text
stringlengths 255
485k
| id
stringlengths 47
47
| dump
stringclasses 2
values | url
stringlengths 20
294
| file_path
stringlengths 125
138
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 62
102k
| score
float64 2.52
5.06
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Bob Walder, director of independent network security testing specialist the NSS Group, assesses the benefits and limitations of network intrusion prevention systems.
While most intrusion detection systems tend to be reactive rather than proactive - they have to wait until something has happened before they can raise the alarm - intrusion prevention systems attempt to be proactive.
An IPS is designed to stop intrusions dead in their tracks, blocking the offending traffic before it does any damage, rather than simply raising an alert after the malicious payload has been delivered. It achieves this by sitting directly in line with the network traffic - one network port accepts traffic from the external system, and another port transmits it to the internal system after it has been checked for anomalies or suspicious content. Problem packets, and all subsequent packets from the same data flow, can simply be discarded within the IPS appliance.
As with IDS systems, IPS products tend to fall into two categories: host IPS (HIPS) and network IPS (NIPS).
HIPS products rely on agents installed directly on the host system being protected. They interact closely with the underlying operating system and resident services in order to detect and prevent rogue system calls.
NIPS (sometimes known as in-line IDS or gateway IDS) could be thought of as a hybrid system, combining features of a standard IDS and a firewall. Like a firewall, the IPS appliance will sport at least two network interfaces: one designated as external and one as internal. Some appliances may have more that two interfaces in order to monitor multiple network paths, but the basic requirement is for two interfaces for data and one for management.
Placed in-line in a critical data path, the IPS detection engine examines packets as they pass through the device and processes them in a similar manner to an IDS in order to determine which packets are suspicious in nature. If a suspicious packet is detected, that packet can be dropped immediately, and all subsequent packets from that particular data stream can be discarded without further processing.
Naturally, an IPS will also raise an alert in the same manner as an IDS, and this allows the IPS to operate in traditional "IDS mode" as well. This is useful because it enables the administrator to tune the system before placing it in full-blown "prevention mode".
Legitimate packets are passed straight through to the internal interface and on to their intended destination. A useful side effect of some NIPS products is that, as part of the initial detection process, they will provide "packet scrubbing" functionality to remove protocol inconsistencies resulting from varying interpretations of the TCP/IP specification (or intentional packet manipulation). Any fragmented packets or packets containing obfuscated URLs will be "cleaned up" before being passed to the destination host.
There are a number of challenges in implementing an IPS device that do not have to be faced when deploying passive-mode IDS products. These stem from the fact that the IPS device is designed to work in-line, presenting a potential choke point and single point of failure.
If a passive IDS fails, the worst that can happen is that some attempted attacks may go undetected. If an in-line device fails, it can seriously affect the performance of the network. Perhaps latency rises to unacceptable values, or perhaps the device fails closed, in which case you have a self-inflicted denial of service condition on your hands. On the bright side, there will be no attacks getting through, but that is small consolation if none of your customers can reach your e-commerce site.
Even if the IPS device does not fail altogether, it still has the potential to act as a bottleneck, increasing latency and reducing throughput as it struggles to keep up with up to a gigabit or more of network traffic.
Devices using off-the-shelf hardware will certainly struggle to keep up with a heavily loaded gigabit network, especially if there is a substantial signature set loaded. This could be a major concern for both the network administrator, who could see his carefully crafted network response times go through the roof when a poorly designed IPS device is placed in-line, and the security administrator, who will have to fight tooth and nail to get the network administrator to allow them to place this unknown quantity among his high-performance routers and switches.
Dropped packets are also an issue, since if even one of those dropped packets is used in the exploit data stream, it is possible that the entire exploit could be missed. Some IPS suppliers get around this problem by using custom hardware - indeed, it may be necessary to design the product to operate as much as a switch as an intrusion detection and prevention device in very heavily loaded networks.
It is difficult for any security administrator to be able to characterise the traffic on the network with a high degree of accuracy. What is the average bandwidth? What are the peaks? Is the traffic mainly one protocol or a mix? What is the average packet size and level of new connections established every second?
If your IPS hardware is operating "on the edge", all of these are questions that need to be answered as accurately as possible in order to prevent performance degradation. However, if the IPS device is rated at wire speed (either 100mbps or 1gbps) it becomes a lot easier to simply drop the device in-line, safe in the knowledge that all normal traffic will pass through transparently. Determining which devices are capable of operating at such high speeds without introducing bottlenecks is not straightforward for the end-user, however, which is where independent third-party testing comes in.
Another potential problem is the false positive. The bane of the security administrator's life, the false positive rears its ugly head when an exploit signature is not crafted carefully enough, such that legitimate traffic can cause it to fire accidentally. While merely annoying in a passive IDS device, consuming time and effort on the part of the security administrator, the results can be far more serious and far-reaching in an in-line IPS appliance. Once again, the result is a self-inflicted denial of service condition, as the IPS device first drops the offending packet, and then blocks the entire data flow from the suspected hacker.
If the traffic that triggered the false positive alert was part of a customer order, you can bet that the customer will not wait around as their entire session is torn down and all subsequent attempts to reconnect to your e-commerce site are blocked by the well-meaning IPS.
In some respects, performance and detection capabilities are the least of the problems facing the administrator tasked with deploying these devices. The problem with any gigabit IPS/IDS product is, by its very nature, the amount of alert data it is likely to generate. On a busy network, how many alerts will be generated in one working day? Or even in one hour?
Even with relatively low alert rates of 10 per second, you are talking about 36,000 alerts every hour. That is 864,000 alerts every day. The ability to tune the signature set accurately is essential in order to keep the number of alerts to an absolute minimum. Once the alerts have been raised, however, it then becomes essential to be able to process them effectively. Advanced alert handling and forensic analysis capabilities - including detailed exploit information and the ability to examine packet contents and data streams - can make or break a gigabit IDS/IPS product.
There are a number of features that are essential in a true IPS product. Probably the most important is the ability to operate in in-line mode. This may seem like a superfluous requirement given the nature of the product, but since some IDS suppliers are claiming "intrusion prevention capability" in their marketing campaigns - which usually turns out to be nothing more than sending TCP reset commands across the wire or reconfiguring a perimeter firewall - it is an important distinction to make up-front.
Unless a device is placed in-line, it is extremely difficult to perform any kind of guaranteed prevention. In most cases, sending TCP resets or reconfiguring firewalls are ineffective prevention mechanisms - by the time the response has been completed, the payload has probably been delivered. The only way to stop a packet (and the rest of the data flow to which it belongs) dead in its tracks is to operate in-line.
The problem with working in-line, of course, is that there is always the potential to affect performance and the reliability of the rest of the network. If the IPS device fails open, the worst that can happen is that you miss an exploit. If it fails closed, you could cut off all external access to and from your network completely. Reliability is therefore essential.
The IPS appliance must offer the maximum up-time possible, and should not require a reboot to apply signature updates. Given that it can represent a single point of failure, it would be nice if it offered some form of failover mechanism for those sites that require guaranteed 100% availability.
As far as performance is concerned, the wish list would have "zero packet loss" and "zero latency" at the top. Zero packet loss under all normal loads is essential, of course, if the device is not to run the risk of missing exploit packets. Unfortunately, given the amount of processing that these devices have to perform for the majority of the packets passing through them, increased latency is something we will have to live with - but it should be kept to a minimum.
Broad and accurate signature coverage is also essential. Bear in mind that if you are going to place your IPS device in-line and turn on the blocking mechanism, you had better be confident that the signatures you have deployed are not prone to false positives. If you do not want to run in blocking mode, or if you want to block only a selected subset of signatures, then you still require a signature set that is comprehensive enough to allow the device to operate as an effective IDS.
There are other key requirements that are common to both IPS and IDS devices: a good alert handling and reporting mechanism; centralised management and configuration; flexible policy definition and deployment; and regularly updated signature sets, to name but a few.
This is a very interesting market and things are moving very quickly indeed. No sooner have we started to notice a broader adoption of IDS than we are already seeing them referred to as "legacy" systems.
IDS suppliers are fighting back by claiming intrusion prevention capabilities of their own, and the resulting marketing spin put on by both parties can only serve to muddy the waters for security administrators tasked with determining which is the best product for their environment. It is important to remember, however, that IDS devices were never designed with IPS in mind - they are detection mechanisms, not prevention devices. It is a little harsh to beat them up over an inability to prevent attacks - that is like buying a pair of Wellington boots and then moaning that they don't stop your head getting wet in the rain.
So called "legacy" IDS systems are likely to be around for a long time yet, and in many organisations there is probably a place for both technologies, at least for the time being.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Testing IPS systems
The NSS Group spends a lot of time creating the methodologies for its tests, and in-line IPS devices have proved the most challenging to date. First, the performance as a pure network device is measured: how quickly it can process packets and how many it drops under various loads.
Then its effectiveness as both a detection and prevention device is tested. Replay tools that provide a quick and easy means of testing passive-mode IDS products are no use for in-line devices, since testers need the stateful traffic to pass through the device in order to test detection capabilities - real exploits are the only way to go.
Finally, detection performance is measured under real-world traffic loads. NSS has invested in multiple Layer 7 traffic generation devices from Caw Networks which allow it to model real-world user behaviour and generate realistic session-based web, FTP, DNS and video/audio streaming traffic from up to two million users at up to 2gbps and 20,000 connections per second. Against this background traffic, testers launch numerous real exploits and monitor how effectively the device detects, alerts and blocks the exploit traffic.
The results of NSS' IPS research will be seen in its next big group test report - IPS Edition 1 - which will be published later this year.
Bob Walder, a leading authority on network security, is one of the founders of the NSS Group and author of the NSS report, Gigabit IDS Group Test (Edition 1), which is available from the NSS website.
The NSS Group is Europe's foremost independent security testing facility. Based in the UK with separate security and network infrastructure testing facilities in the South of France, the NSS Group offers a range of specialist IT, networking and security-related services to suppliers and end-user organisations throughout Europe and the US.
Output from the labs, including detailed research reports, articles and white papers on the latest network and security technologies, are made available on the NSS website.
A new report providing a detailed examination and extensive benchmarking of all the major players in the intrusion prevention systems market is currently in the testing phase, with publication due in the autumn of 2003. www.nss.co.uk/gigabitids | <urn:uuid:9c71fca5-6330-4adc-b40b-1543053876fa> | CC-MAIN-2017-26 | http://www.computerweekly.com/feature/Is-intrusion-prevention-better-than-cure | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00553.warc.gz | en | 0.957541 | 2,755 | 2.53125 | 3 |
Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Two Words By: Ravneet , Nuria , and Alisha
Transcript of Two Words By: Ravneet , Nuria , and Alisha
- About a girl named Belisa Crepusculario
- She grows up as an orphan
- She had extreme desire to be the best at selling words
-She first saw words in the sports section of the newspaper
- She learned to read from a priest for 20 pesos and read the dictionary until she knew it cold
- Went from cold mountains to coasts selling her words
- She eventually learns the impact that words and reading can have among society that is largely illiterate
- Her words became popular, fast, and everyone knew who she was
1. Belisa's name represents the lack of wealth in her family that "she herself had searched until she found the poetry of 'beauty' and 'twilight' cloaked in herself" (Pg.51)
3. Two words - Represents the connection between Belisa and the Colonel, The two words she gave the Colonel represents the connection they have which eventually brings them together.
2. Words -> The way of life. Without words Belisa wouldn't have a job . People wouldn't be able to communicate with each other .
- Spain during the Spanish Civil War
"Both the Colonel and El Mulato had spent their lives fighting in the civil war..."(Pg.53)
- During World War 2 , 1937
- Fransisco Franco-> March 31, 1939
- Centavos - Spanish currency
Story is narrated in the 3rd person.
- Allows the reader to get more of a general idea of the characters.
- However, limits the knowledge on the feelings of characters and their thoughts.
Belisa Crepsulario: Grew up extremely poor and could not afford a name. She had a rough past. Reading and writing had drastically changed her life. "Belisa Crepusculario saved her life and in the process accidentally discovered writing" (pg.52).
"...unable to determine its purpose, until curiosity overcame her shyness." (pg.52)
El Mulato: Colonels horseman. His named is linked to calamity and plunder, he does not change throughout the story (static character)
"...a giant known throughout the land for the speed of his knife and his loyalty to his chief." (Pg.53)
Colonel: Intimidating and powerful. Eventually becomes tired of being fearful. Even though he is very powerful he is illiterate. His named is linked to calamity and plunder as well. Dynamic character, Changes throughout the story
-Calamity: .An event causing great and often sudden damage or distress; a disaster.
-Plunder : Steal goods from, (typically using force and in a time of war or civil disorder
-She overcame her rough past
-Found something to live for
Perception and Insight
-Have a deeper meaning that what is perceived
CAN ANYONE TAKE A WILD GUESS AS TO WHAT THEY THINK THE TWO WORDS ARE!!!!????!?!?!?
There is no right or wrong answer!
"...She herself had searched until she found the poetry of 'beauty' and 'twilight' and cloaked herself in it." (Pg.51)
Meaning of her name in spanish
- Belleza means beauty
- Crepusculo means twilight
The Colonel couldnt stop thinking about her
"Te Amo"- Possible answer
Quote on pg.57, 3rd paragraph
Made By: Ravneet D, Alisha R and Nurije R | <urn:uuid:8b1f419b-679f-4409-aa23-d48b288a4af5> | CC-MAIN-2017-26 | https://prezi.com/tby6ey3meaza/two-words-by-ravneet-nuria-and-alisha/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00633.warc.gz | en | 0.955318 | 888 | 2.96875 | 3 |
Acronym for Spam and Open Relay Blocking System.
SORBS was originally an anti-spam project where a daemon would check, in real time, all servers from which it received e-mail to determine if that e-mail was sent via various types of proxy and open-relay servers. SORBS has evolved into SORBS DNSbl (DNS-based blacklist) which now includes more than 3 million listed hosts that are considered to be compromised (Web servers which have vulnerabilities that can be used by spammers).
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need... Read More »Slideshow: History of Microsoft Operating Systems
Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »Slideshow: Interesting Facts About Google Search
From Goats to Penguins, a server outage and trillions of searches, our slideshow presents interesting facts about Google and the Google.com... Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More » | <urn:uuid:8441883e-e20f-442b-aa07-d0031d72931d> | CC-MAIN-2017-26 | http://www.webopedia.com/TERM/S/SORBS.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323889.3/warc/CC-MAIN-20170629070237-20170629090237-00713.warc.gz | en | 0.852964 | 350 | 3.40625 | 3 |
ACE Studies Solar "Sneezes"
News story originally written on December 14, 1998
Scientists have used the Advanced
(ACE) to measure the temperature of tiny
"sneezes" of solar material called impulsive solar flares.
"These flares are relatively modest, compared to a typical solar flare.
Before ACE, we had to average over a group of them to get a temperature
estimate," said Dr. Joseph Mazur of the Aerospace Corporation, a
contributor to the research.
The Solar Energetic Particle Ionic Charge Analyzer (SEPICA) measures
electrical charge on atoms. Electrons are stripped from atoms at high
temperatures. By measuring the number of missing electrons (the charge),
SEPICA can determine the temperature of the flare
that created the particles.
Shop Windows to the Universe Science Store!
Our online store
on science education, classroom activities in The Earth Scientist
specimens, and educational games
You might also be interested in:
It was another exciting and frustrating year for the space science program. It seemed that every step forward led to one backwards. Either way, NASA led the way to a great century of discovery. Unfortunately,...more
The Space Shuttle Discovery lifted off from Kennedy Space Center at 2:19 p.m. EST, October 29th. The sky was clear and the weather was great as Discovery took 8 1/2 minutes to reach orbit for the Unitied...more
A moon was discovered orbiting the asteroid, Eugenia. This is only the second time in history that a satellite has been seen circling an asteroid. A special mirror allowed scientists to find the moon...more
Will Russia ever put the service module for the International Space Station in space? NASA officials are demanding an answer from the Russian government. The necessary service module is currently waiting...more
During a period of about two days in early May, 1998, the ACE spacecraft was immersed in plasma associated with a coronal mass ejection (CME). The SWICS instrument on ACE, which determines unambiguously...more
J.S. Maini of the Canadian Forest Service has referred to forests as the "heart and lungs of the world." Forests reduce soil erosion, maintain water quality, contribute to atmospheric humidity and cloud...more
In late April through mid-May 2002, all five naked-eye planets are visible simultaneously in the night sky! This is includes Mercury which is generally very hard to see because of its proximity to the...more | <urn:uuid:bcde13cb-2268-417d-9a72-f2620a865d98> | CC-MAIN-2017-26 | https://www.windows2universe.org/headline_universe/sneeze.html&edu=high | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323889.3/warc/CC-MAIN-20170629070237-20170629090237-00713.warc.gz | en | 0.940656 | 518 | 3.609375 | 4 |
Local mobile applications are the ones that therefore are used from there and are saved for your cell phones. They’re usually coded in a particular programming language for example Java for Objective and Androids C for iOS.
They’re recognized to offer a large level of stability along with higher efficiency.
They may be created to create usage of the numerous functions of the telephone for example GPS camera and addressbook. Nonetheless they are usually costly because they are associated with just one technology to build up as well as the designers have to recode for other systems.
While there’s a significant news about internet and cross applications for cellular devices, local applications continue to be those that offer clients the best person experiences. Mobile customers expect much more from their cell phones than texting and basic calling. This really is where indigenous mobile software development makes image. This really is what you’ll need if user experience is of main concern.
Less bugs – These applications feel the app-store testing and therefore are thus constructed with careful programming. They’re examined numerous times before they’re uploaded.Thus they’re usually bug-free and supply customers using the balance to work well with instead of buggy versions that accident!
Performance – this is actually the approach to take if performance of the company software is just a requirements. Web-apps have some other dependencies like data rates of the cellular carriers or the pace of the web connection.
Use of the features of the device
Local applications are far more effective because they could make usage of the telephone’s functions for example GPS camera and addressbook. They could even be created when the use is attached to run-in sync and traditional mode. Web applications require you to be online to allow them to run. The tradeoff here’s that when the application must be recognized on various systems, the designers have to produce individual rules. This could certainly imply substantial time and a substantial improvement expense to promote.
Local applications have absolutely provided a brand new meaning to mobile software development and much more and much more businesses are implementing them because of their businesses.
Web applications are recognized because of their financial savings. These programs nevertheless don’t possess the luxury of utilizing the smartphone functions as well as the whole knowledge they offer is just a little inferior in contrast. The programming language is typical and therefore the development expenses will also be reduced. The consumer will even require a reliable web connection in order to make use of these programs efficiently. Companies prefer them since they’re usually present about the client’s telephone along with a person doesn’t need to remember a website to gain access to them. | <urn:uuid:0bc56930-6a22-4d07-a54f-e2e0932eb78f> | CC-MAIN-2017-26 | http://programmingscala.com/the-native-mobile-app-development-craze | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00352.warc.gz | en | 0.955382 | 541 | 2.5625 | 3 |
Emission spectroscopy of laser-induced plasma was applied to elemental analysis of biological samples. Laser-induced breakdown spectroscopy (LIBS) performed on thin sections of rodent tissues: kidneys and tumor, allows the detection of inorganic elements such as (i) Na, Ca, Cu, Mg, P, and Fe, naturally present in the body and (ii) Si and Gd, detected after the injection of gadolinium-based nanoparticles. The animals were euthanized 1 to 24 hr after intravenous injection of particles. A two-dimensional scan of the sample, performed using a motorized micrometric 3D-stage, allowed the infrared laser beam exploring the surface with a lateral resolution less than 100 μm. Quantitative chemical images of Gd element inside the organ were obtained with sub-mM sensitivity. LIBS offers a simple and robust method to study the distribution of inorganic materials without any specific labeling. Moreover, the compatibility of the setup with standard optical microscopy emphasizes its potential to provide multiple images of the same biological tissue with different types of response: elemental, molecular, or cellular.
22 Related JoVE Articles!
Transient Expression of Proteins by Hydrodynamic Gene Delivery in Mice
Institutions: Hunter College, CUNY.
Efficient expression of transgenes in vivo
is of critical importance in studying gene function and developing treatments for diseases. Over the past years, hydrodynamic gene delivery (HGD) has emerged as a simple, fast, safe and effective method for delivering transgenes into rodents. This technique relies on the force generated by the rapid injection of a large volume of physiological solution to increase the permeability of cell membranes of perfused organs and thus deliver DNA into cells. One of the main advantages of HGD is the ability to introduce transgenes into mammalian cells using naked plasmid DNA (pDNA). Introducing an exogenous gene using a plasmid is minimally laborious, highly efficient and, contrary to viral carriers, remarkably safe. HGD was initially used to deliver genes into mice, it is now used to deliver a wide range of substances, including oligonucleotides, artificial chromosomes, RNA, proteins and small molecules into mice, rats and, to a limited degree, other animals. This protocol describes HGD in mice and focuses on three key aspects of the method that are critical to performing the procedure successfully: correct insertion of the needle into the vein, the volume of injection and the speed of delivery. Examples are given to show the application of this method to the transient expression of two genes that encode secreted, primate-specific proteins, apolipoprotein L-I (APOL-I) and haptoglobin-related protein (HPR).
Genetics, Issue 87, hydrodynamic gene delivery, hydrodynamics-based transfection, mouse, gene therapy, plasmid DNA, transient gene expression, tail vein injection
Induction of Invasive Transitional Cell Bladder Carcinoma in Immune Intact Human MUC1 Transgenic Mice: A Model for Immunotherapy Development
Institutions: University of California, Davis, University of California, Davis, Merck KGaA, Darmstadt, Germany.
A preclinical model of invasive bladder cancer was developed in human mucin 1 (MUC1) transgenic (MUC1.Tg) mice for the purpose of evaluating immunotherapy and/or cytotoxic chemotherapy. To induce bladder cancer, C57BL/6 mice (MUC1.Tg and wild type) were treated orally with the carcinogen N-butyl-N-(4-hydroxybutyl)nitrosamine (OH-BBN) at 3.0 mg/day, 5 days/week for 12 weeks. To assess the effects of OH-BBN on serum cytokine profile during tumor development, whole blood was collected via submandibular bleeds prior to treatment and every four weeks. In addition, a MUC1-targeted peptide vaccine and placebo were administered to groups of mice weekly for eight weeks. Multiplex fluorometric microbead immunoanalyses of serum cytokines during tumor development and following vaccination were performed. At termination, interferon gamma (IFN-γ)/interleukin-4 (IL-4) ELISpot analysis for MUC1 specific T-cell immune response and histopathological evaluations of tumor type and grade were performed. The results showed that: (1) the incidence of bladder cancer in both MUC1.Tg and wild type mice was 67%; (2) transitional cell carcinomas (TCC) developed at a 2:1 ratio compared to squamous cell carcinomas (SCC); (3) inflammatory cytokines increased with time during tumor development; and (4) administration of the peptide vaccine induces a Th1-polarized serum cytokine profile and a MUC1 specific T-cell response. All tumors in MUC1.Tg mice were positive for MUC1 expression, and half of all tumors in MUC1.Tg and wild type mice were invasive. In conclusion, using a team approach through the coordination of the efforts of pharmacologists, immunologists, pathologists and molecular biologists, we have developed an immune intact transgenic mouse model of bladder cancer that expresses hMUC1.
Medicine, Issue 80, Urinary Bladder, Animals, Genetically Modified, Cancer Vaccines, Immunotherapy, Animal Experimentation, Models, Neoplasms Bladder Cancer, C57BL/6 Mouse, MUC1, Immunotherapy, Preclinical Model
Characterization of Complex Systems Using the Design of Experiments Approach: Transient Protein Expression in Tobacco as a Case Study
Institutions: RWTH Aachen University, Fraunhofer Gesellschaft.
Plants provide multiple benefits for the production of biopharmaceuticals including low costs, scalability, and safety. Transient expression offers the additional advantage of short development and production times, but expression levels can vary significantly between batches thus giving rise to regulatory concerns in the context of good manufacturing practice. We used a design of experiments (DoE) approach to determine the impact of major factors such as regulatory elements in the expression construct, plant growth and development parameters, and the incubation conditions during expression, on the variability of expression between batches. We tested plants expressing a model anti-HIV monoclonal antibody (2G12) and a fluorescent marker protein (DsRed). We discuss the rationale for selecting certain properties of the model and identify its potential limitations. The general approach can easily be transferred to other problems because the principles of the model are broadly applicable: knowledge-based parameter selection, complexity reduction by splitting the initial problem into smaller modules, software-guided setup of optimal experiment combinations and step-wise design augmentation. Therefore, the methodology is not only useful for characterizing protein expression in plants but also for the investigation of other complex systems lacking a mechanistic description. The predictive equations describing the interconnectivity between parameters can be used to establish mechanistic models for other complex systems.
Bioengineering, Issue 83, design of experiments (DoE), transient protein expression, plant-derived biopharmaceuticals, promoter, 5'UTR, fluorescent reporter protein, model building, incubation conditions, monoclonal antibody
An Allele-specific Gene Expression Assay to Test the Functional Basis of Genetic Associations
Institutions: University of Oxford.
The number of significant genetic associations with common complex traits is constantly increasing. However, most of these associations have not been understood at molecular level. One of the mechanisms mediating the effect of DNA variants on phenotypes is gene expression, which has been shown to be particularly relevant for complex traits1
This method tests in a cellular context the effect of specific DNA sequences on gene expression. The principle is to measure the relative abundance of transcripts arising from the two alleles of a gene, analysing cells which carry one copy of the DNA sequences associated with disease (the risk variants)2,3
. Therefore, the cells used for this method should meet two fundamental genotypic requirements: they have to be heterozygous both for DNA risk variants and for DNA markers, typically coding polymorphisms, which can distinguish transcripts based on their chromosomal origin (Figure 1). DNA risk variants and DNA markers do not need to have the same allele frequency but the phase (haplotypic) relationship of the genetic markers needs to be understood. It is also important to choose cell types which express the gene of interest. This protocol refers specifically to the procedure adopted to extract nucleic acids from fibroblasts but the method is equally applicable to other cells types including primary cells.
DNA and RNA are extracted from the selected cell lines and cDNA is generated. DNA and cDNA are analysed with a primer extension assay, designed to target the coding DNA markers4
. The primer extension assay is carried out using the MassARRAY (Sequenom)5
platform according to the manufacturer's specifications. Primer extension products are then analysed by matrix-assisted laser desorption/ionization time of-flight mass spectrometry (MALDI-TOF/MS). Because the selected markers are heterozygous they will generate two peaks on the MS profiles. The area of each peak is proportional to the transcript abundance and can be measured with a function of the MassARRAY Typer software to generate an allelic ratio (allele 1: allele 2) calculation. The allelic ratio obtained for cDNA is normalized using that measured from genomic DNA, where the allelic ratio is expected to be 1:1 to correct for technical artifacts. Markers with a normalised allelic ratio significantly different to 1 indicate that the amount of transcript generated from the two chromosomes in the same cell is different, suggesting that the DNA variants associated with the phenotype have an effect on gene expression. Experimental controls should be used to confirm the results.
Cellular Biology, Issue 45, Gene expression, regulatory variant, haplotype, association study, primer extension, MALDI-TOF mass spectrometry, single nucleotide polymorphism, allele-specific
MR Molecular Imaging of Prostate Cancer with a Small Molecular CLT1 Peptide Targeted Contrast Agent
Institutions: Case Western Reserve University , Case Western Reserve University , Case Western Reserve University .
Tumor extracellular matrix has abundance of cancer related proteins that can be used as biomarkers for cancer molecular imaging. In this work, we demonstrated effective MR cancer molecular imaging with a small molecular peptide targeted Gd-DOTA monoamide complex as a targeted MRI contrast agent specific to clotted plasma proteins in tumor stroma. We performed the experiment of evaluating the effectiveness of the agent for non-invasive detection of prostate tumor with MRI in a mouse orthotopic PC-3 prostate cancer model. The targeted contrast agent was effective to produce significant tumor contrast enhancement at a low dose of 0.03 mmol Gd/kg. The peptide targeted MRI contrast agent is promising for MR molecular imaging of prostate tumor.
Cancer Biology, Issue 79, Medicine, Molecular Biology, Cellular Biology, Biomedical Engineering, Anatomy, Physiology, Biochemistry, Oncology, Biomedical and Dental Materials, Pharmaceutical Preparations, Diagnosis, MRI, magnetic resonance imaging, molecular imaging, conjugation, CLT1, prostate cancer, cancer, prostate, imaging, clinical techniques, clinical applications
Controlling the Size, Shape and Stability of Supramolecular Polymers in Water
Institutions: Westfälische Wilhelms-Universität Münster, Eindhoven University of Technology, Eindhoven University of Technology.
For aqueous based supramolecular polymers, the simultaneous control over shape, size and stability is very difficult1
. At the same time, the ability to do so is highly important in view of a number of applications in functional soft matter including electronics, biomedical engineering, and sensors. In the past, successful strategies to control the size and shape of supramolecular polymers typically focused on the use of templates2,3
, end cappers4
or selective solvent techniques5
Here we disclose a strategy based on self-assembling discotic amphiphiles that leads to the control over stack length and shape of ordered, chiral columnar aggregates. By balancing electrostatic repulsive interactions on the hydrophilic rim and attractive non-covalent forces within the hydrophobic core of the polymerizing building block, we manage to create small and discrete spherical objects6,7
. Increasing the salt concentration to screen the charges induces a sphere-to-rod transition. Intriguingly, this transition is expressed in an increase of cooperativity in the temperature-dependent self-assembly mechanism, and more stable aggregates are obtained.
For our study we select a benzene-1,3,5-tricarboxamide (BTA) core connected to a hydrophilic metal chelate via a hydrophobic, fluorinated L-phenylalanine based spacer (Scheme 1
). The metal chelate selected is a Gd(III)-DTPA complex that contains two overall remaining charges per complex and necessarily two counter ions. The one-dimensional growth of the aggregate is directed by π-π stacking and intermolecular hydrogen bonding. However, the electrostatic, repulsive forces that arise from the charges on the Gd(III)-DTPA complex start limiting the one-dimensional growth of the BTA-based discotic once a certain size is reached. At millimolar concentrations the formed aggregate has a spherical shape and a diameter of around 5 nm as inferred from 1
H-NMR spectroscopy, small angle X-ray scattering, and cryogenic transmission electron microscopy (cryo-TEM). The strength of the electrostatic repulsive interactions between molecules can be reduced by increasing the salt concentration of the buffered solutions. This screening of the charges induces a transition from spherical aggregates into elongated rods with a length > 25 nm. Cryo-TEM allows to visualise the changes in shape and size. In addition, CD spectroscopy permits to derive the mechanistic details of the self-assembly processes before and after the addition of salt. Importantly, the cooperativity -a key feature that dictates the physical properties of the produced supramolecular polymers- increases dramatically upon screening the electrostatic interactions. This increase in cooperativity results in a significant increase in the molecular weight of the formed supramolecular polymers in water.
Chemical Engineering, Issue 66, Chemistry, Physics, Self-assembly, cryogenic transmission electron microscopy, circular dichroism, controlled architecture, discotic amphiphile
Application of a C. elegans Dopamine Neuron Degeneration Assay for the Validation of Potential Parkinson's Disease Genes
Institutions: University of Alabama.
Improvements to the diagnosis and treatment of Parkinson's disease (PD) are dependent upon knowledge about susceptibility factors that render populations at risk. In the process of attempting to identify novel genetic factors associated with PD, scientists have generated many lists of candidate genes, polymorphisms, and proteins that represent important advances, but these leads remain mechanistically undefined. Our work is aimed toward significantly narrowing such lists by exploiting the advantages of a simple animal model system. While humans have billions of neurons, the microscopic roundworm Caenorhabditis elegans has precisely 302, of which only eight produce dopamine (DA) in hemaphrodites. Expression of a human gene encoding the PD-associated protein, alpha-synuclein, in C. elegans DA neurons results in dosage and age-dependent neurodegeneration.
Worms expressing human alpha-synuclein in DA neurons are isogenic and express both GFP and human alpha-synuclein under the DA transporter promoter (Pdat-1). The presence of GFP serves as a readily visualized marker for following DA neurodegeneration in these animals. We initially demonstrated that alpha-synuclein-induced DA neurodegeneration could be rescued in these animals by torsinA, a protein with molecular chaperone activity 1
. Further, candidate PD-related genes identified in our lab via large-scale RNAi screening efforts using an alpha-synuclein misfolding assay were then over-expressed in C. elegans DA neurons. We determined that five of seven genes tested represented significant candidate modulators of PD as they rescued alpha-synuclein-induced DA neurodegeneration 2
. Additionally, the Lindquist Lab (this issue of JoVE) has performed yeast screens whereby alpha-synuclein-dependent toxicity is used as a readout for genes that can enhance or suppress cytotoxicity. We subsequently examined the yeast candidate genes in our C. elegans alpha-synuclein-induced neurodegeneration assay and successfully validated many of these targets 3, 4
Our methodology involves generation of a C. elegans DA neuron-specific expression vector using recombinational cloning of candidate gene cDNAs under control of the Pdat-1 promoter. These plasmids are then microinjected in wild-type (N2) worms, along with a selectable marker for successful transformation. Multiple stable transgenic lines producing the candidate protein in DA neurons are obtained and then independently crossed into the alpha-synuclein degenerative strain and assessed for neurodegeneration, at both the animal and individual neuron level, over the course of aging.
Neuroscience, Issue 17, C. elegans, Parkinson's disease, neuroprotection, alpha-synuclein, Translational Research
Computerized Dynamic Posturography for Postural Control Assessment in Patients with Intermittent Claudication
Institutions: University of Sydney, University of Hull, Hull and East Yorkshire Hospitals, Addenbrookes Hospital.
Computerized dynamic posturography with the EquiTest is an objective technique for measuring postural strategies under challenging static and dynamic conditions. As part of a diagnostic assessment, the early detection of postural deficits is important so that appropriate and targeted interventions can be prescribed. The Sensory Organization Test (SOT) on the EquiTest determines an individual's use of the sensory systems (somatosensory, visual, and vestibular) that are responsible for postural control. Somatosensory and visual input are altered by the calibrated sway-referenced support surface and visual surround, which move in the anterior-posterior direction in response to the individual's postural sway. This creates a conflicting sensory experience. The Motor Control Test (MCT) challenges postural control by creating unexpected postural disturbances in the form of backwards and forwards translations. The translations are graded in magnitude and the time to recover from the perturbation is computed.
Intermittent claudication, the most common symptom of peripheral arterial disease, is characterized by a cramping pain in the lower limbs and caused by muscle ischemia secondary to reduced blood flow to working muscles during physical exertion. Claudicants often display poor balance, making them susceptible to falls and activity avoidance. The Ankle Brachial Pressure Index (ABPI) is a noninvasive method for indicating the presence of peripheral arterial disease and intermittent claudication, a common symptom in the lower extremities. ABPI is measured as the highest systolic pressure from either the dorsalis pedis or posterior tibial artery divided by the highest brachial artery systolic pressure from either arm. This paper will focus on the use of computerized dynamic posturography in the assessment of balance in claudicants.
Medicine, Issue 82, Posture, Computerized dynamic posturography, Ankle brachial pressure index, Peripheral arterial disease, Intermittent claudication, Balance, Posture, EquiTest, Sensory Organization Test, Motor Control Test
A Proboscis Extension Response Protocol for Investigating Behavioral Plasticity in Insects: Application to Basic, Biomedical, and Agricultural Research
Institutions: Arizona State University.
Insects modify their responses to stimuli through experience of associating those stimuli with events important for survival (e.g.
, food, mates, threats). There are several behavioral mechanisms through which an insect learns salient associations and relates them to these events. It is important to understand this behavioral plasticity for programs aimed toward assisting insects that are beneficial for agriculture. This understanding can also be used for discovering solutions to biomedical and agricultural problems created by insects that act as disease vectors and pests. The Proboscis Extension Response (PER) conditioning protocol was developed for honey bees (Apis mellifera
) over 50 years ago to study how they perceive and learn about floral odors, which signal the nectar and pollen resources a colony needs for survival. The PER procedure provides a robust and easy-to-employ framework for studying several different ecologically relevant mechanisms of behavioral plasticity. It is easily adaptable for use with several other insect species and other behavioral reflexes. These protocols can be readily employed in conjunction with various means for monitoring neural activity in the CNS via electrophysiology or bioimaging, or for manipulating targeted neuromodulatory pathways. It is a robust assay for rapidly detecting sub-lethal effects on behavior caused by environmental stressors, toxins or pesticides.
We show how the PER protocol is straightforward to implement using two procedures. One is suitable as a laboratory exercise for students or for quick assays of the effect of an experimental treatment. The other provides more thorough control of variables, which is important for studies of behavioral conditioning. We show how several measures for the behavioral response ranging from binary yes/no to more continuous variable like latency and duration of proboscis extension can be used to test hypotheses. And, we discuss some pitfalls that researchers commonly encounter when they use the procedure for the first time.
Neuroscience, Issue 91, PER, conditioning, honey bee, olfaction, olfactory processing, learning, memory, toxin assay
gDNA Enrichment by a Transposase-based Technology for NGS Analysis of the Whole Sequence of BRCA1, BRCA2, and 9 Genes Involved in DNA Damage Repair
Institutions: Centre Georges-François Leclerc.
The widespread use of Next Generation Sequencing has opened up new avenues for cancer research and diagnosis. NGS will bring huge amounts of new data on cancer, and especially cancer genetics. Current knowledge and future discoveries will make it necessary to study a huge number of genes that could be involved in a genetic predisposition to cancer. In this regard, we developed a Nextera design to study 11 complete genes involved in DNA damage repair. This protocol was developed to safely study 11 genes (ATM
, and TP53
) from promoter to 3'-UTR in 24 patients simultaneously. This protocol, based on transposase technology and gDNA enrichment, gives a great advantage in terms of time for the genetic diagnosis thanks to sample multiplexing. This protocol can be safely used with blood gDNA.
Genetics, Issue 92, gDNA enrichment, Nextera, NGS, DNA damage, BRCA1, BRCA2
A Mouse Model for Pathogen-induced Chronic Inflammation at Local and Systemic Sites
Institutions: Boston University School of Medicine, Boston University School of Medicine.
Chronic inflammation is a major driver of pathological tissue damage and a unifying characteristic of many chronic diseases in humans including neoplastic, autoimmune, and chronic inflammatory diseases. Emerging evidence implicates pathogen-induced chronic inflammation in the development and progression of chronic diseases with a wide variety of clinical manifestations. Due to the complex and multifactorial etiology of chronic disease, designing experiments for proof of causality and the establishment of mechanistic links is nearly impossible in humans. An advantage of using animal models is that both genetic and environmental factors that may influence the course of a particular disease can be controlled. Thus, designing relevant animal models of infection represents a key step in identifying host and pathogen specific mechanisms that contribute to chronic inflammation.
Here we describe a mouse model of pathogen-induced chronic inflammation at local and systemic sites following infection with the oral pathogen Porphyromonas gingivalis
, a bacterium closely associated with human periodontal disease. Oral infection of specific-pathogen free mice induces a local inflammatory response resulting in destruction of tooth supporting alveolar bone, a hallmark of periodontal disease. In an established mouse model of atherosclerosis, infection with P. gingivalis
accelerates inflammatory plaque deposition within the aortic sinus and innominate artery, accompanied by activation of the vascular endothelium, an increased immune cell infiltrate, and elevated expression of inflammatory mediators within lesions. We detail methodologies for the assessment of inflammation at local and systemic sites. The use of transgenic mice and defined bacterial mutants makes this model particularly suitable for identifying both host and microbial factors involved in the initiation, progression, and outcome of disease. Additionally, the model can be used to screen for novel therapeutic strategies, including vaccination and pharmacological intervention.
Immunology, Issue 90,
Pathogen-Induced Chronic Inflammation; Porphyromonas gingivalis; Oral Bone Loss; Periodontal Disease; Atherosclerosis; Chronic Inflammation; Host-Pathogen Interaction; microCT; MRI
A Restriction Enzyme Based Cloning Method to Assess the In vitro Replication Capacity of HIV-1 Subtype C Gag-MJ4 Chimeric Viruses
Institutions: Emory University, Emory University.
The protective effect of many HLA class I alleles on HIV-1 pathogenesis and disease progression is, in part, attributed to their ability to target conserved portions of the HIV-1 genome that escape with difficulty. Sequence changes attributed to cellular immune pressure arise across the genome during infection, and if found within conserved regions of the genome such as Gag, can affect the ability of the virus to replicate in vitro
. Transmission of HLA-linked polymorphisms in Gag to HLA-mismatched recipients has been associated with reduced set point viral loads. We hypothesized this may be due to a reduced replication capacity of the virus. Here we present a novel method for assessing the in vitro
replication of HIV-1 as influenced by the gag
gene isolated from acute time points from subtype C infected Zambians. This method uses restriction enzyme based cloning to insert the gag
gene into a common subtype C HIV-1 proviral backbone, MJ4. This makes it more appropriate to the study of subtype C sequences than previous recombination based methods that have assessed the in vitro
replication of chronically derived gag-pro
sequences. Nevertheless, the protocol could be readily modified for studies of viruses from other subtypes. Moreover, this protocol details a robust and reproducible method for assessing the replication capacity of the Gag-MJ4 chimeric viruses on a CEM-based T cell line. This method was utilized for the study of Gag-MJ4 chimeric viruses derived from 149 subtype C acutely infected Zambians, and has allowed for the identification of residues in Gag that affect replication. More importantly, the implementation of this technique has facilitated a deeper understanding of how viral replication defines parameters of early HIV-1 pathogenesis such as set point viral load and longitudinal CD4+ T cell decline.
Infectious Diseases, Issue 90, HIV-1, Gag, viral replication, replication capacity, viral fitness, MJ4, CEM, GXR25
Protein WISDOM: A Workbench for In silico De novo Design of BioMolecules
Institutions: Princeton University.
