. Seed face plane or slightly concave. Carpophore 2-cleft to base. One species: Mediterranean region; cultivated and adventive worldwide, including in China. (Authors: She Menglan (佘孟兰 Sheh Meng-lan); Mark F. Watson)
<urn:uuid:f898d281-b54c-44cd-8653-9ab2f8a313df>
CC-MAIN-2013-20
http://efloras.org/florataxon.aspx?flora_id=620&taxon_id=112896
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.771678
240
2.59375
3
What orbits the Earth at 17,500 miles per hour, is 360 feet wide, 260 feet long and has a crew of 3? It is the International Space Station, also known as the I.S.S. It is going to be finished in the year 2006. The countries that are putting it together are the United States, Russia, Japan, Canada, Brazil, Austria, Belgium, Denmark, Finland, France, Germany, Great Britain, Ireland, Italy, the Netherlands, Norway, Spain, Sweden and Switzerland. There will be 100 different pieces sent up to space to create the I.S.S. What You Want to Know About The I.S.S. When it is completed, the I.S.S. will be the size of two football fields. You will be able to see it from Earth without a telescope. The I.S.S. will be much bigger than previous space stations. Other space stations, like Mir, were cramped. You also had to eat dehydrated food (food without water). The I.S.S. will have a refrigerator with fresh foods. The I.S.S. is like living on earth except one thing-you are weightless! When you are sleeping, you have to be strapped to the wall or else you will float out of your bed. The first crew went up in orbit on October 31, 2000. The size of the crew was decided by how big the escape pod was. That was 3. Did you know that every time we breathe or exercise we add moisture to the air? This extra moisture has to be removed from the air on the ISS so the moisture doesnít collect on the ISS equipment. This moisture will be recycled. The crew will recycle all of the water on board from the moisture in the air to the crewís urine and wash water. I know that sounds really gross, but the water is going to be purified and going to be cleaner than the water we drink here on Earth. There are 3 steps to purifying the water: The crew will be up in space for a long time, but when they come back, they wonít be able to walk right away. There is no gravity in space so you donít use your legs that much, and when you go to use them itís just like trying to run after you rollerblade. The people that are training to get on the space station are going to train hard. They will have to train for 2 years. Some of that training will be in the Canadian forest in the middle of winter to prepare them for problems they might run into up in space. What are Some Modules Up in Space? In 1999,the first U.S. built station component, the Unity connecting module, was moved to the launch pad. It was loaded onto the Space Shuttle, Endeavour. More than six major components are in the processing facility. At the end of the year 2000, more than 500,000 pounds of U.S. and international station equipment was completed. Thatís the weight of 250 pick-up trucks. Unity is a six-sided connecting module to which all-future U.S. station modules will attach. Unity will serve as a passageway to various parts of the station. Attached to Unity are two adapters. One to serve as a permanent connection to the Russian station and another that will serve as a shuttle docking port. What is Going to Put Some Of the International Space Station Together? Some of the I.S.S. is going to be put together from the outside. One of the dangers is that you could be hit by a micrometeoroid. Some micrometeoroids are the size of a grain of sand, but others can be the size of basketballs and go right through you. The countries that are building the I.S.S. have built robots to put together some of the I.S.S. so that no one gets hurt. Remember, the I.S.S. is made up of 100 different modules so it will take a long time to put it together. Space: Everything You Want to Know and Beyond. </J0112388> Last Visited: December, 2001. NASA.<http://www.nasa.gov> Last Visited: January, 2002. Space in the Spotlight Novi Meadows Elementary 2002 All pictures courtesy of NASA unless otherwise noted
<urn:uuid:991becfd-9c85-4bda-9c57-df0359bc1e99>
CC-MAIN-2013-20
http://library.thinkquest.org/CR0215468/international_space_station.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95787
913
3.109375
3
Hexavalent chromium is a compound used to create pigments and prevent corrosion in dyes, paints, primers, inks and plastics. The chemical is used in the production of stainless steel, leather tanning and wood preservation. The Hexavalent Chromium Panel was formed in October 2009 to represent former and current users of hexavalent chromium. The panel’s primary activities include sponsoring research to fill the scientific database informing the risk levels for hexavalent chromium in drinking water and communicating the findings of this research. In the past year, the panel has undertaken an effort to sponsor an independent study. Guided by highly qualified, leading experts, research is being conducted to determine the threshold at which the chemical is not toxic. This data will inform EPA and other policymakers as they develop a drinking water standard for hexavalent chromium.