The aim of de novo
protein design is to find the amino acid sequences that will fold into a desired 3-dimensional structure with improvements in specific properties, such as binding affinity, agonist or antagonist behavior, or stability, relative to the native sequence. Protein design lies at the center of current advances drug design and discovery. Not only does protein design provide predictions for potentially useful drug targets, but it also enhances our understanding of the protein folding process and protein-protein interactions. Experimental methods such as directed evolution have shown success in protein design. However, such methods are restricted by the limited sequence space that can be searched tractably. In contrast, computational design strategies allow for the screening of a much larger set of sequences covering a wide variety of properties and functionality. We have developed a range of computational de novo
protein design methods capable of tackling several important areas of protein design. These include the design of monomeric proteins for increased stability and complexes for increased binding affinity.
To disseminate these methods for broader use we present Protein WISDOM (https://www.proteinwisdom.org), a tool that provides automated methods for a variety of protein design problems. Structural templates are submitted to initialize the design process. The first stage of design is an optimization sequence selection stage that aims at improving stability through minimization of potential energy in the sequence space. Selected sequences are then run through a fold specificity stage and a binding affinity stage. A rank-ordered list of the sequences for each step of the process, along with relevant designed structures, provides the user with a comprehensive quantitative assessment of the design. Here we provide the details of each design method, as well as several notable experimental successes attained through the use of the methods.
Genetics, Issue 77, Molecular Biology, Bioengineering, Biochemistry, Biomedical Engineering, Chemical Engineering, Computational Biology, Genomics, Proteomics, Protein, Protein Binding, Computational Biology, Drug Design, optimization (mathematics), Amino Acids, Peptides, and Proteins, De novo protein and peptide design, Drug design, In silico sequence selection, Optimization, Fold specificity, Binding affinity, sequencing
Diffusion Tensor Magnetic Resonance Imaging in the Analysis of Neurodegenerative Diseases
Institutions: University of Ulm.
Diffusion tensor imaging (DTI) techniques provide information on the microstructural processes of the cerebral white matter (WM) in vivo
. The present applications are designed to investigate differences of WM involvement patterns in different brain diseases, especially neurodegenerative disorders, by use of different DTI analyses in comparison with matched controls.
DTI data analysis is performed in a variate fashion, i.e.
voxelwise comparison of regional diffusion direction-based metrics such as fractional anisotropy (FA), together with fiber tracking (FT) accompanied by tractwise fractional anisotropy statistics (TFAS) at the group level in order to identify differences in FA along WM structures, aiming at the definition of regional patterns of WM alterations at the group level. Transformation into a stereotaxic standard space is a prerequisite for group studies and requires thorough data processing to preserve directional inter-dependencies. The present applications show optimized technical approaches for this preservation of quantitative and directional information during spatial normalization in data analyses at the group level. On this basis, FT techniques can be applied to group averaged data in order to quantify metrics information as defined by FT. Additionally, application of DTI methods, i.e.
differences in FA-maps after stereotaxic alignment, in a longitudinal analysis at an individual subject basis reveal information about the progression of neurological disorders. Further quality improvement of DTI based results can be obtained during preprocessing by application of a controlled elimination of gradient directions with high noise levels.
In summary, DTI is used to define a distinct WM pathoanatomy of different brain diseases by the combination of whole brain-based and tract-based DTI analysis.
Medicine, Issue 77, Neuroscience, Neurobiology, Molecular Biology, Biomedical Engineering, Anatomy, Physiology, Neurodegenerative Diseases, nuclear magnetic resonance, NMR, MR, MRI, diffusion tensor imaging, fiber tracking, group level comparison, neurodegenerative diseases, brain, imaging, clinical techniques
Analysis of Nephron Composition and Function in the Adult Zebrafish Kidney
Institutions: University of Notre Dame.
The zebrafish model has emerged as a relevant system to study kidney development, regeneration and disease. Both the embryonic and adult zebrafish kidneys are composed of functional units known as nephrons, which are highly conserved with other vertebrates, including mammals. Research in zebrafish has recently demonstrated that two distinctive phenomena transpire after adult nephrons incur damage: first, there is robust regeneration within existing nephrons that replaces the destroyed tubule epithelial cells; second, entirely new nephrons are produced from renal progenitors in a process known as neonephrogenesis. In contrast, humans and other mammals seem to have only a limited ability for nephron epithelial regeneration. To date, the mechanisms responsible for these kidney regeneration phenomena remain poorly understood. Since adult zebrafish kidneys undergo both nephron epithelial regeneration and neonephrogenesis, they provide an outstanding experimental paradigm to study these events. Further, there is a wide range of genetic and pharmacological tools available in the zebrafish model that can be used to delineate the cellular and molecular mechanisms that regulate renal regeneration. One essential aspect of such research is the evaluation of nephron structure and function. This protocol describes a set of labeling techniques that can be used to gauge renal composition and test nephron functionality in the adult zebrafish kidney. Thus, these methods are widely applicable to the future phenotypic characterization of adult zebrafish kidney injury paradigms, which include but are not limited to, nephrotoxicant exposure regimes or genetic methods of targeted cell death such as the nitroreductase mediated cell ablation technique. Further, these methods could be used to study genetic perturbations in adult kidney formation and could also be applied to assess renal status during chronic disease modeling.
Cellular Biology, Issue 90,
zebrafish; kidney; nephron; nephrology; renal; regeneration; proximal tubule; distal tubule; segment; mesonephros; physiology; acute kidney injury (AKI)
Modeling Astrocytoma Pathogenesis In Vitro and In Vivo Using Cortical Astrocytes or Neural Stem Cells from Conditional, Genetically Engineered Mice
Institutions: University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, University of North Carolina School of Medicine, Emory University School of Medicine, University of North Carolina School of Medicine.
Current astrocytoma models are limited in their ability to define the roles of oncogenic mutations in specific brain cell types during disease pathogenesis and their utility for preclinical drug development. In order to design a better model system for these applications, phenotypically wild-type cortical astrocytes and neural stem cells (NSC) from conditional, genetically engineered mice (GEM) that harbor various combinations of floxed oncogenic alleles were harvested and grown in culture. Genetic recombination was induced in vitro
using adenoviral Cre-mediated recombination, resulting in expression of mutated oncogenes and deletion of tumor suppressor genes. The phenotypic consequences of these mutations were defined by measuring proliferation, transformation, and drug response in vitro
. Orthotopic allograft models, whereby transformed cells are stereotactically injected into the brains of immune-competent, syngeneic littermates, were developed to define the role of oncogenic mutations and cell type on tumorigenesis in vivo
. Unlike most established human glioblastoma cell line xenografts, injection of transformed GEM-derived cortical astrocytes into the brains of immune-competent littermates produced astrocytomas, including the most aggressive subtype, glioblastoma, that recapitulated the histopathological hallmarks of human astrocytomas, including diffuse invasion of normal brain parenchyma. Bioluminescence imaging of orthotopic allografts from transformed astrocytes engineered to express luciferase was utilized to monitor in vivo
tumor growth over time. Thus, astrocytoma models using astrocytes and NSC harvested from GEM with conditional oncogenic alleles provide an integrated system to study the genetics and cell biology of astrocytoma pathogenesis in vitro
and in vivo
and may be useful in preclinical drug development for these devastating diseases.
Neuroscience, Issue 90, astrocytoma, cortical astrocytes, genetically engineered mice, glioblastoma, neural stem cells, orthotopic allograft
In Vivo Modeling of the Morbid Human Genome using Danio rerio
Institutions: Duke University Medical Center, Duke University, Duke University Medical Center.
Here, we present methods for the development of assays to query potentially clinically significant nonsynonymous changes using in vivo
complementation in zebrafish. Zebrafish (Danio rerio
) are a useful animal system due to their experimental tractability; embryos are transparent to enable facile viewing, undergo rapid development ex vivo,
and can be genetically manipulated.1
These aspects have allowed for significant advances in the analysis of embryogenesis, molecular processes, and morphogenetic signaling. Taken together, the advantages of this vertebrate model make zebrafish highly amenable to modeling the developmental defects in pediatric disease, and in some cases, adult-onset disorders. Because the zebrafish genome is highly conserved with that of humans (~70% orthologous), it is possible to recapitulate human disease states in zebrafish. This is accomplished either through the injection of mutant human mRNA to induce dominant negative or gain of function alleles, or utilization of morpholino (MO) antisense oligonucleotides to suppress genes to mimic loss of function variants. Through complementation of MO-induced phenotypes with capped human mRNA, our approach enables the interpretation of the deleterious effect of mutations on human protein sequence based on the ability of mutant mRNA to rescue a measurable, physiologically relevant phenotype. Modeling of the human disease alleles occurs through microinjection of zebrafish embryos with MO and/or human mRNA at the 1-4 cell stage, and phenotyping up to seven days post fertilization (dpf). This general strategy can be extended to a wide range of disease phenotypes, as demonstrated in the following protocol. We present our established models for morphogenetic signaling, craniofacial, cardiac, vascular integrity, renal function, and skeletal muscle disorder phenotypes, as well as others.
Molecular Biology, Issue 78, Genetics, Biomedical Engineering, Medicine, Developmental Biology, Biochemistry, Anatomy, Physiology, Bioengineering, Genomics, Medical, zebrafish, in vivo, morpholino, human disease modeling, transcription, PCR, mRNA, DNA, Danio rerio, animal model
Ole Isacson: Development of New Therapies for Parkinson's Disease
Institutions: Harvard Medical School.
Medicine, Issue 3, Parkinson' disease, Neuroscience, dopamine, neuron, L-DOPA, stem cell, transplantation
Preventing the Spread of Malaria and Dengue Fever Using Genetically Modified Mosquitoes
Institutions: University of California, Irvine (UCI).
In this candid interview, Anthony A. James explains how mosquito genetics can be exploited to control malaria and dengue transmission. Population replacement strategy, the idea that transgenic mosquitoes can be released into the wild to control disease transmission, is introduced, as well as the concept of genetic drive and the design criterion for an effective genetic drive system. The ethical considerations of releasing genetically-modified organisms into the wild are also discussed.
Cellular Biology, Issue 5, mosquito, malaria, dengue fever, genetics, infectious disease, Translational Research
Population Replacement Strategies for Controlling Vector Populations and the Use of Wolbachia pipientis for Genetic Drive
Institutions: Johns Hopkins University.
In this video, Jason Rasgon discusses population replacement strategies to control vector-borne diseases such as malaria and dengue. "Population replacement" is the replacement of wild vector populations (that are competent to transmit pathogens) with those that are not competent to transmit pathogens. There are several theoretical strategies to accomplish this. One is to exploit the maternally-inherited symbiotic bacteria Wolbachia pipientis. Wolbachia is a widespread reproductive parasite that spreads in a selfish manner at the extent of its host's fitness. Jason Rasgon discusses, in detail, the basic biology of this bacterial symbiont and various ways to use it for control of vector-borne diseases.
Cellular Biology, Issue 5, mosquito, malaria, genetics, infectious disease, Wolbachia
Interview: Protein Folding and Studies of Neurodegenerative Diseases
Institutions: MIT - Massachusetts Institute of Technology.
In this interview, Dr. Lindquist describes relationships between protein folding, prion diseases and neurodegenerative disorders. The problem of the protein folding is at the core of the modern biology. In addition to their traditional biochemical functions, proteins can mediate transfer of biological information and therefore can be considered a genetic material. This recently discovered function of proteins has important implications for studies of human disorders. Dr. Lindquist also describes current experimental approaches to investigate the mechanism of neurodegenerative diseases based on genetic studies in model organisms.
Neuroscience, issue 17, protein folding, brain, neuron, prion, neurodegenerative disease, yeast, screen, Translational Research
A Strategy to Identify de Novo Mutations in Common Disorders such as Autism and Schizophrenia
Institutions: Universite de Montreal, Universite de Montreal, Universite de Montreal.
There are several lines of evidence supporting the role of de novo
mutations as a mechanism for common disorders, such as autism and schizophrenia. First, the de novo
mutation rate in humans is relatively high, so new mutations are generated at a high frequency in the population. However, de novo
mutations have not been reported in most common diseases. Mutations in genes leading to severe diseases where there is a strong negative selection against the phenotype, such as lethality in embryonic stages or reduced reproductive fitness, will not be transmitted to multiple family members, and therefore will not be detected by linkage gene mapping or association studies. The observation of very high concordance in monozygotic twins and very low concordance in dizygotic twins also strongly supports the hypothesis that a significant fraction of cases may result from new mutations. Such is the case for diseases such as autism and schizophrenia. Second, despite reduced reproductive fitness1
and extremely variable environmental factors, the incidence of some diseases is maintained worldwide at a relatively high and constant rate. This is the case for autism and schizophrenia, with an incidence of approximately 1% worldwide. Mutational load can be thought of as a balance between selection for or against a deleterious mutation and its production by de novo
mutation. Lower rates of reproduction constitute a negative selection factor that should reduce the number of mutant alleles in the population, ultimately leading to decreased disease prevalence. These selective pressures tend to be of different intensity in different environments. Nonetheless, these severe mental disorders have been maintained at a constant relatively high prevalence in the worldwide population across a wide range of cultures and countries despite a strong negative selection against them2
. This is not what one would predict in diseases with reduced reproductive fitness, unless there was a high new mutation rate. Finally, the effects of paternal age: there is a significantly increased risk of the disease with increasing paternal age, which could result from the age related increase in paternal de novo
mutations. This is the case for autism and schizophrenia3
. The male-to-female ratio of mutation rate is estimated at about 4–6:1, presumably due to a higher number of germ-cell divisions with age in males. Therefore, one would predict that de novo
mutations would more frequently come from males, particularly older males4
. A high rate of new mutations may in part explain why genetic studies have so far failed to identify many genes predisposing to complexes diseases genes, such as autism and schizophrenia, and why diseases have been identified for a mere 3% of genes in the human genome. Identification for de novo
mutations as a cause of a disease requires a targeted molecular approach, which includes studying parents and affected subjects. The process for determining if the genetic basis of a disease may result in part from de novo
mutations and the molecular approach to establish this link will be illustrated, using autism and schizophrenia as examples.
Medicine, Issue 52, de novo mutation, complex diseases, schizophrenia, autism, rare variations, DNA sequencing | <urn:uuid:1ba84139-e1f0-4d79-9490-e377a91816fc> | CC-MAIN-2017-26 | https://www.jove.com/visualize/abstract/23544060/association-between-age-at-diagnosis-graves-disease-variants-genes | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00352.warc.gz | en | 0.905712 | 9,349 | 2.75 | 3 |
Encephalitis caused by the Herpes simplex virus (HSV) is very serious disease, which may end up with a significant brain damage or even death. This condition, more specifically HSV type 2, may affect newborn babies causing neonatal herpes and generalized infection of the brain. The other type of this disease is known to affect children over 3 months and adult people. In this case, HSV type 1 affects only temporal and frontal lobes of the brain.
HSV remains dormant in the nervous system (the neurons) and in rare occasions it gets transported through peripheral neurons to the brain (central nervous system), provoking encephalitis. HSV encephalitis is considered to be medical emergency, as this is the most serious complication of the HSV infection that exists.
How HSV Affects the Brain?
Doctors still don’t know everything about this virus and the way it causes encephalitis. However, neurons get destroyed very quickly in this disease, especially those located in the medical temporal and inferior frontal lobes. In rare cases HSV encephalitis can affect some other parts of the brain, such as cerebellum, basal ganglia or the brainstem. Brain cells get damaged directly because of the virus and also because of the immune system of the body, responding to infection. Viral infection spreads through the brain, from one side to the other, provoking necrosis of the cells and inflammation.
About 30% of all herpes encephalitis (HSE) is caused directly because of the primary HSV infection, while other cases are usually associated with some preexisting HSV infection and its reactivation.
What to Expect from HSE Diagnosis?
Herpes encephalitis is potentially fatal neurological disease and for that reason it must be treated. In untreated patients, HSE is a progressive problem and usually ends lethally after a week or two in some 70% of cases. Those who survive untreated HSV encephalitis may expect serious neurologic problems.
Acyclovir and vidarabine are drugs recommended for the treatment of this condition. However, doctors usually prefer acyclovir because of the studies which revealed just 19% (or 6 to 11%, depending on the studies) mortality rate. These results are much better than in patients treated with vidarabine. After the treatment with acyclovir, some 38% of the patients had no or just mild neurological deficits, 9% had moderate and 53% experienced severe neurological problems.
Neonatal HSE is quite often fatal medical problem. About 6% of babies suffering from isolated HSE and some 31% of those with disseminated HSV infection in the brain have fatal consequences.
Prognosis is also found to be much better for non-comatose patients, especially in those younger than 30 years of age, while coma usually means bad prognosis. | <urn:uuid:3e0deff7-631c-4500-a616-2230569527e5> | CC-MAIN-2017-26 | http://ic.steadyhealth.com/herpes-encephalitis-prognosis | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320264.42/warc/CC-MAIN-20170624152159-20170624172159-00513.warc.gz | en | 0.944093 | 594 | 3.3125 | 3 |
6.34We have considered two principal alternatives to trial by a jury of 12 laypeople. The first is to require that all sexual violence cases be heard by a judge sitting alone in the role of fact-finder. The judge could be specially trained and educated. The second alternative is for the role of fact-finder in sexual violence cases to be filled by a small group of “assessors” (two or three) who would be required to come to the trial with prior knowledge and understanding of sexual violence, either by virtue of their work history and experience in the area, or by having been trained and educated specifically for the purpose of sitting on sexual violence cases.
6.35Under this model, the right to elect trial by jury would be removed for all sexual violence cases and all trials would be tried by judge-alone. Trials by judge-alone are already an established part of the criminal justice system, so there is an established body of rules for how these trials should be conducted and what special requirements apply to them (such as the requirement to provide reasons for the verdict). This proposal would therefore be relatively easy to implement.
6.36It would also lead to cost and resource savings, because it would obviate the need for the complex evidential rules that are required to insulate juries from certain evidence. Trial by judge-alone tends to be faster and therefore potentially less trying for complainants (and a speedy trial also has advantages for defendants).
6.39Against this is that the removal of juries from sexual violence trials means the loss of the functions outlined above, at least in the area of sexual violence – the expression of democratic involvement; the safeguard against arbitrary or oppressive government by acting as a check on potential abuses of power; and the promotion of public confidence in the system.
6.40The second alternative is to confer the role of fact-finder on a smaller group or people (referred to as “assessors”) who would sit as fact-finders with some prior knowledge and understanding of sexual violence.
6.43If lay assessors were to be used in New Zealand the first question is what their role would be. They might advise the judge without voting on a case, or they might have independent voting power, as is the case for assessors in Germany. That would then influence who could be employed in that role.
6.44One submitter suggested that jurors could be drawn from a panel of people selected for their special experience in or knowledge of the particular matters to be featured at trial. Another option is that the assessors could be laypeople who have gone through training and education to sit on sexual violence cases and do so as “professional jurors”. Since they would not be full-time jurors, but would sit on a rotational basis, they would need to be available as and when required, so would need some flexibility in their other employment.
6.45A third option would be to introduce a system utilising the services of Justices of the Peace (JPs). There is a cohort of JPs in New Zealand who have judicial training and who deal with adjournments, bail applications, and minor offences so they already have some introduction to the judicial role and required neutrality. They would, however, need additional training and education to deal with sexual violence cases specifically. Consideration might also need to be given to whether the current cohort of JPs is sufficiently representative of a wide range of ethnicities, of social demographics, and of all genders.
6.46In favour of the lay assessor model is that the training and expertise brought to bear by these individuals would better equip them to set aside common misconceptions about sexual violence and to deal with the full evidence and its weight. An element of the collective decision-making model of the jury would be retained, in a way that would not be present in the judge-alone model. The trial process would be simplified given most of the substantial and complex array of evidence rules that currently dictate what can be presented to the jury could be removed.
6.48Having looked at the matter again, in the specific context of a review which examines the criminal justice response to sexual violence, and in light of subsequent research, we think that there is a case for conferring the decision-making function in sexual violence cases on some entity other than the jury. We note the possible gains that may come from removal of the jury. As noted by the reference group with which we corresponded during the writing of this Report (see paragraph 1.60), the need to insulate the jury from certain evidence is removed and weight of evidence, rather than admissibility, becomes more central. The need for directions from the judge is diminished. There is likely to be reduction in time to trial and length of trial.
6.49The design of an alternative, however, needs to be carefully considered, and it would need to be justified as a reasonable limit on the right to jury trial in the NZBORA 1990. At this stage we make no recommendation to change the fact-finder in sexual violence cases, but we recommend that future consideration be given to this issue as part of the evaluation of a new specialist court (see Chapter 5). Ideally, that would be grounded in reliable data as to the levels of accuracy achieved in decision-making by different kinds of fact-finding bodies. | <urn:uuid:8d4bd61c-cf15-4def-b2c0-e2e63af39230> | CC-MAIN-2017-26 | http://r136.publications.lawcom.govt.nz/Chapter+6+-+The+fact-finder+in+sexual+violence+cases/Alternatives+to+jury+as+fact-finder+in+sexual+violence+cases | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00593.warc.gz | en | 0.975981 | 1,095 | 2.625 | 3 |
11 Urban Rooftop Farms Feeding America from Above
September 4, 2014 | AJ Hughes
As urban populations grow and the demand for local food rises, agricultural innovators see opportunity atop the roofs of city buildings. Much of this space is devoted to outdoor gardens, but rooftop greenhouses are also sprouting up in cities with cold climates.
Some are large structures used for commercial purposes, some are owned by restaurants, some assist in feeding the needy, and some are used for educational purposes. But all have one thing in common—they enable growers to grow food year-round in urban settings.
New York City, New York: Gotham Greens
Gotham Greens, with two locations in Brooklyn and one in Queens, operates three of the numerous rooftop greenhouses that sit atop many of New York City’s buildings. Greenpoint, its flagship Brooklyn greenhouse, was constructed in 2010, contains more than 15,000 square feet and produces over 100 tons of greens every year. Its Gowanus location, also in Brooklyn, consists of over 20,000 square feet atop a Whole Foods Market. Annually, it grows over 200 tons of greens and tomatoes. Its Queens facility, in the Jamaica section of the borough, will utilize more than 60,000 square feet and begin producing crops this year.
Montreal, Quebec: Lufa Farms
“Our vision is a city of rooftop farms”, reads the slogan of Montreal-based Lufa Farms. Its first of two rooftop greenhouses sits on top of a building in the center of Montreal and spans 30,000 square feet. Lufa farmers utilize sustainable hydroponics, despite the fact that this method is not organically-certified in Canada. This method poses less of an environmental impact. Produce at Lufa Farms is grown solely for taste and nutrition. A primary objective is to grow food where people already live―hence the city location.
Chicago, Illinois: Dr. Pedro Albizu Campos High School
In Chicago, Dr. Pedro Albizu Campos High School sits in the city’s Humboldt Park neighborhood. On the roof of the school sits a hydroponic greenhouse, used both to grow food and educate its students about sustainability. Other greenhouses can be found on rooftops along the same road, Division Street. The high school builds its curriculum around social transformation, and views social ecology and urban agriculture as ways to transform the world.
San Francisco, California: Project Open Hand
San Francisco nonprofit Project Open Hand provides healthy meals to the sick and elderly. The organization uses its greenhouse at its city headquarters to grow herbs and greens for use by its chefs in meals for clients. Basil, lettuce and micro-greens are grown inside the greenhouse, which utilizes hydroponic systems.
New York City, New York: Manhattan School for Children
On the rooftop of the Manhattan School for Children (Public School 333) in New York City sits a rooftop greenhouse. Its purpose? To educate students about where their food comes from, and to teach the link between food and health. The greenhouse is the result of a partnership of parents and New York Sun Works, a nonprofit organization that constructs science labs for city schools. Named the Sun Works Center for Environmental Studies, students experience the importance of sustainability. Key issues taught are climate change, the importance of green cities and the ability of agriculture to adapt to greater demand and changing circumstances.
Grand Rapids, Michigan: Grand Rapids Downtown Market
In Grand Rapids, Michigan, the Grand Rapids Downtown Market is all about local foods and sustainability. The market, with space for 24 vendors in its main hall and sustainability features such as a green roof and live walls, also has a rooftop greenhouse where some of the produce sold there is grown.
Fairfax, Virginia: George Mason University
A rooftop greenhouse is perched atop Exploratory Hall on the Fairfax, Va. campus of George Mason University. Part of the Department of Environmental Science and Policy, the greenhouse has three rooms simulating different climates. Other plants utilize an outdoor terrace. The greenhouse has partnered with the Smithsonian Museum of Natural History and the university’s Potomac Heights Vegetable Garden, which supplies area homeless shelters.
Chicago, Illinois: University of Chicago
The University of Chicago has a rooftop greenhouse on top of its Donnelley Biological Sciences Learning Center. It contains 7,500 square feet of growing space, and a portion of the greenhouse is used for drug research.
Madison, Wisconsin: University of Wisconsin
Famed conservationist and forester Aldo Leopold taught at the University of Wisconsin-Madison. Now, a residence hall on campus bearing his name was built with sustainability in mind, and its many features include a 1,400-square foot rooftop greenhouse. Students who call the 52,800-square foot residence hall home enjoy the opportunity of growing and preparing their own food year-round (despite harsh Wisconsin winters). The residence hall is also home to the university’s Greenhouse Learning Community.
Milwaukee, Wisconsin: University of Wisconsin-Milwaukee
On Dec. 4, 2013, a ribbon-cutting ceremony took place for a new rooftop greenhouse at the University of Wisconsin-Milwaukee. Sitting on top the Northwest Quadrant on campus, the greenhouse includes 9,200 square feet divided into 11 sections, each with its own separate climate controls. Also, 1,200 square feet of space is devoted to outdoor growing. About 1,700 students learn at the greenhouse every year
New York City, New York: Roberta’s Pizza
New York City is home to many pizzerias, but Roberta’s Pizza in Brooklyn’s Bushwick neighborhood boasts its own rooftop greenhouses. The restaurant grows 20 percent of its produce in these two small facilities. | <urn:uuid:a56740a4-f492-4c25-8f59-bc008fc23673> | CC-MAIN-2017-26 | http://seedstock.com/2014/09/04/high-growth-11-urban-rooftop-farms-across-america/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00593.warc.gz | en | 0.930507 | 1,182 | 2.734375 | 3 |
Category Archives: K.CC.3.A
As I was writing my lesson plans for this week, I saw that I am supposed to do two new things this week. One is to begin introducing the first 5 Math Work Stations and the second items is to begin teaching the K.CC.3.A standard (writing numbers to 20) (we are just writing to 10 at this point in the year).
I decided to create a set of booklets that would let me accomplish both of these things:
(click the color picture below to get yours). 🙂
Each book contains 6 pages (7 if you count the cover page) and helps your students to represent numbers in a variety of ways (see below).
These would be great for individual, small, or whole group work. I think these would be excellent for homework too! I will say that when I first saved this file, I intended to include the number zero, but after thinking about it, that would be a pretty empty number book! No way to show zero other than to write the number and write the number word, so I left it out. If I have requests for it, I could make those two pages just for zero. I did include zero in my August Problem Solving Pack if you do need a page for zero.
P.S. I’m going to start working on the October Problem Solving Pack soon–trying to stay ahead! 🙂 | <urn:uuid:060b0fa9-af35-4ec6-9a7e-dd80cb3fad87> | CC-MAIN-2017-26 | https://kristenskindergarten.com/category/k-cc-3-a/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320489.26/warc/CC-MAIN-20170625101427-20170625121427-00593.warc.gz | en | 0.960463 | 296 | 3.640625 | 4 |
Online youth magazine Tween Tribune recently featured outstanding adolescents making powerful contributions in their communities. David Albright, for example, has been baking muffins almost every week for five years for locals in-need at the Beth El Center in Connecticut. Despite his quiet humility, Albright garnered national attention as an honoree in the Prudential Spirit of Community Awards program in Washington, D.C.
Another young man, 14-year-old Hunter Gandee, completed a 40-mile hike in Michigan to raise awareness about Cerebral Palsy Swagger. The condition limits his brother’s ability to walk, which is why the seven-year-old rode on Gandee’s back for the trek.
Kids like David and Hunter are already having a significant impact in society. If they could participate in summer camps that complement their energy and idealism with tools in advocacy, community development, and other leadership skills, they could exponentially advance their abilities to galvanize change.
Tools from leadership summer camps will help kids influence policy and social practice
Gandee’s project drew attention and partnerships from rock stars, football teams, university research labs, and professionals. In a similar Tween Tribune story, over 2000 people – mostly students – in Katmandu, Nepal set the world record for tree hugging on World Environment Day. The initiative drew the attention of parliament members who praised the project and its significance.
Community stakeholders can indeed be influenced by youth movements. But in order to gain their respect rather than just a pat on the head, these kids need more formal training. Leadership summer camps and quality adventure camps offer opportunities for personal development to complement kids’ inherent social ingenuity.
What kind of world-saving skills can kids attain in summer camp?
Some summer camps are geared specifically towards capacity building for community organizing. Kids take part in leadership or conflict-resolution camps to learn about facilitating cross-cultural dialogue or creating an impactful campaign. There are even camps now that educate about social entrepreneurship – a program that both David Albright and Hunter Gandee might benefit from.
While these sorts of camps offer a boost into the world of advocacy and change making, that does not diminish the influence of traditional summer. Traditional summer camps and adventure camps that challenge teens in contexts like backpacking or ropes courses also encourage creative problem solving, critical reasoning, collaboration, personal responsibility, and leadership, simply through a different context. | <urn:uuid:2a167f6d-10a5-4ee8-a11d-65f9bd13aeee> | CC-MAIN-2017-26 | http://www.camppage.com/blog/summer-camps-capitalize-on-kids-inherent-idealism-and-energy/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00673.warc.gz | en | 0.935197 | 492 | 2.65625 | 3 |
You ask about two things that keep getting said about swine flu: that it’s usually mild, and that the people it kills usually have underlying medical conditions.
The “mildness” meme
The information that most swine flu cases are mild was crucial information in late April and early May, when the early news from Mexico suggested that swine flu might be very severe. What “mild” meant then was fairly clear: The vast majority of cases weren’t fatal. Swine flu wasn’t the public health catastrophe it had originally looked like it might be.
But now “mild” has become a meme more than an actual piece of information. The question that is too seldom answered is: mild compared to what?
Compared to bird flu, with its 61% fatality rate, swine flu is incredibly mild. Compared to the 1918 pandemic, with its 2-3% fatality rate, swine flu is still very mild.
And swine flu is mild compared to what it might turn into – compared to the possibility of a much more virulent second wave. But the key message for this comparison shouldn’t be that swine flu is mild; the message is that swine flu could get a whole lot worse. This is a message I’d like to see much more often: We need to get prepared in case it doesn’t stay as mild as it is so far.
Compared to the seasonal flu, which kills on average about one person in a thousand, swine flu isn’t especially mild. Health officials can’t calculate a precise case fatality rate because they’re not trying to count all the cases – so they don’t have any denominator for the fraction. But it’s looking like swine flu is roughly as deadly as the seasonal flu – about one death in a thousand cases. And while seasonal flu deaths are overwhelmingly the elderly, swine flu deaths tend to be younger.
Like other flu pandemics, swine flu is expected to infect one-third to one-half of the population eventually (not counting any who get vaccinated, once there’s a vaccine). When you focus on this pervasiveness to come, one death in every thousand cases doesn’t sound so mild anymore. If you know two or three thousand people, someone you know will probably die of swine flu. Several people you know will get seriously ill and need hospitalization. And maybe a thousand people you know will go through a week or so of feeling really awful and being thoroughly incapable of doing much of anything, even taking care of themselves.
Somehow, the word “mild” doesn’t conjure up all that illness in people’s minds. Most people underestimate the seriousness of the flu to start with. In normal, non-pandemic times, doctors are used to telling patients they probably don’t have the flu this time because they don’t feel rotten enough. So when we’re told that swine flu is mild, we don’t think, “It will infect a half to a third of the world population and kill a few million people, mostly young people, before it’s over.” We think, “It’s like having a bad cold.”
Considering how hard public health professionals have to work to get the public to take influenza seriously enough – to bother getting vaccinated, for example – they’re not doing themselves any favors when they stress endlessly that swine flu is mild. Assuming next year’s seasonal flu is equally serious, will they call that “mild” too?
Bottom line: The mildness meme isn’t inaccurate, but it’s incomplete and therefore misleading. It leaves people unprepared for what is almost certainly coming, lots of very sick friends and neighbors and a North American death toll in the tens of thousands; and for what might be coming, a more virulent strain of the same disease and a North American death toll in the hundreds of thousands or even the millions.
The “underlying conditions” meme
Like the seasonal flu, swine flu often kills in combination with other medical conditions – asthma, diabetes, AIDS and other autoimmune disorders, pregnancy, etc. In some cases the flu exacerbates another disease; in some cases the other disease weakens the system and makes it more vulnerable to flu.
This is obviously useful information. It tells doctors that they should be especially attentive to patients with both the flu and one of the listed conditions. It tells policymakers that they should prioritize people with the listed conditions when it comes to allocating scarce resources, such as antivirals and vaccines. And it tells the rest of us that if we have one of the listed conditions, we should try even harder to avoid catching the flu, and should take it even more seriously if we catch it.
But like “mild,” “underlying conditions” has become a meme, repeated too often in ways that don’t necessarily convey the right meaning.
What matters is that people with underlying conditions are especially vulnerable and need to be especially careful. What people often hear, though, is that swine flu is no big deal because it’s usually not deadly except to people with underlying conditions. That is, people hear it not as a warning but as an effort to reassure.
If people take this effort to reassure seriously, it will mislead them – because in fact swine flu has killed significant numbers of people with no underlying conditions at all. But I suspect people are neither misled nor reassured by repeated news stories about people who died from swine flu plus some underlying condition. More commonly, I suspect, we think of our own medical conditions, and of all the people we know with various medical conditions. So if anything we feel a little alarmed.
And perhaps we even feel a little offended. The “underlying conditions” meme tries to draw a line between “us” (the healthy, who presumably have little to fear from swine flu) and “them” (those with underlying conditions, who might die … but after all they were sick already). It sounds dismissive, and it backfires. Too many of “us” feel like “them”; most people with listed conditions feel like they’re basically healthy. So the news that they – we – are vulnerable to swine flu isn’t reassuring after all.
To the extent that reassurance is the goal of these two memes, it is a pretty pointless goal. At least in the U.S., public opinion polls show that concern about swine flu has declined from low to lower. I assume the same is true in Canada. In North America, swine flu panic is much rarer than swine flu deaths. The problem isn’t panic or even excessive anxiety. The problem is complacency, both about what’s going to happen and about what might happen.
Copyright © 2009 by Peter M. Sandman | <urn:uuid:70cdc689-5915-44d0-8b1d-86b8305e4d76> | CC-MAIN-2017-26 | http://psandman.com/articles/branswell5.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00033.warc.gz | en | 0.963927 | 1,476 | 2.953125 | 3 |
This week’s book review is Nowhere People, by Henry Reynolds. Henry Reynolds is probably Australia’s most prominent exponent of what its opponents call the “Black Armband” school of colonial history. The Black Armband school of history (as contrasted by its originator, Geoffrey Blainey, with the “three cheers” school of history) focuses (in its opponents’ views excessively) on the various wrongs that were done to the aboriginal people of Australia during white settlement:
The ‘black armband’ view of our history reflects a belief that most Australian history since 1788 has been little more than a disgraceful story of imperialism, exploitation, racism, sexism and other forms of discrimination. (John Howard – 1996 Sir Robert Menzies Lecture).
To me, the argument seems to be over focus, rather than fact. One thing that Henry Reynolds did in one of his earlier works was make an attempt to count the number of Aborigines who actually died from various frontier confrontations, add them up, and compare them with the number of Aborigines who lived at the time. Reading the detail of his books, it’s hard to argue with his conclusion that there was a guerilla war going on at various times and places during the early days of Australian settlement; one which was almost overwhelmingly won by white people due to a combination of superior numbers, firepower, and occasionally, germs. That doesn’t negate one of the other historical passions of Australians – that the ANZACs were a brave and heroic fighting force in World War I and particularly Gallipolli; but maybe it tells you that some of them had prior experience.
I’ve been a big fan of Henry Reynolds since I found his first books maybe 10 years ago (he’s been writing a lot longer than that), so if you can’t already, you can tell which side I’m on.
Anyway, back to this book. This book is a history of “mixed-race” people in Australia, and focuses on how much international theorising about mixing races affected the way in which mixed-race people were treated here. It has some high-level review of international thinking during the early 1900s, and then talks about the ways in which that thinking very much influenced the decisions of most state governments to try and separate mixed-race children from their aboriginal parents (an episode commonly known as the stolen generations). It’s clear from the source documents, that Reynolds quotes quite extensively, that this was more than just children being removed from parents who neglected them; in most cases, the children were stolen forcibly and the state neglected them worse, and for ideological reasons.
The book is then topped and tail with Reynolds’ story of his own family – it seems likely (although he doesn’t and never will know) that Reynolds’ grandmother had a fair bit of aboriginal ancestry.
I found the book heavy going; Reynolds seems to revel in finding quotes that sound unbelievably racist to modern ears (international ones talking about quadroons, mulattos, etc and the mongrelisation of the race), but apart from piling them on top of each other, doesn’t do much with them. While he has a good high level survey of the stolen generation timelines, I’ve read better outlines of the facts elsewhere.
Sadly, the book didn’t do that much for me; I suspect that Reynolds’ personal interest has overtaken the need for good editing. Or maybe I’m just too politically correct (and squeamish) to be able to read that many racist documents in one sitting. | <urn:uuid:8481bcd5-2009-423b-bbd5-56fb0e1b1f4b> | CC-MAIN-2017-26 | http://www.actuarialeye.com/2006/04/16/book-review-nowhere-people/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320887.15/warc/CC-MAIN-20170627013832-20170627033832-00033.warc.gz | en | 0.981631 | 766 | 2.84375 | 3 |
"Northern Lights" were seen as far south as Cuba in the Caribbean.
Telegraph operators were shocked by their equipment. Paper caught on fire due to sparks.
Much has been written about the impact a similar event would have on our much more intensively "wired" modern world. It would not be good. Integrated circuits are exquisitely sensitive to voltage surges.
How long do Carrington events last?
One detail that intrigued me was the possibility of the event only hitting one hemisphere. Is it possible that the event would burn out in less than twelve hours and only take one hemisphere, or portions of one hemisphere, back to the stone age?
There is actually some pretty good data available HERE from the July 2012 event that narrowly missed the earth. Even though it missed the earth it came close enough that satellites orbiting the earth were able to collect some very high quality data.
Another question is, suppose we had advance knowledge. Suppose we saw Europe being hammered and knew that our turn in the barrel would occur in five hours. What could we do? Do we pull all of our breakers and unplug all of our devices? Do we put the most fragile equipment in steel garbage cans or refrigerators?
From a numerical modeling standpoint, nothing makes systems "behave" better than power consuming devices. In electrical systems that would be resistance. Sadly, incandescent light bulbs are hard to find. Pulling all of the breakers and leaving all of the incandescent light fixtures on would be a pretty good way to tamp-down any voltage spikes that might occur.
The consequences of latitude
One of the more recent EMP events hit Quebec's power grid in March of 1989.
It may not be a coincidence that the event happened in Canada. The lower latitudes are more protected from solar winds than higher latitudes. That is why Aurora Borealis (Northern Lights) are not visible in regions closer to the Equator.
If higher latitudes are more exposed, then Europe is at risk. Montreal, Quebec is at the same latitude (45th parallel) as Milan, Italy. If Europe is at risk, then so is Russia.
|The red line denotes the 37th parallel|
Stuff to think about. | <urn:uuid:18b9bc0d-3bfc-41c3-b378-1ed30d158683> | CC-MAIN-2017-26 | http://eatonrapidsjoe.blogspot.com/2017/02/carrington-events.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00193.warc.gz | en | 0.966143 | 456 | 3.265625 | 3 |
Timeline for the Flood of ‘94
SUNDAY, JULY 3
Tropical Storm Alberto makes landfall, its center near Destin, Florida. Peak winds are 60 to 65 mph, but they quickly diminish as the storm moves into southeast Alabama and southwest Georgia. There is little wind damage, but heavy rains accompany the storm.
MONDAY, JULY 4
Downgraded to a tropical depression, Alberto slows to a crawl as it enters Middle Georgia. Some Fourth of July celebrations are canceled because of the steady rain. Ground already saturated by more rain than normal during June cannot absorb the deluge. Creeks and rivers begin to rise rapidly, but the rain decreases around Macon during the evening as the storm moves north.
TUESDAY, JULY 5
Alberto stalls just south of Atlanta, then begins to backtrack, bringing more heavy rain back to Middle Georgia. As creeks and rivers reach flood stage, roads and bridges wash out or are covered with water. Residents along the Ocmulgee River at Juliette and Pope’s Ferry are evacuated minutes before the river floods or washes away their homes. Interstate 75 floods and closes at the south Bibb County line.
The first eight deaths are attributed to Alberto, including two people in Macon. In Monroe County, the steel suspension bridge at High Falls State Park is washed away by the flooding Towaliga River, which also sweeps two cars off nearby roads. Two people are rescued, but another person drowns.
WEDNESDAY, JULY 6
The deadliest day of the flood, with 20 more fatalities, including 11 in Sumter County, where Americus is isolated by the flooding Muckalee Creek and its tributaries.
The rain finally stops in Macon, but problems abound. The Ocmulgee River and area creeks continue to rise, and Interstates 75, 475 and 16 all close when portions flood. Many secondary roads are also covered, leaving Macon cut off from the outside world for a short time. The water plant floods, leaving residents without running water. The Ocmulgee surges against the bottom of the Otis Redding Memorial Bridge, threatening to topple it. A 300-foot breach in the levee floods Central City Park, along with the nearby industrial area.
Downtown Montezuma is flooded in less than an hour when a dam breaks to the north, creating a parallel channel to the flooded Beaver Creek. Then-Gov. Zell Miller declares 30 counties disaster areas and calls out the National Guard. Marines help evacuate residents in Albany, where 15,000 residents are urged to leave before the Flint River floods the city.
THURSDAY, JULY 7
The Ocmulgee River crests in Macon at an estimated 35 feet 4 inches (flood stage is 18 feet), although no one is really sure because the river gauge is swept away. Water starts to recede and some roads begin to reopen. Relief workers arrive, and the Alabama National Guard sets up a mobile water purification center at Lake Tobesofkee. Portable toilets pop up around town.
South of Macon, flooding continues. Water reaches second-floor levels in downtown Montezuma as the Flint continues rising. Southern Frozen Foods, a major employer, burns. Downstream, evacuations continue in Albany.
That evening, Alberto finally dissipates over central Alabama, having dropped 10- to 20-plus inches of rain along a crescent-shaped corridor from south of Dothan, Ala., to Peachtree City.
FRIDAY, JULY 8
Water and sewerage systems in Hawkinsville are shut down by the flooding Ocmulgee. The Flint crests at 26.3 feet in Montezuma, then floods Lake Blackshear to the south. The dam is breached and the lake drains, sending more water on toward Albany, where more than 400 caskets are washed out of Oakview Cemetery. Five people die in Albany during flooding.
SATURDAY, JULY 9
I-16 and I-75 around Macon finally reopen, but there is still no water to drink or flush toilets. The Ocmulgee crests at 41 feet in Hawkinsville. The number of evacuees in Albany reaches almost 30,000.
MONDAY, JULY 11
Cleanup efforts are in high gear in areas where floodwaters have receded, but nearly 180,000 people are without running water in Bibb, Pulaski, Lee, Crawford and Sumter counties.
WEDNESDAY, JULY 13
President Bill Clinton visits Albany, which has sinkholes developing under homes as water recedes. He pledges $60 million in federal aid to Georgia. That later increased to nearly $450 million.
THURSDAY, JULY 14
The last of the 33 deaths (31 in Georgia, two in Alabama) attributed to Alberto comes in Terrell County, when a car hits a culvert on a closed, washed-out road.
FRIDAY, JULY 15- FRIDAY, JULY 22
Cleanup efforts continue throughout the state, but it is months before some residents are back in their homes. Some flooded businesses never reopen.
SATURDAY, JULY 23
Macon’s water treatment plant is finally put back in operation, giving most Macon residents running water once again. But they are told to boil drinking water for another four days before tests confirm that the tap water is safe.
WEDNESDAY, JULY 27
Bibb County residents have drinkable water from the water system.
Source: The Telegraph; “Deluge: The Flood of ‘94,” a book produced by The Telegraph, the Columbus Ledger-Enquirer and the Tallahassee Democrat; and the National Weather Service. | <urn:uuid:25f2a3a4-308d-44d4-8666-00208c6326cc> | CC-MAIN-2017-26 | http://www.macon.com/news/local/article30133770.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323711.85/warc/CC-MAIN-20170628153051-20170628173051-00193.warc.gz | en | 0.942653 | 1,209 | 2.53125 | 3 |
Hi! Over the last couple weeks I've shared some of my favorite tricks for planning a story, bubble-mapping and drawing. Both of those are strategies I use for brainstorming and planning a story. This next strategy focuses on organizing your ideas so that you're ready to write.
Equipment required: Colored pens, index cards*, and tape.
It's likely that as you've thought about your story, some of the story's moments have become very clear in your head. Examples: Your hero meets her mentor. Your hero steals a golden apple. Your villain hacks into the NORAD computers, and thinks he's undetected.
Write each of these idea-moments on a separate index card.
Notice that I've used two colors on this card. Each major character has his or her own color. That way, when I organize the cards, I'll be able to follow each of their storylines and see any gaps. (When a major character is offstage, as, for example, the wizard Simon is in parts of the Jinx books, you still need to know where s/he is and what s/he's doing.)
Now look at your bubble-maps. (See last week's post.) Read through them carefully. Identify anything in your maps that looks like it should be a scene or a story-moment.
Make a separate index card for each of these story moments.
Keep making index cards till you run out of scenes and story moments.
(Note: If I have a lot I want to write on a card, I sometimes start out with a Sharpie, but finish with a ballpoint pen.)
Now, it's time to play with your cards.
Sort through them. You'll notice that some of the scenes clearly belong at the beginning of the story, others near the end. Lay them out on a flat surface, in the order in which you think they might occur. The beginning of the story goes at the top, the end of the story at the bottom. If two or more ideas seem like they should happen at the same time, put them side-by-side.
Keep moving them around till you think you've got them where you want them.
You'll probably find some of your cards don't fit in anywhere. That's okay. It may be that those scenes don't actually belong in the story, or it may be that you'll figure out a place for them later.
You may also find gaps. Don't worry about that right now either.
When you think you have all the cards in the right order, tape them to the wall.
Now it's time to fill in those gaps.
Take some more blank index cards. Think about what scenes you might use to fill in the gaps. Jot them on the cards, and add them to the wall.
Read through what you've got.
Now look at the storyline for each of your main characters. (Just follow his or her color-code down the wall.) Do any individual characters have gaps? It's okay, for now, if they do. They may end up having gaps in the story. Just remember that you've always got to know where the major characters are, and, if they leave the story in the middle, you have to know what became of them. If a major character is left hanging, fill in an index card to show what he's doing.
When your wall of cards is finished, you're ready to write.
You can start writing your novel directly from what's on the wall.
Or you can divide your wall into chapters, hanging a slip of paper with the chapter number on it next to each section on the wall. (I've done that in the last picture above.)
Or you can use your wall display as a basis for a traditional written outline.
I've tried all of these, and they all work.
And there you have 'em, as Casey Kasem used to say. My three main strategies for pre-writing a novel. I hope you find them useful for planning your own.
*Some writers use sticky notes instead of index cards. I like the index cards because they're sturdier, easier to rearrange, and cheaper. | <urn:uuid:bb694d9c-5aa0-4288-a119-aa8f17c067d0> | CC-MAIN-2017-26 | http://sageblackwood.blogspot.com/2014/09/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323908.87/warc/CC-MAIN-20170629103036-20170629123036-00273.warc.gz | en | 0.96712 | 874 | 2.703125 | 3 |
How do we regulate advanced technologies along social or ethical lines? ASU expert says powerful new technologies are stretching the boundaries of science and science policy
Society faces several new and very powerful technologies that could alter the human trajectory into the future and, for the most part, the public wants clear guidelines as to how these technologies like gene editing are managed to ensure they are used safely. But the public’s wariness with these new technologies is largely based on ethical, religious and social concerns, rather than concerns about safety or efficacy, which is what regulatory agencies are limited to consider.
So what the public wants and what can be currently provided are a mismatch at best. As a result, regulatory agencies are struggling to come up with best practices to use in this technology driven world while staying within their regulatory authority, according to Arizona State University Regents Professor of Law, Gary Marchant.
“The dilemma we face is that many of the public’s concerns about emerging technologies are ‘out of bounds’ for the institutions we rely on to regulate those technologies,” said Marchant, speaking today (Feb. 17) at the annual meeting of the American Association for the Advancement of Science in Boston. “Expressly considering ethical and social concerns would result in controversy and legal quagmire,” he added. “On the other hand, not considering the factors that drive much of public sentiment may be undemocratic and ineffective.”
Marchant’s presentation “Governing Ethical, Social and Religious Aspects of Biotechnologies,” outlines the current public sentiment on advance biotechnologies, like cloning of animals and human gene editing, and the public’s concerns with and perceptions of these technologies.
Using animal cloning as an example, Marchant said religious and ethical concerns dominate the public’s unease with it, far outweighing any safety concerns about the technology. The sense of ‘playing god’ or some internal unease with the technology was more of a driving force for wanting regulation, than safety effects of the technology on that specific species or fear of the risks involved, he said.
Using this week’s National Academy of Sciences report on gene editing, which he co-authored, Marchant drew parallels between the public’s concerns on that technology – in this instance it lies with the ethical aspects of tinkering with the human germline and enhancement engineering – and how best to proceed incorporating social, ethical and religious aspects into regulations.
“For some technologies within this domain we could ask that the Recombinant DNA Advisory Committee – established by the National Institutes of Health and which now provides a public sounding board on controversial or novel human gene therapy protocols – to deliberate and engage on ethical and social issues associated with human gene editing, or we could develop a robust program for public consultation and dialogue on the topic,” Marchant said.
Other possible solutions, he added, include having the regulatory agencies in charge expand their definitions of safety and efficacy to incorporate ethical and social concerns; give agencies statutory authority to consider ethical and social issues; create a separate agency to consider ethical and social issues; or require an ethics impact statement for major regulatory actions.
“As biotechnologies grow more powerful and increasingly raise more profound ethical issues, we can no longer leave these ethical and social dimensions off the decision making table,” said Marchant. “To do so would be profoundly undemocratic and detrimental to the success of those technologies.”
Enjoy the article?
Did you find this article informative? Please consider contributing to Eurasia Review, as we are truly independent and do not receive financial support from any institution, corporation or organization. | <urn:uuid:9318de51-ffc2-4ff8-8e69-ce2b4e119853> | CC-MAIN-2017-26 | http://www.eurasiareview.com/20022017-regulating-advanced-technologies-along-social-or-ethical-lines/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323908.87/warc/CC-MAIN-20170629103036-20170629123036-00273.warc.gz | en | 0.935388 | 764 | 2.609375 | 3 |
The three basic types of ladders are straight (extension), step and step/extension. Stepladders include step-stools and platform ladders, generally for home or light commercial use.
Quality classifications of step/extension ladders include consumer (household), commercial (mechanic) and industrial grades.
Metal ladders, usually made of aluminum, require little if any maintenance. Wood ladders should be treated with two coats of clear penetrating sealer or varnish. Opaque sealers should never be used on wood ladders because they hide cracks or other defects.
Hinges and other moving hardware should be lubricated periodically. If the metal is not rustproof, it should be treated periodically with clear varnish or other rust proofing material.
Ladder rungs are either flat, round or "D" shaped. Stepladders use 3" or greater channels for flat steps. "D" rungs are preferred for step/extension and straight ladders. Their flat top surface is more comfortable to stand on.
Rungs must be capable of carrying an 800-LB. load as a household ladder, a 900-LB. load as a commercial ladder, and a 1,000-LB. load as an industrial ladder. The minimum size considered acceptable for round rungs is 1-1/4 and 1-1/2 the minimum for "D" rungs.
Standards established by the American National Standards Institute (ANSI) and required for ladder identification are:
All ladders should bear labels with ratings, sizes and maximum standing heights.
There are four major points to consider when selecting a ladder: the kind of activity involved, the demands of the application, the height of the ladder must reach so the climber may work from a safe position, and the basic material from which the ladder is made.
Activity: In most cases, the activity involved will make the choice fairly obvious. For example, a stepladder would be the choice to paint the outside walls and ceilings; an extension ladder usually is needed to paint outside. If the job involves more effort than usual, or will require more time on the ladder, consider "upgrading" to a ore-efficient or capable design. For example, a platform ladder in place of a stepladder.
Application: Ladders are constructed to safely hold a certain amount of weight, which includes the user, clothing and tools. Therefore, ladders are matched or job rated to the physical demands and abuse of the application. For example, a ladder used daily on a construction site should feature more-sturdy construction (or higher-duty ranking) than the ladder used a few times a year for light chores around the house.
The heavier-duty ladder, while it costs more to build and buy, is better suited for commercial or industrial use, because it will stand up under more frequent and rigorous use. The homeowner may prefer a lighter and more economical "household"-duty ladder for less-frequent use and less-demanding application.
Because the most critical point involved here is the rated-load capacity, or the working weight of the user, his clothing and tools, the duty rating is described in terms of pounds.
Household-rated ladders are economical, lightweight and dependable for around-the-house use. They represent an excellent value. Commercial-rated ladders are engineered for the handyman, painter, mechanic and for general use. Industrial-rated ladders are for the heavy climber, for daily use. Stable, strong and built to take it, industrial ladders are intended for contractors, maintenance and industrial work.
Every ladder's duty rating is prominently displayed by a color-coded label on the ladder side rail. Look for the proper duty ratings to match the highest level of use.
Height: Beyond the actual ladder height, the height of the maximum safe working position on the ladder must be considered. With stepladders the ladder should be high enough so the user does not stand above the second step from the top. The first step from the top carries a label warning the user not to stand on that step. With extension ladders, the user should stand no more than four rungs from the top.
The final consideration is which ladder material is best suited to your needs. The three most common and generally available materials for ladders are wood, aluminum and fiberglass. Each has certain characteristics that make it the preferred material for certain uses.
Because clean and dry wood ladders are nonconductive, they offer a margin of safety when working near electricity. They also offer a natural firm grip for the worker's feet and hands. However, wood ladders are heavy. A pleasing traditional look, wide availability and outstanding economy are among wood ladders' strongest attributes.
Aluminum's strongest advantage is its light weight in combination with strength. Aluminum is also corrosion resistant, economical and performance is reliable. However, because aluminum ladders conduct electricity, they should never be used when working near energized electrical lines.
Fiberglass offers a favorable blend of desirable characteristics when compared with wood or aluminum. Being nonconductive (like dry, clean wood), yet made of modern and rugged materials (like aluminum), fiberglass ladders have become a leading choice for applications where they must be used regularly in widely varying circumstances.
|- Alkyd primer needed on new wood. Two- or three-day wait recommended before any oil-base paint is applied after rain. Not recommended for application over masonry. Requires 12 to 48 hours to dry, depending on local conditions. Brushes and tools clean with turpentine.|
|- Need alkyd or good latex primers on new wood. Have chemical binder instead of oil. Resistant to moisture. Dry to touch in 30 minutes (under normal conditions). Brushes and rollers wash in water.|
|- Need latex primer on new surfaces. Should be applied in heavy layers. Takes 4 to 12 hours to dry. Brushes and rollers wash in water.|
|- Latex paints are waterbased; alkyd paint, oil-base. Waterbase paints dry faster than oil, and, as a rule, do not give off "painty" odors common to oil quality alkyd paints form a tough non-porous surface which makes them more washable than latex. Latex is easier to use because clean-up is done with water.|
|- Require undercoat and surface preparation. Go on like paint, but look like porcelain after they dry. Used on ceramic tile, walls, bowls and appliances. Will not stick if applied over ordinary paint. Toughest finish available.|
Check your state and local codes before starting any project. Follow all safety precautions. Information in this document has been furnished by the North American Retail Hardware Association (NRHA) and associated contributors. Every effort has been made to ensure accuracy and safety. Neither NRHA, any contributor nor the retailer can be held responsible for damages or injuries resulting from the use of the information in this document.
Don't forget to select your local Rocky's Ace Hardware for free local pickup | <urn:uuid:3a83a4df-1fa7-430d-bc1e-1c72a20570c5> | CC-MAIN-2017-26 | http://www.rockys.com/project-center/learning-guides/learn-about-ladders/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323908.87/warc/CC-MAIN-20170629103036-20170629123036-00273.warc.gz | en | 0.914682 | 1,476 | 3.1875 | 3 |
One of the mysteries of the English language finally explained.
Any of a group of compounds having effects in the body like those of vitamin A.
- ‘Because some patients with atopic dermatitis or severe xerosis are very sensitive to the retinoids, we may start them with a lower strength cream or a weaker topical agent.’
- ‘Although the preclinical data have been promising, human studies using vitamin A or retinoids as chemopreventive agents have been largely disappointing.’
- ‘Several studies have demonstrated low-dose retinoids in combination with calcium glucarate interact synergistically to inhibit mammary tumor growth in both animal models and human cell lines.’
- ‘Although the liver is the primary organ involved in storage and homeostasis of retinoids, adipose depots account for 15 to 20% of total body retinoid stores.’
- ‘Interest in retinoic acid as a chemopreventive agent stems from laboratory research that indicates retinoids are potent modulators of epithelial cell growth and differentiation.’
Top tips for CV writingRead more
In this article we explore how to impress employers with a spot-on CV. | <urn:uuid:b3e5a9bb-01a7-47ad-a383-b92761f23115> | CC-MAIN-2017-26 | https://en.oxforddictionaries.com/definition/retinoid | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323908.87/warc/CC-MAIN-20170629103036-20170629123036-00273.warc.gz | en | 0.892212 | 257 | 2.515625 | 3 |
FDA defining what 'gluten free' means on packages
WASHINGTON — Consumers are going to know exactly what they are getting when they buy foods labeled “gluten free.”
The Food and Drug Administration is at last defining what a “gluten free” label on a food package really means after more than six years of consideration. Until now, manufacturers have been able to use their own discretion as to how much gluten they include.
Under an FDA rule announced Friday, products labeled “gluten free” still won't have to be technically free of wheat, rye and barley and their derivatives. But they almost will: “Gluten-free” products will have to contain less than 20 parts per million of gluten.
That amount is generally recognized by the medical community to be low enough so that most people who have celiac disease won't get sick if they eat it.
People who suffer from celiac disease don't absorb nutrients well and can get sick from the gluten found in wheat and other cereal grains. Other countries already have similar standards.
Celiac disease affects up to 3 million Americans. It causes abdominal pain, bloating and diarrhea, and people who have it can suffer weight loss, fatigue, rashes and other long-term medical problems. Celiac is a diagnosed illness that is more severe than gluten sensitivity, which some people self-diagnose.
Only a very small number of people wouldn't be able to ingest the amount of gluten that will be allowed under the new rule, FDA officials said.
“Adherence to a gluten-free diet is the key to treating celiac disease, which can be very disruptive to everyday life,” FDA Commissioner Margaret A. Hamburg said. “The FDA's new ‘gluten-free' definition will help people with this condition make food choices with confidence and allow them to better manage their health.”
The rule would also ensure that foods with the labels “no gluten,” “free of gluten,” and “without gluten” meet the definition. Manufacturers will have a year to comply, though the FDA urged companies to meet the definition sooner.
Many companies that market gluten-free foods already meet the standard. But Andrea Levario of the American Celiac Disease Alliance said the federal guidelines will cut down on painstaking shopping for those who suffer from celiac disease.
Levario said that wheat must be labeled on food packages but that barley and rye are often hidden ingredients in food. The standard will also ensure that companies can't label products “gluten-free” even if they are cross-contaminated from other products made in the same manufacturing facility.
“Without clear ingredient information and a definitive labeling standard, celiac consumers are playing Russian roulette when it comes to making safe food choices,” said Levario. “This will eliminate confusion for the consumer and will cut down on calls to companies to try and determine whether their products are safe and gluten free.”
Michael Taylor, FDA deputy commissioner for foods, said the rule originally proposed during the George W. Bush administration was delayed because the agency was evaluating whether standard was correct.
“We wanted to do a careful scientific assessment of the data and the range of sensitivities,” Taylor said.
Since the rule was first proposed, gluten-free foods have become big business. Millions of people are buying the foods because they say they make them feel better, even if they don't have celiac disease. Americans spent more than $4 billion on gluten-free foods last year, according to the American Celiac Disease Alliance, and a major manufacturing survey issued this week suggested that the niche industry is giving an economic boost to the food industry overall. | <urn:uuid:858a5345-3434-4ec0-a251-1000b448343b> | CC-MAIN-2017-26 | http://triblive.com/news/editorspicks/4467298-74/gluten-free-celiac | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00632.warc.gz | en | 0.970762 | 775 | 2.6875 | 3 |
The Measles, Mumps and Rubella (MMR) vaccine which was introduced in the 70's has resulted in the dramatic decrease in what used to be the very common childhood diseases of Measles, Mumps and Rubella. I even remember having Measles and Mumps as a child myself, but nowadays you don't see kids with these conditions in the clinic.
Over the past decade, there has been concerns about a possible link between the MMR vaccine and Autism. This was the result of a paper published in 1998 in the British Journal "The Lancet" It has since been shown that the whole thing was a sham. Here is the excerpt from Wikipaedia:
Claims of a connection between the vaccine and autism were raised in a 1998 paper in the respected British medical journal The Lancet. It was later discovered that Andrew Wakefield, the paper's lead author, had received major funding from British trial lawyers seeking evidence against vaccine manufacturers. Ten of the paper's twelve coauthors retracted its interpretation of an association between MMR vaccine and autism. It was also discovered that Wakefield had previously filed for a patent on a rival vaccine using technology that lacked scientific credibility, and that Wakefield knew but did not publish test results that contradicted his theory by showing that no measles virus was found in the children tested. In 2009, The Sunday Times reported that Wakefield had manipulated patient data and misreported results in his 1998 paper, creating the appearance of a link with autism. A special court convened in the United States to review claims under the National Vaccine Injury Compensation Program ruled on February 12, 2009 that parents of autistic children are not entitled to compensation in their contention that certain vaccines caused autism in their children. The Lancet fully retracted the 1998 paper on February 2, 2010.
Following the 1998 publication, there has been many large epidemiological studies conducted to look into the safety of the MMR vaccine. All of these studies concluded that the MMR vaccine was safe. I recently read one of the papers published by the Cochrane Collaboration in 2008. This paper reviewed all the previous studies conducted on the safety of the MMR vaccine and concluded that there was no link between MMR and Autism. The following the summary of the paper:
I hope this short post will give parents a better understanding of issues behind the MMR/Autism link. I think there is very good evidence to show that the MMR vaccine is safe and benefits far outweigh the risk. At this point in time, there is no reason to believe that giving the MMR vaccine will cause the child to develop Autism. | <urn:uuid:5ed94698-3c37-457f-adba-924cac355ee5> | CC-MAIN-2017-26 | http://www.karrifamilyclinic.com.sg/2010/03/mmr-vaccine-does-not-cause-autism.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00632.warc.gz | en | 0.978711 | 517 | 2.671875 | 3 |
The primary function of the MySQL privilege system is to
authenticate a user who connects from a given host and to associate
that user with privileges on a database such as
DELETE. Additional functionality
includes the ability to have anonymous users and to grant privileges
for MySQL-specific functions such as
INFILE and administrative operations.
There are some things that you cannot do with the MySQL privilege system:
You cannot explicitly specify that a given user should be denied access. That is, you cannot explicitly match a user and then refuse the connection.
You cannot specify that a user has privileges to create or drop tables in a database but not to create or drop the database itself.
A password applies globally to an account. You cannot associate a password with a specific object such as a database, table, or routine.
Internally, the server stores privilege information in the grant
tables of the
mysql database (that is, in the
mysql). The MySQL server reads the
contents of these tables into memory when it starts and bases
access-control decisions on the in-memory copies of the grant
The MySQL privilege system ensures that all users may perform only the operations permitted to them. As a user, when you connect to a MySQL server, your identity is determined by the host from which you connect and the user name you specify. When you issue requests after connecting, the system grants privileges according to your identity and what you want to do.
MySQL considers both your host name and user name in identifying you
because there is no reason to assume that a given user name belongs
to the same person on all hosts. For example, the user
joe who connects from
office.example.com need not be the same person as
joe who connects from
home.example.com. MySQL handles this by enabling
you to distinguish users on different hosts that happen to have the
same name: You can grant one set of privileges for connections by
and a different set of privileges for connections by
see what privileges a given account has, use the
SHOW GRANTS statement. For example:
SHOW GRANTS FOR 'joe'@'office.example.com'; SHOW GRANTS FOR 'joe'@'home.example.com';
MySQL access control involves two stages when you run a client program that connects to the server:
Stage 1: The server accepts or rejects the connection based on your identity and whether you can verify your identity by supplying the correct password.
Stage 2: Assuming that you can
connect, the server checks each statement you issue to determine
whether you have sufficient privileges to perform it. For example,
if you try to select rows from a table in a database or drop a table
from the database, the server verifies that you have the
SELECT privilege for the table or the
DROP privilege for the database.
For a more detailed description of what happens during each stage, see Section 6.2.4, “Access Control, Stage 1: Connection Verification”, and Section 6.2.5, “Access Control, Stage 2: Request Verification”.
If your privileges are changed (either by yourself or someone else) while you are connected, those changes do not necessarily take effect immediately for the next statement that you issue. For details about the conditions under which the server reloads the grant tables, see Section 6.2.6, “When Privilege Changes Take Effect”.
For general security-related advice, see Section 6.1, “General Security Issues”. For help in diagnosing privilege-related problems, see Section 6.2.7, “Troubleshooting Problems Connecting to MySQL”. | <urn:uuid:55e2ee4f-dfb8-478f-a03b-f2290d298ae7> | CC-MAIN-2017-26 | https://dev.mysql.com/doc/refman/5.6/en/privilege-system.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00632.warc.gz | en | 0.852846 | 781 | 2.890625 | 3 |
Most monitors and PCs are equipped with a range of energy saving measures and user profiles - these should be employed at all times in order to cut energy use and save both money and CO2!
slide 1 of 3
It Makes Sense to Switch Off
Users with an ecological and economical sense of duty should be aware that considerable power savings can be made simply by turning your PC and monitor off when you’re not using them.
While PCs aren’t the biggest consumers of electricity (using up to 2.8 kwh a year with 24/7 usage), and leaving them idle uses very little, there is still a case for shutting down or switching to a Hibernate or Sleep mode – a PC with drives running and perhaps a video game playing can be using as much as 250 watts, while in standby the same device will use under 10 watts.
Monitors meanwhile are a different kettle of fish, depending on whether you’re using a (traditional) CRT or a modern LCD display.
slide 2 of 3
Different Monitors, Different Power Requirements
There are different types of monitor, and for this reason there are different power requirements. One of the advantages to using a laptop is that these devices are designed to run off a battery – as such they have a low power requirement. A key element of the laptop computer is the LCD monitor. Typically a 17" LCD uses around 35 watts, and this is true for a desktop LCD display. Meanwhile a CRT display will use 80 watts.
Running a screensaver meanwhile will save you absolutely no energy, as this requires the monitor to be switched on – however putting your monitor into Sleep mode will reduce consumption to fewer than 15 watts, while switching off completely will see this drop to under 10 watts.
While greater savings can be made by switching off a CRT monitor, every little helps – so remember to switch off your monitor when your PC is shutdown!
slide 3 of 3
Sleep or Hibernate to Save Energy
Using Sleep or Hibernate mode on your PC is another way to save money on energy bills. As long as your PC hardware is designed to do this (it’s rare to find a system that won’t hibernate) this can be set up via the Control Panel.
In Power Management (or Hardware and Sound > Power Options in Windows 7) different profiles are available for different situations, and these can be used to set your PC and monitor to go into standby mode after a pre-determined time period.
You might also try switching to a PC with a lower power requirement – or even switching to a laptop with a comparative specification. Laptops are designed to use as little power as possible for efficiency and portability purposes.
Peripherals such as printers, scanners, routers and modems should also be switched off when not in use. | <urn:uuid:fefe0b37-bf41-47fd-9c36-812b7fed0187> | CC-MAIN-2017-26 | http://www.brighthub.com/computing/hardware/articles/59860.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00713.warc.gz | en | 0.934852 | 591 | 3.125 | 3 |
Getting close to nature might improve your sleep quality, research suggests.
Seniors and men sleep more soundly if they have access to natural surroundings, such as beaches or parks, according to a study published in the September issue of the journal Preventive Medicine.
“It’s hard to overestimate the importance of high-quality sleep,” said study author Diana Grigsby-Toussaint, a professor of kinesiology and community health at the University of Illinois.
“Studies show that inadequate sleep is associated with declines in mental and physical health, reduced cognitive function and increased obesity,” she said in a university news release. “This new study shows that exposure to a natural environment may help people get the sleep they need.”
More than 255,000 adults from across the U.S. were surveyed about their quality of sleep in the previous month. Most said they slept poorly fewer than seven nights during the month.
But those who said they slept poorly on 21 to 29 nights were less likely to have access to green spaces or other natural areas than those who said they slept poorly on fewer than seven nights.
The link between good sleep and exposure to natural areas was much stronger for men than for women, the researchers found.
Living near parks and other natural areas can boost seniors’ physical activity levels, which can help them sleep better, Grigsby-Toussaint explained.
She said the stronger link between green spaces and sleep among men could reflect women’s reluctance to use such areas out of safety concerns.
“If there is a way for persons over 65 to spend time in nature, it would improve the quality of their sleep — and their quality of life,” Grigsby-Toussaint said.
The results provide an incentive for nursing homes and retirement communities to include nature trails and garden spaces, and to provide safe, inviting outdoor areas, she added. | <urn:uuid:2a318e4b-606a-425c-b21a-4d349350e8b4> | CC-MAIN-2017-26 | https://www.dallasnews.com/life/healthy-living/2015/10/19/improve-your-sleep-naturally | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00713.warc.gz | en | 0.966155 | 401 | 3.40625 | 3 |
A communication aid helps a person to communicate more effectively with those around them. These aids range from simple letter boards to sophisticated pieces of computer equipment.
If you're absolutely new to the subject of communication aids, this article gives a brief and basic overview:
Communication charts, books etc
Effective communication for the non-speaker can often be achieved by pointing with a finger or the eyes to words, photos and symbols contained in communication books, charts and boards. A major plus is that they can be used in any environment. An example of a communication book, shown above, was created by a child's parents and carers. It consists of a number of pages containing words and symbols that have been grouped together in topics - toys, bathtime, meals etc. It takes careful planning for such a system to be really effective, so the ACE Centre have written a guide to developing communication books.
Words and symbols
It’s not essential for the user to be able to read text in order to use a communication aid. Many aids present the user with symbols which can relate a full range of spoken vocabulary. There are many types of symbol 'vocabularies' - some fairly pictorial (like the example here), and some fairly abstract. It's fairly common to use show the word along with it's related symbol in order to avoid ambiguity.
Communication aids that speak
These aids use two types of 'voice' - artificial or pre-recorded - to speak letters, words or phrases that the user has chosen. By artificial, we mean computer-generated speech which, thankfully, is nowhere near as robotic as it used to be. You can listen to samples of the sort of voices that are available at Sensory Software's website.
Nearly all speaking communication aids can play back pre-recorded speech which, as it's name suggests, consists of single words or phrases that have been recorded by a human speaking into a microphone (usually on the aid itself).
Types of speaking communication aid
In theory, even a speaking birthday card is a form of communication aid, but in practice the simplest speaking aids are sturdy battery-powered devices whose single message lasts for a few seconds and can be re-recorded as many times as needed by speaking into a microphone built into the unit. These straightforward aids are invaluable for passing messages and teaching cause & effect. In the picture on the left, a child is using a single-message device to join in the reading of a book that has a repeated phrase in its text.
More complex speaking aids tend to have their words and phrases stored in 'levels'. The aid on the left appears to have just four messages that are spoken by pressing the large touchpads. In fact it has 20 stored messages - the two small green arrow buttons at the top of the aid can jump between five 'levels', each containing four messages. Each time a new level is selected, a different paper overlay containing the relevant set of four symbols has to be inserted.
When hundreds of words need to be available, paper overlays become impractical. This is where the more expensive high-tech communication aids step in - many display their message 'buttons' on touchscreens, rather than paper overlays. The screen can change at the press of a finger to reveal a new screen containing a different set of messages.
These high-tech talking devices (an example is pictured on the left) have much more to offer than just a 'dynamic' screen, however. Some are modified notebook or handheld computers, and offer all the advantages and features that you would expect from such machines (internet, email, word processing etc). Others have been purposely built for the job. All, however, have three things in common - they offer hundreds (if not thousands) of spoken messages, they run specialised communication software, and they primarily use artificial speech. The example pictured here is typical of such aids in that it has a colour touchscreen, communication software to suit a wide range of abilities, onscreen 'keyboards' for literate users, plus the capability to control other equipment such as a mobile phone, a computer, and environmental devices (doors, TV, etc). Prices are generally in the thousands.
Using a communication aid
There are a suprising number of ways to operate these aids. The most obvious method to access the stored speech is by pressing buttons or a touchscreen on the aid to trigger a spoken word or message, but this might not be possible for individuals with physical disabilities. Switches and other specialised equipment are available that allow access through any controllable movement of the body. And that’s not just limb movement, it includes head control, sucking and blowing - even eye movement alone.
But just how do you select a message with a switch? With single-message aids it's straightforward - plug in a switch, and press it. For aids with, say, four messages, there's usually a facility where the aid will automatically 'scan' the message buttons one-by-one, highlighting them in turn with a light above or around each button. When the indicator light for the required message is lit, the user hits the switch to select it. In the picture above, two switches are being used - the first switch moves the highlighter across the messages, and the second switch selects the message.
These scanning methods also work with touchscreen-based communication aids, but here the messages, words or letters can be arranged in a grid. You can see this sort of scanning in action at www.switchscanning.org.uk. This opens up all sorts of scanning possibilities, especially if two switches are used. There's some great video clips of such 'alternative' access at www.assistiveware.com/videos.php
Choosing a communication aid
It's asolutely vital that an assessment is carried out before a communication aid is chosen, and we're not saying that to drum up business for ourselves! It's essential to build up an accurate picture of a person's abilities before trying to identify a suitable communication aid. We believe that this is best done through a multidisciplinary assessment, where variables such as seating, mobility, access, motivation, educational needs and cognitive levels are all taken into account.
It also makes sense to try out a communication aid before making a decision about purchase. Sometimes the children that we assess trial quite a few aids from our extensive loan library of equipment before making a final decision. Their skills change over time too - as does technology - so the suitability of an aid needs to be regularly reviewed.
Once a communication aid has been purchased, everyone involved with the children - teachers, carers, therapists - will need to know how to use the aid suitably and effectively, and here we can offer help through our training service.
Communication aids of any flavour come under the umbrella term of AAC (Augmentative and Alternative Communication). You might also hear of talking communication aids being referred to as Speech Output Devices or sometimes as VOCAs (Voice Output Communication Aids). | <urn:uuid:d0fc65da-6ee0-4a54-ac8c-0461f52f4295> | CC-MAIN-2017-26 | http://aceoldham.publishpath.com/Default.aspx?shortcut=what-is-a-communication-aid | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320323.17/warc/CC-MAIN-20170624184733-20170624204733-00073.warc.gz | en | 0.952752 | 1,437 | 3.484375 | 3 |
|“||Once upon a time, the land was ruled by monsters. They wore fine black suits. They hid behind their fine black book with their fine black beards. And they lived in grand houses. And they ruled by fear. They made everyone fear the woods, trees, and the birds and the animals around them so that they would not dare to venture from their village. And if anyone said anything other than what the monsters wanted them to say, they stole their voices.||”|
The Puritans are a group of Protestant settlers who emigrated from the Old World to America following violent religious wars. In Salem they act as antagonists of the witches as they are represented as fervent religious, free-thinking oppressors.
Most of the citizens of Salem are Puritans, people who adhere to a particular moral code that affects their entire life, deeply attached to the Holy Scriptures. The entire structure of the colonies of Essex County is governed by a council of Puritans opposed to Native Americans, to the Anglo-French domain and, of course, to the enemies of Christ, who are allied with the demonic forces.
The Council of Selectmen is an assembly formed by prominent male citizens, whose task is to administer justice, quell disputes and intervene on urban issues. Given the close correlation between religious and temporal power in the puritanical society, the selectmen are - apparently - eminent Puritan who blindly follow the word of the Lord. There are fourteen members of the select board in 1692, after John Alden claims a seat on the board as his father's heir.
Salem Council of Selectmen
Boston assembly of Puritan elders
The Puritans were a group of English Protestants in the 16th and 17th centuries, including, but not limited to, English Calvinists. Puritanism in this sense was founded by John Calvin from the clergy shortly after the accession of Elizabeth I of England in 1558, as an activist movement within the Church of England. Particularly in the years after 1630, Puritans left for New England, supporting the founding of the Massachusetts Bay Colony and other settlements. This English-speaking population in America did not all consist of original colonists, since many returned to England shortly after arriving on the continent, but produced more than 16 million descendants. This so-called "Great Migration" is not so-named because of sheer numbers, which were much less than the number of English citizens who emigrated to Virginia and the Caribbean during this time. Puritan hegemony lasted for at least a century. That century can be broken down into three parts: the generation of John Cotton and Richard Mather, 1630–1661 from the founding to the Restoration, years of virtual independence and nearly autonomous development; the generation of Increase Mather, 1662–1689 from the Restoration and the Halfway Covenant to the Glorious Revolution: years of struggle with the British crown; and the generation of Cotton Mather, 1689–1728 from the overthrow of Edmund Andros (in which Cotton Mather played a part) and the new charter, mediated by Increase Mather, to the death of Cotton Mather.
Throughout the Salem serie
To Be Added
- John Alden (to Cotton Mather): Are you sure you want the truth? Are you really damn sure you know the difference between good and evil? Cause you puritans, you think the world is just black and white. What if the truth of the world is that it's nothing but gray?
- Tituba: My body was bought and sold many times, but never my soul, not until I came to Salem. I am a child in a cage, given less to eat than the animals on the ship. I fear I will never see the sun again. And then a man comes. It was he that brought me to Salem, only to be bought and sold again. I am sold from hand to hand, from man to man.
- -- in The House of Pain
- Tituba: Tell me, who started this war between witches and puritans, the scattered few of them or the mighty many of you?
- Increase Mather: By your own admission, these creatures have sold their very souls for vengeance to the Devil. Is this not so?
- Tituba: Were your people never slaves? Did they never cry out in the wilderness for justice? And did your God not hear their cries and answer with thunder?
- -- in The House of Pain
- Mary Sibley: There is no world new or old not founded on bones and blood.Imagine a world free of the violent hypocrisy and oppression of the puritans, a new world that celebrates the power of nature, freedom of thought, belief, and feeling. This is our chance.
- Anne Hale: But at what price? You, all of you, even my father, sold your souls to the devil himself.
- Mary Sibley: Neither the world, the flesh, nor the devil himself is like a puritan suit in only black and white. All is gray. And the devil they fear is not the devil I know.
- -- in Cry Havoc
- Mr. Hathorne: I am quite certain what God is most displeased with. But what is a surer sign of a world turned upside-down than a world with a woman on top? We have utterly upended the most fundamental principle of how things are to be, which is led by men. Men of property, men of substance, men of godly goodwill.
- -- in Cry Havoc
- Isaac Walton: Hypocrite! Hypocrite.You're all fornicators. Screwing each other every day of the week, including the Sabbath! I swear if Jesus Christ walked the streets of Salem, he wouldn't find a man worth saving.
- Mr.Hathorne: This is vile blasphemy, and you will hang for it.
- Isaac Walton: Go on, then! Hang me! Hang me! Done died on those stocks years ago. You all, so busy looking for where the evil came from. You brought it with you. Still, you look all'round for who could have done it. Must be the Indians, or the French or the witches or even my Dollie. Blame it on my Dollie. She had angel eyes. Couldn't see my scars just my soul and loved it. Angel eyes. Risked her life to save mine. And I'll remember them until my dying day. I promise you. But who will remember the lot of you when you're ashes? They say God sees every sparrow that falls. But he don't see you. Not no more! He forgot all about you. Salem is the dust he shook from his feet when he turned around and walked away, and he ain't never coming back!
- --in On Earth as in Hell
- Mary Sibley: No, I no longer have Faith in my magic. It has brought me and everyone around me nothing but misery and death.
- Anne Hale: Do not give in to despair. That is what you would tell me. We are not puritans Not anymore. We do not believe in this idiotic predestination. We make our own destiny.
- Mary Sibley: You're right. It's not over till we're dead and the birds are eating our eyes!
- --in On Earth as in Hell
- The seat of the Puritan Council of Elders is based in Boston.
- Mr. Elliot, subjugated by Countess Von Marburg, was one of the members together with rev. Increase Mather and rev. Cotton Mather.
- The hallmark of the Puritans is their inclination to dress entirely in black.
- George Sibley was the last of the founding fathers of Salem to be alive during the events narrated in the Second Season of Salem, before being killed. | <urn:uuid:e03df467-300e-4d12-812e-794988f1f554> | CC-MAIN-2017-26 | http://salem.wikia.com/wiki/Puritans | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00153.warc.gz | en | 0.959562 | 1,629 | 3.21875 | 3 |
Scoping Out Sunglasses
You may think we wear sunglasses for comfort and fashion. But here's another important
reason to wear sunglasses—to protect the health of your eyes.
If you spend long hours in the sun without protection, you increase your exposure
to ultraviolet (UV) rays. UV is an invisible form of radiation from sunlight. Overexposure
to UV-A and UV-B radiation causes damage to the skin and eyes. You can damage the
surface of your eyes in the same way you can get sunburned—with just 1 exposure to
extremely bright sunlight reflected off sand, snow, or water. Exposure to sunlight
over years can lead to vision loss from cataracts or macular degeneration.
Conditions that put eyes at risk
According to the American Academy of Ophthalmology (AAO) and the American Optometric
Association (AOA), these are conditions that put the eyes of adults and children at
Surfaces like snow, sand, water, and concrete that reflect UV rays.
High altitudes or low latitudes. Exposure to UV rays is higher in the mountains or
closer to the equator like in the Caribbean.
Time of day. UV radiation is usually at its highest from 10 a.m. to 4 p.m. As a rule-of-thumb,
check your shadow. If it is shorter than you, UV radiation is at a higher intensity.
If it is longer, UV radiation is at a lower intensity.
Time of year. UV radiation is higher in the spring and summer, or May to August in
the northern hemisphere, and lower in the fall.
Precautions to take
Protect your eyes:
Don’t look directly at the sun. The AAO and AOA say that damage to eyes from looking
directly at the sun during an eclipse is from thermal rays of the sun, not UV radiation.
Sunglasses won’t protect your eyes. Don’t look directly at an eclipse.