<urn:uuid:06705a3e-bdaa-4d88-b958-5b6823c82336>
CC-MAIN-2013-20
http://www.americanchemistry.com/ProductsTechnology/Hexavalent-Chromium/default.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.942678
176
3.1875
3
The Handel and Haydn Society is a chorus and period instrument orchestra in the city of Boston, Massachusetts. Founded in 1815, it is one of the oldest performing arts organizations in the USA. Most widely known for its performances of George Frideric Handel's Messiah, the group gave its American premiere in 1818 and has performed the piece annually since 1854. The Handel and Haydn Society was founded as an oratorio society in Boston on April 20, 1815, by Gottlieb Graupner, Thomas Smith Webb, Amasa Winchester, and Matthew S. Parker, a group of Boston merchants and musicians who were eager to improve the performance of choral music in a city that, at the time, offered very little music of any kind. The name of the Society reflects the foundersí wish to bring Boston audiences the best of the old (G.F. Handel) and the best of the new (Haydn) in concerts of the highest artistic quality. The first performance by the Society was held on Christmas night in 1815 at King's Chapel, and included a chorus of 90 men and 10 women. From its earliest years, the Handel and Haydn Society established a tradition of innovation, performing the American premieres of G.F. Handelís Messiah in 1818, Haydnís The Creation in 1819, Verdiís Requiem in 1878, Amy Beach's Mass in 1892, and numerous other works by G.F. Handel, Mozart, J.S. Bach, and others. The Society was also an early promoter of composer Lowell Mason, publishing his first collection of hymns and later electing him as the group's President. Mason's music was extremely influential and much of it is still performed today. He is best known for composing the music for the popular carol, Joy to the World. Mason was also instrumental in establishing music education in the USA. Throughout the 19th and 20th centuries, Handel and Haydn staged music festivals to commemorate its own anniversaries and such significant events as the end of the Civil War. The Society organized Americaís first great music festival in 1857, and in later years gave benefit concerts to aid the Union Army, victims of the Chicago fire in 1871, and Russian Jewish refugees in 1882. Over the years, the Handel and Haydn Society has performed for such luminaries as President James Monroe, Grand Duke Alexis of Russia, Admiral Dewey, and Queen Elizabeth II. By the mid 20th century, the Handel and Haydn Society had begun to move toward vocal and instrumental authenticity. In 1967, an acknowledged expert in Baroque performance practice, Thomas Dunn, became the Society's Artistic Director and transformed the group's large amateur chorus into one of approximately 30 professional singers. In 1986, Christopher Hogwood succeeded Thomas Dunn as Artistic Director and added period-instrument performances and a new verve to the high choral standards of the Society. In October 1986, Handel and Haydn presented its first period instrument orchestra concert under Christopher Hogwoodís baton, and by the 1989-1990 season all of the Society's concerts were performed on period instruments. The Society has remained committed to historically informed performance following the end of Christopher Hogwood's tenure as Artistic Director in the spring of 2001. Handel and Haydn Society announced the appointment of Harry Christophers as Artistic Director on September 26, 2008. Harry Christophers, a regular guest conductor of the Society, began his tenure as Artistic Director with the 2009-2010 season and is the organizationís thirteenth artistic leader since its founding in 1815. The initial term of Harry Christophersí contract with the Society extends through the 2011-2012 season. Harry Christophers has conducted the Handel and Haydn Society each season since his first appearance in September 2006, when he led a sold-out performance in the Esterházy Palace at the Haydn Festival in Eisenstadt, Austria. Held in the same location where Haydn lived and worked for nearly 40 years, this Austrian appearance marked the Societyís first in Europe in its then 191-year history. Harry Christophers returned to conduct the Society in Boston in a critically acclaimed performance of G.F. Handelís Messiah in December 2007, followed by an appearance at Symphony Hall in January 2008. Founder and Music Director of the renowned UK-based choir and period-instrument orchestra, The Sixteen, he is also in demand as a guest conductor for leading orchestras and opera companies worldwide and in the USA. Welsh conductor Grant Llewellyn joined Handel and Haydn in the 2001-2002 season as Music Director. Grant Llewellyn did not have a background in period-instrument performance prior to joining the Society, but has won wide acclaim from critics and musicians for his energetic and compelling conducting. He has been noted for his charming personality and for his ability to produce exceptional performances from the Society's musicians. During his tenure as Music Director, the Society produced several recordings that have met with considerable commercial success, including Peace and All is Bright which both appeared on Billboard Magazine's Classical Top 10 chart. Handel and Haydn Society was also awarded its first Grammy Award for a collaboration with the San Francisco choral ensemble Chanticleer for the 2003 recording of Sir John Tavener's Lamentations and Praises. The Society also entered into a multi-year relationship with Chinese director Chen Shi-Zheng starting in 2003. This has yielded fully-staged productions of Monteverdi's Vespers (in 2003) and Orfeo (in 2006) that Chen sees as the start of a cycle of Monteverdi's surviving operas and his Vespers. The 2006 Orfeo was co-produced by the English National Opera. Chen also directed a production of Purcell's Dido and Aeneas in 2005 for Handel and Haydn. Grant Llewellyn concluded his tenure in 2006. In July 2007, the ensemble made a historic appearance at London's Royal Albert Hall as part of the BBC Proms concert series, presenting Haydn's oratorio Die Jahreszeiten (The Seasons), with Sir Roger Norrington conducting.