Wear sunglasses that protect your eyes from UVA and UVB rays when you are outside.
Wear them even on cloudy days.
Wear a hat to provide additional protection for not only your eyes, but also your
skin. Wear it even on cloudy days.
These precautions are especially important for people who have lighter skin or light-colored
eyes, and for people who take medicines that increase the skin’s and eyes' sensitivity
to sunlight. These medicines include tetracycline, doxycycline, allopurinol, sulfa
drugs, birth control pills, diuretics, phenothiazine, and psoralens.
What features should you look for?
The AAO and AOA advise against buying sunglasses that say they “block UV radiation,”
but don’t say how much is blocked. If they don’t block 99% to 100%, do not buy them.
Either plastic or glass lenses can soak up UV light, but the protection of either
can be improved by the addition of a clear UV coating. According to the AAO and AOA,
mirror coating and gradient tinting of lenses do not offer UV protection. The color
and degree of darkness of lenses do not mean the lenses can block UV rays. Polarized
lenses block glare, but offer no UV protection. Photochromic lenses, or lenses that
change from light to dark when exposed to UV rays, may offer protection. Wraparound
sunglasses keep light from shining on your eyes from the sides, offering more protection.
Polycarbonate lenses offer 99% UV protection.
For comfort, sunglasses should be free of distortion and imperfection. Look through
the glasses at arm's length and move them slowly across, up and down over a square
pattern like a floor tile. If the lines sway or wiggle, the lenses are imperfect.
You also should check lenses to make sure the color is exactly the same throughout.
If you play sports, consider getting special lenses made from polycarbonate plastic
that protects them from breaking. Also, get them with a coating that protects them | <urn:uuid:41a263a4-37a2-4b7f-93a4-4fa06ee2e402> | CC-MAIN-2017-26 | https://www.urmc.rochester.edu/encyclopedia/content.aspx?ContentTypeID=1&ContentID=1761 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320532.88/warc/CC-MAIN-20170625134002-20170625154002-00153.warc.gz | en | 0.921147 | 870 | 3.265625 | 3 |
When it comes to storage, hard drives have more and more competition — but they are likely to stay around for the next few years, sources agree.
But while it has competition, hard drive technology has not been rapidly changing. While the power of computer chips have been doubling every other year for decades, in conformance with Moore’s Law, no such force is at work with hard drives, notes John Rydning, research director at industry analyst firm IDC. Performance has been improved mostly by increasing the areal density of the platters (i.e., the amount of bits that can be crammed into a square inch) but density improvements are coming slower and slower, he says.
Image credit: Wikimedia Commons
Two types of hard drives are currently used in office computers: 2.5-inch and 3.5-inch form-factors (referring to the diameter of the spinning platters), explains Rydning. The 2.5-inch units are typically used in portable machines while the 3.5-inch units are typically used in desktop machines.
Currently the highest capacity available in the 3.5-inch form-factor is about four terabytes, while the highest capacity available in the 2.5-inch form-factor is about 1.5 terabytes, he notes. (A terabyte is a thousand gigabytes, or one trillion bytes.)
Another way to increase density has been to add platters. Rydning explains that there are ongoing efforts to make the platters thinner, not only to add more platters to each drive but so that hard drives can fit into thin laptops. Currently, mobile machines may have as many as two platters, while desktop machines usually have three but may have as many as five.
The I/O speed of hard drives is determined by their rotational speeds, notes David Hill, principal at an analyst firm called the Mesabi Group. For about the last decade the vendors have been offering the same three speeds: 7,200, 10,000, and 15,000 RPM. Mechanical limitations make it unlikely that they can rotate much faster, he says.
In terms of technology, the main competition for hard drives is solid state drives, using NAND flash memory devices. Such memories are non-volatile, meaning their contents survive after the power is turned off (unlike RAM), but they are faster than hard drives and have no moving parts.
However, solid state memory costs about a dollar per gigabyte while hard drive storage costs about 10 cents per gigabyte, Rydning notes. But vendors are spanning the difference by offering hybrids — hard drives with solid state caches — which store the most frequently used files and accelerate access. The caching algorithm is very important, he says.
If you use flash up front that will save you money on software costs, adds Hill. “You’ll be able to use storage more efficiently and break even on flash.”
Flash memory is the only real storage option for tablets, as they lack hard drives. (Cell phones and memory sticks also rely on it, of course.) Meanwhile, the users have begun to compare the speed of their office machines to that of their flash-based tablets, and the office machines come off unfavorably, Rydning notes. But even with solid state drives, desktop units will need retooled operating systems and applications before they can be as fast as tablets.
In the future, Rydning expects that the personal computer storage market will fragment. At the low end we can expect to see systems using conventional hard drives that may have large capacities but may not be particularly fast. At the high end we can expect to see solid state drives delivering maximum speed for those who are willing to pay for it. Mid-range systems will use hybrid technologies to selectively boost speed, he predicts.
“If you need terabytes of memory you won’t use flash storage,” Hill says. “But if you need 200 gigabytes you will.”
Hill also notes that users are increasingly interconnecting with web-based archival storage, so that their needs for local storage are no longer open-ended. Also, today’s hard drives with capacities of hundreds of gigabytes are perfectly adequate for many users.
Says Hill: “I used to run out of space, but not anymore. There could be a point of diminishing returns concerning the storage needs of the desktop.”
The growing use of VDI (virtual desktop integration) in enterprises may also cut storage demand, as one copy of the operating system is stored centrally, rather than on each desktop, facilitating upgrades and enhancing security, he adds. | <urn:uuid:07dec53c-e24e-4326-89a3-395065e640fe> | CC-MAIN-2017-26 | http://atomicbetty0.blogspot.com/2014/01/pc-storage-trends-hard-drives-hard-to.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00233.warc.gz | en | 0.952128 | 963 | 2.671875 | 3 |
When I was a kid the family dog was always coming home loaded with burrs in the fall and winter. Dogs ran loose in the neighborhoods back then and added their own part to moving the native plants around. I remember having to comb and brush and gently pull those burrs out of my dog's fur and the other day while out walking my latest generation of dog we encountered some burrs which got me thinking about them again.
Burrs are technically seed heads with little bristles or hooks. They are known as "hitchhikers" because they attach to fur, clothing, etc. and get carried to a new location where hopefully they will be dropped or rubbed off, starting a new planting in a new location. Many different plants have these burrs but the most common in our area are teasel, which is a taller plant and shown in the bottom picture (It is the one with the cone like seed heads. The other plant with the basket shaped seed head is Queen Anne's Lace) and these shown in the snowy photographs which are the seeds of American Burdock, a plant also known for its medicinal and edible qualities.
A fun fact about burrs is that velcro was developed by observing the way the hooks of burrs stuck to other materials. | <urn:uuid:536fae72-36f6-4b7a-ab68-1b55f6548d62> | CC-MAIN-2017-26 | http://capecodartandnature.blogspot.com/2010/01/brrrr-or-is-that-burr.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00233.warc.gz | en | 0.97785 | 258 | 2.796875 | 3 |
A residential house is designed to function as a dwelling place of families or single individuals, and the materials used to complete the construction process of residential homes, include wood, concrete, and brick, or any other materials that can be used for the ventilation, roofing, electrical and plumbing system. Residential houses are divided into various parts or areas that can be used for specific functions, and the most common parts or areas includes kitchen or cooking area, dining room, living room, attic, basement or cellar, laundry room, garage, bedroom and bathroom.
The process of construction is basically defined as the act of constructing a building or any infrastructure, which may start with designing, planning, financing, and the process will continue until the project is completed and ready to be used by the customer. The three sectors of construction includes infrastructure, which is often called as heavy civil, heavy engineering, or highway; industrial, which include power generation, manufacturing plants, mills, refineries and process chemicals; and buildings, which is divided into non-residential or commercial and residential. The business of selling and building any dwelling places is called as residential construction, like quad-duplex, apartments, condominiums, duplex, single-unit, and manufactured, which is appropriate for single-family, multi families, and individuals, and wood-framed construction is the most commonly used technique of residential construction. It involves different steps to complete the construction process, such as developing floor plans, doing survey, excavating the foundation, obtaining approval of government building, installing windows, covering the walls with siding, installing roof shingles, adding floor and ceiling, pouring a footers and foundation with the use of concrete, building the main structure for load-bearing, framing the interior walls, adding essential utilities, installing insulation and bathroom fixtures, priming and painting the ceilings and interior walls, tiling, installing appliances and floor covering, and clearing the building site. The workers and the professionals who are responsible in the process of construction are planning consultants, construction manager, general contractor, and individual trade contractors or tradesman, like ironworkers plumbers, masons, carpenters, and electricians; architects, and engineers.
A skilled person that is responsible for the day by day oversight of a construction site, is called as a general contractor or prime contractor at http://barringtononeremodeling.com/#!residential-commercial-construction, and the other functions of a general contractor includes the management of trades and vendors, and communication of information to all the skilled worker throughout the entire course of a project. A general contractor has a lot of responsibilities and tasks assigned to them during construction, such as monitoring cash flows and schedules, maintaining accurate records, securing the property, managing personnel on the site, providing temporary utilities on the site, maintaining accurate records, disposing construction waste, and providing site surveying and engineering, providing all of the labor, equipment, services, and materials needed in the construction process; reviewing contract documents, and applying for building permits.
There are definitely a lot of Fort Worth Kitchen Remodeling contractors that can be find or hired by the people in every parts of the globe, and the individuals who wants to hire and find the most efficient and the best one in their local area can find them through the use of the internet and newspapers, or from the word of mouth or suggestions of engineers, architects, and construction companies. | <urn:uuid:f8421e3a-fe65-4223-a0a3-9a8c1ffdc594> | CC-MAIN-2017-26 | https://findgeneralcontractorssite.wordpress.com/2017/02/27/finding-the-best-general-contractor/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320695.49/warc/CC-MAIN-20170626083037-20170626103037-00233.warc.gz | en | 0.947981 | 695 | 3.0625 | 3 |
I am delighted to publish my first ever guest post, by Kristy Swift. A natural teacher if ever I met one, Kristy has such a delightfully inquisitive approach to learning, both for herself and for her pupils.
T-Rexes and Musical Glue
Like most kids, I was obsessed with dinosaurs. I spent hours in my Dad’s workshop, building model T-Rex skeletons from hobby kits. Assembling the “bones” was fun, but it was no use building T-Rexes if they were only going to collapse again. Once I had everything in position, I needed to keep it there.
A quick trip to the hardware store usually solved the problem. There were many adhesives available, but the best one came in two tubes. It was fun to squeeze each ingredient onto a piece of card, stirring them with a toothpick to cause a chemical reaction. This created something stronger than the original parts; something that would really stick.
I didn’t grow up to become a palaeontologist, though. I fell in love with music instead. However, I often think of those model T-Rexes, because musical concepts are a lot like those fiddly T-Rex bones. You need exactly the right mental glue to make them stick, and you create the best glue by combining several ingredients.
I recently met someone with an incredible recipe for “musical glue”. His name is Paul Harris, and he teaches so proactively that every moment of the lesson becomes fun, achievable, and likely to stay in the student’s memory. Earlier this year, he spoke at Faber Music in London and generously shared his methods.
Paul’s website maintains that teaching music is “incontestably, one of the most fascinating and stimulating of all professions.” His multi-layered approach replaces the master-apprentice model (“Let me tell you what’s wrong with you”), with something more collaborative and fun (“Let’s break this into achievable components and enjoy all of them”).
What are these achievable components, then? If a piece is sight-readable, it just means we’re familiar enough with its patterns to perform it without much rehearsal. What if we used this concept of “pattern-familiarity” as the basis for all of our teaching? We could immerse students in the patterns of any given piece, before they see the piece itself. If we explore the patterns in a variety of ways, they will stick like glue.
“Lovely Moon, Shedding Silver Light…”
I decided to try Paul’s approach with one of my vocal students. This particular girl needed a piece for her Grade 7 ABRSM exam. Given her sensitive and expressive nature, I thought she might appreciate Bellini’s Vaga luna che inargenti (Lovely Moon, Shedding Silver Light). The song is filled with unrequited longing, like a mini operatic aria. However, the Italian text is sometimes a stumbling block, particularly in combination with Bellini’s syncopated rhythms. Nevertheless, the song’s touching spirit more than justifies those challenges.
We began our warm-up by exploring different vocal colours. I asked, “What is the effect of singing on Ah, Eh, Ee, Oh and Oo? Which one makes a tone that you would call ‘silvery?’ What kinds of pieces might need a silvery timbre?”
Another section of her warm-up included the exact kind of syncopation used by Bellini in the song: firstly, we played with it as “call and response” patterns, and then as a melodic improvisation around the given rhythmic pattern.
The next step was an exploration of how various composers express “moonlight” in their music. (Renée Fleming has an entire album called Night Songs, and of course there’s the eponymous Beethoven sonata!) Let’s not forget Romantic literature, either. I asked some more questions: “How many times have you studied a poem that draws on an element of nature? Quite a few? Fantastic… what does the moon symbolise? Ah… emotional themes. Secrets, unrequited love and loneliness, perhaps? Which movies have you seen that have those elements?”
I was delighted that she had something other than Twilight to discuss here, but I would have accepted Twilight if need be! It’s also worth noting that this conversation took less than three minutes. Completely worth it in terms of the curiosity it piqued. At this point, I took the Bellini book from the top of the piano, and began to open it. My student almost dragged it from my hands. A win for Bellini! Evidently, this kind of lesson plan beats the “sing these dots in order, fail, and let me tell you how you went wrong” model.
Paul Harris, thank you! | <urn:uuid:86198905-e61c-47b3-85ba-74f6e37763db> | CC-MAIN-2017-26 | https://musicatmonkton.com/category/guest-post/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320915.38/warc/CC-MAIN-20170627032130-20170627052130-00313.warc.gz | en | 0.96484 | 1,060 | 2.59375 | 3 |
If you have eliminated your pest hatchery by getting rid of brush, weeds and debris you have come a long way. The next step is to carry out the types of cultural practices on your lawn that will make it a pleasant place for people and pets, and an unpleasant place for pests.
Traditional lawns have hundreds of variables. They are one of the largest consumers of home management dollars.
There is mowing to be done, and the expenses that go along with that. There is irrigation, and the cost of the system, and then the continuing cost of the water it uses. There is fertilization, and the cost of the fertilizer as well as the expense or the time and labor of applying it. There are activities like aerifying, dethatching, that add to the cost and, or the labor. Of course, there is also the cost of pest control.
Considering all of these factors, and adding environmental impact, we can say that lawns are resource hungry, and when done incorrectly, they have a big carbon footprint and a big financial footprint.
New trends in lawns
Awareness of this is growing, and new trends are springing up which counter many of these effects.
There is a movement toward native or natural habitats. This extends beyond “natural forest” type settings to the use of native grasses and landscapes which can survive and even thrive with the normal levels of rainfall for a given area, and are less likely to need additional fertility or pesticides.
Native habitats, using native landscape plants and grasses offers a huge advantage in pest prevention, and we will talk more about this a little latter.
There is a movement toward home farming, micro farming, and gardening that is beginning to use much of what was formerly formal lawn space for growing vegetables and herbs.
Home farming and gardening can be part of a practical answer to lawn pest issues. By using lawn space as productive land, the need for the large amounts of intensive lawn maintenance are diminished, but many pest control issues still exist, so it is basically neutral from a pest prevention perspective.
Traditional lawns and lawn maintenance practices
For now, we will look at traditional lawns, and traditional lawn maintenance practices and their relationship to the control and prevention of pests in both the lawn, landscapes, and the home itself.
Pest like cover for protection, they like food and water for survival and multiplication. They will take this wherever they can find it, and move on looking for more. As the population grows, they will seek more. When they find more, the population grows more!
A well balanced lawncare program will work against pests, a poorly balanced lawn regimen will attract pests. All aspects of lawn care are important. Mowing is the primary lawn care activity, and will yield the best results if carried out properly, and the worst results if neglected or done improperly.
Do not underestimate this part of your overall pest prevention program. | <urn:uuid:38408c4e-c4f2-447f-8682-f6f213b9eeab> | CC-MAIN-2017-26 | http://bugsandweeds.com/pest-prevention-program/lawn-maintenance-for-pest-prevention/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00393.warc.gz | en | 0.951871 | 599 | 2.703125 | 3 |
Japan's Fukushima Daiichi nuclear power plant
Source: Press TV
The operator of Japan's Fukushima plant has admitted for the first time that a partial meltdown occurred in the station within hours after the March 11 twin disasters.
Tokyo Electric Power Co. (TEPCO) announced on Monday that based on new data, most of the fuel rods in the reactor No.1 had melted and fallen to the bottom of the reactor's pressure vessel only 16 hours after a massive quake and tsunami hit the plant.
"Because there is similar damage to the fuel rods at the No. 2 and 3 reactors, the bottoms of their pressure vessels could also have been damaged," senior TEPCO official Junichiro Matsumoto said.
Matsumoto added that the company plans to carry out similar analysis on the two reactors.
The massive March 11earthquake and ensuing tsunami in Japan's northeastern coast set off a nuclear disaster by knocking out power to the cooling systems of reactors at the Fukushima Daiichi plant, and caused radiation leaks.
The government initially ordered the evacuation of people living in a 20-kilometer (12.4-mile) radius around the plant, and told people residing between 20 and 30 kilometers (18.6 miles) from the plant to remain indoors.
On Sunday, Japan began widening evacuation zone around the plant and transferred about 4,000 residents of Iidate-mura village and 1,100 people in Kawamata-cho town to public housing, hotels and other facilities in nearby cities.
TEPCO has been struggling to stop radioactive leaks from the plant's damaged reactors for months.
On Thursday, the company said that new measurements taken this week indicate that water pumped into the pressure vessel had quickly leaked out from the reactor one building.
The company has also reported another spill of contaminated water despite efforts to stop spills into the Pacific. | <urn:uuid:8a707262-66ad-42a2-81f8-08e325650870> | CC-MAIN-2017-26 | http://worldunitednews.blogspot.com/2011/05/japan-confirms-meltdown-for-first-time.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321938.75/warc/CC-MAIN-20170627221726-20170628001726-00393.warc.gz | en | 0.955982 | 382 | 2.703125 | 3 |
Ending waste as world food answer
Nov. 8, 2013
Like far too many international endeavors launched with high hopes and much vigor, the “Save Food” campaign of the Food and Agriculture Organization of the United Nations has seen much of its fire dimmed as global supply-demand changes have recently calmed markets. This does not mean the efforts undertaken by the FAO in 2011, first to measure and then to reduce global food production that does not actually feed people, have come to naught. According to the FAO, which has assumed leadership for this undertaking, more than 150 public and private sector “partners,” including major food companies, have aligned their related activities with UN agencies like the World Food Programme “to find new approaches to improving the efficiency of the world’s food system.” No matter how skeptical one may be about the power of such a grand international undertaking, the goal of focusing on improving efficiency has to have won nearly universal agreement to seeking to do something.
It is the vastness of the enterprise that also accounts for its slow start, even when a leading global food retailer like Wal-Mart commits itself and its purchasing to supporting this endeavor. Important to appreciating the potential of “Save Food” is remembering how the program got its start. It was a private industry group, made up of food packaging manufacturers, that went to the FAO several years ago to suggest the need for a study to measure food loss and food waste. This had been selected as the theme for its 2011 international trade fair. From the start, “loss” was defined largely as what occurred between the time seeds were planted in developing countries and crops were harvested. “Waste” was the loss experienced mainly in developed nations between foods being processed, sold at retail and used in the home.
The global loss and waste figures were staggeringly large, exceeding projections by pessimistic observers. In developing countries, 30 percent to 40 percent of food crops are lost before entering marketing channels. Up to 50 percent of root crops as well as fruit and vegetables are lost, while oilseeds and grain losses are at the lower 20 percent level. Shopping habits, aesthetic sensibilities and “throw-away-mindsets” are cited as the main cause of waste in industrialized countries. Waste in Europe and North America is estimated as equivalent to 10 kilograms per person per month, an average not even reached in a year by consumers in sub-Saharan Africa and in South and Southeast Asia.
For a total world estimate, the FAO came up with 1.3 billion tonnes of food with a value of more than $1 trillion lost or wasted each year. Referencing the estimate that 870 million people do not have enough to eat, the UN agency said this food shortage could be eliminated by saving only one-quarter of what is now lost or wasted.
Several specific steps have been put forward to relieve the current situation. Most fundamental is assuring that supply and demand are in balance to reduce the volume of crops grown and allowed to rot for lack of market. Most interesting here was the recommendation from the French minister of agriculture who told an FAO conference that adding storage capacity and expanding processing facilities should help.
“Resolving food issues globally means producing, but also processing and storing what is produced,” noted Stephane Le Foll, the minister. Next is promoting environmentally-minded food retailing mainly by changing retail marketing techniques. Third is assuring that surplus food is made available to hungry people or if inedible is used in a way that allows the energy and nutritional content to be put to the best use.
The “Save Food” campaign makes good sense, even though some aspects are easier to implement than others. Just because pressures from sharply rising prices have eased is no reason to stop looking for ways to enhance the global food system’s efficiency. Hardly any international campaign merits more support than this. | <urn:uuid:b75fe2d3-8b0d-4dc2-be87-f80c84a0f948> | CC-MAIN-2017-26 | http://www.meatpoultry.com/Writers/Other-Contributors/Ending-waste-as-world-food-answer.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00473.warc.gz | en | 0.97137 | 808 | 3.296875 | 3 |
This paragraph assumes that disciples give to the poor (compare 6:19-24 at greater length); what it evaluates is how we give to the poor.
Jesus again employs hyperbole in his descriptions (as in 5:19, 29-30), thereby adding graphic force to his warnings. Although some scholars have argued that people actually blew trumpets during giving in the synagogues, Jesus probably simply uses rhetorical exaggeration to reinforce his point, as when picturing the Pharisees who swallow a camel whole but strain out a mere gnat (23:24). Jesus adds to this stark image still another: we should be so secretive in giving that we should not let our left hand know what our right hand is doing (6:3; 1 Cor 4:3-5). He challenges us about the danger of public piety with such forceful language precisely "because our assurance that such hypocrisy is no great problem with us is a major part of the problem" (Tannehill 1975:85).
Jesus emphasizes future reward for those who forgo present honor. He promises something better than a charitable deduction on one's income tax, nice as that may be (vv. 1, 2, 4). Many of his contemporaries believed that charity delivers the giver from death and stores up treasure in heaven (Tobit 4:10; 12:8; 14:10; t. Pe'a 4:21; Pes. Rab. 25:2); Jesus likewise emphasizes heavenly reward for serving those truly in need (6:19-21). In contrast to nineteenth-century evangelicalism, much of today's church is divided between those who emphasize personal intimacy with God in prayer and those who emphasize justice for the true poor (see Sider 1993). Like the prophets of old, however, Jesus demanded both (6:2-13; Mk 12:40); he also recognized that without keeping God himself in view, we can pervert either form of piety.
We should care for the poor. The phrase when you give to the needy implies the expectation, standard in Judaism, that one would care for the needs of the poor (Tobit 4:7), just as the phrase when you pray (6:5) takes for granted that the hearer will pray (m. 'Abot 2:10). Jesus' Jewish contemporaries emphasized that one must give charity from the right kind of heart (m. 'Abot 5:13) and sometimes objected to ostentation in charity (Test. Job 9:7-8; m. Seqalim 5:6).
If more of us Christians feared God, this realization would scare some sense into us. We like to think that Jesus was condemning the "legalistic" religion of Judaism, but we are wrong. Jesus was not condemning an officially legalistic religion, but the ostentatious practice of those whose religion taught purity of heart. In other words, on many points the Pharisees believed the same things we do, the same things Jesus was teaching. When we parade up to the altar to give our money (in some churches) or make sure the ushers see us contribute a significant offering when they pass the plate (in other churches), our hearts stand condemned regardless of our doctrine. True religion demands sufficient faith to settle for God's approval, to do what pleases him no matter what others may think.
Step 1 - Create an account or log in to start your free trial.
Starting your free trial of Bible Gateway Plus is easy. You’re already logged in with your Bible Gateway account. The next step is to enter your payment information. Your credit card won’t be charged until the trial period is over. You can cancel anytime during the trial period.
Click the button below to continue.
Step 1 - Create an account or log in to start your subscription.
You’ve already claimed your free trial of Bible Gateway Plus. To subscribe at our regular subscription rate of $3.99/month, click the button below.
Now that you've created a Bible Gateway account, upgrade to Bible Gateway Plus, the ultimate online Bible reading & study experience!
Bible Gateway Plus equips you to answer the toughest questions about faith, God, and the Bible. There's no software to install; it's all integrated seamlessly into your Bible Gateway experience. Try it free for 30 days! | <urn:uuid:b54bdba2-22dd-4c7a-8ca3-f374fdec2add> | CC-MAIN-2017-26 | https://www.biblegateway.com/resources/commentaries/IVP-NT/Matt/Doing-Charity-Secretly?action=getChapterSections&cid=1&source=1&schap=6 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00473.warc.gz | en | 0.933424 | 895 | 2.671875 | 3 |
Ever wonder what happened today in the past? Here are 6 things:
- 757 Stephen II ends his reign as Catholic Pope.
- 1514 Copernicus makes his first observations of Saturn.
- 1564 Shakespeare is baptized.
- 1607 The Brits establish a colony in Virginia.
- 1929 The 1st non-stop flight from England to India is completed.
- 1986 The world's worst nuclear disaster occurs at Chernobyl power plant.
So, guys, those were just 6 things in history that happened today (April 26)!
I'll be doing blogs every week or so.Can you add anything to the list?
❤️s from Kry!
Credits to: www.historynet.com/today-in-history
FYI: All blogs are posted a few days after the writing process. | <urn:uuid:5c19d3b9-711d-4e9e-83a2-3f5db0dec735> | CC-MAIN-2017-26 | http://sbsabres.blogspot.com/2017/04/today-in-past-april-26.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00553.warc.gz | en | 0.95274 | 173 | 2.625 | 3 |
from The Century Dictionary and Cyclopedia
- Of or pertaining to the family Pœciliidæ, fresh-water fishes of southern Europe, Asia, Africa, and America: commonly known as killi fishes. Some of them occur in bays and arms of the sea.
Sorry, no etymologies found.
Sorry, no example sentences found. | <urn:uuid:cbfadc85-c3a0-4a47-911e-eb41947a0f06> | CC-MAIN-2017-26 | https://www.wordnik.com/words/p%C5%93ciloid | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323970.81/warc/CC-MAIN-20170629121355-20170629141355-00553.warc.gz | en | 0.833059 | 77 | 2.53125 | 3 |
We are approaching the completion of our counting of the omer, the preparation for mattan Torah, during which time we have been mourning the death of Rabbi Avika's students. The gemara (Sota 21) tells us that the study of Torah is greater than all other mitzvos in that a mitzvah protects one from sin and harm only when one is performing the mitzvah, but Torah affords 24x7 protection at all times, even when one is not actively engaged in learning. Why then were these great talmidei chachamim, students of R' Akiva, not saved from death in the merit of their Torah study? Why is it that they died davka during this period of anticipating and preparing for mattan Torah?
Chazal tell us that R' Akiva's students died because they failed to honor and respect each other -- it was a flaw in their bein adam l'chaveiro, in their midos. R' Shternbruch explains that Torah without bein adam l'chaveiro -- Torah without midos -- is not Torah. Therefore, their learning did not protect them.
You cannot celebrate a mattan Torah of laws bein adam la'Makom and ignore the bein adam l'chaveiro. Right after speaking about the holiday in Parshas Emor, the Torah reminds us (23:22) that there is a mitzvah to leave pe'ah and leket for the poor. Why stick that in here? Meshech Chochma explains very beautifully that the Torah is hinting to us that when we celebrate Shavuos, we have to recognize that caring for the poor, social law, bein adam l'chaeivo law, is also part of mattan Torah. When we stood at Sinai it was not just to receive a bunch of rituals. (A quibble: the Torah there does not speak about Shavuos as the time of mattan Torah?) It was to receive these laws as well.
The Beis Yisrael of Gur sees this lesson in Parshas BaMidbar, which is almost always read before Shavuos. "V'eileh toldos Aharon u'Moshe b'yom dibeir Hashem es Moshe b'har Sinai." The Torah tells us that it is going to list the toldos of Aharon and Moshe and then it then just lists Aharon's children. So why mention Moshe? Explains Rashi, one who teaches his friend's children Torah is credited as if he gave birth to them. Because Moshe taught Aharon's children Torah, he counts as their father as well. What Moshe got "b'yom dibeir Hashem es Moshe b'har Sinai," through mattan Torah -- or what Moshe needed to properly experience mattan Torah --- was this sense of responsibility for "chaveiro," for his friend, his neighbor, for their children. This is the "v'ahavta l'rei'acha kamocha" which R' Akiva called the "klal gadol baTorah" in action. (And since these children count as his tolados, it also fulfills Ben Azai's dictum of "zeh sefer toldos ha'adam as the cardinal principle!)
The Midrash writes that Rus does not teach us halacha; it teaches us chessed. Chessed, caring for others, is not an additional theme tacked on to the Yom Tov of kabbalas haTorah, but rather is integral to what kabbalas haTorah is all about.
On a completely different note, I saw a pshat from the Divrei Shaul quoted in Ta'amei haMinhagim that, unless I'm mistaken, seems to refer to the myth of the sirens that appears in Homer's Odyssey and elsewhere. He explains why mattan Torah was accompanied by thunder and lightening by quoting from the Ya'avetz's siddur that there are creatures that emerge from the sea and sing with such beautiful voices that people literally die from the pleasure of their song. Kal v'chomer: if people die from the hearing the beautiful song of these sea men, imagine the effect the beautiful song of dvar Hashem would have! (My wife's comment: but the gemara in fact says that people did die when they heard the dibros and Hashem had to revive them). Therefore, Hashem used cacophonous thunder and lightening to minimize the effect of the beauty of the sound of the dibros.
It's not an exact parallel: the sirens lure sailors to their death using song; here, the song itself kills people. But it's close enough to make me wonder if it is one and the same myth. Maybe it's sacrilegious to think that, I don't know. I would like another source for this Ya'avetz if there is one, but don't have time to dig into it. | <urn:uuid:c7ca91d0-af22-4cd6-98cf-748d758585c0> | CC-MAIN-2017-26 | http://divreichaim.blogspot.com/2017/05/toras-chessed.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320209.66/warc/CC-MAIN-20170624013626-20170624033626-00273.warc.gz | en | 0.969645 | 1,060 | 2.5625 | 3 |
The initiative aims at developing the talents of the children, while also providing life skills training to ensure that children in rural, poor communities have the support necessary to realize their full potential and become happy, healthy, and productive members of their society, including becoming positive role models in their communities.
LUYODEFO believes that by bringing together individuals and communities, it bridges cultural and ethnic divides, as well as impacts public policy through the promotion of young people’s rights of participation, play, and socialization at sports events.
How LUYODEFO is Using Sports
- Providing training and services relevant to the development of physical activity in the community, thereby helping to rehabilitate the children who have gone through psychological traumas due to many reasons, including HIV/AIDS.
- Providing programming for orphans and vulnerable children (OVC) by encouraging participation, which builds self-esteem and enhances the child’s exploitation of his/her talents. Competition, exercise, and teamwork help the young people form common goals and foster skills that can help shape their future — it’s a critical outlet during a crucial stage in life.
- Creating a forum to effectively conduct campaigns on health, sexuality, and HIV/AIDS; gender equality; domestic and gender-based violence (DV/GBV); children’s rights and child protection; drug abuse; environmental issues; etc. | <urn:uuid:42304758-8bd7-47c5-ab89-750699ea569c> | CC-MAIN-2017-26 | http://www.luyodefo-ug.org/community/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00353.warc.gz | en | 0.955002 | 284 | 3 | 3 |
The VIA project focuses on vowel variation across American dialects. We explore how where speakers are raised influences how they pronounce vowels and how they hear vowels that others produce. A critical aspect of our work is measuring the degree to which speakers in different areas of the same region participate in the vowel shift patterns (NCS, SVS and CVS) that appear to be affecting vowel production in each region. These shift patterns are making vowel sounds, in many cases, become more acoustically distinct across the U.S. (Select the About the Project tab for more detail on these shifts.)
Unlike most research on vowels in American dialects, we look not only at how vowel sounds are pronounced but also at how they are perceived. In other words, does living in a region where vowel production is different from another region actually alter how speakers hear the sounds as well as make the sounds? By studying both how speakers say vowels and how they hear vowels, we hope to provide some insight into the nature of the relationship between speech production and perception, an understudied area in language research. In collecting both production and perception based data from the same individuals from different regional dialect backgrounds, we investigate how socially driven differences in speech production relate to variability in speech perception.
Here you can read a bit about our main findings so far. We also provide an overview of some of our most relevant published research.
What we found
Figure 1 shows where most of the subjects who participated in this project were from.
So, what did we find? Well, our work is still ongoing but a number of discoveries have so far emerged.
Significant regional differences in production by region
Not surprisingly, our research finds that vowels vary depending on where individuals were raised regionally. Speakers in the North, South and West do, in general, sound different when saying the vowels in words like beet /i/, bit /I/, bait /e/, bet /ɛ/, bat /æ/, cot /ɑ/ and caught /ɔ/. However, the pronunciation of back vowels, that is, vowels in words like boot /u/, book /ʊ/ and boat /o/, are not as different across regions.
The figures below display averages of the acoustic patterns found in our data for each region, using the International Phonetic Alphabet (IPA) symbols for each vowel class as noted above. Vowel plots such as these are made by taking measurements of several formants in a vowel signal. Formants are bands of acoustic energy around a particular frequency which represent different resonances of the vocal tract.
Differences in the position of the tongue, lips and jaw during a vowel’s articulation creates a different resonance pattern that includes these more acoustically intense bands (formants) which help listeners decode which vowel quality they are hearing. We can measure these differences in mouth/tongue position by instrumentally measuring how the formant structure (bands of acoustic energy) varies across different vowels. So, when different speakers use a different positioning of articulators in the vocal tract to make a sound (a more raised or backed tongue position, for example), the resultant formant pattern is measurably different. What are known as the first and second formants capture the main acoustic properties of a vowel and these appear to be most salient to listeners in classifying vowel sounds as particular categories.
So, for our project, we use the values of these first formants to plot a schematic diagram that graphically represents where speakers’ articulators are positioned when making such sounds. By comparing these measurements, we can see how speakers relate to one another in their vowel productions. Speakers from the same region tend to cluster together in terms of the way they articulate vowel sounds. As a result, we often find, when subjects from the same region’s vowels are plotted together, that we can really see variation across regions in how sounds are made. Figure 2 below displays such diagrams for our speakers in each region in our study, the South, the West and the North.
Comparing these to the depiction of what we should expect based on the vowel shifts reported in each region (see http://www.pbs.org/speak/ahead/change/changin/ for contemporary vowel shift schematics), we can see that our speakers from across the U.S. do in fact show evidence of these regional shift patterns. For example, note how close together the /e/ and /ɛ/ classes are in the Southern means plot compared to how far apart they are in the Northern means plot. Likewise, note how close together the /ɑ/ and /ɔ/ vowel classes are in the Western plot compared to the Southern and Northern plots. These vowel positions illustrate the divergent tendencies in vowel production we are finding across regions.
Overall, our Northern speakers show more raised (meaning the tongue positioned higher in the mouth during articulation) production of the short front vowels /I/, /ɛ/ and /æ/ in words like bit, bet and bat, while they do not show any evidence of a merger in the vowels in words like cot and caught /ɑ/ and /ɔ/.
In the South, we see that the long and short front vowels are much closer together than in the Northern speaker sample. In other words, the vowels in words like beet /i/ versus bit /I/ and bait /e/ versus bet /ɛ/ do not have as much distance acoustically as those vowel pairs in the North. This suggests they are not raising or lowering and tensing the tongue the same way as Northerners during these vowels’ articulation.
So, what does this mean? Well, it doesn’t mean Southerners do not make a difference in the pronunciation of these vowels, but it means that they are using different acoustic cues compared to Northerners to keep these vowels distinct (so that they continue to signal a meaningful vowel difference such as in bet versus bat). We suspect that Southerners use spectral dynamics (shifting acoustic ranges during a single vowel sound’s articulation) more than speakers in other regions to maintain vowel differences, something often referred to as ‘drawling.’
Finding measures of ‘drawling’ has proven difficult in language research as it has been hard to locate an acoustic measure that correlates with a ‘drawl’ and only a few studies look closely at what kinds of vowel measures beyond vowel length might equate with listener perceptions of drawled vowels. We are currently examining this hypothesis more empirically and early results indeed suggest Southerners have more rapid changes across a single vowel’s acoustic waveform (measured as vector length, trajectory length and spectral rate of change) than speakers in other regions.
Moving beyond the North and South, we also find Western vowel sounds produced differently – in line with the previously studied changes occurring in that region (also found in Canada). In the West, we found that short front vowels, in particular those found in words like bed /ɛ/ and bad /æ/, are retracting (the tongue position further back in the mouth) so that a word like bad sounds more like ‘bod’ to listeners outside that region. Looking at this same vowel sound in the North, you can see that this is quite different than how it is articulated there. For a Northerner, bad is produced much higher and fronter in the mouth (more ‘bed’ like to non-Northerners) than how it is produced (with a backed position) for a Westerner.
We also find, in contrast to the North and South, that speakers in the West tend not to pronounce a difference in the low back vowel sounds /ɑ/ and /ɔ/. These are the sounds in word pairs like cot, caught and Don, Dawn that are pronounced as distinct vowels sounds elsewhere, but sound the same when produced by a Westerner. However, as discussed in a bit more detail below, our research has shown that Westerners are actually using durational cues to mark a subtle acoustic contrast in these two classes, despite the fact that most people think they ‘sound the same’ when pronouncing these vowels.
So, though people often think Northern and Western speech is ‘general American’ sounding, you can see that this is actually far from accurate in that speech in all three regions varies considerably and in increasingly different ways. What we can get from this is that the concept of ‘general American’ is actually a myth. Speakers from all three regions are changing the way they say vowel sounds, and changing in ways that lead to more distinctive vowels across regions. This is particularly true for vowels produced in the front of the mouth.
Emerging similarity as well as difference
One interesting finding in contemporary research, confirmed here by our study results, is that changes to back vowel sounds (sounds produced by the back of the tongue raising and lowering as found in words like boot, book and boat) are more consistent across regions. These three vowel classes (referred to as the /uw/, /ʊ/ and /ow/ classes, respectively) are fronting, or using a fronter tongue position, in all major U.S. English dialects. Note in Figure 2 that these back vowel classes are actually not that far back in the mouth. The /ul/ and /ol/ categories in the plots represent these vowels before “L”, in words like “pool” and “pole”. As can be seen in the figure, these contexts resist fronting and depict the actual back periphery of speakers’ articulatory spaces.
Southern speakers are more advanced in this change and Northerners are least advanced, but all three dialects are showing a shift toward this fronter articulation. Why might this be when front vowel sounds are clearly moving in different directions? Well, likely this has to do somewhat with what is motivating back vowel fronting compared to the front vowel changes. Back vowel fronting is not uncommon in languages more generally, particularly languages like English that have a relatively large vowel inventory. Physiologically, there is only a limited amount of space in back of the mouth to produce back vowel sounds and English has quite a few vowels produced there.
Thus, it is thought that back vowel fronting is motivated by this crowding in the back of the mouth creating a tendency for fronting to relieve the overcrowding (Stockwell and Minkova 1997). An alternative explanation proposed to account for back vowel fronting is that it is an effect of tongue body frontness during the articulation of adjacent coronal consonants – consonants produced with fronter tongue articulation (Flemming 2003). Either way, similar pressures across dialects appears to have led to similar changes occurring.
Significant intra-regional differences in production and perception based on regionally diagnostic vowel shift patterns
While a bit more complex than the results discussed above, our research has also suggested that speakers raised within the same region do not all participate to the same degree in the regional vowel shifts. We find both within-speaker variability for participation within the same field site but also substantial variability across field sites within the same region. So, for example, siblings in Memphis displayed a great deal of difference in how much they participated in the Southern Vowel Shift pattern, with some showing the full shift pattern and some showing much less (see Figure 3 below showing the systems for three siblings).
Even more striking, though, different field sites within the South showed a great deal of difference in whether speakers there shifted vowels according to regional patterns or not. Looking at Figure 4 below, you can see that Memphis speakers in general show much more of the Southern Shift pattern than Virginians who show very little of the pattern comparably. However, we still found that regional cohesion within the vowel system (meaning vowels system similarity) was greater within regions than across regions. So, in other words, a speaker from Virginia and a speaker from Tennessee are still more similar in terms of how they produce vowels than either of them are to a Northerner or Western speaker.
Significant regional differences in perception by region
Given our findings that the North, South and West have different ways of saying the front vowels (as in beet /i/ and bit /I/, and bait /e/ and bet /ɛ/), a reasonable hypothesis approaching this research would be that subjects from the different regions have different perceptual tendencies. In particular, we would expect that Southerners, for whom the Southern Vowel Shift involves different tongue position during production of /i/~/ɪ/ (beat~bit) and /e/~/ɛ/ (bait~bet) compared to the North and West, would exhibit different perceptual tendencies for these vowels compared to the other regions. Since the Northern Cities Shift (NCS) is characterized by more acoustically spread out bait and bet vowels than found in other regions, we might also (or alternatively) expect listeners from the North to show different perceptions than listeners from regions (like the South and West) with more proximate mid front vowels.
However, we also know from our research results that we find a lot of variability in even how much speakers raised in the same location participate in the vowel changes. So, even within a single city, listeners are exposed to a wide range of acoustic examples of each vowel which may make their perception of vowel sounds more elastic than their production of these same sounds. In other words, though you may say vowels somewhat the same way, you are used to hearing vowel sounds produced by other speakers in a vastly larger acoustic range, particularly in urban areas. Thus, our perception may be more fluid in terms of what/how we categorize the sounds we hear. In such a case, we might expect fewer cross regional differences in perception than we find in production.
So, what did we find in terms of perception? Well, we found that both of the above hypotheses were confirmed: Speakers do appear to adjust their perception range when consistently exposed to sounds that are produced differently across regions but that, for the most part, perception is more fluid across dialects than production.
The most striking difference in how vowels are produced across regions is in the way the mid front vowels (the vowels /e/ and /ɛ/ like in bait and bed) are said. In the North, the bait vowel remains articulated with a fronter tongue position while the bed vowel is made with a much more lowered and backed tongue position. In the South, however, the bait vowel is made with a very backed tongue position while the bed vowel has a much fronter tongue position. As you can imagine, this leads to a substantial difference in how these vowels sound across regions. When we look not only at how these vowel sounds differ in how they are produced but also perceived by speakers in the North and South, we find that this difference in pronunciation is matched with a difference in how speakers in the North and South hear these two vowels. The figure below presents what is called an identification function.
This function shows how listeners in each region classified a word with the /e/ versus /ɛ/ vowel when played 28 varying acoustic versions of these sounds along a seven-point continuum (varying the formant structure) – in other words, when asked if they heard bet or bait when hearing the stimuli word. As you can see, Southerners differ (significantly based on statistical tests) from listeners from other regions. Listeners from the South hear more of the acoustic versions of the stimuli as bait, likely as a result of hearing a more backed variant of this vowel produced by speakers around them in the South. In contrast, Northerners and Westerners heard more bet vowels when they listened to the stimuli, again likely because of the retracted position for the bet vowel they hear produced in their regions compared to the South.
So, these results indicate that there is a link between production and perception. However, it appears that production must be very distinct for this perception effect to occur. Other vowels studied, those that don’t differ as much in how they are said across regions, do not show perceptual differences in the way that the bait versus bet vowel did.
Other research findings
We are still in the process of collecting and analyzing data. In addition to the results reported above, we have also looked at vowel length (duration) and spectral dynamics (‘drawling’) across dialects. In those papers, we also found significant differences across regions and across speakers in how durational (length) and dynamic aspects (‘drawling’) of vowels were used by speakers. For example, Western speakers, who show a merged formant structure in the cot/caught vowel classes, actually maintain a durational difference in those vowels that is lacking in speakers not merging them. Similarly, Southerners who overlap their formant structure in the bait and bet vowels on our measures above actually use more vowel dynamics (or drawling) in the bait vowel as a way of maintaining distinction and avoiding a merger in these classes.
So, it seems, speakers have a variety of acoustic cues to utilize in maintaining vowel differences. A speaker’s regional affiliation and the type of vowel patterns he or she participates in appear to influence how these cues are employed.
Finally, we have some other work in progress that examines geo-spatial mapping techniques for perception data and how vowel perception can be altered by changing social information provided about a speaker. Should you be interested in learning more about our research, you can look at some of our published papers.
Below you will find a list of our most recent work
Fridland, Valerie and Tyler Kendall. Forthcoming. English in the Western United States. In Raymond Hickey (ed.), Listening to the Past: Audio Records of Accents of English. Cambridge, UK: Cambridge University Press.
Fridland, Valerie, Betsy Evans, Tyler Kendall and Alicia Wassink. Forthcoming. Speech in the Western States: Vol. 1. Publication of the American Dialect Society. Duke University Press.
Fridland, Valerie. 2015. The spread of the cot/caught merger in the speech of Memphians: An ethnolinguistic marker? In Language Variety in the South: Historical and Contemporary Perspectives ed. by Michael D. Picone and Catherine Evans Davies. Tuscaloosa: University of Alabama Press.
Fridland, Valerie and Kathy Bartlett. 2015. What we hear and what it expresses: The perception and meaning of vowel differences among dialects. In Language Variety in the South: Historical and Contemporary Perspectives ed. by Michael D. Picone and Catherine Evans Davies. Tuscaloosa: University of Alabama Press.
Fridland, Valerie and Tyler Kendall. 2015. Within-Region Diversity in the Southern Vowel Shift: Production and Perception. Proceedings of the International Congress on Phonetics (ICPhS) 2015.
Kendall, Tyler and Charlotte Vaughn. 2015. Measurement Variability in Vowel Formant Estimation: A Simulation Experiment. Proceedings of the International Congress on Phonetics (ICPhS) 2015.
Fridland, Valerie, Tyler Kendall and Charlie Farrington. 2014. Durational and spectral differences in American English vowels: Dialect variation within and across regions. Journal of the Acoustical Society of America (JASA) 136:1:344-349
Fridland, Valerie, Tyler Kendall and Charlie Farrington. 2013. The role of duration in regional U.S. vowel shifts. Proceedings on Meetings on Acoustics (POMA) 19.
Fridland, Valerie. 2013. Interpreting Intra-Regional Southern Vowel Distinctions. Proceedings from the 33rd meeting of the Berkeley Linguistics Society.
Kendall, Tyler. 2013. Speech Rate, Pause, and Sociolinguistic Variation: Studies in Corpus Sociophonetics. Basingstoke, UK: Palgrave Macmillan.
Fridland, Valerie and Tyler Kendall. 2012. The effect of regional vowel differences on vowel perception and production: Evidence from U.S. vowel shifts. Lingua 122/7: 779-793.
Fridland, Valerie. 2012. Rebel vowels: Southern vowel shift and the N/S speech divide. Language and Linguistic Compass 6/3:183-192.
Kendall, Tyler and Valerie Fridland. 2012. Variation in the production and perception of mid front vowels in the US Southern Vowel Shift. Journal of Phonetics 40: 289-306.
Fridland, Valerie. 2010. The cycle of production, ideology, and perception in the speech of Memphis, TN. A Reader in Sociophonetics. Dennis Preston and Nancy Nieldelski (eds.). Mouton de Gruyter.
Kendall, Tyler and Valerie Fridland. 2010. Mapping Production and Perception in Regional Vowel Shifts. Penn Working Papers in Linguistics 16/2. | <urn:uuid:2c678fef-1289-4411-a673-189ba52d2515> | CC-MAIN-2017-26 | https://vowels-in-america.blogs.unr.edu/findings/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00353.warc.gz | en | 0.930832 | 4,404 | 3.3125 | 3 |
Pemrograman Jaringan Routing -Aurelio Rahmadian- Objektif Pengenalan Router = Komputer WAN Protocol Bagian-bagian Router Dokumentasi Perancangan Static Routing Dynamic Routing Prinsip Routing Table Pengenalan At the center of the network is the router. Stated simply, a router connects one network to another network. Therefore, the router is responsible for the delivery of packets across different networks. Pengenalan Routers are now being added to satellites in space. These routers will have the ability to route IP traffic between satellites in space in much the same way that packets are moved on Earth, thereby reducing delays and offering greater networking flexibility. Pengenalan Its primary responsibility of forwarding packets from one network to the next. It is only because of the router's ability to route packets between networks that devices on different networks can communicate. Router = Komputer Routers have many of the same hardware and software components that are found in other computers including: CPU RAM ROM Operating System Router = Komputer A router connects multiple networks. This means that it has multiple interfaces that each belong to a different IP network. When a router receives an IP packet on one interface, it determines which interface to use to forward the packet onto its destination. The interface that the router uses to forward the packet may be: ◦ the network of the final destination of the packet (the network with the destination IP address of this packet) - LAN ◦ network connected to another router that is used to reach the destination network. - WAN Router = Komputer The primary responsibility of a router is to direct packets destined for local and remote networks by: ◦ Determining the best path to send packets ◦ Forwarding packets toward their destination Router = Komputer The router uses its routing table to determine the best path to forward the packet. When the router receives a packet, it examines its destination IP address and searches for the best match with a network address in the router's routing table. The routing table also includes the interface to be used to forward the packet. Router = Komputer It is very likely that a router will receive a packet that is encapsulated in one type of data link frame, such as an Ethernet frame and when forwarding the packet, the router will encapsulate it in a different type of data link frame, such as Point-toPoint Protocol (PPP). The data link encapsulation depends on the type of interface on the router and the type of medium it connects to. DTE DCE WAN Protocol High-Level Data Link Control (HDLC) Point-to-Point Protocol (PPP) Frame Relay Bagian-bagian Router Power Supply WIC Shield WIC Shield NVRAM CPU SDRAM Fan Bagian-bagian Router High Speed WIC (HWIC) Console Port USB Port Flash Memory Fast Ethernet Port Auxiliary Port Power Cable Connector Bagian-bagian Router CPU The CPU executes operating system instructions, such as system initialization, routing functions, and switching functions. RAM RAM stores the instructions and data needed to be executed by the CPU. RAM is used to store these components: ◦ Operating System: The Cisco IOS (Internetwork Operating System) is copied into RAM during bootup. ◦ Running Configuration File: This is the configuration file that stores the configuration commands that the router IOS is currently using. With few exceptions, all commands configured on the router are stored in the running configuration file, known as running-config. ◦ IP Routing Table:This file stores information about directly connected and remote networks. It is used to determine the best path to forward the packet. ◦ ARP Cache: This cache contains the IPv4 address to MAC address mappings, similar to the ARP cache on a PC. The ARP cache is used on routers that have LAN interfaces such as Ethernet interfaces. ◦ Packet Buffer: Packets are temporarily stored in a buffer when received on an interface or before they exit an interface. Bagian-bagian Router RAM is volatile memory and loses its content when the router is powered down or restarted. Bagian-bagian Router ROM ROM is a form of permanent storage. Cisco devices use ROM to store: ◦ The bootstrap instructions ◦ Basic diagnostic software ◦ Scaled-down version of IOS Flash Memory Flash memory is nonvolatile computer memory that can be electrically stored and erased. Flash is used as permanent storage for the operating system, Cisco IOS. In most models of Cisco routers, the IOS is permanently stored in flash memory and copied into RAM during the bootup process, where it is then executed by the CPU. Bagian-bagian Router NVRAM NVRAM (Nonvolatile RAM) does not lose its information when power is turned off. This is in contrast to the most common forms of RAM, such as DRAM, that requires continual power to maintain its information. NVRAM is used by the Cisco IOS as permanent storage for the startup configuration file (startup-config). ROM, flash memory, and NVRAM does not lose its contents when the router loses power or is restarted. Dokumentasi Perancangan Dokumentasi Perancangan When configuring a router, certain basic tasks are performed including: ◦ ◦ ◦ ◦ ◦ ◦ Naming the router Setting passwords Configuring interfaces Configuring a banner Saving changes on a router Verifying basic configuration and router operations Static Routing Remote networks are added to the routing table either by configuring static routes or enabling a dynamic routing protocol. When the IOS learns about a remote network and the interface that it will use to reach that network, it adds that route to the routing table as long as the exit interface is enabled. A static route includes the network address and subnet mask of the remote network, along with the IP address of the next-hop router or exit interface. Static routes are denoted with the code S in the routing table. Static Routing Saat-saat untuk menggunakan static routing: A network consists of only a few routers. Using a dynamic routing protocol in such a case does not present any substantial benefit. On the contrary, dynamic routing may add more administrative overhead. A network is connected to the Internet only through a single ISP. There is no need to use a dynamic routing protocol across this link because the ISP represents the only exit point to the Internet. A large network is configured in a hub-and-spoke topology. A hub-and-spoke topology consists of a central location (the hub) and multiple branch locations (spokes), with each spoke having only one connection to the hub. Using dynamic routing would be unnecessary because each branch has only one path to a given destination-through the central location. Dynamic Routing Dynamic routing protocols are used by routers to share information about the reachability and status of remote networks. Dynamic routing protocols perform several activities, including: Network discovery Updating and maintaining routing tables Dynamic Routing There are several dynamic routing protocols for IP. Here are some of the more common dynamic routing protocols for routing IP packets: ◦ RIP (Routing Information Protocol) ◦ IGRP (Interior Gateway Routing Protocol) ◦ EIGRP (Enhanced Interior Gateway Routing Protocol) ◦ OSPF (Open Shortest Path First) ◦ IS-IS (Intermediate System-to-Intermediate System) ◦ BGP (Border Gateway Protocol) Prinsip Routing Table 1. Every router makes its decision alone, based on the information it has in its own routing table. 2. The fact that one router has certain information in its routing table does not mean that other routers have the same information. 3. Routing information about a path from one network to another does not provide routing information about the reverse, or return, path. | <urn:uuid:4f12e27b-5302-4c6b-98a4-d29f3cd8ea2e> | CC-MAIN-2017-26 | http://slidegur.com/doc/121094/jaringan-komputer-dasar | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00433.warc.gz | en | 0.906685 | 1,616 | 3.9375 | 4 |
CLEVELAND--A dart-like molecule that sticks to proteins in the eye is the main trigger for the unchecked growth of blood vessels, according to researchers at Case Western Reserve University and the Cleveland Clinic Cole Eye Institute. Uncontrolled blood vessel growth is one of the main reasons for the development of age-related macular degeneration (AMD), the leading cause of blindness among people over 65 in the United States.
Robert Salomon and his graduate students Kutralanathan Renganathan and Liang Lu of Case's Department of Chemistry in the College of Arts and Sciences, found that the molecule, Carboxyethylpyrroles (CEPs), attaches to proteins found in the eye, triggering the uncontrolled growth of blood cells.
The Case researchers teamed up with Quteba Ebrahem Jonathan Sears, Amit Vasanji, John Crabb and Bela Anand-Apte and Xiaorong Gu (a Salomon group alumna), of Cleveland Clinic, to complete the study titled Carboxyethlpyrrole oxidative protein modifications stimulate neovascularization: Implications for age-related macular degeneration.'
The results of their collaborative work were published in the recent Proceedings of the National Academy of Science (PNAS).
AMD is a progressive disease that results in the severe loss of vision. The early stages of AMD are characterized as 'dry,' with the disease advancing to the 'wet form' as the retina, the part of the eye responsible for central vision, becomes infused with fluid from leaky new blood vessels, during a process called neovascularization. The unchecked blood vessel growth, or angiogenesis, in the retina accounts for 80% of the vision loss in the advanced stages of AMD.
The retina cells that detect light contain polyunsaturated fatty lipids that are exquisitely sensitive to damage by oxygen. Even in healthy eyes, these cells are renewed every ten days. The researchers at Case and Cleveland Clinic used a method developed by Salomon to specifically detect and measure the amount of CEPs found in the eye.
The researchers did in vivo animal studies with membranes from chicken eggs and rat eyes and found that CEPs attached to proteins induce angiogenesis. They also found that the protein part of CEP-protein adducts is not important for producing the growth of the blood vessels. Rather, the actual CEP is the cause of angiogenesis.
In an attempt to block CEP from triggering the angiogenesis process, 'we are now trying to find the receptors - the keyholes - in the retina cells that are activated by CEPs,' said Salomon. 'We are also designing drugs that can mop up the CEPs or prevent their formation.'
The research is supported by an Ohio Board of Regents Biomedical Research Technology Transfer Award to the Cole Eye Institute, National Institutes of Health Grants as well as the Foundation Fighting Blindness and the American Health Association.
For more than three decades, Salomon has worked in the area of lipid research. His work centers on the oxidation of lipids in the body that contributes to a host of diseases including glaucoma, keratitis and other eye diseases as well as Alzheimer's disease, atherosclerosis, autism and end-stage renal disease. He discovered many chemical transformations that occur as a result of lipid oxidation, and generated some of the first molecular tools that have been used in clinical studies relating the hardening of the arteries in heart disease. In the hope of preventing the formation of toxic molecules in the eye, through the combination of oxygen with lipids, Salomon is now studying the processes that generate them with a new grant from the National Eye Institute of the National Institutes of Health. | <urn:uuid:1573ff18-77c1-4976-b7ac-31c227bdcf0a> | CC-MAIN-2017-26 | http://www.medindia.net/news/view_news_main.asp?x=14130 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320539.37/warc/CC-MAIN-20170625152316-20170625172316-00433.warc.gz | en | 0.940017 | 759 | 2.59375 | 3 |
A first-of-its-kind space rock filled with pristine material from the formation of the Earth itself has returned to the inner solar system, after billions of years in the cosmic boondocks. And it could help us piece together our planet’s origin story.
Four and a half billion years ago, chunks of the same material that formed Earth and the other rocky planets are thought to have been flung into the Oort cloud, a ring of icy debris encircling the outermost edge of the solar system. Untouched, they’ve been preserved for eons in the deep freeze of space. Now, astronomers have spotted one of these fossils nearby, marking the very first observation of a rocky object from the Oort cloud.
“This is super exciting, because it could be a piece of what formed the Earth” Olivier Hainaut—an astronomer at the European Southern Observatory and co-author on the new Science Advances study describing the discovery—told Gizmodo.
The object, dubbed PANSTARRS, was spotted in 2014 by Pan-STARRS1, a Hawaiian telescope used to identify rogue comets and asteroids in our planet’s backyard. The telescope routinely surveys the entire sky and turns up thousands of uninteresting hunks of debris. But as soon as PANSTARRS’ orbit had been calculated, Hainaut and his colleagues realised they had found something exceptional.
The shape of the orbit was indicative of a long period comet—an icy body that fell into the inner solar system from the Oort cloud. But as comets from the Oort cloud hurl toward the Sun, they release a long tail of sublimating ice and dust. This one didn’t.
C/2014 S3, the very first rocky object from the Oort cloud, may provide important clues about the formation of the solar system. Image: K. Meech (IfA/UH)/CFHT/ESO
Curious, the astronomers decided to take a closer look using the European Southern Observatory’s Very Large Telescope in Chile. And things got even stranger. By studying the faint light reflected off PANSTARRS, Hainaut and his colleagues learned that it is not filled with ice at all, but with rocky material. In terms of composition, it’s a classic S-type asteroid, similar to those found main asteroid belt between Mars and Jupiter.
“If you’d shown me the spectrum, I would have just said this is another stupid asteroid,” Hainaut said. “If you showed me the orbit, I’d say yea, it’s a standard long-period comet. But you don’t at all expect to find a rocky asteroid on an Oort cloud orbit. That’s wrong.”
One possible explanation is that an asteroid was flung into the Oort cloud somewhat recently, before falling back toward the inner solar system. But it soon became apparent that this wasn’t the case. “When we observed it very carefully, its spectrum showed that the rocks hadn’t been baked by the Sun,” Hainaut explained. “They’re primordial.”
Eventually, the astronomers concluded that PANSTARRS was formed in the inner solar system long ago, before being ejected into the Oort cloud as the rocky planets themselves were coalescing. That makes it a potential building block of Earth, Venus, Mercury, or Mars.
“This one is the first uncooked asteroid we have found: it has been preserved in the best freezer there is,” lead study author Karen Meech of the University of Hawaii said in a statement.
Now that PANSTARRS has caught our attention, astronomers are hoping to find more objects like it. There are several competing theories about how the solar system formed, and they predict different ratios of icy to rocky objects in the Oort cloud. “Depending on how the planets migrated, the number of rocky planetesimals in the Oort cloud will change dramatically,” Hainaut said. “Just by counting these objects up and doing statistics, we can say which theories are completely wrong and which ones survive.”
PANSTARRS has already made its closest approach to the Sun, and it’s now on its way back to the outer solar system. But if we get lucky, one of its cousins may whiz even closer to Earth, allowing astronomers to get a detailed look at its composition. This could lend insight into the exact conditions under which our planet was formed. Our history is flying around out there, and if we’re patient enough, we’ll find it. | <urn:uuid:3f7c66d9-4e81-4fdd-8b17-57ac0b93698c> | CC-MAIN-2017-26 | http://www.gizmodo.co.uk/2016/04/a-mysterious-object-from-earths-distant-past-has-returned/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00673.warc.gz | en | 0.946295 | 975 | 3.578125 | 4 |
Toronto Star: “Meet the Coywolf”
Perhaps you’ve heard of zonkeys, zorses (a.k.a. zebrulas), ligers, wholphins, and other hybrid animals—but what about the coywolf? As can be guessed from its name, the coywolf is a hybrid between a coyote and a wolf, and they’re becoming more common in Ontario.
According to Trent University geneticist Bradley White, who has studied the hybrids for 12 years, the coywolf has a dangerous combination of “the wolf characteristics of pack hunting and aggression and the coyote characteristics of lack of fear of human-developed areas.” White believes the coywolf’s origin traces back to the 1920s.
As creationists would expect, geneticist Paul Wilson notes that some coywolves are more coyote-like, whereas others are distinctly more wolf-like. In other words, there is a continuum between wolf and coyote. Creationists can understand this continuum as a microcosm of the original canine created kind, which likely included wolves, coyotes, dingoes, some foxes, and ordinary dogs. Each has since become further separated as genetic information is lost within populations; nonetheless, hybrids remind us of their common origin. Yet many of their common characteristics are unique, reminding us that they did not evolve from a non-canid organism.
Still, White utters an oft-heard phrase in response to the hybridization: “evolution in action.”
Science News: “Rapid Evolution May Be Reshaping Forest Birds’ Wings”
God included a range of genetic information and adaptability in organisms to allow them to live properly in a range of habitats.
A study of multiple bird species in Canada and the United States revealed subtle differences in bird wings that depend on the forestation of birds’ habitat. Researchers already knew that more forested areas were home to more birds with rounder wing tips, improving maneuverability around branches. Less forested areas, on the other hand, house birds with more pointed wing tips, which allows more efficient, sustained flight.
Given this, André Desrochers of Laval University examined changes in bird wing tips across the past century by measuring historical specimens. He then cross-referenced the changes with known patterns of human-caused deforestation and reforestation. Unsurprisingly, birds from areas that had undergone deforestation grew longer and sharper wing tips, while the wing tips of birds in reforested areas became shorter and rounder.
The report notes that “as bird species face new challenges, they respond to the extent they can.” This comports with the creationist view: God included a range of genetic information and adaptability in organisms to allow them to live properly in a range of habitats.
The scientists aren’t certain how significant a role genes play in the wing tip changes. Still, Cornell University ornithologist David Winkler noted, “It’s surprising that there’s so much change so fast,” and Desrochers calls “rapid evolution” the most direct explanation. The speed of the changes indicates how the created kinds could have speciated rapidly after the Flood. Centuries of accumulated changes between some populations from the same created kinds resulted in sexual incompatibility. However, in other kinds (such as canids; see above), populations retain the ability even if interbreeding is uncommon.
ScienceDaily: “Speciation through Genome Duplication More Common in Plant Evolution than Previously Thought”
A new study shows that polyploidy—having an extra set of certain chromosomes—plays a more important role in plant speciation than scientists had thought. Rather than three or four percent, the study indicates that fifteen percent of flowering plants and almost a third of fern species “are directly derived from polyploidy,” explained University of Muenster evolutionary biologist Troy Wood. Polyploidy can lead to reproductive isolation, new morphology, and characteristic traits, so is considered at least a potential mechanism for speciation, as another news article explained.
While polyploidy in vertebrates is usually fatal, for plants polyploidy seems to have a generally neutral effect. Nonetheless, the study is a reminder that genetic mistakes only rarely have beneficial effects, instead usually having no effect or negative effects. And when they do result in beneficial differences, it is only because the genetic mistake “breaks” some mechanism, giving the organism a contextual advantage. Speciation due to genetic mistakes—for better or worse—may explain some small portion of the diversity on the planet. But those genetic mistakes cannot account for the origin of all of earth’s species, as evolutionists suggest.
For more information:
Remember, if you see a news story that might merit some attention, let us know about it! (Note: if the story originates from the Associated Press, Fox News, MSNBC, the New York Times, or another major national media outlet, we will most likely have already heard about it.) And thanks to all of our readers who have submitted great news tips to us. | <urn:uuid:23ef4459-6591-4c77-9d69-caad0f40a834> | CC-MAIN-2017-26 | https://answersingenesis.org/natural-selection/speciation/trio-of-speciation-reminders/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323801.5/warc/CC-MAIN-20170628204133-20170628224133-00033.warc.gz | en | 0.936702 | 1,068 | 3.234375 | 3 |
This is an interesting question asked by a reader, (thanks Bhavin.)
With regard to the recession of 1981 I think that the cause of the recession cannot be entirely attributed to Monetary policy.
Reasons for Recession in 1981
1. Structural problems in economy late 1970s.
In 1979 inflation was a significant problem in the UK economy. The inflation was primarily cost push inflation. This was a combination of wage push inflation, caused by powerful trades unions and rising oil prices. To reduce this inflation was arguably necessary for the long term benefit of the economy; to reduce inflation of 20% inevitably leads to some slow down in economic growth.
2. Strength of Sterling.
Normally the increased production of oil would be beneficial for an economy. However in the case of the UK it came at an unfortunate time. The discovery of oil combined with high interest rates caused a significant appreciation in the £. This caused real problems for exporters. It was in the manufacturing export sector where the recession was felt most keenly.
3. Monetary Policy
However, despite the above 2 being contributing factors, monetary policy played an important role in the recession of 1981. The government had a Monetarist zeal to try and control the money supply. Arguably this caused real interest rates to be higher than necessary. Therefore monetary policy caused the recession to be deeper and more lasting than necessary. This is a good example of the limitation of using monetary targets, rather than targeting inflation directly.
Causes of Recession 1991.
In my view the recession of 1991 can be attributed almost entirely to a failure of government macro economy policy. By 1987 the economy was in a good position. Supply side policies were beginning to increase competitiveness and structural inflation had been brought under control. The essential problem was that the government allowed itself to get carried away by the perceived success of its supply side policies. Therefore it allowed the economy to grow much faster than the long term trend rate of economic growth. Therefore inflation was almost inevitable. In response to inflation of 10% the government then overreacted by increasing interest rates to 15%. The failure of macro economic policy was highlighted by using the ERM as a tool for reducing inflation, rather than direct inflation targeting. Again the recession was deeper than necessary because they tried to maintain a value of the exchange rate that was higher than necessary.
In short the government made 2 elementary mistakes.
1. Allowed the economy to grow too fast - Boom and Bust
2. By targeting a high value of the exchange rate, they caused interest rates to be much higher than necessary to reduce the inflationary pressures they had created. | <urn:uuid:578e03f9-42e6-4382-b699-947b91b0c424> | CC-MAIN-2017-26 | http://econ.economicshelp.org/2007/04/are-uk-recessions-caused-by-failure-of.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329372.0/warc/CC-MAIN-20170629154125-20170629174125-00113.warc.gz | en | 0.972002 | 530 | 2.96875 | 3 |
|Databases:||Wikipedia with DBpedia|
|Papers:||DOAJ Google Scholar PubMed|
|Ontologies:||MeSH NeuroLex Wikidata Wikipedia|
|Other:||Google Twitter WolframAlpha|
Twitter is a social web site with microblogging.
Retweet is a tweet that is copied from another tweet." Retweets may be copied from another messages and prepended with "RT @user", "RT" and "RT:" or postpended with "via @user". "RT please" is used by users wanted to be retweeted. Retweets may also be transmitted by pressing the retweet-button. Button-retweets are not available from the user time line (e.g., twitter.com/statuses/user_timeline/fnielsen2.xml).
Mentions are tweets with "@user" that does not indicate retweets.
Links (i.e. web links) are often shorten with URL shortening services such as bit.ly or goo.gl. Twitter automatically construct links from the "http : / /" pattern.
They have 26K/sec search queries.
Twitter data
Tweet might be obtained, e.g., from the streaming API, from the search API (search.twitter.com/search.json?q=Shell) and from other parts for the API, e.g., individual tweets retrieved by ID (twitter.com/statuses/show/27289337859.json)
Data sets
Due to Twitter's new Terms of service several previously public data sets are no longer available.
- Edinburgh Twitter Corpus
- http://twitter.mpi-sws.org/ 54,981,152 user accounts, 1,963,263,821 follow links, 1,755,925,520 tweets. No longer publicly available.
- Haewoon Kwak's social graph
- an.kaist.ac.kr/traces/WWW2010.html Seem to have been unavailable at times. (twitter_rv.tar.gz). The uncompressed fil is approximately 26 GB. There are 41'652'230 profiles and 1'468'365'182 giving a density on 8.46-07
- Observatory on Social Media https://market.mashape.com/truthy/osome
- Data set for sentiment analysis.
- Data set collected 2009 June to December in the lab of Jure Leskovec. No longer publicly available.
- TREC 2011 dataset ]
- Twitter Sentiment Corpus
- Collection by Niek Sanders consisting of "5513 hand-classified tweets" http://www.sananalytics.com/lab/twitter-sentiment/
Each tweet has several fields [groups.google.com/group/twitter-development-talk/browse_thread/thread/4b08544f2c02d68f?pli=1].
|favorited||Always empty in the streaming data|
|retweet_count||Always empty in the streaming data. This is presently not reflecting the number of retweets [code.google.com/p/twitter-api/issues/detail?id=1889].|
|contributors||Always empty in the streaming data|
|truncated||Whether the message was truncated after retweeting||False|
|text||Actual Twitter text||makan malem KFC tapi gw yg ketiban belinya ... capek tau k mall palem -_-|
|created_at||Date of sending the tweet||Thu Sep 09 10:13:12 +0000 2010|
|retweeted||"represents whether the user you are authenticating as has retweeted this status or not. The field is a boolean and can be true or false."||False|
|coordinates||Usually empty, seems to contain the same as 'geo'|
|entities||User mentions, hashtags|
|place||Usually empty, if set contains a struture with country code, bounding box, city|
|source||Program used to send the tweet, HTML-formatted||a href="http://m.dabr.co.uk" rel="nofollow" Dabr|
|geo||Usually empty, can contain geographical coordinates||[14.45101058, 120.98492687]|
|id||Identifier for the status||23996832400|
In the streaming data the usual fields may not be available. This indicated wiht the "delete" field, as well as the user-id and the status-id
The search interface only have the following fields: "profile_image_url", "created_at", "from_user", "metadata", "to_user_id", "text", "id", "from_user_id", "geo", "iso_language_code", "source". The "id" is not the same as the standard id.
|followers_count||Integer for the number of followers||71|
|statuses_count||Integer for the number of messages written||1650|
|description||Text description (autobiography)||I'm not perfect|
|friends_count||Integer for the number of frinds||65|
|screen_name||Twitter user name||sangguinirachel|
|lang||Should indicate language, but is often left at 'en' (English)||en|
|name||Real name||Sangguini Rachel PLS|
|created_at||Tue Jul 14 14:26:56 +0000 2009|
Third party web services
- http://www.peerindex.net/ Analyzes a users profile with respect to "authority", "activity" and "audience" as well as "realness".
- Pulse of the Tweeters
- pulseofthetweeters.com/ Ranking of users with respect to influence on selected topics. The web service has also sentiment analysis for topics. The service is setup by researcher from Center for Ultra-scale Computing and Information Security at Northwestern University.
- socialmention.com A real-time search Internet search engine for social media with text sentiment analysis, keywords, users hashtag statistics across a number of services: Twitter, YouTube, Facebook, etc.
- The Tweeted Times
- Construction of a personality news cite from tweets. http://tweetedtimes.com
- tweetpsych.com/ creates a "psychological profile" and display how users score on dimensions such as "social", "constructive", "sex", "work", etc. It is made by Dan Zarrella.
- www.trendistic.com/ plots curves of twitter message volume as a function of time and based on a query term.
- e.g., chirp.tribalytic.com/
- http://trusty.indiana.edu
- http://www.tweetfeel.com/ Sentiment analysis
- twinfluence.com/ social network analysis
- twitgraph.appspot.com/ sentiment analysis based on a query. The code is available from code.google.com/p/twitgraph/
- twitrratr.com/ sentiment analysis based on a query.
- Twitter Sentiment
Twitter data providers
- A new ANEW: evaluation of a word list for sentiment analysis in microblogs
- A tweet consumers' look at Twitter trends
- Altmetrics in the wild: Using social media to explore scholarly impact
- Analizying factors to increase the influence of a Twitter user
- Beyond microblogging: conversation and collboration in Twitter
- Bieber no more: first story detection using Twitter and Wikipedia
- Catching fish in the stream: real time analysis of audience behavior in social media
- Characterizing microblogs with topic models
- Crowd sentiment detection during disasters and crises
- Detecting and tracking the spread of astroturf memes in microblog streams
- Sarita Yardi, Daniel Romero, Grant Schoenebeck, Danah Boyd (2010). "Detecting spam in a Twitter network". First Monday 15(1): missing pages. .
- Emerging topic detection on Twitter based on temporal and social terms evaluation
- Everyone's an influencer: quantifying influence on Twitter
- Extracting strong sentiment trends from Twitter
- Good friends, bad news - affect and virality in Twitter
- I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience
- Michael van Meeteren, Ate Poorthuis, Elenna Dugundji. "Mapping communities in large virtual social networks: using Twitter data to find the Indie Mac community".
- Meeyoung Cha, Hamed Haddadi, Fabrício Benevenuto, Krishna P. Gummadi(2010). "Measuring user influence in Twitter: the million follower fallacy".
- Modeling events with cascades of Poisson processes
- Modeling public mood and emotion: Twitter sentiment and socio-economic phenomena
- Networks and language in the 2010 election
- Networked gatekeeping and networked framing on egypt
- Predicting discussions on the social semantic web
- Sitaram Asur, Bernardo A. Huberman. "Predicting the future with social media".
- Mike Thelwall, Kevan Buckley, Georgios Paltoglou (2010). "Sentiment in Twitter events". Journal of the American Society for Information Science and Technology missing volume: missing pages. .
- Bernardo A. Huberman, Daniel M. Romero, Fang Wu (2009). "Social networks that matter: Twitter under the microscope". First Monday 14(1): missing pages. .
- Structural predictors of tie formation in Twitter: transitivity and mutuality
- Temporal patterns of happiness and information in a global social network: hedonometrics and Twitter
- The role of multimedia content in determining the virality of social media information
- Tweet, tweet, retweet: conversational aspects of retweeting on Twitter
- Tweetin' in the rain: exploring societal-scale effects of weather on mood
- Tweeting about TV: sharing television viewing experiences via social media message streams
- Tweeting the meeting: an in-depth analysis of Twitter activity at Kidney Week 2011
- Tweets are forever: a large-scale quantitative analysis of deleted tweets
- Stephen Dann (2010). "Twitter content classification". First Monday 15: missing pages. .
- Twitter mood predicts the stock market
- Bernard J. Jansen, Mimi Zhang, Kate Sobel, Abdur Chowdury (2009). "Twitter power: tweets as electronic word of mouth". Journal of the American Society for Information Science and Technology 60(11): 2169-2188. doi: 10.1002/asi.21149. .
- Brian P. Blake, Nitin Agarwal, Rolf T. Wigand, Jerry D. Wood(2010). "Twitter quo vadis: is Twitter bitter or are tweets sweet?".
- Twitter rank: finding topic-sensitive influential Twitterers
- Understanding the demographics of Twitter users
- Bongwon Suh, Lichan Hong, Peter Pirolli, Ed H. Chi(2010). "Want to be retweeted? large scale analytics on factors impacting retweet in Twitter network". Second IEEE International Conference on Social Computing (SocialCom).
- Haewoon Kwak, Changhyun Lee, Hosung Park, Sue Moon(2010). "What is Twitter, a social network or a news media?".
- Whisper: tracing the spatiotemporal process of information diffusion in real time
- Who says what to whom on Twitter
- Akshay Java, Tim Finin, Xiaodan Song, Belle Tseng(2007). "Why we twitter: understanding microblogging usage and communities". Joint 9th WEBKDD and 1st SNA-KDD Workshop.
- Wikipedia on Twitter: analyzing tweets about Wikipedia
- ↑ www.independent.co.uk/news/people/news/how-peerindex-calculated-the-twitter-100-2215534.html
- ↑ www.independent.co.uk/news/people/news/the-twitter-100-2215529.html
- ↑ www.readwriteweb.com/archives/how_recent_changes_to_twitters_terms_of_service_mi.php
- ↑ The Edinburgh Twitter Corpus
- ↑ What is Twitter, a social network or a news media?
- ↑ J. Yang, Jure Leskovec(2011). "Temporal variation in online media". ACM International Conference on Web Search and Data Mining (WSDM '11). | <urn:uuid:16194663-5e8b-4282-9d72-d00bdb3d0982> | CC-MAIN-2017-26 | http://neuro.imm.dtu.dk/wiki/Twitter | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00554.warc.gz | en | 0.673616 | 2,716 | 2.625 | 3 |
THE IRISH SEA PROVINCE IN ARCHAEOLOGY AND HISTORY
Edited by Donald Moore.
Bowen, E.G.: ‘Britain and the British seas’, 13–28.
Herity, Michael: The early prehistoric period around the Irish Sea, 29–37.
Savory, H.N.: The later prehistoric migrations across the Irish Sea, 38–49.
O’Kelly, M.J.: Problems of Irish ring-forts, 50–54.
Alcock, Leslie: Was there an Irish-Sea culture-province in the Dark Ages? 55–65.
Chadwick, Nora K.: Early literary contacts between Wales and Ireland, 66–77.
Fenn, R.W.D.: Irish Sea influence on the English church, 78–85.
Sawyer, P.H.: The Vikings and the Irish Sea, 86–92.
Thomas, W. Gwyn: Medieval church-building in Wales, 93–97.
Ó Danachair, Caoimhín: Irish vernacular architecture in relation to the Irish Sea, 98–107.
Owen, Trefor M.: Social perspectives in Welsh vernacular architecture, 108–115. | <urn:uuid:11b66568-fdd2-402a-8353-4667ece3b71b> | CC-MAIN-2017-26 | http://tbreen.home.xs4all.nl/Journals/ISProv.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00554.warc.gz | en | 0.797711 | 260 | 2.59375 | 3 |
by Peg Herring
Thanks to Evelyn David for inviting me to visit your blog! Last Friday’s post, “The Dreaded Adverb” is at http://marilynmeredith.blogspot.com
The Post: The Ones Spell Check Won’t Catch
O, Moon, when I gaze on thy beautiful face,
Careening along through the boundaries of space,
The thought has often come into my mind
If I ever shall see thy glorious behind. (Anonymous poem, c. 1900)
Like the poet above, we’ve all said or written things that we would have expressed differently had we but stopped to think. As an English and speech teacher, I often found humor (which I tried to suppress for the sake of students’ dignity) in unfortunate wording and misunderstood words. For example, there was the student who did a book report on Poland by James Michener and informed the class that Poland once had a really talented piano player named CHOP-in. The girl, a talented music student, was embarrassed to learn she’d been reading about Frederick Chopin.
Lack of experience limits students as they attempt to comment on the world, but the rest of us are held responsible for what we say and write. There is no spell check for speaking, so we must think carefully before we talk. And spell check can’t help with some problems in writing, either. We all know the difference (if we’re paying attention) between the right to “bear arms” and the right to “bare arms”, but to your computer, one is just as good as the other.
Things Spell-check usually won’t catch:
1. Homonyms: Too/two/to- especially when the sentence structure allows both possibilities, e.g. “She saw two the fire.” Sales/sails-particularly bad mistake on a resume: “I increased our sails.”
2. Words easily mistyped: was/saw, form/from, friend/fiend
3. Words that are often confused: complimentary/complementary, insure/ensure, affect/effect, through/threw, then/than, further/farther
4. Pronouns and contractions: its/it’s, they’re/their/there, your/you’re (and maybe even “yore”).
5. Incorrect usage: “Would of” instead of “would have”. “I would have gone with you” is correct. “Try and…” instead of “try to…” “Try to do better next time” is correct. “Suppose to” instead of “supposed to” “We were supposed to be there by four” is correct.
6. Missing or reversed Smart Quotes. You might have half a set. You might have two facing left instead of curled around the words, or singles instead of doubles or vice versa. The computer doesn’t care.
What to do:
1. Always Use Spell- and Grammar-Check. They are not foolproof, but they make a good start, calling your attention to areas in question. If it irritates you that the program won’t let you spell “Charlie” your way (“Charley”), there’s the “Ignore all” command.
2. Use the computer’s dictionary/thesaurus to check anything you’re unsure of. It’s convenient and quick.
3. Keep a list of the mistakes you make most often. Do a word search for them when a project is finished.
4. Look up the rules/definitions/standards and make a conscious effort to learn them. Yes, it is work, but what were you doing when they taught it in high school?
5. Proofread, proofread, proofread: there is no substitute for careful proofreading, and honestly, nobody cares about your work being 100% correct more than you do—At least, that’s how it should be.
The Poser: Name three novels/series in which the protagonist works in forensics.
The Prizes-Weekly Prizes: (your choice of THE DEAD DETECTIVE AGENCY in e- or print format) drawn from the names of those who comment on the blogs as we go. Comment once/day, but the first commenter each day gets entered twice in Saturday’s drawing!
The Pathway: The next entry, “Metaphors and Figurative Language” and the answers/comments to the Poser will be up tomorrow at http://nancyjcohen.wordpress.com
The Pitch: THE DEAD DETECTIVE AGENCY, First in The Dead Detective Mysteries, paranormal mystery. Tori Van Camp wakes in a stateroom on a cruise ship with no memory of booking a cruise, but she does have a vivid recollection of being shot in the chest. Determined to find out what happened and why, Tori enlists the help of an odd detective named Seamus. Together they embark on an investigation like nothing she’s ever experienced. Death is all around her, and unless they act quickly, two people she cares about are prime candidates for murder. Read more about this book and the author at http://pegherring.com.
The Perpetrator: Peg Herring writes historical and contemporary mysteries. She loves everything about publishing, even editing (most days). Peg’s historical series, The Simon and Elizabeth Mysteries, debuted in 2010 to great reviews. The second in the series will be available in November from Five Star.
Peg’s Blog Crawl-February, 2011
January 31-Post schedule of Blog Crawl, explain prizes, etc.