<urn:uuid:adf9bed8-4123-4114-93c0-42bbc2bad6b4>
CC-MAIN-2013-20
http://bach-cantatas.com/Bio/H&HS.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.9671
1,281
2.53125
3
Crab, King – US (kani) In the U.S., there are three commercial King Crab species – Red, Blue and Golden King Crab – all caught in Alaskan waters. King Crabs typically mature around 5-7 years of age and can have a leg span of 6 feet. Most King Crab populations are at healthy levels of abundance and not considered overfished. Some populations are closed for fishing, however, to rebuild numbers. King Crabs are caught using crab pots, which are typically 700 lb steel pots covered with nylon webbing. Although large, they do relatively little damage to the muddy sea floor. New management policies and regional closures have helped mold this ‘derby’ fishery into a well-regulated, efficient and economically stable program. Bycatch in King Crab fisheries is low, typically consisting of female and undersized male crabs.
<urn:uuid:2c1449a3-7478-455e-8554-5da26976376b>
CC-MAIN-2013-20
http://blueocean.org/seafoods/crab-king-us-kani/?showimg=562
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.955856
181
3.203125
3
“Norman Clyde was attracted to the Sierra Nevada Mountains sometime after 1911 while in his mid-20s… Clyde spent more than 50 years perfecting his mental maps, locating crashed airplanes, and rescuing lost souls and climbers in trouble - or retrieving their bodies. Clyde’s name was legendary. Many climbers would rank him second only to John Muir as an intimate pioneer of places inaccessible and second to none as a climber… Clyde climbed Mt. Whitney at least 50 times. Between 1914 and about 1940, he became the first climber to reach the tops of at least 126 peaks.”
<urn:uuid:2a5fd565-ef99-481d-a074-65aa47b0cdea>
CC-MAIN-2013-20
http://new-tomorrows.tumblr.com/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.978933
125
2.578125
3
Potatoes are one of the easiest plants to grow because they are not extremely picky about the soil that they are grown in. Growing the best potatoes, however, requires preparation and diligence during the growing stages. As potato plants spread and the potatoes start to grow, the gardener needs to be sure that the tubers remain covered with soil. Chit (pre-sprout) the seed potatoes. This step is optional but recommended. Cut out the crown sprouts or eyes to allow the potato to grow sprouts from the shoulders and sides. To find the crown sprout, look closely at the potato for a cluster of more than four or five eyes. Cut out these eyes with a potato peeler and set the potatoes in an egg carton, crown side up. Check the potatoes every few days and mist them lightly with a water/fertilizer mix. When the sprouts have grown to about an inch, they are ready to plant. Clear the planting area of all weeds and debris, using a shovel and garden rake. Remove any rocks and roots, as they can interfere with the growth of the potatoes. Prepare the soil to approximately 1 foot deep. Spread a 2-inch layer of compost or planting mix onto the cleared soil and mix in with a shovel. Dig into the soil with the shovel and turn the dirt several times until the compost and soil are mixed thoroughly. Plant the sprouted (or unsprouted) seed potatoes at a depth of about 1 inch and about 1 foot apart. If the seed potatoes are small, less than 2 oz. each, they do not need to be cut; if they are larger than 2 oz., cut the potatoes into chunks that include at least one eye each. Each chunk should be no smaller than 1 square inch. Water the potatoes thoroughly at least once each week. Over-watering will cause potatoes that have black centers, but potatoes need to be watered consistently to avoid misshapen tubers. Check the leaves and stems daily for insect damage and treat as necessary. Bring in dirt from other areas of the garden to bury the tubers as they grow in size; do not let the potatoes become uncovered while growing. Harvest the potatoes at any desired stage of growth. New potatoes are small, tender potatoes and are used in many recipes. Allow baking potatoes to grow larger.
<urn:uuid:b9c4d755-8f2c-4731-bbf2-3a6ea75a3724>
CC-MAIN-2013-20
http://www.gardenguides.com/80951-grow-potato-plant.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705195219/warc/CC-MAIN-20130516115315-00002-ip-10-60-113-184.ec2.internal.warc.gz
en
0.944859
481
3.5
4