Feb. 1 Chris Verstraete-Slowing Readers—Bad Policy
Feb. 3 Melissa Bradley-He Said, She Panted
Feb. 4 Marilyn Meredith-The Dreaded Adverb
Feb. 5 Weekend-Draw for Prizes from Week 1
Feb. 6 Weekend—
Feb. 7 The Stiletto Gang-The Ones Spell Check Won’t Catch
Feb. 8 Nancy Cohen-Metaphors
Feb. 9 Kaye George-Names Into Words
Feb. 10 Lisa Haselton-Losing the Spice
Feb. 11 Chris Redding-Inventing Words
Feb 12 Weekend-Draw for Prizes from Week 2
Feb.13 Lelia Taylor Syntax and Sentence Structure
Feb. 14 Jenny Milchman-Why Do We Say That? Part II
Feb. 15 Pat Brown-Dialogue and What It Reveals http://themysteryworldofpabrown.blogspot.com
Debbi Mack-Portmanteau Words
Feb. 17 Bo Parker-Read It Aloud
Feb 19 Weekend-Draw for Prizes from Week 3
Feb. 20 Weekend
Feb. 21 Jeff Marks-And What About Contractions?
Feb. 22 Geraldine Evans-Idioms
Feb. 23 Maryann Miller-Eccentric Phrases
Feb. 24 Peg Herring Being Precise
Feb. 25 Peg Herring Open Topic
Feb. 26 Weekend-Draw for Prizes from Week 4
Feb. 27 Weekend
Feb. 29 Stacy Juba-Why Do We Say That? Part III
March 1-Final Drawing for Prizes from All Entries | <urn:uuid:f4cd7480-df87-412d-981e-d4da2d1f3e47> | CC-MAIN-2017-26 | http://thestilettogang.blogspot.com/2011/02/ones-spell-check-wont-catch.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00554.warc.gz | en | 0.919588 | 1,580 | 2.78125 | 3 |
Many kids love to look for animal tracks. When it snows, you might say, "Look at those tracks in the snow. What animal was hopping or running here recently?" If you are walking in the woods or the park, you may see animal tracks in the mud. It is easy to learn about animal tracks and how to identify them. This is a fun hobby for many kids, and you may want to research more about the animals or the habitats you were exploring when you are finished identifying animal tracks.
Research the common animals in your community or the environment where you will be exploring. For example, if you are going to look for animal tracks in your backyard, you may want to research footprints of dogs, cats, squirrels, rabbits, coyotes, and raccoons, depending on where you live. When you are doing your research, you can use the Internet or a library book to see what an animal's footprint usually looks like.
Draw sketches, make copies, or print out pictures of the animal tracks that you want to look for in your yard or in the park. You may want to make copies and draw sketches, so you are more familiar with what the tracks look like. Put these copies in a folder or backpack, so you can refer to them when you are outside looking for tracks. It is easier for kids to learn about animal tracks if they have examples to look at when they are outside.
Go to the spot that you want to explore and look for tracks. You may want to bring a camera, pencil and sketch pad, as well as the other items listed in Step 2. It is easiest to look for tracks in freshly fallen snow or in a muddy yard. Animal tracks are harder to find in dirt and grass.
Find a track and try to identify it. Ask yourself questions like, "What is the shape of the print?" "Is it large or small?" "Are the toes separated or together?" "Do I see claw marks or just footprints?" When you have the answers to your questions, try to guess which animal left the track. Then remove your sample animal track printouts from your backpack, and compare your results with the track on the ground. If you guessed the track was left by a squirrel, does the track on the ground match the squirrel's track in the photo?
Take a picture or draw a sketch of any animal track you cannot identify. Then when you get back to your house or to the library, you can research and try to find the name of the animal who left this mystery track. You can also do more research on the animal tracks you found by discovering what the animal likes to eat or places where it usually lives and so on. | <urn:uuid:a0bebee1-72c9-441a-9532-9d750cc96a1a> | CC-MAIN-2017-26 | http://www.ehow.co.uk/how_4814497_learn-animal-tracks-kids.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00634.warc.gz | en | 0.963743 | 549 | 3.609375 | 4 |
What are Fatty Acids? As quoted in The Definitive Guide to Fats, “Fats are compounds of carbon, hydrogen and oxygen atoms that exist in chains of varying lengths, shapes and orders. They’re one of the vital nutrients required by the body for both energy and the construction/maintenance of “structural” elements, such as cell membranes.”
Not all fats are the same. There are “good” fats and “bad” fats. Most of what causes problems is hydrogenation, genetically modified crops, synthetic pesticides and fertilizers, and other processing and manufacturing practices.
Trans-fat is just another name for transformed fat. It is a by-product of hydrogenation. It is not a natural fat and has been proven to cause serious health problems including heart disease, diabetes, obesity, and immune dysfunction.
The so-called “no fat” and “low fat” trend has been called into question. We NEED fat to do our most basic functions and for long term health. So how do you know the difference? Let’s start by taking a look at each kind.
Mono-unsaturated Fats are liquid at room temperature (usually), and are comprised of one double-bonded carbon. Corn Oil, Flaxseed Oil, Olive Oil, Peanut Oil, and Sesame Seed Oil are some of the most common Mono-unsaturated fats. These are the “good” or “healthy” fats.
Poly-unsaturated Fats are liquid at room temperature, and are comprised of multiple double-bonded carbons. These are prone to rancidity so freshness is important. These are the Omegas found in fish, nuts, and algae. They are where our Essential Fatty Acids come from.
These are often the fats that get a bad rap because this is where our cholesterol comes from. They are usually solid at room temperature. But not all saturated fats are the same and not all cholesterol is bad. Coconut Oil is highly nutritious and has been shown to reduce “bad” cholesterol and raise “good” cholesterol (see the Supplements and Substitutes pages). Saturated Fats play a crucial role in calcium absorption and immune function.
Essential Fatty Acids
Essential Fatty Acids, commonly known as Omega-3 and Omega-6 are poly-unsaturated fatty acids. They are required for critical biological processes, and cannot be synthesized. They must come from food.
There are two main essential fatty acids: Alpha-linolenic acid (ALA) and linoleic acid (LA). There are also two non-essential fatty acids that can be synthesized with the presence of certain essential fatty acids. If you are deficient in the essential fatty acids, you will most likely be deficient in the non-essential ones as well. For deficiency symptoms, please see Essential Nutrients Symptoms Checklist.
Essential= Cannot be synthesized by humans. Must come from food.
Non-Essential= Can be synthesized in the presence of specific Essential Fatty Acids.
Alpha-linoleic acid (ALA) is an Essential Omega-3 fatty acid. If this is present, docosahexaenoic acid (DHA) and eicosapentaenoic acid (EPA) can be synthesized, a Non-essential long-chain Omega-3 fatty acid. This is often not sufficient and supplementation through food is required. This is what helps balance our “good” cholesterol.
Linolenic acid (LA) is an Essential Omega-6 fatty acid. If this is present, arachidonicacid (AA) can be synthesized, a Non-essential long-chain Omega-6 fatty acid. Too much Omega-6 raises triglycerides, or “bad’ cholesterol.
Oleic Acid (OA) is a Non-Essential Omega-9 fatty acid. Needs EFA’s to be synthesized. Omega-9 fatty acids are abundantly available through our diets.
So Why the Hype?
You hear people talking about “good fats” and “bad fats” and “lean meats.” What does it all mean and why does my body need it?
Essential Fatty Acids play a crucial role in brain function, growth, and development. Omega-3 in particular has been shown to reduce inflammation and prevent chronic diseases such as heart disease, high blood pressure, diabetes, osteoporosis, arthritis, auto-immune disorders, and some cancer.
Essential Fatty Acids are vital parts of our neurological processes. Without these, we don’t function. If these are imbalanced, as our modern diet tends to be, it can cause a host of diseases and nutrient deficiencies.
The ratio of Omega-3 to Omega-6 fats that humans need is 1:1. Our current American diet contains close to 6 times the amount of Omega 6 compared to Omega 3 Fatty Acids. Most of this imbalance comes from consuming grains and corn. Consequently, when we feed animals grain based diets, their Omega-3 and Omega-6 ratios are altered. This further enhances our imbalance.
This is bad because Omega-3 keeps Omega-6 under control. If allowed to outnumber Omega-3, we see an increase in inflammatory responses and chronic and auto-immune diseases.
I have mentioned elsewhere the importance of reducing inflammation. Our body has enough work trying to balance out the toxins in our air, our water, and our immediate surroundings. Limiting the amount of inflammatory responses due to the food we choose to eat can greatly decrease overall inflammation, auto-immune responses, and dis-ease.
Essential Fats are just that…Essential! | <urn:uuid:367841ef-cc4c-4e1c-a720-71fba73e566f> | CC-MAIN-2017-26 | http://www.livinglyme.com/nutrition/how-food-works/fatty-acids/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00634.warc.gz | en | 0.925297 | 1,209 | 3.578125 | 4 |
Palanpur, Oct 21 (UNI) Though kite flying is celebrated during the festival of Makarsankranti in January, people of Sidhdhapur town of Palanpur district in north Gujarat fly kites on 'Dussera' day.
''Right since this morning, people were perched on their terraces to fly kites with phaphada and jalebi doing the rounds. ''Though Makarsanktranti is the main festival for kite flying, in Duessera we fly kites in equal numbers,'' kite flyer Girishbhai Bhatt told UNI.
''It is difficult to ascribe any specific reason for kite flying during Dussera. However, it is a tradition I have been flying kites since last 20 years,'' said Mr Bhatt.
Kanubhai Thakar, a well known scholar and a retired college teacher, attributed the custom of kite flying during Dussera to Sidharaj Jaisingh Solanki, the benevolent Emperor of Gujarat during the 12th century.
''Sidharaj Solanki is considered as great as emperor Ashoka.
Solanki, whose kingdom was in Sidhdhapur, was a bird lover and was against the practice of kite flying during Makarsankranti that killed many birds,'' said Mr Thakar.
''Solanki had prohibited kite flying ahead of Makarsankranti and made it only a day affair on Dussera. The kite flying on Dussera in Sidhdhapur is also seen as tribute to Solanki,'' he said. | <urn:uuid:a7bc5833-8e8a-4a96-9fe7-9b0bcf12601c> | CC-MAIN-2017-26 | http://www.oneindia.com/2007/10/21/sidhdhapur-celebrates-dussera-with-kite-flying-1193203442.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00634.warc.gz | en | 0.974041 | 336 | 2.53125 | 3 |
President Obama can now claim -- in addition to Nobel Prize winner and leader of the free world -- the distinction of having a fish named after him.
Two scientists, Steve Layman of Geosyntec Consultants and Rick Mayden of Saint Louis University, have discovered five new fish species among populations previously thought to be Speckled Darters. Layman told BuzzFeed that the new Spangled Darter, named Etheostoma Obama and found in Tennessee, was named for the president "for his environmental leadership" and "more global vision" in approaching conservation.
Al Gore, Jimmy Carter, Bill Clinton, and Teddy Roosevelt served as inspiration for the other four new Darter species. Etheostoma TeddyRoosevelt, or the Highland Darter, was so named for the 26th president's "legacy of preserving vast areas for national monuments, parks, forests and refuges, setting a precedent that many other presidents would follow." | <urn:uuid:d0cf6adf-a534-4a04-a64c-185d2eb65ec9> | CC-MAIN-2017-26 | http://www.washingtonexaminer.com/new-fish-species-named-for-obama/article/2514680?rel=author | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00634.warc.gz | en | 0.950532 | 192 | 2.875 | 3 |
New Study Fails to Replicate “Power Pose” Effect
The idea behind power poses is that if you stand in a “powerful” position, broad posture, hands on hips, shoulders high and pushed back, you will suddenly feel psychologically and physiologically stronger.
Although the concept is intuitively appealing, a new study finds the premise is incorrect.
University of Pennsylvania researchers Coren Apicella, an assistant professor in the psychology department, and Kristopher Smith, a fourth-year psychology Ph.D. student, attempted to replicate an earlier study on power poses.
The earlier study appeared in 2010 in the journal Psychological Science, and reported the poses resulted in increases in feelings of power, risk taking and testosterone and a decrease in cortisol. In the new study, the Penn researchers found no support for any of the original effects, often called embodied cognition.
The new findings appear in the journal Hormones and Behavior.
“We did find that if anything — and we’re skeptical of these results, because we’d want to replicate them — that, if you’re a loser and you take a winner or high power pose, your testosterone decreases,” Apicella said.
In other words, Smith said, “people might not be able to ‘fake it until they make it,’ and in fact it might be detrimental.”
The pair started working on this study two years ago, with the aim of putting the power pose concept into a relevant ecological context grounded in evolutionary theory. They opted to use as their starting point the notion of contest winners and losers.
Before a competition, animals make their bodies as large as possible, gritting their teeth, making their hair stand on edge. In some situations, humans can similarly showcase displays of confidence intended to intimidate an opponent.
“We know that hormones change in this competitive context, especially testosterone,” Apicella said, referring to a well-known finding called the “winner-loser effect.”
“Winners experience a relative increase in testosterone compared to losers. The evolutionary theory for that is, if you just won a competitive interaction, that testosterone may be motivating you to take on future competition. If you lost, it’s saying, back off, you don’t want to get your butt kicked again.”
With that as the backdrop, the Penn researchers brought in nearly 250 college-age males from the Philadelphia region to take part in their study. Participants provided a saliva sample to offer a baseline measure for testosterone and cortisol levels, then took part in rounds of tug-o-war. One person was declared the strong man, the other the weak man.
“They would then make a high, low or neutral power pose,” Smith explained, based on a random placement into one of the three groups.
High power poses enable a body to take up more space (think of the Wonder Woman stance); low power poses constrict the area a body occupies (picture someone hunched over). While posing, study subjects viewed faces on a computer screen, the same images used in the original study, then 15 minutes later, the researchers took a second saliva sample to measure the same hormones they looked at to start.
“We didn’t find any support for this idea of embodied cognition,” Apicella said.
Not only do power poses not help, they could potentially cause harm.
In their paper, the scientists describe a series of studies in the 1970s that asked why low-ranking sparrows simply didn’t fake a higher ranking. A researcher tested this by painting low-status birds’ plumage to match that of the dominant birds. “The legitimate high-ranking birds persecuted the ‘fakers,'” the Penn researchers wrote.
“Our study is more in line with these results,” Apicella said. “This was one of several tests that didn’t go in the direction predicted by embodied cognition.”
The current findings are not the only to suggest that the effects of power posing are not real, adding to the evidence that has accumulated since the 2010 study. Some say the inability to replicate that first work doesn’t matter, that they’ll continue touting its results regardless.
This philosophy presents a problem to scientists working in social science fields. Indeed, this area of research is under close scrutiny because emerging analysis suggests few studies can be replicated. The replication crisis was confirmed in an analysis of 100 published papers, when only 36 percent showed replications with significant findings.
“As scientists, we care about the truth,” Apicella said. “There’s so much skepticism about research in general, especially research coming out of social science. Studies like the original power pose work can be harmful because they delegitimize good work.”
To that end, and especially given the recent failed replications, Apicella cautions researchers continuing to work on this topic to tread lightly. “Even if power poses were found to work in the short term,” she said, “we don’t know if they could backfire in the long term.”
Source: University of Pennsylvania
Nauert PhD, R. (2016). New Study Fails to Replicate “Power Pose” Effect. Psych Central. Retrieved on June 25, 2017, from https://psychcentral.com/news/2016/11/29/power-poses-are-not-helpful/113174.html | <urn:uuid:44cdc3f7-c545-4d0b-a948-2447534f2306> | CC-MAIN-2017-26 | https://psychcentral.com/news/2016/11/29/power-poses-are-not-helpful/113174.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320545.67/warc/CC-MAIN-20170625170634-20170625190634-00714.warc.gz | en | 0.940795 | 1,159 | 2.734375 | 3 |
Unformatted text preview: n are willing to
work. Firms bid up the real wage w to attract workers. ◮ If w > w firms find more workers willing to work than firms
care to hire. Jobseekers drive down the real wage. Upshot: the labor market moves toward equilibrium (w , N ).
¯¯ Frictional and Structural Unemployment
◮ Problem with supply and demand model above. No worker who wishes to work another hour at the prevailing wage w is unable to find an employer.
Unemployment (defined as people looking for work but not working)
would be zero!
◮ How can this be?
◮ Supply and demand is a useful way of thinking about the determination ¯
of w and N but doesn’t tell the whole story.
◮ Example Landlords and tenants
◮ Frictional unemployment – unemployment that arises from the matching process of workers searching for suitable jobs and firms searching for
◮ Structural unemployment – long-term and chronic unemployment arising from imbalances in skills and characteristics of workers and the needs of
firms. The Natural Rate and Cyclical Unemployment Define the natural rate of unemployment as the level of
unemployment when output and and employment are at their
full-employment levels. So it reflects unemployment that is dues to
frictional unemployment and structural unemployment. If denote
the unemployment rate by u , then the natural rate is u and is the
¯ and Y .
level of unemployment associated with N
Define Cyclical unemployment as the difference between the actual
unemployment rate and the natural rate. Potential Output ¯
Y = AF (K , N ) (1) ¯
where N is the market clearing quantity in labor market.
◮ Key Assumption N is determined today. K is determined in
the previous time period. That is, it takes time to build
machinery and structures.
This assumption is maintained throughout the course. ◮ ¯
Anything that changes N will change Y The Costs of Unemployment
◮ Economic costs
◮ Periods of cyclical unemployment are times of depressed
output the economy could produce more at full employment
(potential output) ◮ Broader costs
◮ ◮ Psychological rise in stress and mental illness ◮ Human capital those who are unemployed experience a
deterioration in skills Equity
◮ The costs fall on those who are unemployed
These costs fall heavily on specific groups...
View Full Document | <urn:uuid:1f302cfa-272e-499a-b85f-58f602280b22> | CC-MAIN-2017-26 | https://www.coursehero.com/file/8754827/Frictional-and-Structural-Unemployment-Problem-with-supply/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320545.67/warc/CC-MAIN-20170625170634-20170625190634-00714.warc.gz | en | 0.883011 | 557 | 2.9375 | 3 |
Unformatted text preview: e fits tightly into a beaded belt, and what looks like clam or oyster
shells are stitched all over the upper half of the dress. In the role of berdache, Finds Them and Kills Them carried on the traditions of women.
In war, Finds Them and Kills Them was as fierce as any Crow warrior
and was known far and wide for his/her great bravery, especially among
the Lakota Sioux, the Crow’s greatest enemies.
Thinking Inside the Box
It isn’t only in India and among the native North Americans that such
people walk. “Not-men” live among the Muslims of Oman, where they
are called xaniths6; among the people of Brazil, they are known as the
tranvesti, viado, and bichas; among the Hawaiians and Tahitians they
are the mh; in Thailand they are called the kathoey; and in the Philippines they are the bakla. It is likely that there are many other peoples
in other places who similarly fall outside of our definitions of men and
The simplest explanations for these people might be that they are
simply men or women with significant identity issues, or that they are
simply homosexuals. What would we have found if we had just lifted
the dress of Finds Them and Kills Them and peered between his legs?
Likely we would have found ourselves dead. But even if we had survived, whatever we found would have been of no significance. We’ve
already seen that genitals can be a poor measure of a person’s sex, and
so can any other criterion we might choose—chromosomes or hormones, and on and on. Even if we wished to explain all the ambiguity
away as some simple sort of genetic mutation, we have to ask ourselves,
why does that mutation keep popping up? Why does it appear in so
many societies? Generally, these people aren’t reproductive. Biologically,
that should be a death knell for their genes. But the people and their
genes don’t go away. Perhaps all of us are essential in ways we have not
At least some of those who know the nádleeh, hijra, and the alyha,
those who see them with other eyes, have great respect for them and 150 Between XX and XY their spiritual powers. Those who know them through other eyes don’t
see what we see, don’t feel the need to trivialize them somehow and
squeeze the spread of human beings in the vise of our words. They
don’t feel the need to question what the universe has given to them.
Or at least once they didn’t. When Europeans first began to explore
the Americas, only the northeastern, north-central, and east-central
tribes lacked berdache. Now the berdache are relatively few. The metastasis of white religion and white values might have killed the berdache, or
it might have been simple white ridicule of the berdache that doomed
them. The murderous power of that ridicule is apparent today among
the Pima and the Papago Indians of the American Southwest. Berdache
still survive in these tribes, but they are condemned and mocked by
many of their people.7
What About Their Parents?
No matter who we become, much of what set us upon our paths was
out of our hands. Long before we even realized that choices had to be
made, our parents were making those choices for us. And for all their
lives, the world whispered in our parents’ ears about what was wrong
and what was right, what was cute and what was travesty. It is impossible to imagine that the cultures of our parents didn’t limit the options
open to us, doesn’t still limit the options open to us, especially to those
of us who have unexpected, maybe even inconvenient, needs.
Mojave boys normally begin to show interest in the activities of men—
hunting, riding horses, making bows and arrows, interest in girls—by
about age ten or eleven, before the tribal puberty ceremony. A boy who
skipped all of this and instead picked up dolls and imitated the domestic
work of women or forced himself into women’s gambling games, a boy
who chose a bark skirt over a breechcloth, was a potential alyha.
The parents’ response to this behavior was reportedly ambivalence.
Ambivalence is not the same as indifference, though we sometimes use
it as though it was. Ambivalence means the simultaneous presence of
strong opposing emotions—love and hate, fear and pride, promise and
failure. Alternatives 151 In the beginning the boy’s parents try hard to force him into the
activities of men. But when the child sticks fast to his mother and
the ways of women, his family gives in resignedly and prepares for
the “transvestite ceremony.” But they tell the child nothing about this.
At the ceremony, two women lead the boy into a circle of women
who begin to sing “the transvestite songs.” If the boy dances with the
women he is an alyha. When that happens, the women take the boy
to the river, wash away his past, and give him girls’ clothes to wear.
Afterward the alyha chooses a girl’s name by which he will be known
from then on.
Watching their child transform into an alyha pleases no parents.
They know it will change their child’s life forever and i...
View Full Document
This document was uploaded on 02/04/2014.
- Spring '14 | <urn:uuid:edb4e2a8-fece-4c8f-860a-1b0e64719f9a> | CC-MAIN-2017-26 | https://www.coursehero.com/file/8778636/A-boy-who-skipped-all-of-this-and-instead-picked-up-dolls-and/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320545.67/warc/CC-MAIN-20170625170634-20170625190634-00714.warc.gz | en | 0.961725 | 1,241 | 2.515625 | 3 |
WATCH THIS VIDEO ABOUT TEACHING CHILDREN WITH READING DIFFICULTIES.
OR .... YOU CAN READ THE FOLLOWING!!!.
Just because a child has a reading difficulty or reading disorder does not mean they should ever be prevented from learning - or receiving a good education.
Yet by insisting that a text book or printed materials be used as the only way to provide information to that child, is doing just that.
These children represent a huge proportion of our society that is being robbed of their opportunity to learn, and enjoy their education, because they are expected to use text-based materials that do not meet their needs.
But most children with a Reading Difficulty or disorder are EXTREMELY intelligent and highly creative with a strong desire to learn and excel.
This is why it is not surprising that so many famous and highly successful people in the world today - and in history, have also suffered from a reading disorder or reading disability like Dyslexia.*Yet the solution to educating children with reading difficulties is so simple.
These children are often Visual Learners, so you provide the information you want them to study in a visual format.
Video provides that ideal visual format - it enables students to learn by watching .....and listening too.
Zane Education currently provides the only online video library that is also fully subtitled. It offers immediate access to the online teaching of 260+ curriculum topics across 12 subjects, for students and kids of all ages, using an inexpensive online monthly or annual subscription system costing from as little as between $8.99 to $17.99 per month.
But there is far more to using our online Visual Learning solution than using online educational video to teach children with reading difficulties and reading disabilities. It also includes and supported by:
The use of video also enables each child to learn entirely at their own speed which is essential in allowing them to achieve their greatest individual potential.
Zane Education's online Visual Learning solution is an ideal and much more affordable alternative to remedial reading classes and tutors that often charge up to $100 an hour for their time.
YOU COULD CHANGE AND IMPROVE YOUR CHILD'S LIFE IMMEDIATELY by enabling them to enjoy learning - and their education. End their frustration and restimulate that natural desire to learn which will secure their future.
To purchase your subscription and for further information about your choice of subsciptions, go to the very top of this page and visit our Buy a Subscription page.
And when you have completed your purchase, please don't forget to visit our Downloads page where you will find a wide selection of freely downloadable User Guides including a Guide for the Disabled Student, provided to help you and your child achieve the best results from our online resources.
Our unique and advanced online learning solution provides these significant benefits for families of those children experiencing difficulties with reading:
Customers can complete a free Registration for a Basic Membership by going to our Registration Page.
Access to the use of our full subtitled videos is a Premium Service and requires the purchase of a Gold, Silver or Bronze Membership subscription
Gold Membership - all videos for all subjects for all Grades
Silver Membership - all videos for all subjects for the chosen Grade
Bronze Membership - all videos for all Grades for the chosen Subject | <urn:uuid:89600a74-4022-4874-8078-ba5395d683dd> | CC-MAIN-2017-26 | http://www.zaneeducation.com/reading-difficulties-and-reading-improvement/difficulties-with-reading.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320763.95/warc/CC-MAIN-20170626133830-20170626153830-00074.warc.gz | en | 0.948675 | 677 | 2.890625 | 3 |
Some time back, I watched the Mel Gibson movie “Get the Gringo.” wherein he is sent to the fictional El Pueblito prison. The prison is run by the prisoners themselves. Though amusing, I could not comprehend that such a thing actually existed anywhere in the world.
Doing a little research, I found that El Pueblito was a real-life prison built in 1956 in Tijuana, Mexico, as part of an experiment where researchers, wanting to help inmates readjust to life in the outside world after serving their sentence, allowed their families to stay with them. Over the years, this flexible arrangement was abused and some of these inmates began ruling over the prison.
The El Pueblito, model-prison-turned-law-enforcement nightmare was effectively destroyed about eleven years back on August 20, 2002. On that day, approximately 2,000 law-enforcement officers stormed the facility to transfer many prisoners to other institutions, evict entire families that lived at El Pueblito and begin the destruction of hundreds of homes and businesses that had been built in the prison patio.
Things probably got out of hand at El Pueblito and a well intentioned controlled experiment went haywire. I am not sure if anyone went back and researched on the lessons learned from the El Pueblito experiment.
CNN carried the following news feature on August 04, 2013:
The Washington Post was the first to carry a news report about the Honduras prison system on August 02, 2013 based on a Inter-American Commission on Human Rights, report released the same day. The President of Honduras, Porfirio Lobo Sosa, called it an “unacceptable situation.”
Maybe the situation in Honduras was a unique one. But this may just be another example of a trend that’s increasing across countries in the world.
Costs of incarceration have increased in the United States and all over the world, and continue to rise. Private prisons have come into existence in quite a few countries. Governments keep trying to find ways to curtail prison costs with little success.
Is this be a disruptive trend? Could it just be a matter of time before government run prison systems or private ones give way to prisons run by the inmates themselves? | <urn:uuid:1c82f59b-2ee2-4bad-8a0a-fc89f7df1e06> | CC-MAIN-2017-26 | https://saviorebelo.wordpress.com/tag/incarceration/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320763.95/warc/CC-MAIN-20170626133830-20170626153830-00074.warc.gz | en | 0.964815 | 460 | 2.734375 | 3 |
1851 Great Exhibition: Official Catalogue: Class X.: Mx. C. De Dunin
From Graces Guide
210. DUNIN, Mx. C. DE, London — Inventor, Manufacturer and Patentee.
Piece of mechanism intended to illustrate the different proportions of the human figure: it admits of being expanded from the size of the Apollo Belvidere to that of a colossal statue.
The external part of the figure consists of a series of steel and copper plates sliding upon each other, and kept in contact by screws, nuts, and spiral springs; attached to these plates, and within the figure, are metal slides, having projecting pins at their extremities: these pins are inserted in curved grooves cut in circular steel plates; the curvature of these grooves being so arranged that when the steel plates are put in revolution by a train of wheels and screws the slides belonging to each particular part of the figure are expanded or contracted in correct proportion. The elongation of the figure is accomplished either by sliding metal tubes, provided with racks, and acted upon by a combination of wheels, or by screws and slides, as found most applicable for each particular part. Besides the general adjustments described, each part of the figure has an independent and separate adjustment, by which it can be put out of its correct likeness to the Apollo Belvedere, and made to represent the deformities or peculiarities of form of any individual. The varieties of figure and size of the human body are so numerous that it necessarily requires a great number of movements to represent them. Some idea may be formed of the number of mechanical combinations included in the figure, from the following list of the parts of which it is constructed, viz.-875 framing-pieces, 48 grooved steel plates, 163 wheels, 202 slides, 476 metal washers, 482 spiral springs, 704 sliding plates, 32 sliding tubes, 497 nuts, 3500 fixing and adjusting screws, and a considerable number of steadying pinions, etc., making the number of pieces, of which the figure is composed, upwards of 7000. It is stated that this invention could easily be made applicable in the artist's studio; but that its more immediate object is to facilitate the exact fitting of garments, more especially in cases where great numbers are to be provided for, as in the equipment of an army, or providing clothing for a distant colony; that personal attendance is not required, since there is adapted to the figure, a new system of measurement which enables any person to take the exact size and form of an individual; and from the measurement so taken, the figure can be adjusted to represent correctly the person to be fitted, so that the clothing may be tried on, and, if necessary, altered with as much facility as if the original person, whose measure had been taken, were present.
An establishment provided with three or four of such figures, would be sufficient to fit perfectly, and without any subsequent alteration, the clothing of an army of several hundred thousand men, at whatever distance they might be from the establishment.
The inventor states it as his intention to present this figure to his Majesty the Emperor of all the Russias. | <urn:uuid:ad252460-3405-4060-89de-6d686b5225c6> | CC-MAIN-2017-26 | http://www.gracesguide.co.uk/1851_Great_Exhibition:_Official_Catalogue:_Class_X.:_Mx._C._De_Dunin | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321306.65/warc/CC-MAIN-20170627083142-20170627103142-00154.warc.gz | en | 0.956202 | 650 | 3.109375 | 3 |
Eudaimonia: the final goal of all human activity – happiness, well-being, human flourishing.
Virtue: habitually doing what is right – being good requires the practice of a certain kind of behaviour.
Phronesis (practical wisdom): the virtue most needed for any other virtue to be developed which requires balancing self – interest with that of others.
Plato and Virtue: centres around the achievement of man’s highest good, which involves inner well-being and eudaimonia. Happiness must be attained through the pursuit of virtue and actions are good when they help you achieve this. Plato centralised certain virtues: temperance, courage and prudence – the cardinal virtues. When in balance, Plato believed a person’s actions will be good.
Aristotle and Virtue: distinguished between things which are good as means (for the sake of something else) and things which are good as ends (for their sake only). He sees one final good in eudaimonia – human flourishing which is a life characterised by these virtues. Aristotle emphasised that good human life is one lived in harmony and co-operation with other people, as we are seen as social beings as well as rational beings.
Acquiring virtues: 1) intellectual virtues – developed by training and education
2) moral virtues - developed by habit
To Aristotle you acquire virtues through doing virtuous acts and practicing the acts to acquire the skill E.G temperance by doing temperate acts and courageous by doing acts of courage. Aristotle believed that while all people have the potential to develop moral and intellectual virtues, only a few will actually achieve this – for Aristotle these were gentlemen philosophers and todays equivalent of this depends on social factors: where we are brought up and the environment in which we live. Aristotle saw reason as a supreme human virtue also a moral sense – putting into action what act your reason judged as good.
There exists two vices of excess and deficiencies which we must find the balance (mean) of to acquire the true virtue to live in society in the best way. The difference between virtue and vice is a matter of balance and extremes however the mean is not the same for everyone and depends on circumstance – you need to apply phronesis to decide on the right course of action in each situation.
Vice of deficiency
Vice of excess
The example of virtuous people
Virtue is acquired through doing, one way in which is to follow the example of virtuous people by watching and imitating how they live. People such as Gandhi, Martin Luther King JR and Nelson Mandela are good examples of virtuous people who challenge us to aspire to ‘moral heights’ and to see what can be achieved.
· People flourish when they reason well | <urn:uuid:126631c7-24f0-4505-b7ac-9aa8bf650fe9> | CC-MAIN-2017-26 | https://getrevising.co.uk/revision-notes/virtue_ethics_10 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00234.warc.gz | en | 0.953943 | 562 | 3.75 | 4 |
Download as ZIP file
Do we need any smoke control in staircases?
Safe lives by Smoke and Heat Exhaust Vent systems
(PresseBox) (Passau, ) The people were not able to escape because of the smoke in the staircase during the fire happened last week in a house in Munich. It was the result of a very professional work of the fire brigade in Munich that no more people than the two was injured or killed by the effects of this fire. This is reason enough to hold the requirements in our building laws up for a smoke release system in staircases. And also the maintenance of these systems should be demanded to ensure smoke fire escape routes for people getting in contact with fire in houses. Only in this way we can avoid bigger damages during the 250.000 fires we have yearly in Germany. | <urn:uuid:4cffd01c-3663-4b35-ac15-69e7754909c0> | CC-MAIN-2017-26 | https://www.pressebox.com/pressrelease/simon-rwa-systeme-gmbh/Do-we-need-any-smoke-control-in-staircasesOE/boxid/245766 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322320.8/warc/CC-MAIN-20170628032529-20170628052529-00234.warc.gz | en | 0.978302 | 165 | 2.578125 | 3 |
Texas A&M study recommends 'standing desks' in elementary schools citing health benefits
The desks have caught on in the workplace with adults
Published 3:39 pm, Wednesday, August 24, 2016
According to a recently published study from Texas A&M University Health Science Center researchers it would behoove some schools to introduce desks that allow for children to stand during the school day, citing statistics that indicate the desks could reduce body mass numbers.
The study was published this week -- the first week that most Texas schoolkids returned to class -- in the American Journal of Public Health and includes findings from studies conducted at 24 elementary classrooms in three College Station schools.
According to the data there is evidence, researchers say, that kids with access to standing desks saw a decline in the increase of their individual body mass index. That is a key indicator in determining obesity.
Mark Benden, an associate professor in the Department of Environmental and Occupational Health at the Texas A&M School of Public Health and an author of the study, seemed to rave about the benefits of standing desks for children.
"Research around the world has shown that standing desks are positive for the teachers in terms of classroom management and student engagement, as well as positive for the children for their health, cognitive functioning and academic achievement," said Benden. "It's literally a win-win, and now we have hard data that shows it is beneficial for weight control."
Benden's researchers had already discovered in the past that students who stand burned up to 15 percent more calories than those who sit down. The challenge, it seems, is measuring weight loss in bodies that are constantly growing and changing.
Adults in some workplaces have opted for standing desks after studies showed a variety of benefits, including weight loss, circulation and productivity. Texas A&M released their findings on this earlier in the year.
According to a release from Texas A&M, four classrooms at each of the schools that participated in the study were outfitted with "stand-biased" desks, which have the option of sitting or perching on a stool. Four additional classrooms without the standing desks were used as a control.
Researchers monitored 193 students between the start of their third grade year and the end of fourth grade.
The authors say that students who had the standing desks for two years "averaged a three percent drop in BMI" while those in sitting desks "showed the two percent increase typically associated with getting older." Even kids who spent just a year with the desks were found to have a noticeable drop in BMI.
"In addition, there weren't major differences between boys and girls, or between students of different races, suggesting that this intervention works across demographic groups," the study said.
The Stand2Learn desks developed by Benden and his team look not unlike normal school desks but instead feature a small foot rest, stool and slats to increase the height of the tabletop.
It remains to be seen if Texas schools will one day move to a stand-biased desk option but it appears that research like A&M's could help turn the tide. | <urn:uuid:5a3c3204-a187-41ba-9b2c-e5f35363f72a> | CC-MAIN-2017-26 | http://www.chron.com/news/houston-texas/texas/article/Texas-A-M-study-9181838.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00314.warc.gz | en | 0.977378 | 631 | 2.8125 | 3 |
Inventing the Victorians
Interesting. We think we know all about the Victorian era and the people who lived in that period. We have definite ideas about their morality, their pastimes and their way of life in general.
Could it be that we’re wrong?
Maybe we have a completely false idea about the way people lived in Victorian times. Perhaps we know less than we think we do. In fact,maybe we are very mistaken in our ideas.
In Inventing the Victorians, author Matthew Sweet sets the record straight.
We may have first found out about the Victorian era from history lessons at school. We’ve possibly read novels set in the era. It’s very likely that most of us have seen movies and television shows that are set in the era. But how accurate is that picture?
We were told, for example, that the Victorians were incredibly puritanical. We’ve heard that they even covered up the legs of their pianos to preserve decency. What’s more, few of us have ever challenged that thought.
Victorian times were very progressive. There had been no other period in history in which advancements were made in so many fields and people found themselves faced with new inventions on a weekly basis.
Somany things that are part of our everyday lives today were developed or invented by the Victorians; theme parks,shopping malls, the cinema …
This book demonstrates that the Victorians were, in fact, very different to the way we are today but we’ve no reason to believe that we are superior. The author also believes that we are actually indebted to the people who lived in those days – they helped to create so many of the beneficial aspects of our own time.
He argues that today we are actually more rigid, more self-righteous, certainly more racist and indeed less tolerant than the people we tend to condemn as a stuffy generation who didn’t know how to have fun and whose women believed that their intimate marital role was to ‘lie back and think of England’.
The author demonstrates his assertions with hundreds of stories and examples – often hilariously funny – about the Victorian people and their era – almost every aspect of life and society is explored.
“The Victorians culture was as rich and cultured as our own; the Victorians shaped our lives and sensibilities in so many different ways. They are still with us”
ABOUT THE AUTHOR | <urn:uuid:f58e73b4-bce2-456f-a652-f695d4c62dad> | CC-MAIN-2017-26 | http://jaquo.com/inventing-the-victorians/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00593.warc.gz | en | 0.985613 | 509 | 3.046875 | 3 |
The latest news from academia, regulators
research labs and other things of interest
Posted: Nov 10, 2016
Researchers discover new method to dissipate heat in electronic devices
(Nanowerk News) Controlling the flow of heat through semiconductor materials is an important challenge in developing smaller and faster computer chips, high-performance solar panels, and better lasers and biomedical devices.
For the first time, an international team of scientists led by a researcher at the University of California, Riverside has modified the energy spectrum of acoustic phonons-- elemental excitations, also referred to as quasi-particles, that spread heat through crystalline materials like a wave--by confining them to nanometer-scale semiconductor structures. The results have important implications in the thermal management of electronic devices.
Fariborz Kargar, a graduate student researcher, is measuring the acoustic phonon dispersion in the semiconductor nanowires in UCR’s Phonon Optimized Engineered Materials (POEM) Center, directed by Alexander Balandin.
The team used semiconductor nanowires from Gallium Arsenide (GaAs), synthesized by researchers in Finland, and an imaging technique called Brillouin-Mandelstam light scattering spectroscopy (BMS) to study the movement of phonons through the crystalline nanostructures. By changing the size and the shape of the GaAs nanostructures, the researchers were able to alter the energy spectrum, or dispersion, of acoustic phonons. The BMS instrument used for this study was built at UCR's Phonon Optimized Engineered Materials (POEM) Center, which is directed by Balandin.
Controlling phonon dispersion is crucial for improving heat removal from nanoscale electronic devices, which has become the major roadblock in allowing engineers to continue to reduce their size. It can also be used to improve the efficiency of thermoelectric energy generation, Balandin said. In that case, decreasing thermal conductivity by phonons is beneficial for thermoelectric devices that generate energy by applying a temperature gradient to semiconductors.
"For years, the only envisioned method of changing the thermal conductivity of nanostructures was via acoustic phonon scattering with nanostructure boundaries and interfaces. We demonstrated experimentally that by spatially confining acoustic phonons in nanowires one can change their velocity, and the way they interact with electrons, magnons, and how they carry heat. Our work creates new opportunities for tuning thermal and electronic properties of semiconductor materials," Balandin said. | <urn:uuid:4be1ed1c-59dd-4c94-9c38-36627057e834> | CC-MAIN-2017-26 | http://www.nanowerk.com/nanotechnology-news/newsid=45043.php | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00593.warc.gz | en | 0.913226 | 536 | 2.90625 | 3 |
Care of Young Wildlife
If You Care . . . Leave Them There!
Young Wildlife Belong in the Wild
Every year, many people upset the lives of young wildlife when they only mean to help. The problems arise when people assume that young wildlife found alone are abandoned, helpless and need saving. In nearly all cases, this is a mistake. Often, wild animal parents stay away from their young when people are near.
These well meaning acts of kindness tend to have the opposite result. Most people quickly find that they do not really know how to care for young wildlife, and many of the animals that are "rescued" soon die despite their best efforts.
Even if they do survive in our care, these young wild animals have missed the natural experiences that teach them to fend for themselves. When these wild animals are released back into the wild it is difficult for them to function as they should (for example, their ability to find natural foods is impaired) and they have a reduced ability to survive. Further, they may be thrust as unwelcome intruders into the home range of another member of their species.
Also, the care given to young wildlife often, unavoidably, results in some attachment to humans. On release to the wild, those animals generally have little fear of people. Some return to places where people live, only to be attacked by domestic animals or to be hit by cars. Some become nuisances getting into stored food, trash cans or dwellings. People have also been injured by once-tamed wildlife.
What to Do
All of these problems can be avoided by following the rules below when coming upon young wildlife:
LEAVE THEM ALONE! It may be difficult to do, but this is the real act of kindness and in nearly all cases it is the best thing to do.
DO NOT consider young wildlife as possible pets. This is illegal and is bad for the animal.
However, when you encounter a young wild animal that is obviously injured or orphaned, please call a Wildlife Rehabilitator for advice and help. Wildlife Rehabilitators, volunteers licensed by DEC, are the only people legally allowed to receive and treat distressed wildlife. They have the experience, expertise and facilities to successfully treat wild animals. The goal of the rehabilitator is to release a healthy animal back into the wild, where it belongs.
The following resources can help you locate a Wildlife Rehabilitator in your area
- Find a Wildlife Rehabilitator Near You
- In Erie County, call the DEC Buffalo Main Office at (716) 851-7200.
This office is located at 270 Michigan Avenue in Buffalo, NY 14203.
Outside Erie County: call your nearest DEC Regional Wildlife Office.
- New York State Wildlife Rehabilitators (NYSWRC)
For more information about Wildlife Health go to http://www.dec.ny.gov/animals/261.html | <urn:uuid:d0d91aa2-5b8a-4d2c-9cfe-dd46161deb2f> | CC-MAIN-2017-26 | http://www2.erie.gov/health/index.php?q=node/13 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00593.warc.gz | en | 0.955549 | 595 | 3.125 | 3 |
The above picture is a portrait of Lady Astor by John Singer Sargent from 1909.
Lady Astor is Elected in 1919
On today’s date in 1919, Nancy Witcher Astor, Viscountess Astor, was elected to the British Parliament, becoming the first woman so elected to ever take her seat. Nancy Astor was born in Danville, Virginia in 1879. Her father had been a Confederate officer and a one time slave owner. In 1897, she married Robert Gould Shaw II (brother of late commander of the fabled 54’th Massachusetts – regiment during the Civil War). and they had one child, a son, before they got divorced in 1903. Not long after that during a visit to England, she met and fell in love with Waldorf Astor (below), the great-great-grandson of the American fur trader John Jacob
Astor. In 1906, they married. They lived at the Astor family estate in Clivedon. Lady Astor took the Unionist seat of her husband, Waldorf Astor, who was moving up to the House of Lords, after he inherited his father’s seat. She had run a bright and flamboyant campaign for the seat and attracted international attention when she won a resounding victory(she was not actually the first woman ever elected -that laurel belongs to Constance Markiewicz, an Irish Nationalist who won in 1918, but declined to take her seat in protest to British policy in Ireland).
Lady Astor and “The Clivedon Set”
Lady Astor (below, circa 1940’s) became known as a strong individualist, a friend of George Bernard Shaw, and prone to many
acidic comments on politics and society saying once “I married beneath me. All women do.” Her comments would sometimes take on a self-deprecating nature: “My vigour, vitality, and cheek repel me. I am the kind of woman I would run from.” She met once with Joseph Stalin despite her hate for communists, and told him that Winston Churchill was finished. This caused considerable comment and was just part of a life-long tendency on her part to go against the grain. She eventually became identified with “the Clivedon Set” a group of British politicians who strongly favored a policy of appeasement towards the regime of Adolf Hitler in Germany. “The set” became so named because they frequently met at the Astor’s estate, Clivedon.
Lady Astor Becomes a Favorite Target of Churchill
But it was as the object of two of Sir Winston Churchill’s most venomous barbs that Lady Astor achieved what is likely her most enduring claim to fame. As noted above, she had written Churchill off as being finished long before he actually was. This was not unusual, as many others did this as well. But Lady Astor and Churchill developed a particularly biting relationship. After one exchange, she is said to have told Sir Winston:
“If you were my husband, I would put poison in your coffee!” To which Sir Winston is said to have replied “And if you were my wife, I’d drink it!”
Another exchange between the two came at a point when Churchill, as was often the case, had had a bit too much to drink.
Lady Astor – “Sir Winston, you are very DRUNK!”
Churchill – “Yes madam I AM very drunk. And you madam, are very ugly. But in the morning I shall be sober!”
READERS!! If you would like to comment on this, or any “Today in History” posting, I would love to hear from you!! You can either sign up to be a member of this blog and post a comment in the space provided below, or you can simply e-mail me directly at: [email protected] I seem to be getting hits on this site all over the world, so please do write and let me know how you like what I’m writing (or not!)!!
Both by William Manchester. Little Brown & Co., Boston, 1983 and 1988.
Portrait by Sargent = | <urn:uuid:e6d2fa04-028b-42a6-8b48-557745f6267d> | CC-MAIN-2017-26 | https://krusty1960historysstory.wordpress.com/2013/11/28/november-28-lady-astor-is-elected-to-parliament/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00593.warc.gz | en | 0.983255 | 892 | 2.9375 | 3 |
The big unresolved problem with Nuclear waste
The Romans left a legacy that is still evident in our life society today, from their road engineering to their communal baths, they left a lasting impact upon the civilized world. The Romans were an advanced race, far ahead of their time in many ways, and we can only thank our lucky stars that they did not invent Nuclear power, for if they had we would still be storing and guarding their Radioactive waste today. Let that sink in for a minute if you will, for we are doing exactly that, leaving our future generations with a huge, cancer causing problem that we do not know how to solve. Instead, we are forever indebting our children, and their children, and their children and their children with this immoral waste product of Nuclear energy production for generations to come.
Nuclear waste is a worldwide problem. There is no disposal site to securely contain radioactive waste that is currently known to man. The Nuclear industry worldwide has already produced a pile of hazardous material to be stored and guarded well beyond our lifetimes. Now with the creation of new Nuclear reactors across the globe it wants to create even more of this toxic and lethal poison, of which we have no viable scientific solution with how to store it.
What is Radioactive waste?
When spent Uranium fuel comes out of a Nuclear reactor it is highly radioactive, and nearly all aspects of Nuclear power are contaminated with radioactivity. This radioactivity naturally decays over time and so it has to be stored in secure storage facilities until it no longer poses a risk to human health. The amount of time this takes for each individual element is known as a half-life. The period (or half-life) of the used fuel depends on the type of waste created and the types of radioactive isotopes that are present in the spent fuel. This time period can range from a few days to millions of years, and it has to be stored safely and securely so that it does not pose a serious or deadly heath risk to humans.
The continually increasing cost of trying to keep the waste safe from humans and the environment will be a financial burden on tax payers and consumers forever. No-one can predict the final cost. At present, the Nuclear decommissioning agency spends £3 Billion per annum. In the UK, the main storage and reprocessing site is called Sellafield. This site requires continuous updates in order to be kept safe and this requires huge annual financial investments. Two thirds of the Governments DECC budget is used on the clean up of Nuclear facilities.
If humans are exposed to radiation it will cause damage to the DNA structures and enzymes in living cells in the body, and this will lead to Cancer as well as may other ill-health effects. Just standing next to the waste fuel store at most Nuclear sites would be enough to kill you.
All Nuclear power stations worldwide have a process known as ‘routine releases’. This is where Nuclear power stations release radioactive particles into the local air and sea environment, and all the public have to rely on that these particles are not dangerous to our health is the word of the Nuclear industry. Nuclear power has only been around for 70 years and so the effects of radiological routine releases cannot be properly known, assessed or understood for sure. It has been documented that health issues to the public have developed in the locality of Nuclear power stations. In 2008, a German government study reported an increased level of Leukemia and other nasty cancers among children living within a 5km radius of ALL 16 German reactors.
Chris Busby did a similar study at Hinkley Point in Somerset, here is what he found:
Germany is leading the way in Europe in shutting down and decommissioning all of its Nuclear reactors. We feel that the rest of the world needs to follow in their path as soon as possible. We cannot accept this continued exposure to radiation and health defects as a consequence any longer. Since the 1986 Nuclear meltdown at Chernobyl in Ukraine, life expectancy has decreased by 20 years. TWENTY YEARS. This is due to the multitude of health problems from the Nuclear disaster where radioactive releases spread into the environment and contaminated the land and food. Radiation does not just go away, it will not decay for a long period of time, and therefor it will remain present for different life cycles and generations to live with, altering the DNA of living beings that come into contact with it and causing horrific deformities and mutations in living cells of the body. The mainstream media do not portray the inhumane suffering and deformities that the children of Chernobyl, Ukraine and Belarus have suffered. The Fukushima Daiichi nuclear meltdown is far more severe than Chernobyl, with Three nuclear reactors plus the majority of their respective spent fuel pools having melted down 100%, Chernobyl by comparison was one reactor that was a 30 % meltdown before it was contained, to a degree. Fukushima cannot be stopped from continuing to meltdown, and as a result since March 2011 THREE HUNDRED TONS of radioactive water has been leaking into the Pacific unabated. Recent oceanic studies completed by Dana Durnford of TheNuclearProctologist.org have found that the Pacific is dying, with basic life forms ceasing to exist, and the Pacific birth-pool in western Canada being devoid of life.
The cover up of this monumental catastrophe suggests a unilateral cohesion of information suppression to the public by the Governments of the world, the Politicians that we as a people have elected in order to protect us and to serve our best interests. We at MutantDaisys firmly believe that our future generations will look back on the actions of our elected in a worse light than that of which we currently view Hitler and the Nazi parties. They will also wonder why on Earth that we, as a public, allowed it to go on and did not realize the horrendous consequences Nuclear power was doing to all lifeforms. They will ask why we allowed it to continue. We are trying to instigate wholesale change and revolution of the current criminal status-quo, we are trying to inform the public and inspire freedom of thought. People must wake up to the fact that our Governments are hiding the truth, no matter how harsh the reality of the situation unfolding is to bear, we have a duty to know and to try and rectify the situation for our future children. The Children of Japan are already suffering the effects of radiation exposure, they are contracting more and more Thyroid cancers by the day, again the information of which is being suppressed by the Japanese governments and media. One of our main goals at MutantDaisys is to help the Japanese children by removing them and their families from the highest areas of radiation that they are being forced to live in. We are witnessing Nuclear radiation contamination exposure genocide.
The Unsolved Problem
Referring back to Nuclear waste, there is no scientific solution to the problem of it in sight. We have no solution to the legacy waste from the past 60 years, nor the future waste that will be created by the new reactors currently being built and in production now. The new reactors that are planned will run at a higher intensity than their predecessors and so they will create more Nuclear waste than before. This is a problem that is only going to continue to get worse, however we anticipate the effects of Fukushima will soon make it pale into insignificance in comparison.
If you have read this article, please tell your friends about it and share it to as many people as you can. We need all the help and support that we can get in highlighting the true nature of the Nuclear industry and the consequences it is causing. Thank-you. | <urn:uuid:52be18cd-6ac6-4189-a454-5b4d880e9903> | CC-MAIN-2017-26 | https://mutantdaisys.wordpress.com/2016/05/08/if-the-romans-had-nuclear-power-we-would-still-be-storing-their-radioactive-waste/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00593.warc.gz | en | 0.965607 | 1,550 | 3.1875 | 3 |
Research | English language teacher education in a diverse environment
Continuing with this week’s theme of language learning.
This collection of research articles and papers covers various areas of English language learning around the world. The collection is divided in three themes:
- The institutional environment: approaches to English language teaching and English language teacher education
- The socio-economic environment: English for development
- The home environment: issues in the home/school language switch
From their website:
“This volume is a collection of papers derived from the Third International Teacher Educators Conference held in Hyderabad, India from 16 – 18 March 2013 on the theme English Language Teacher Education in a Diverse Environment.
This publication examines the many contexts in which English teaching and learning takes place around the world. The book explores a broad range of issues from the challenges of teaching and learning languages in large, diverse classrooms to the implications this raises for the training and continuing professional development of teachers.”
Download the full volume from here [PDF 3.8 MB, 254 pages] | <urn:uuid:47ef7ed5-4566-422b-a6da-a929209bc7cb> | CC-MAIN-2017-26 | http://eveltio.net/2013/10/09/research-english-language-teacher-education-in-a-diverse-environment/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00033.warc.gz | en | 0.931312 | 215 | 2.78125 | 3 |
Register for the November Online Conference "MOOCs and Mobile Technologies – Their Impact on Reference Service"
Implementing mobile technologies within libraries, whether it is moving to the cloud, circulating e-readers, or building mobile websites, seems pretty straightforward until you make the decision to embark on this path. Delivering services to an open classroom is exciting. What can you do to move from idea to service delivery?
Come explore the role of librarians in MOOCs: massive online open courses and their use of mobile technologies in the library to reach out to patrons, at our online conference Thursday, November 7.
Conference sessions include:
- Connecting Users with Resources: Facilitating Easy Access
- A Librarian Takes A MOOC
- That All May Read in a Digital World
- Social Influence: Using Mobile Technologies to Connect and Engage Patrons
- Massively Social & Openly Mobile Reference: Current & Future Tech
For more information and registration information, visit the conference web pages. | <urn:uuid:d3ccf18e-96f6-49a5-b707-5c76750ee9c0> | CC-MAIN-2017-26 | http://www.amigos.org/node/2180 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00033.warc.gz | en | 0.882924 | 207 | 2.515625 | 3 |
On June 3, 2017, late at night, an unnamed 58-year-old homeless man was shoved onto the tracks in a Manhattan subway station. Gray Davis, a 31-year-old ballet dancer, leapt down onto the tracks and lifted the unconscious man to safety. And then lifted himself up before the next train arrived (Cooper & Southall, 2017).
Thanks to research on the bystander effect, we know the conditions under which we are less likely to help and under which we are more likely to help (Myers, 2015). Let’s see how these play out with Gray Davis on that night.
We are more likely to help when:
We are feeling good. He was with his wife and mother after having watched his wife, also a ballet dancer, perform. While they certainly could have been arguing for the last 6 hours, I’m going to choose to believe they had an enjoyable day.
We are not in a rush. Their evening out had just come to a close, and they were making their way home.
The victim needs help. An unconscious man on train tracks clearly needs help.
We know that there were a number of bystanders present. Davis reports that “People were screaming to get help,” and, well, it’s a Saturday night in Manhattan so there must have been others present. Why did the number of bystanders seem to have little impact on Davis? At the time of the incident, Davis was already committed to helping. When his wife, Cassandra Trenary, saw the man and a woman arguing, she sent Davis to get help. He ran up to the token booth, but it was unoccupied. He had returned to the platform to learn that the man had been shoved onto the tracks. And, as a dancer, Gray Davis also knew he had the physical skill to help.
Factors that were not present? The victim did not appear to be similar to his rescuer and the incident did not take place in a small town.
Other factors that could have been present that we don’t know about? We don’t know if Davis was feeling guilty about something, if he is a religious man, or if he had recently seen someone else being helpful.
I have an assignment where I ask students to take the conditions that are more likely to lead to helping and create a scenario in which someone is more likely to help. And then I ask students to reverse them to create a scenario in which someone is less likely to help. If you decide to offer a similar writing assignment, ask students to identify how each condition related to helping behavior is illustrated in their scenario. It will make scoring them much easier.
Cooper, M., & Southall, A. (2017, June 04). Ballet dancer leaps onto subway tracks and lifts man to safety. Retrieved from https://www.nytimes.com/2017/06/04/arts/dance/ballet-dancer-gray-davis-subway-rescue.html
Myers, D. G. (2015). Exploring social psychology (7th ed.). Boston: McGraw-Hill. | <urn:uuid:7f1f1b3c-5b98-44b7-8f72-07b3eefad805> | CC-MAIN-2017-26 | https://community.macmillan.com/community/the-psychology-community/blog | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00033.warc.gz | en | 0.986019 | 650 | 2.859375 | 3 |
Morning sickness refers to a state or feelings of nausea, vomiting or sickness during the early part of pregnancy which occurs especially in the morning. Why is it called morning sickness? Simply because, it is a feeling of sickness; and it starts at the beginning of the day (not necessarily). For most women the signs appear during the start of the day but goes away as the day progresses, while some other may feel it either at the later part of the day or even the whole day.
It does not happen to all women in pregnancy. It may happen to some and not to others. According to an estimate, about 3 quarters of women feel morning sickness during the first three months of their pregnancy.
The earliest time it starts is normally four weeks or five weeks and in some cases as late as six weeks. All women do not experience the same starting time, or length. Some may feel it as early as four weeks, while other may start the feeling even after the 6th week. However, the majority of women get the nausea and vomiting feeling just about the first four weeks.
How long does morning sickness last?
There is no exact answer to that. Some women would get relief just about in two weeks after its appearance, while other may feel better in about 5 to 9 weeks, some around 14 weeks and some even later than that. Generally speaking, around 50% of pregnant women find themselves relieved from morning sickness by 14th week. While some other may take even a month or so longer. In a few other cases, it may become more severe, in which case, it is called as hyperemesis gracidarum. Such excessive cases of nausea and vomiting has been observed in a very small group of women which may lead to weight loss and dehydration because of the lack of absorption of food and liquids in to the body in the right amount.
Causes of Morning Sickness
What causes it? Who gets it? Why certain women get it and others don’t? There are no exact and scientific answers to these questions. There are some studies which have probed into the matter and have come up only with some general observations.
Some of the reports indicate that Morning Sickness, most probably, occurs because of the changing levels of the hormones after a woman conceives. The hormones level rise above the normal level enabling the body to cope with the new situations.
But again, the question remains why the hormone level rise in some women during their pregnancy and not in others? It is not known exactly. It may be due to the overall psychical makeup of the body, health condition, the immune system and other factors. So, the general observation is that some women get more morning sickness than others, without exactly knowing the underlying causes or reasons behind it.
Typically speaking, there are a couple of causes which are generally associated with nausea and vomiting during pregnancy without any clear scientific evidence. For example, women with twins or more babies have more chances to suffer from morning sickness than the women pregnant with only one baby. This could be because of the production of high levels of hormones in their bodies such as, HCG, estrogens etc. Also those women who used to take birth control pills before they were pregnant have more chances to suffer than the ones who did not. Women who have a family history are likely to suffer more than those who not. In other words, genetic factor is responsible to a certain extent for causing nausea and vomiting during pregnancy.
What about the relationship of morning sickness with a baby girl or a baby boy? Does it have an effect in case of gender of the baby? There, certainly, have been debates regarding this issue i.e. what is the effect of the morning sickness on women carrying a boy and on women carrying a girl. According to a study, it was found that those women who were pregnant with baby girls were 50 percent higher than those pregnant with boys.
There is another issue, much less debatable, that women having miscarriages have no or low morning sickness as compared to those who have successful pregnancies. The logic or reason behind this is that women with miscarriages do not have the babies or placenta developing and, as such, have lower levels of hormones. As there system does not require a high level of hormones so they do not have the feeling of nausea or vomiting.
On the other hand, women who have successful pregnancies have the babies or placenta developing in them and hence their body needs a high level of hormones. This may be true to some extent. However, that does not mean that a successful pregnancy is definitely related to morning sickness as there are a lot many women out there who delivered quite well without feeling sick or vomiting while they were pregnant.
How to Ease?
What are the ways that can ease or relieve morning sickness? Are there any? Yes, there are! In most cases, doctors and midwives will not prescribe any medication as long as they see it as a normal part of pregnancy. However, there are some very useful and easy steps which if followed can get one a good relief. In case of more severe cases, one should always speak to the doctor and act upon the advice that is recommended by him or her. Here a couple of steps which may help to reduce morning sickness.
1) Change eating habits. That means to eat smaller bits during the day rather than one large meal.
2) Avoid the stomach either being completely full or empty.
3) Take a good rest during the day.
4) Avoid smelling places like kitchen.
5) Substitute the nausea and vomiting causing food with the ones that don’t trigger morning sickness.
6) Consider using acupressure or motion sickness bands.
Morning Sickness Frequently Asked Questions
1) What is Morning Sickness?
A general definition of Morning Sickness would be a state or a feeling of nausea and vomiting in the early part of pregnancy especially during the morning.
2) When does morning sickness start?
Answer: No fixed time. It may start early as well as late. Round from first to the 6th week is the normal time. Few women have seen it as early as the 1st week.
3) How long does morning sickness last?
Answer: It may last a few days or a few weeks. Generally, goes away after 4 weeks.
4) What does morning sickness feel like?
Answer: It feels like you are motion sick. You simply feel sick, vomiting or nausea.
5) When does morning sickness end?
Answer: No exact end times. Generally improvement starts after the first few weeks. In some rare cases may last up to 14 weeks or even later.
6) What causes morning sickness?
Answer: No exact cause known. It may be due to the rising levels of hormones. Common triggers are spicy or sharp smelling food, empty stomach or being too full at one time.
7) When do you get morning sickness?
Answer: It has been associated with pregnancy. Any sickness other than pregnancy is generally not referred to as morning sickness. | <urn:uuid:25c48a96-8e08-442b-af49-c03f805bda5c> | CC-MAIN-2017-26 | https://www.peashealth.com/morning-sickness-causes-symptoms-relief/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00033.warc.gz | en | 0.97126 | 1,445 | 3.3125 | 3 |
My top margin is missing
When you open a document, is the insertion point at the top left corner of the page, as if there were no top margin?
If you're reading the document in Print Layout view and all of the pages appear to be cut off, with no top or bottom margin, the option for hiding white space between pages has been turned on.
If the top and bottom margins are not showing, you can restore them by pointing and clicking in the document, or by using the View tab.
To use the View tab to show white space between pages, do the following:
- On the View tab, in the Document Views group, click Print Layout.
- Click the Microsoft Office Button , and then click Word Options.
- Click Display.
- Under Page display options, select the Show white space between pages in Print Layout view check box. | <urn:uuid:4b456159-3bcc-48b1-98e3-81545f11b515> | CC-MAIN-2017-26 | https://bod.zendesk.com/hc/en-us/articles/206742076-Missing-Top-Margin-Word-2007- | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00114.warc.gz | en | 0.848714 | 179 | 2.515625 | 3 |
These poems also helped to inspire our original poem. That I, whose experience of teaching is extremely limited, should presume to discuss education is a matter, surely, that calls for no apology. Note: The program has been completely rewritten (version 5.0 on) to make the report writing process faster and easier. At this age, one readily memorizes the shapes and appearances of things; one likes to recite the number-plates of cars; one rejoices in the chanting of rhymes and the rumble and thunder of unintelligible polysyllables; one enjoys the mere accumulation of things.
From 1967-74, he taught instrumental music in Beloit, Wisconsin Public Schools. STAAR RELEASED TEST: State of Texas Assessments of Academic Readiness Sample STAAR Reading, Language Arts, Math and Science Test Grade 3, 4, 5, 6, 7 and 8. Visit the Athletics link for information. The book includes many different kinds of short poems, from the silly “Dressing Too Quickly” to “The No-No Bird” about a child’s tantrum. Music Learning Theory is an explanation of how we learn music.
We didn't have a good experience with it ourselves. The Pert age, which follows upon this (and, naturally, overlaps it to some extent), is characterized by contradicting, answering back, liking to "catch people out" (especially one's elders); and by the propounding of conundrums. These rhythms enable poets to examine rhythmic patterns and express these in commonly understood terms. Her practical yet motivational ideas for teaching writing make her a favorite among teachers.
Well into the 1920s, rhyme-time occupied an important place in New York City public schools. But observe: it is not the way in which a trained craftsman will go about to teach himself a new medium. After receiving his Bachelor of Music from George Mason University, he taught instrumental music in the Fairfax County Public Schools and performed as a pianist in the Washington, DC area. Stay afterwards for a piece of wedding cake.
Remember, even the most seasoned academic veterans have had to learn how to write a research paper at some point in their career. You'll also find easy songs to familiar tunes to help your child practice hearing and making the sounds in a fun way. Classic poetry and rhetoric give kids a language, at once subtle and copious, in which to articulate their own thoughts, perceptions, and inchoate feelings. When she began making art that visually represents ASL through themes of music, everything changed.
Whether these items work or not is up for debate. Grading Option: OP Transfer: CSU Development and presentation of advanced topics in Early Childhood Development. Their energy is devoted to understanding, and they have good command and use of the various comprehension strategies. Finally she sent us away to live with her sister up in northern Michigan just so my mother couldn’t see that man anymore. We then go into the safe house to hide for the day and wait until the night so that we can begin traveling again.
But they treated the plots and wording of the originals freely. The term "eye" may give the reader the idea that the sun is kind of like a conscious being, since conscious beings have eyes for purposes of perceiving the world; what a thing "sees" it can presumable think about in a conscious way. Some valuing those of their own, Side or Mind, Still make themselves the measure of Mankind; Fondly we think we honour Merit then, When we but praise Our selves in Other Men. Description: 10 Fast Facts on the Constitution The U.
Without proper rendering support, you may see question marks, boxes, or other symbols instead of Hebrew letters. Spicy Kraig belongs, pay-station cures neighbours disruptively. Languagepoor families are likely to use fewer different words in their everyday conversations and the language environment is more likely to be controlling and punitive.3 Exposure to less common, more sophisticated vocabulary (rare words) at home relates directly to children's vocabulary acquisition.
Thus, if your thought is concentrated upon one thing--say, the point of a needle--it is located there in the sense that it is not elsewhere; but although it is "there," it occupies no space there, and there is nothing to prevent an infinite number of different people's thoughts being concentrated upon the same needle-point at the same time. A nameless youth adrift in the world at the mercy of images and metaphors. The first epics are associated strongly with preliterate societies and oral poetic traditions.
Watch Kim talk about ASL, the power of interpreters, and her interaction with sound and language as a Deaf person below. To conduct applied research that will have an immediate impact on policy and practices related to literacy instruction in Florida. Somebody else whom people mention in regard to your work is Russell Edson. Over the course of the next few months, I engaged on a fun learning and writing project that took physics principles and facts and applied them to poetry. They organize instruction so that students are the producers, not just the consumers, of knowledge. | <urn:uuid:fb726565-fa41-48ce-bd4d-3f9e9a39b383> | CC-MAIN-2017-26 | http://ecofreshcarpets.com/books/category/poetry/page/2 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00274.warc.gz | en | 0.950431 | 1,054 | 2.6875 | 3 |
The inertial guidance system was a technological component of a starship that measured the distance traveled and automatically adjusted the course of a ship. When the system malfunctioned, the course adjustments were done manually.
Aboard Galaxy-class starships, information from this component could be downloaded to and accessed from the operations station on the bridge. This information could be later confirmed on the Conn console.
In early 2365, while the USS Enterprise-D was attempting to leave the void in the Morgana Quadrant for the Cornelian system, Lieutenant Commander Data reported that the inertial guidance system showed that seven parsecs had been traveled. Acting Ensign Wesley Crusher confirmed what Data had reported. (TNG: "Where Silence Has Lease") | <urn:uuid:a4e4814d-c56a-4bb5-9dbd-98469138c0f6> | CC-MAIN-2017-26 | http://memory-alpha.wikia.com/wiki/Inertial_guidance_system | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00274.warc.gz | en | 0.959058 | 149 | 2.75 | 3 |
In what ways has knowledge of child development and parental involvement changed over time? How does parenting style influence child development and behavior? What can parents and educators do to promote positive self-concepts in children? Provide examples.
I will certainly assist you in completing your request.
Knowledge of Child Development and Parental Involvement
The following resource was helpful in thinking through the issues surrounding the above:
Lowe, Roy. (2009). Childhood Through the Ages. An Introduction to Early Childhood Studies. Chapter 2. Maynard & Thomas.
I attached it below for your reference.
Lowe refers to two pioneers of childhood development who have documented that up to the seventeenth century (the Middle Ages), children were understood to be small adults and thus their nurturing and care was either non-existent and/or not understood to be necessary.
Children were raised to be a contributive part of the workforce.
Even before this period, the medieval period did not record age thus there wasn't any established definition for childhood which means that children were forced into adulthood at a young age.
Refer to page 22 of the article for more detailed information.
Children were, least to say, brutally treated and exploited needing parental care later in their adulthood because, if they lived into adulthood, they were not socially and personally developed.
According to Aries (in the article), it wasn't until the eighteenth century that "childhood" was recognized as a stage of development.
To give you a more recent example, the twentieth century consisted of many changes in childhood development and parental involvement. To take the issue of breastfeeding, for example, when the industrial society began to produce formula, society, in-turn, began to promote formula feeding rather than breastfeeding. Over the century, womens' breasts were viewed as a sexual ...
This solution will assist the student in discussing how child development and parental involvement has changed over time, whether parenting styles influence child development, and examples of how parents and educators and promote positive self-concepts in children. 1114 words with references. | <urn:uuid:f704d22e-0af4-4fed-b459-361a66fe291b> | CC-MAIN-2017-26 | https://brainmass.com/sociology/family-childhood/child-development-and-parental-involvement-574532 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00274.warc.gz | en | 0.963055 | 420 | 3.453125 | 3 |
| Most of this page uses content from Wikipedia. The original article was at Devnull. The page may have contained some inaccurate or outdated information, so please edit it so it contains better information.|
The list of authors can be seen in the page history. As with Malware Wiki, the text of Wikipedia is available under the Creative Common Attribution-ShareAlike 3.0 License.
Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information.
This worm, once the host has been compromised, downloads and executes a shell script from a web server. This script downloads a gzipped executable file named k.gz from the same address, and then decompresses and runs the file.
This downloaded file appears to be an IRC client. It connects to different channels and waits for commands to process on the infected host.
Then the worm checks for presence of the GCC compiler on the local system and, if found, creates a directory called .socket2. Next, it downloads a compressed file called devnull.tgz. After decompressing, two files are created: an ELF binary file called devnull and a source script file called sslx.c. The latter gets compiled into the ELF binary sslx.
The executable will scan for vulnerable hosts and use the compiled program to exploit a known OpenSSL vulnerability. | <urn:uuid:d6ee1a60-3ce5-49be-bd20-fd8d2d33cdb4> | CC-MAIN-2017-26 | http://malware.wikia.com/wiki/Devnull | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00434.warc.gz | en | 0.901189 | 285 | 2.71875 | 3 |
We treat children, teens and adults who are diagnosed with autism and other language, communication, behavioral and developmental disorders. We use the principles of Applied Behavior Analysis to decrease inappropriate behaviors while increasing functional skills. We frequently have parents of young newly diagnosed children ask us to explain applied behavior analysis and why it is necessary. Here it is in a nutshell…..
Applied Behavior Analysis (ABA) is the application of behavioral therapy to solve problems associated with autism such as language delays and extreme sensory and behaviorial challenges. It is not one procedure, or even a handful of procedures or therapeutic techniques. It is a scientific methodology and is the only proven discipline for successfully treating autism and other developmental disabilities. Early and intensive ABA is by far the most effective approach for establishing language, self-help skills, and reducing unwanted behaviors with children diagnosed with autism and other developmental disorders.
It has been described that Applied Behavior Analysts are analogous to physicians, who develop treatments for biological problems based on basic medical research. ABA is driven by data. Behavior, goals, and treatments are defined objectively and specifically. This results in reliable data to be collected and used in modifying treatment. Decisions about what treatment to use, and whether or not the treatment actually works, are dependent upon the analysis of this data. ABA therefore is a scientifically measurable approach to treating autism, and all conclusions are tied back to observable changes in behavior.
Over 40 years of research demonstrates that the techniques of applied behavior analysis are effective in creating and sustaining meaningful changes in the behavior of individuals. These techniques have been used to teach new classes of behavior (as in verbal and nonverbal communication, self-help skills, etc.), to reduce or eliminate classes of behavior (problem behavior such as self-injury, aggression, etc.), and to modify existing classes of behavior to better suit the individual’s environment. One of the most powerful and meaningful conclusions to be drawn from research in applied behavior analysis is that these techniques are extremely effective across clinical diagnoses, co-morbidities, level of functioning, race, gender, and socio-economic status.
- ABA therapy is individualized. Each individual’s behavior is analyzed and modified according to their specific needs and abilities. There is no treatment or strategy that will work with every person; applied behavior analysts therefore tailor treatment approaches and teaching strategies so that they are effective for that individual. Compare this aspect to most other psychological and pharmacological approaches that have been shown to produce average improvements in a group of people. These approaches are used with many individuals at once, even though it may not have the intended effects on many of the people within the group.
- Successful ABA treatment is a family affair. ABA involves parents, teachers, siblings and extended family members whenever possible to create and maintain an environment in which the child will speak on a day-to-day basis. The ultimate goal is to create and maintain a happy, stable and supportive family environment for the child and for all people involved.
Focus Areas of Behavior Intervention
ABA treatment is used to affect changes in the following area:
A. Communication – Ability to request items and/or activities in the natural environment necessary for his/her survival and well being (eating, drinking, sleeping, toileting, bathing, vocational, leisure)
B. Language Skils– Receptive and Expressive
- Receptive – Understanding spoken language and process all stimuli in order to efffectively function across a variety of environments.
- Expressive – Ability to communicate needs effectively.(ie. hunger, thirst, healthcare, etc).
C. Motor Skills
- Gross – Skills that involve the large muscle groups of the body necessary for coordination, speed, balance, etc. involving walking, sitting upright, standing, climbing, etc.
- Fine – Skills that involve the hands and fingers allowing a client to grasp and manipulate objects for skills such as feeding, drinking, toileting, writing, dressing, communication, etc.
- Oral – Skills that involve the mouth, tongue, teeth, etc. allowing a client to eat, drink, swallow, and communicate verbally.
D. Cognitive Abilities
- Life & Independent Living Skills – Ability to independently manage areas such as: feeding, drinking, dressing, toileting, hygiene, grooming and safety to name a few of the foundational skills
- Social and Behavior Skills – Build skills that allow a person to successfully improve the appropriate behaviors necessary to function in all environments from a health, well being and safety standpoint. And the ability to initiate and maintain quality relationship as well across a variety of environments. | <urn:uuid:de72104c-3bcc-4b58-8967-4abca3983177> | CC-MAIN-2017-26 | http://vistacba.com/what-is-applied-behavior-analysis-aba-and-why-does-it-work/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128322870.59/warc/CC-MAIN-20170628050821-20170628070821-00514.warc.gz | en | 0.93789 | 932 | 3.640625 | 4 |
HARRIET BEECHER STOWE
THE CHAMPION OF HUMAN LIBERTY
"Ah, dearer than the praise that stirs
The air to-day, our love is hers!
She needs no guaranty of fame
Whose own is linked with freedom's name."
THERE are few women in American history who have been so highly praised and so severely censured as Harriet Beecher Stowe. Mrs. Stowe was born in the year 1812, at Litchfield, Conn., just at a time when her father, Rev. Lyman Beecher, was rising into fame as a pulpit orator. As a girl she was active, conscientious and helpful. When grown she spent more or less of her time in teaching school. Later on in life she married the Rev. Calvin E. Stowe and entered upon her domestic duties with the same energy with which she took up all other duties of life, busying herself with her pen at odd moments.
She was never called beautiful, yet her large, dark eyes, and almost sad expression of countenance, show that the woman was no ordinary type. After- her marriage she moved near Boston. Here she had an opportunity to study the negro character. Here she also studied the system of slavery and its influence upon master and slave. Her heart was stirred with the tales of wrong and sorrow which she heard from those who had escaped from the land of bondage. The pent-up feelings of her heart at last found an outlet. She resolved to write and tell what she knew of the crimes and horrors of the slave system, in a book. "Uncle Tom's Cabin" took the public by storm. It first appeared in detached parts through the medium of a weekly newspaper. In April, 1852, it was issued in two volumes, and in May was republished in London. By the close of 1852 more than one million copies had been sold in America and England. The book has now been translated and published in French, German, Italian, Spanish, Dutch, Swedish, Flemish, Polish, Russian and other languages. These versions are to be found in the British Museum, in London. It has been dramatized in twenty different forms, and to-day, not only in America, but in every capital in Europe, its influence in stamping out the dark system of slavery, is beyond^all question. Mrs. Stowe uttered a voice for humanity and for God that will not soon die away, and in strength of description has never been surpassed.
Take for instance that part where Eliza, the slave mother, concealed in a closet, overhears a conversation between Mr. and Mrs. Shelby, and learns that her little son has been sold to a trader. "When the voices died in silence, she rose and crept stealthily away. Pale, shivering, with rigid features and compressed lips, she looked an entirely altered being from the soft and timid creature she had been hitherto. She moved cautiously along the entry, paused one moment at her mistress' door, raised her hands in mute appeal to heaven, and then turned and glided into her own room. It was a quiet, neat apartment on the same floor with her mistress. There was the pleasant sunny window, where she had often sat singing at her sewing; there a little case of books, and various little fancy articles arranged by them, the gifts of Christmas holidays; there was her simple wardrobe in the closet and in the drawers; here was, in short, her home; and, on the whole, a happy one it had been to'her. But there, on the bed, lay her slumbering boy, his long curls falling negligently around his unconscious face, his rosy mouth half open, his little fat hands thrown out over the bed clothes, and a smile spread like a sunbeam over his whole face. 'Poor boy, poor fellow,' said Eliza; 'they have sold you; but your mother will save you yet.' No tear dropped over that pillow; in such straits as these the heart has no tears to give—it drops only blood, bleeding itself away in silence."
Somewhat in advance of her pursuers, Eliza reached a village on the bank of the Ohio. Here, to her dismay, she found the river swollen to a flood, and filled with floating ice. She had been but a short time in the village tavern when "the whole train of her pursuers swept by the window, around to the front door. A thousand lives seemed to be concentrated in that one moment to Eliza. Her room opened by a side door to the river. She caught her child, and sprang down the steps toward it. The trader caught a full glimpse of her just as she was disappearing down the bank; and throwing himself from his horse, and calling loudly on Sam and Andy, he was after her like a hound after a deer. In that dizzy moment, her feet to her scarce seemed to touch the ground, and a moment brought her to the water's edge. Right on behind they came; and, nerved with strength such as God gives only to the desperate, with one wild cry and flying leap, she vaulted sheer over the turbid current by the shore, on to the raft of ice beyond. It was a desperate leap, impossible to anything but madness and despair. The huge, green fragment of ice on which she alighted pitched and creaked as her weight came on it; but she staid there not a moment. With wild cries and desperate energy she leaped to another and still another cake, stumbling, leaping, slipping, springing upward again. Her shoes are gone, her stockings cut from her feet, while blood marked every step; but she saw nothing, felt nothing, till dimly, as in a dream, she saw the Ohio side, and a man helping her up the bank."
Besides "Uncle Tom's Cabin" Mrs. Stowe wrote many other works, the most notable being "The Minister's Wooing," "Sunny Memories of Foreign Lands." and "Oldtown Folks." Mrs. Stowe passed away on the first of July, 1896, surrounded by friends in her pretty home at Hartford, Conn.
Excerpt from Leaders of the 19th Century by Evelyn Harriet Walker ©1900 | <urn:uuid:ca84391b-1458-4548-8005-119aa21cb900> | CC-MAIN-2017-26 | http://historicaltidbits.blogspot.com/2016/09/harriet-beecher-stowe.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00594.warc.gz | en | 0.984487 | 1,305 | 3.40625 | 3 |
In 1945, The Watson Scientific Computing Laboratory was founded at Columbia University in New York, New York. The renovated fraternity house on Manhattan's West Side was used as IBM's first laboratory devoted to pure science. The lab was the forerunner of IBM's Research Division, which today operates research facilities around the world.
In 1966, IBM researcher Robert H. Dennard invented Dynamic Random Access Memory (DRAM) cells, one-transistor memory cells that store each single bit of information as an electrical charge in an electronic circuit. The technology permits major increases in memory density and is widely adopted throughout the industry where it remains in widespread use today.
IBM has been a leading proponent of the Open Source Initiative, and began supporting Linux in 1998. The company invests billions of dollars in services and software based on Linux through the IBM Linux Technology Center, which includes over 300 Linux kernel developers. IBM has also released code under different open source licenses, such as the platform-independent software framework Eclipse (worth approximately US$40 million at the time of the donation), the three-sentence International Components for Unicode (ICU) license, and the Java-based relational database management system (RDBMS) Apache Derby. IBM's open source involvement has not been trouble-free, however (see SCO v. IBM). Famous inventions by IBM include the following:Automated teller machine (ATM) Floppy disk Hard disk drive Electronic keypunch Magnetic stripe card Virtual machine Scanning tunneling microscope Reduced instruction set computing Relational database Universal Product Code (UPC) Financial swap SABRE airline reservation system Dynamic Random Access Memory (DRAM) Watson artificial intelligence | <urn:uuid:8d35c08e-97a9-4f6d-bd77-b0596482ac50> | CC-MAIN-2017-26 | http://ibmss.blogspot.com/2013/07/research-and-inventions.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00594.warc.gz | en | 0.923934 | 336 | 3.25 | 3 |
At the Alaska Federation of Natives Convention in Fairbanks last month, Sealaska Heritage Institute presented a study addressing the possibility of changing the definition of "Alaska Native" with regard to taking marine mammals for food or art purposes.
"Determination of Alaska Native Status Under the Marine Mammal Protection Act" was prepared by the institute's maritime anthropologist, Steve J. Langdon, with funding from several Native corporate and nonprofit groups. A news release from the institute said it "brings to light data that might alarm some sectors of the Native community, because findings indicate among other things that the proportion of the Alaska Native population becoming ineligible to hunt marine mammals under current agency enforcement policies is rising at an accelerating rate."
SHI President Rosita Worl was quoted in the press release as warning, "In some communities, especially around the Gulf of Alaska, there may be few individuals eligible to hunt or utilize marine mammals in the not too distant future."
That hypothetical situation might take another hundred years to come about. But in the 21st century, with intermarriage and out-migration an increasing fact of life, it could happen sooner rather than later.
With no eligible individuals to harvest marine mammals for subsistence food and other uses, the amount of ivory, bone and fur media used to create traditional and contemporary Alaska Native art would dry up. In addition, so would the number of people who would be legally allowed to work with such material. That would wipe out one of the unique aspects of the Alaska art market.
Art and craftwork made from marine mammals constitutes a major income source for many rural communities, the study says, noting that for some households it is the "primary means of obtaining cash."
"Marine mammals are an extremely important component of Alaska Native life," especially as a food source, Langdon writes. He cites Alaska Department of Fish and Game numbers that report the statewide average of marine mammal consumption in rural areas to be roughly 40 pounds per person per year. In addition to supplying food, the animals are used to make clothing, tools, family-use items and ceremonial regalia.
"Rich cultural traditions of dance, song, myth, ceremony, and ritual have been created by Alaska Natives as key parts in their expression of identity, heritage, and artistic expression," Langdon writes. "The relationship between Alaska Natives and marine mammals is one of great time depth, deep emotion, and profound integration."
Blood quantum requirement
At issue is the long-established, some say antiquated, concept of "blood quantum," the percentage of one's ancestors who are documented as "full-blood" Native Americans. Different federal agencies use different criteria to determine who is an Alaska Native. Applicants to the Bureau of Indian Affairs who can demonstrate Alaska Native ancestry are eligible for services regardless of blood quantum, the press release noted.
However, the Marine Mammal Protection Act uses a different definition, requiring a person to be "¼ degree or more Alaska Indian, Eskimo and/or Aleut blood or who was originally enrolled as an Alaska Native under the Alaska Native Claims Settlement Act" in order to harvest animals including seal, otter, walrus and whale or work with material from those animals.
The study states that the BIA registered "nearly 20,000 Alaska Natives of less than ¼ blood quantum" between 2006 and 2016. "In the coastal regions… the rate of newly enrolled Natives under ¼ blood quantum was nearly 30 percent." And in some regions around the Gulf of Alaska it reached nearly 60 percent.
"The data indicate that the proportion of the Alaska Native population falling below the ¼ blood quantum has been increasing for some time and that descendants of Alaska Natives living in regions in the Gulf of Alaska will be most prone to losing eligibility to hunt marine mammals in the future."
The study also noted that interviews with Alaska Natives revealed diverse opinions about how to address the situation. Some thought it was a good idea and others foresaw "unanticipated and detrimental outcomes."
SHI presented the study to AFN's Subsistence Committee, which requested it after the 2010 convention, without recommending any specific course of action. Worl stressed that the decision of whether to change or keep the status quo would be made by the Native community. | <urn:uuid:f5d1e099-8cd8-4628-9ab3-973152639602> | CC-MAIN-2017-26 | https://www.adn.com/alaska-news/2016/11/13/study-proportion-of-alaska-natives-allowed-to-hunt-marine-mammals-will-decrease-at-an-accelerating-rate/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319688.9/warc/CC-MAIN-20170622181155-20170622201155-00233.warc.gz | en | 0.943665 | 870 | 2.890625 | 3 |
The term Bulimia nervosa represents eating disorder. It is a condition in a person binges and purges and may consume a lot of food during one time and then try to get rid ofthe food by using laxatives, vomiting or sometimes by means of over exercising. People with this disorder have an extreme fear of gaining weight and have a distorted view of their body size and shape. Due to this, they can’t maintain a stable body weight. They hardly eat and the small amount of food that they eat becomes an obsession.
Health tips- Signs & Symptoms of Bulimia Nervosa
Ø Binge eating of foods rich in carbohydrates
Ø Unstable Body weight
Ø Loss of control over eating
Ø Constipation, nausea, diarrhea, abdominal pain, gas
Ø Irregular menstruation
Ø Going to bathroom during meals
Ø Sore throat , Bad breath
People who may develop this disorder are as follows:
· People with a lower self-esteem
· Middle-class women mainly college students and teenagers
· People having a family history of substance abuse and mood disorders
Treatment for this disorder
The most appropriate treatment for Bulimia Nervosa would be a combination of psychotherapy, medication and family therapy. The person with this disorder has to be actively involved in their treatment in order to be more successful in the treatment.
Nutritional tips that may help to reduce the symptoms:
· Drinking 1.5- 2.5 liters of filtered water every day.
· Avoid alcohol, caffeine and tobacco.
· Use protein rich sources like organic meat, eggs and vegetable protein shakes.
This aims at increasing muscle mass and preventing wastage. | <urn:uuid:ad8d8393-c573-4f8f-bb91-ec0977c3d2ef> | CC-MAIN-2017-26 | http://www.goodhealthtipsonline.com/2011/03/bulimia-nervosa.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320243.11/warc/CC-MAIN-20170624082900-20170624102900-00394.warc.gz | en | 0.950917 | 353 | 2.78125 | 3 |
- Brain Stroke at HealthSewak.com
- Corporate and Cyber Law update
- Depression a curable mental disorder at www.healthsewak.com
- Diabetes at www.HealthSewak.com
- free health camp at noida
- Healthy Diet
- Heart Attack at www.healthsewak.com
- Heart Attack Causes and Symptoms
- Heart Attack Diagnosis
- Heart Attack Treatments
- Lung Care at healthsewak.com
- Obsessive compulsive neurosis
- Risk Factors for Brain Stroke
- sleep apnea at www.healthsewak.com
- Sleep Apnea Sleep Disorder
- Wheat Allergy
It’s an important building block of a healthy diet. But of the three macronutrients in food — protein, fat, and carbohydrates — protein may be the one you know least about.
How Much Is Enough?
Protein requirements are complicated because the amount we need changes with age.
- Infants require about 10 grams a day.
- Teenage boys need up to 52 grams a day.
- Teenage girls need 46 grams a day.
- Adult men need about 56 grams a day.
- Adult women need about 46 grams a day.
One important exception is pregnant or lactating women. The recommended intake for them rises to 71 grams of protein a day.
Another way to look at protein requirements is as a percentage of calories. The Institute of Medicine recommends we get at least 10% and no more than 35% of calories from protein.
The Risks of Too Little Protein
That shortfall could mean trouble. Protein is important to many physiological functions from building and maintaining muscle and bone to keeping cells in good working order.
Recent studies suggest that protein makes a meal more satisfying, which in turn could help people maintain a healthy weight. Indeed, a 2005 study published in theAmerican Journal of Clinical Nutrition found that increasing protein from 15% to 30% of total calories — and reducing fat from 35% to 20% of calories — resulted in sustained weight loss.
Choosing the Healthiest Sources of Protein
A wide variety of foods — from meat, fish, and dairy to beans, whole grains, nuts, eggs, and vegetables — contain protein. A meat-eater can easily get all the protein he or she needs. But even vegetarians can meet their requirements if they choose with a little care.
How healthy a protein-rich food is typically depends on what else it contains. For example:
- Meat is one of the leading sources of protein in the American diet. Some meat is also loaded with saturated fat, which is unhealthy. The healthiest choice is lean meat low in saturated fat.
- Fish is an excellent source of protein and the oils contained in fish help protect against heart disease.
- Eggs are also abundant in protein, although they also contain dietary cholesterol — up to 185 mg for a large egg.
- Plants such as beans and nuts are a particularly wise choice for protein since so many Americans fall short on fiber. Both beans and nuts are rich in fiber and plant-based phytochemicals that may help lower heart disease and cancer risk.
|Food per 100 gram||Protein||Carbs||Fat||Calories|
|Almond Nuts||21.1g||6.9g||55.8g||2541kJ (614kcal)|
|Bread (wholemeal)||11.0g||39.1g||2.2g||935kJ (220kcal)|
|Cottage Cheese||12.2g||4.5g||1.5g||340kJ (80kcal)|
|Goji Berries||12.3g||57.7g||0.3g||1205kJ (285kcal)|
|Milk (Semi Skimmed)||3.6g||4.8g||1.8g||209kJ (50kcal)|
|Milk (Whole)||3.3g||4.7g||3.6g||268kJ (64kcal)|
|Peanut Butter (Crunchy)||24.9g||10.1g||50.2g||2452kJ|
|Pizza (Pepperoni)||11.4g||28.0g||11.1g||1085kJ (260kcal)|
|Porridge oats||11.0g||60g||8.0g||1500 kJ/ (356 kcal)|
|Rice (brown)||6.9g||74.0g||2.8g||1480kJ (350kcal)|
|soya beans||35.9g||14.8g||18.6g||1555kJ (375kcal)|
|Sunflower Seeds||23.4g||18.6g||47.5g||2475kJ (600kcal)|
Ankylosing spondylitis is a type of arthritis that affects the spine. Ankylosing spondylitis symptoms include pain and stiffness from the neck down to the lower back. The spine’s bones (vertebrae) may grow or fuse together, resulting in a rigid spine. These changes may be mild or severe, and may lead to a stooped-over posture. Early diagnosis and treatment helps control pain and stiffness and may reduce or prevent significant deformity.
What Are the Symptoms of Ankylosing Spondylitis?
The most common early symptoms of ankylosing spondylitis include:
- Pain and stiffness. Constant pain and stiffness in the low back, buttocks, and hips that continue for more than three months. Spondylitis often starts around the sacroiliac joints, where the sacrum (the lowest major part of the spine) joins the ilium bone of the pelvis in the lower back region.
- Bony fusion. Ankylosing spondylitis can cause an overgrowth of the bones, which may lead to abnormal joining of bones, called “bony fusion.” Fusion affecting bones of the neck, back, or hips may impair a person’s ability to perform routine activities. Fusion of the ribs to the spine or breastbone may limit a person’s ability to expand his or her chest when taking a deep breath.
- Pain in ligaments and tendons. Spondylitis also may affect some of the ligaments and tendons that attach to bones. Tendonitis (inflammation of the tendon) may cause pain and stiffness in the area behind or beneath the heel, such as the Achilles tendon at the back of the ankle.
Ankylosing spondylitis is a systemic disease, which means symptoms may not be limited to the joints. People with the condition also may have fever, fatigue, and loss of appetite. Eye inflammation (redness and pain) occurs in some people with spondylitis. In rare cases, lung and heart problems also may develop.
How Is Ankylosing Spondylitis Treated?
There is no cure for ankylosing spondylitis, but there are treatments that can reduce discomfort and improve function. The goals of treatment are to reduce pain and stiffness, maintain a good posture, prevent deformity, and preserve the ability to perform normal activities. When properly treated, people with ankylosing spondylitis may lead fairly normal lives. Under ideal circumstances, a team approach to treat spondylitis is recommended. Members of the treatment team typically include the patient, doctor, physical therapist, and occupational therapist. In patients with severe deformities, osteotomy and fusion can be done.
- Physical and occupational therapy. Early intervention with physical and occupational therapy is important to maintain function and minimize deformity.
- Exercise. A program of daily exercise helps reduce stiffness, strengthen the muscles around the joints and prevent or minimize the risk of disability. Deep breathing exercises may help keep the chest cage flexible. Swimming is an excellent form of exercise for people with ankylosing spondylitis.
- Medications. Certain drugs help provide relief from pain and stiffness, and allow patients to perform their exercises with minimal discomfort. Nonsteroidal anti-inflammatory drugs (NSAIDs) — such as ibuprofen, naproxen, and aspirin — are the most commonly used drugs for spondylitis treatment. In moderate to severe cases, other drugs may be added to the treatment regimen. Disease-modifying anitrheumatic drugs (DMARDs), such as methotrexate, can be used when NSAIDs alone are not enough to reduce the inflammation, stiffness, and pain. In addition, relatively new drugs called biologics — Enbrel (etanercept), Humira (adalimumab), Remicade (infliximab), and Simponi (golimumab) — have been FDA-approved for treating ankylosing spondylitis. Also, the antidepressant Cymbalta has been approved for chronic back pain as well. Steroid injections into the joint or tendon may be helpful in some cases.
- Surgery. Artificial joint replacement surgery may be a treatment option for some people with advanced joint disease affecting the hips or knees.
In addition, people with spondylitis are urged to not smoke or chew tobacco products because smoking aggravates the condition. Certainly, all of the other reasons why doctors discourage smoking also apply here as well.
People with spondylitis are encouraged to sleep on a firm mattress with the back straight. Placing large pillows under the head is discouraged, since it may promote neck fusion in the flexed position. Similarly, propping the legs up on pillows should be avoided because it may lead to hip or knee fusion in the bent position. Choose chairs, tables, and other work surfaces that will help avoid slumping or stooping. Armchairs are preferred over chairs without arms.
Since those with ankylosing spondylitis could easily hurt their rigid necks or backs, special care should be taken to avoid sudden impact, such as jumping or falling.
What is acute renal failure?
Acute renal failure (also called acute kidney injury) means that your kidneys have suddenly stopped working. Your kidneys remove waste products and help balance water and salt and other minerals (electrolytes) in your blood. When your kidneys stop working, waste products, fluids, and electrolytes build up in your body. This can cause problems that can be deadly.
What causes acute renal failure?
Acute renal failure has three main causes:
- A sudden, serious drop in blood flow to the kidneys. Heavy blood loss, an injury, or a bad infection called sepsis can reduce blood flow to the kidneys. Not enough fluid in the body (dehydration) also can harm the kidneys.
- Damage from some medicines, poisons, or infections. Most people don’t have any kidney problems from taking medicines. But people who have serious, long-term health problems are more likely than other people to have a kidney problem from medicines. Examples of medicines that can sometimes harm the kidneys include:
- A sudden blockage that stops urine from flowing out of the kidneys.Kidney stones, a tumor, an injury, or an enlarged prostate gland can cause a blockage.
You have a greater chance of getting acute renal failure if:
- You are an older adult.
- You have a long-term health problem such as kidney or liver disease, diabetes,high blood pressure, heart failure, or obesity.
- You are already very ill and are in the hospital or intensive care (ICU). Heart or belly surgery or a bone marrow transplant can make you more likely to havekidney failure.
What are the symptoms?
Symptoms of acute renal failure may include:
- Little or no urine when you urinate.
- Swelling, especially in your legs and feet.
- Not feeling like eating.
- Nausea and vomiting.
- Feeling confused, anxious and restless, or sleepy.
- Pain in the back just below the rib cage. This is called flank pain.
Some people may not have any symptoms. And for people who are already quite ill, the problem that’s causing the kidney failure may be causing other symptoms.
How is acute renal failure diagnosed?
Acute renal failure is most often diagnosed during a hospital stay for another cause. If you are already in the hospital, tests done for other problems may find your kidney failure. If you’re not in the hospital but have symptoms of kidney failure, your doctor will ask about your symptoms, what medicines you take, and what tests you have had. Your symptoms can help point to the cause of your kidney problem. Blood and urine tests can check how well your kidneys are working. A chemistry screen can show if you have normal levels of sodium (salt), potassium, and calcium. You may also have an ultrasound. This imaging test lets your doctor see a picture of your kidneys.
How is it treated?
Your doctor or a kidney specialist (nephrologist) will try to treat the problem that is causing your kidneys to fail. Treatment can vary widely, depending on the cause. For example, your doctor may need to restore blood flow to the kidneys, stop any medicines that may be causing the problem, or remove or bypass a blockage in the urinary tract. At the same time, the doctor will try to:
- Stop wastes from building up in your body. You may have dialysis. This treatment uses a machine to do the work of your kidneys until they recover. It will help you feel better.
- Prevent other problems. You may take antibiotics to prevent or treat infections. You also may take other medicines to get rid of extra fluid and keep your body’s minerals in balance.
You can help yourself heal by taking your medicines as your doctor tells you to. You also may need to follow a special diet to keep your kidneys from working too hard. You may need to limit sodium, potassium, and phosphorus. A dietitian can help you plan meals.
Does acute renal failure cause lasting problems?
About half the time, doctors can fix the problems that cause kidney failure, and the treatment takes a few days or weeks. These people’s kidneys will work well enough for them to live normal lives. But other people may have permanent kidney damage that leads to chronic kidney disease. A small number of them will need to have regular dialysis or a kidney transplant. Older people and those who are very sick from other health problems may not get better. People who die usually do so because of the health problem that caused their kidneys to fail.
Have sex when you’re ready
You may be afraid to resume sexual activity after a heart attack. But it’s not true that resuming sex after a heart attack can cause another heart attack, stroke, or sudden death. Talk with your doctor if you have any concerns. But you can resume sexual activity as soon as you feel ready for it.
Life After a Heart Attack
Many people survive heart attacks and live active, full lives. If you get help quickly, treatment can limit damage to your heart muscle. Less heart damage improves your chances for a better quality of life after a heart attack.
After a heart attack, you’ll need treatment for coronary heart disease (CHD). This will help prevent another heart attack. Your doctor may recommend:
- Lifestyle changes, such as following a healthy diet, being physically active, maintaining a healthy weight, and quitting smoking
- Medicines to control chest pain or discomfort, high blood cholesterol, high blood pressure, and your heart’s workload
- A cardiac rehabilitation program
If you find it hard to get your medicines or take them, talk with your doctor. Don’t stop taking medicines that can help you prevent another heart attack.
Returning to Normal Activities
After a heart attack, most people who don’t have chest pain or discomfort or other problems can safely return to most of their normal activities within a few weeks. Most can begin walking right away.
Sexual activity also can begin within a few weeks for most patients. Talk with your doctor about a safe schedule for returning to your normal routine.
If allowed by State law, driving usually can begin within a week for most patients who don’t have chest pain or discomfort or other problems. Each State has rules about driving a motor vehicle following a serious illness. People who have complications shouldn’t drive until their symptoms have been stable for a few weeks.
Anxiety and Depression After a Heart Attack
After a heart attack, many people worry about having another heart attack. Sometimes they feel depressed and have trouble adjusting to new lifestyle changes.
Talk about how you feel with your health care team. Talking to a professional counselor also can help. If you’re very depressed, your doctor may recommend medicines or other treatments that can improve your quality of life.
Joining a patient support group may help you adjust to life after a heart attack. You can see how other people who have the same symptoms have coped with them. Talk with your doctor about local support groups or check with an area medical center.
Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you.
Risk of a Repeat Heart Attack
Once you’ve had a heart attack, you’re at higher risk for another one. Knowing the difference between angina and a heart attack is important. Angina is chest pain that occurs in people who have CHD.
The pain from angina usually occurs after physical exertion and goes away in a few minutes when you rest or take medicine as directed.
The pain from a heart attack usually is more severe than the pain from angina. Heart attack pain doesn’t go away when you rest or take medicine.
If you don’t know whether your chest pain is angina or a heart attack, call 9–1–1.
The symptoms of a second heart attack may not be the same as those of a first heart attack. Don’t take a chance if you’re in doubt. Always call for help right away if you or someone else has heart attack symptoms.
Unfortunately, most heart attack victims wait 2 hours or more after their symptoms start before they seek medical help. This delay can result in lasting heart damage or death.
|Category of a person||Fasting Value||Post Prandial|
|Minimum Value||Maximum Value||Value 2 hours after consuming glucose|
|Normal||70||100||Less than 140|
|101||126||140 to 200|
|Established Diabetes||More than 126||–||More than 200|
* All values are in Milligrams | <urn:uuid:36a79c4a-db7d-4e6a-8781-c431996051f2> | CC-MAIN-2017-26 | https://anujforchange.wordpress.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320243.11/warc/CC-MAIN-20170624082900-20170624102900-00394.warc.gz | en | 0.912972 | 3,952 | 2.890625 | 3 |
Diabetes is spreading to epic proportions in the UK. It affects 3.2 million people, a figure which has doubled since 1996 and is expected to rise to five million by 2025.
Around 10 per cent of these people have type 1 diabetes, where the body can’t produce enough of the hormone insulin to convert carbohydrates to energy stores. This tends to be diagnosed in childhood, and is associated with the failure of the insulin-producing cells in the pancreas.
The other 90 per cent of people have type 2 diabetes, where the body either fails to produce enough insulin or is resistant to it. This has been shown to be associated with being overweight and is more common in middle-aged and older people. Despite this, the first cases in children were diagnosed in 2000 — a sad reflection of western diets and sedentary lifestyles.
All too often doctors find themselves battling the repercussions of poorly controlled diabetes. At its worst, you see 30-year-olds with foot amputations, blindness and kidney disease. The diabetes epidemic, affecting countries all over the world, has serious repercussions that are only reduced by good glucose control and early diagnosis. If not managed properly, diabetes can lead to an increased risk of heart attack, strokes, kidney disease, nerve damage, poor circulation, hearing loss, erectile dysfunction and blindness. Research from the University of Washington even suggests that high blood sugars are strongly related to increased risk of Alzheimer’s.
Researchers at Harvard suggest there are five ways to reduce your risk of diabetes: maintain a healthy weight; increase your levels of activity; stop smoking; drink moderate amounts of alcohol; and fine-tune your diet. For those already with the disease, it boils down to good control of these five things, attending check-ups and taking any medication you are prescribed.
A healthy diet is a proven weapon in the fight against diabetes. While we all know that eating more fruit and vegetables and less sugar and refined food is good for us, studies have also shown that some foods are particularly effective at actually lowering blood sugar. They include the ten foods on these pages.
Pumpkin Chinese researchers claim that chemicals in pumpkins helped regenerate damaged pancreatic cells that produce insulin in rats. Watch this space, and eat pumpkin in the meantime, as the chemical may eventually eliminate the need for insulin.
Green tea The traditional Chinese drink, thought to help ward off cancer and heart disease, also helps regulate blood sugar. The Journal of Agricultural and Food Chemistry says it ‘may be a simple, inexpensive means of preventing or retarding diabetes’.
Pomegranate Research from Israel suggests that drinking just one glass a day of the juice of the praised Middle Eastern fruit lowers the risk of atherosclerosis — which leads to cardiovascular disease and diabetes — without affecting blood sugar levels.
Cinnamon Research from Imperial College London suggests 2g of cinnamon a day decreases blood sugar by 8 per cent, and Californian research shows that it decreases cholesterol levels too. The spice has been used medicinally for over 5,000 years.
Garlic The US Department of Agriculture’s Human Nutrition Center suggests garlic can increase levels of insulin and lower blood sugar. An Indian study found the allicin in garlic combines with thiamine B vitamins to stimulate pancreatic insulin production.
Apples Two servings of whole fruit a week help reduce the risk of type 2 diabetes by 25 per cent. A Finnish team found men who ate foods high in quercetin, such as apples, onions, green leafy vegetables and berries, reduced their diabetes risk by 20 per cent.
Almonds Studies say 50g of almonds daily for women and 75g for men lowered diabetes risk. A report in the Journal of the American College of Nutrition found high almond intake increased insulin sensitivity and lowered cholesterol levels.
Dark chocolate According to Italian researchers, the flavonoids in dark chocolate help to counteract insulin insensitivity that is associated with type 2 diabetes. Eating 100g of dark chocolate a day accelerated the body’s metabolism of glucose.
Whole-fat dairy products High levels of trans-palmitoleic acid, found in whole-fat dairy products, have been shown to lower the risk of diabetes. Research in the Annals of Internal Medicine recommends three to five servings of whole-fat dairy products daily.
Brown rice, pasta and bread The fibre present in the whole grain content of brown bread, whole grain pasta and brown rice prolongs the digestion process so sugar is released over a longer period of time. According to Harvard researchers, decreasing the burden on insulin production by switching to brown rice could decrease the risk of diabetes by 36 per cent.
This article first appeared in the print edition of The Spectator magazine, dated 31 May 2014 | <urn:uuid:ebaaf923-fe88-4d53-b171-717bd41cc945> | CC-MAIN-2017-26 | https://health.spectator.co.uk/ten-foods-to-tackle-diabetes-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320243.11/warc/CC-MAIN-20170624082900-20170624102900-00394.warc.gz | en | 0.934791 | 964 | 3.34375 | 3 |
I have a question about sex in swimming pools and hot tubs. Will the chemicals deteriorate a condom? Also, can spermicide be used in water or will it be washed away? Please answer. Thank you.
Condoms aren't typically tested in pools or hot tubs, or with chemicals found in these hot, wet places. But even without testing underwater sex — whether in the pool, hot tub, ocean, lake, river, shower, or bath — isn't considered a safer sex option. Here's why:
- Hot tub or pool water does not kill or immobilize sperm; women who have sex with men can get pregnant in a hot tub.
- Sexually transmitted infections (STIs) can be passed between sexual partners in a hot tub.
- Spermicide is likely to "wash off" or wash away in water.
- Water containing chemicals, salt, or bacteria can be forced into the vagina or rectum during sex, possibly causing irritation, infection, or temporary dryness.
- Since it's recommended to store latex condoms away from direct sunlight, it's possible that the heated water of a hot tub may have a similar effect in breaking down latex.
- Water can seep between the condom and the penis, possibly causing the condom to slip off.
- Oil-based products that come off in water — such as sun screen, lotion, shampoo, conditioner, and soap — and possibly even chlorine can cause latex condoms to deteriorate.
Of course, using a condom in a pool or hot tub or other body of water is better than not using one at all, but it's effectiveness may be seriously compromised. Rather than springing for a roll in the tub, you may want to consider the hot tub as a location for relaxing pre- or post-action.Alice! | <urn:uuid:4f870811-d837-4cd7-9ab6-edd0f982fc37> | CC-MAIN-2017-26 | http://goaskalice.columbia.edu/answered-questions/safer-sex-possible-swimming-pool-or-hot-tub | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00474.warc.gz | en | 0.943506 | 374 | 2.53125 | 3 |
Psychoactive drugs have a history of influencing some of the world’s greatest writers, artists and musicians. Both the high and the art we create from this experience ARE unique to each person, and can be as much of a hindrance as a help.
Certain drugs have the capacity to alter one’s consciousness, or mental state. Drugs that affect the mind in this way are termed psychoactive, psychotropic, or psycho pharmaceuticals. Some of these drug types are perfectly legal, such as alcohol, caffeine and nicotine. Others require a prescription and are useful in treating neuropsychiatric disorders. Still, other types such as cocaine, MDMA, and marijuana are prohibited in many countries. Psychoactive drugs, while having obvious dangers, are used by some creatives to inspire works of art. The use of all kinds of drugs to influence creativity is a widely known, if kept quiet, aspect of our creative world. From the belief that Paleolithic stone art was created under the influence of natural hallucinogens and the interest in the effects of alcohol on a writer’s creative process, to the psychedelic 50s and 60s counterculture – drugs have been used to influence our creative licence for centuries.
Psychoactive drugs work by acting as chemical messengers that bind to receptors on brain cells. Brain cells communicate with each other by sending chemical messages. Taking a psychoactive drug modifies the messages sent between cells, causing changes in neural activity. Changing the brain’s cellular activity in this way gives rise to the alternate mental states experienced in a drug induced high.
However, this high is distinctly different for each drug. Stimulants, such as MDMA, create an almost surreal, faster-running world and a heightened sense of connection and affection to those around you. Psychedelics like LSD can alter the user’s perception of time and place, often sparking a desire for deep discussion amidst the hallucinogenic effects of brighter colours, lights and patterns. Depressants such as alcohol and cannabis are known to create a slow, content association with the world around them, and opiates (heroin and methadone) can produce feelings of euphoria, invincibility and reality distortion. The nature of human individuality means that each person’s experience with each drug can be vastly different from one use to the next - and therefore, so can the art we produce.
Throughout history, artists, musicians and writers have attributed many of their works to their experience with psychoactive drugs. Pablo Picasso’s cubism movement has been linked with his frequent, yet short-lived, opium smoking. Many musicians such as The Beatles, Keith Richards and Janis Joplin credit LSD, heroin and marijuana use with a large portion of their musical success. Ken Kesey authored One Flew Over the Cuckoo’s Nest while volunteering for the US military’s MKULTRA program, and Hunter S Thompson (Fear and Loathing in Las Vegas, Hell’s Angels) became known for producing all of his writing while under the influence of psychoactive drugs.
Many creatives claimed that using these drugs was liberating, and provided inward insight that was otherwise restricted. Aldous Huxley, author of Doors of Perception, says that in using the drug as a reference for his writing he was able to have a stronger insight into the people around him, and into his own life. Hunter S Thompson is most famously quoted saying that while he wouldn’t like to advocate the use of drugs or alcohol to anyone, “they’ve always worked for me”. This isn’t the same for all, however. Melbourne-based artist Shane* told Lateral that while he admits to and is inspired by the enlightening properties of most psychoactives, “for the most part taking drugs is a hindrance to making art in the same way it would be to doing any other work, or driving”. Two other Melbourne-based artists and one writer also spoke to Lateral, detailing how the use of certain drugs have influenced, or hindered, their creative process.
“When I'm looking to ketamine or MDMA for creativity, they're a means to the same end. I'm a writer, so what I borrow from most are my experiences. When trying to reflect on either my own or my character's standing in any setting, culture or time, perching on the outside and peering in with a stripped ego is incredibly powerful. For me, ketamine and MDMA allow this.
"A huge element of the writing process is exploring your perspective, and your experiences with other perspectives, whether they're ones you've lived or ones you've created. A massive part of this exploration is human connection and observation. MDMA takes away a lot of the difficulties people can face when empathising, and allows you to connect to the primal throb of human energy. Personally, it’s not just that I'm more loving, more positive, more sensitive through MDMA, it's that my ego — that is my self-belief of my own identity within the culture that I have been brought up in — is less important to me. I feel that if I am with others that also feel this way, then the interactions that we have tend to be more genuine and honest. You can discuss and unpack fears or existential threats without the same emotional, fight or flight chemical impulses as you would normally, inhibitions are down and the intricacies of nature really open up. These kinds of experiences can be instrumental in living and are such a nourishing addition to the pool of experiences that writers draw from to create."
"Ketamine is a little different. With small amounts of ketamine, thinking outside-the-box is now your inside-the-box — and that box is a hypercube. Things like scale, size and imagination are no problem and that can only be good for creativity. When these things come with ease, unpacking big concepts or empathising with specific character's motivations is a much simpler process, because you are no longer restrained to just your body. You can close your eyes, transport yourself inside your imagination and play it out vividly. At higher dosages, though, keyboards, hands and the English language are none of your concern. Ketamine does all the ego-stripping that MDMA does, but at levels that can be completely shattering to your concept of reality.
These are experiences that will make you live and act differently, let alone write and create.”
“There are two polarising reactions I have creatively when smoking marijuana. The first is a total repression, an inability to gather the focus necessary for getting my art supplies together, let alone creating and perfecting a piece. These tend to annoy me a lot and I’ll lay off the drug altogether out of sheer frustration. The other is the complete opposite, where the drug enables me to release all of the distractions and stresses and form a single minded focus.
"Such successful interactions tend to only happen if I am in a state of high energy and mental activity to begin with, for example after an extremely stressful or emotional day I can settle myself in for an art session and use weed to unstick myself from the day and sink into that whirlwind of creative spirit that we all find sometimes. The result is my sinking into an almost meditative state, where I’ll remain for several hours and produce things that have been some of my best and most innovative. I once sat for almost six hours sculpting with polymer clay and created two pieces that I still have and love today. I also painted one of my most emotive pieces which I am still being asked to sell on a regular basis. Marijuana is not responsible for all of my best works, but definitely a proportion of them."
"One of the never-ending restrictions on my ability to create is the pressure and stress I put myself under to create perfect, breathtaking pieces every time I sit down. It allows me to make mistakes and create things that are (there’s no better word for it) hideous, and not become frustrated or discouraged. It allows me to make pieces that I might think trite or simple when sober. It becomes this strange suspension of being, in which there is no real perception of time or space, just the floating state of pure creativity. I have experienced times where I have sculpted or painted for hours on end without realising how hungry, tired or uncomfortable I was. I have finished a piece and gone to stand up and fallen flat on my face because my legs were completely asleep. The total immersion in your creation is the most wonderful feeling in the world, and I am always so happy when it happens.
"So in interpreting the effect of marijuana on my art, I really think it is simply a way of removing my analytical and critical mind from the creative, and allowing it more free range during the creative process. The trance-like creative sessions that my best works have risen from do not require marijuana, and they happen often on their own. Marijuana is just a good way of helping me reach that stage when I am feeling particularly blocked by everyday life.
By using it, though, I have to accept the risk that it could go the other way and I’ll end up pinned to the bed watching Star Trek without a single thought in my head.”
“Painting and creating artwork while under the influence of a mind altering substance can be a deep, emotional and meditative experience. It can help reduce hesitancy and doubt while painting (that worrying feeling of screwing up your work) and instead just going with the flow. It helps release a constant feeling of creativity, inspiration and curiosity. This allows me to make unstudied decisions of where colours are going, taking risks with only reward - in turn creating more unique and fascinating artworks. Its an amazing feeling to follow a brush around the canvas with no outside thoughts and distractions, only focusing on the present moment of creation."
"My experience with acid and creating art was quite interesting. It felt as though I had been completely infatuated with the act of drawing. I noticed I was really drawn into small details and abstractions of the sketches, and spent a long time on finishing them. I also noticed the style of these sketches was completely different to something I would usually draw. It felt like I was simply just playing with the pen and making marks on the paper, not taking much interest in the aesthetics of the final drawing as a whole. Though the next day, when sober, they all looked weird.”
The history of illicit drugs is not always this open-minded and creative, however, and it can be an incredibly dangerous game. But when we stop to consider the calibre of works produced as a direct result of drug use, the influence of psychoactive drugs may allow some artists to achieve something raw and unique.
*Names have been changed.
Edited by Nicola McCaskill and Jack Scanlan, and supported by Damo Camilleri. | <urn:uuid:51214b9f-1c95-45f9-be9d-d4609246dee8> | CC-MAIN-2017-26 | http://www.lateralmag.com/articles/issue-10/high-art | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320395.62/warc/CC-MAIN-20170625032210-20170625052210-00474.warc.gz | en | 0.961636 | 2,258 | 2.71875 | 3 |
BEER-SHEVA, Israel, Jan. 4 (UPI) -- Data from smartphone traffic apps can help prevent traffic crashes by helping deploy police resources at the most accident-prone areas, Israeli researchers say.
Researchers at Ben-Gurion University of the Negev say data from geosocial networks like the Global Positioning System traffic app Waze can identify locations where collisions occur most frequently.
Waze, with a reported 30 million worldwide users, records location data and enables users to upload and share comments on traffic alerts, collisions or police presence.
"Only now are we beginning to discover the potential in the huge amount of data collected daily," BGU researcher Michael Fire said. "Studies of this kind, which monitor events such as traffic accidents over time, can help the police identify dangerous sections of roads in real time, or alternatively, locations where few police are needed."
Researchers using Waze data in conjunction with Google Earth were able to determine that of the locations in Israel with the highest number of collisions, three-quarters were intersections.
Waze data on police presence allowed them to determine whether the police were present at the spots that had the worst traffic accidents.
"There were numerous instances where the police were manning quieter intersections, while busier intersections went unmonitored," Fire said. "According to the data, police response time varied from 20 minutes to 40 minutes in some situations." | <urn:uuid:853d525b-ed8a-4ee6-a989-e53378cdd178> | CC-MAIN-2017-26 | http://www.upi.com/Science_News/2013/01/04/Study-Smartphone-data-could-cut-crashes/UPI-37681357344168/?spt=hs&or=sn | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320841.35/warc/CC-MAIN-20170626170406-20170626190406-00634.warc.gz | en | 0.948053 | 287 | 2.609375 | 3 |
The Tescari Dominion is a strong centralized state at the center of the continent, east of the Disputed Lands and north of Aethon.
Most of the land within the Tescari Dominion is arid, and uninhabitable. For this reason, many of the Tescari live below ground in an elaborate natural cave system.
Early Tescari history was marked by frequent warfare over the narrow strips of arable land on either side of the River Brecclain. Given the harsh climate of their land, both space and food were at a premium, making control of these tracts essential to survival.
Throughout much of their early history, the Tescari to the west of the River Brecclain were vassals of their more powerful neighbor, the Uthraian Empire.
The discovery of the great caves was a landmark event in the history of the Tescari people. The caves were discovered in the decades after the Rift with the aid of the surviving Uthraian mages. After their discovery, a great project was undertaken to make the caves inhabitable for the growing Tescari population.
The cave system is home to the current Tescari capital Ard Tescar. Scholars speculate the caves were formed via seismic activity resulting from the the Rift.
Much of the existing cave system was shaped and refined by Casters. Indeed, much of the architecture, especially in Ard Tescar, could only have been built with the assistance of Sae.
The entrances to the caves are closely guarded and highly fortified. All foreigners, with the exception of diplomats and the most trusted merchants, are denied entry.
The discovery of the great caves marked a dramatic shift in Tescari culture, and a clear dichotomy emerged between the surface and cave dwelling Tescari.
Casters are cherished in Tescari culture, especially the great architects who sculpt great works of art and architecture from the living rock. Families who produce skilled casters gain much prestige. Over time, the bloodlines of these families have come to dominate the Tescari aristocracy.
The Tescari dominion is governed by a narrowly defined aristocratic oligarchy.
The Tescari capital is at Ard Tescar, the great underground city.
Given the easily defensible nature of the Tescari cave system, and the harsh conditions of the Tescari desert, the Tescari do not field large standing armies. Instead, the Tescari maintain many smaller, elite units, specializing in subterfuge and lightning fast raids. These commando forces often include specialized casters in their ranks. In situations where a larger army is required, the Tescari will often turn to their allies in the Free States for mercenaries. While the Tescari maintain considerable stockpiles of arms and armor underground, their citizens are only armed in cases of national emergency.
Tescari commanders are known for being clever and resourceful. Rather than engaging an enemy in direct conflict, they prefer to let nature do much of the work, harassing the enemy all the while. After the harsh rays of the desert sun have sapped their enemy of strength during the day, Tescari troops descend upon their enemies in the dead of night, sewing chaos. In particular, Tescari soldiers are trained to target the enemy's leadership, causing massive loss of morale.
The Tescari domains are rich with deposits of copper and tin. The Tescari are renowned for their working of bronze.
While the Tescari maintain farmsteads along the banks of the Brecclain, they have perfected the art of growing food underground without the aid of sunlight. They guard this knowledge closely.
Since the Tescari are landlocked, they maintain close ties with the Free City of Solith, which serves as a port for Tescari goods. The Tescari also maintain limited trade with the Noricans of Brecceleia, via trade routes along the River Breccelain.
Over the centuries, Tescari who dwell below ground have developed eyes with yellow irises. This is the result of their consumption of subterranean foods, as well as an adaptation to the lack of sunlight. When cave-dwelling Tescari surface, they typically wear veils or specialized glasses to mitigate the effects of the sun. | <urn:uuid:c0b33357-0ca9-49fa-999c-bda3d21874ee> | CC-MAIN-2017-26 | http://project-norica.wikia.com/wiki/Tescari_Dominion | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321410.90/warc/CC-MAIN-20170627115753-20170627135753-00714.warc.gz | en | 0.951754 | 882 | 2.59375 | 3 |
Articles, Books, Documents, Periodicals, Audio-Visual
Search the Library
Search the Directory
Your support makes our work possible. Please Donate Today
|The neutrality of this article is disputed. Please see the discussion on the talk page. Please do not remove this message until the dispute is resolved. (December 2007)|
The Coal Strike of 1902 was a strike by the United Mine Workers of America in the anthracite coal fields of eastern Pennsylvania. The strike threatened to shut down the winter fuel supply to all major cities (homes and apartments were heated with anthracite or "hard" coal because it had higher heat value and less smoke than "soft" or bituminous coal). President Theodore Roosevelt became involved and set up a fact-finding commission that suspended the strike. The strike never resumed, as the miners received more pay for fewer hours; the owners got a higher price for coal, and did not recognize the trade union as a bargaining agent. It was the first labor episode in which the federal government intervened as a neutral arbitrator.
The UMWA had won a sweeping victory in the 1897 strike by the soft-coal (bituminous coal) miners in the Midwest, winning significant wage increases and growing from 10,000 to 115,000. A number of small strikes took place in the anthracite district from 1899 to 1901, by which the union gained experience and unionized more workers. The 1899 strike in Nanticoke, Pennsylvania, demonstrated that the unions could win a strike directed against a subsidiary of one of the large railroads. It hoped to make similar gains in 1900, but found the operators, who had established an oligopoly through concentration of ownership after drastic fluctuations in the market for anthracite, to be far more determined opponents than it had anticipated. The owners refused to meet or to arbitrate with the union; the union struck on September 17, 1900, with results that surprised even the union, as miners of all different nationalities walked out in support of the union.
Republican Senator Mark Hanna, himself an owner of bituminous coal mines (not involved in the strike) sought to resolve the strike, coming less than two months before the presidential election. He worked through the National Civic Federation which brought labor and capital together. Relying on J. P. Morgan to convey his message to the industry that a strike would hurt the reelection of Republican William McKinley, Hanna was able to convince the owners to concede a wage increase and grievance procedure to the strikers. The industry refused, on the other hand, to formally recognize the UMWA as the representative of the workers. The union declared victory and dropped its demand for union recognition.
The issues that led to the strike of 1900 were just as pressing in 1902: the union wanted recognition and a degree of control over the industry. The industry, still smarting from its concessions in 1900, opposed any federal role. The 150,000 miners wanted their weekly pay envelope. Tens of millions of city dwellers needed coal to heat their homes.
John Mitchell, President of the UMWA, proposed mediation through the National Civic Federation, then a body of relatively progressive employers committed to collective as a means of resolving labor disputes. In the alternative, Mitchell proposed that a committee of eminent clergymen report on conditions in the coalfields. George Baer, President of the Philadelphia and Reading Railroad, one of the leading employers in the industry, brushed aside both proposals dismissively:
On May 12, 1902, the miners went out on strike. The maintenance employees, who had much steadier jobs and did not face the special dangers of underground work, walked out on June 2. The union had the support of roughly eighty percent of the workers in this area, or more than 100,000 strikers. Some 30,000 left the region, many headed for Midwestern bituminous mines; 10,000 returned to Europe. The strike soon produced threats of violence between the strikers on one side and strikebreakers, the Pennsylvania National Guard, local police and hired detective agencies on the other.
On June 8 President Theodore Roosevelt asked his Commissioner of Labor, Carroll D. Wright, to investigate the strike. Wright investigated and proposed reforms that acknowledged each side's position, recommending a nine hour day on an experimental basis and limited collective bargaining. Roosevelt chose not to release the report, for fear of appearing to side with the union.
The owners, for their part, refused to negotiate with the union. As George Baer wrote when urged to make concessions to the strikers and their union, the "rights and interests of the laboring man will be protected and cared forânot by the labor agitators, but by the Christian men to whom God in His infinite wisdom has given the control of the property interests of the country." The union used this letter to sway public opinion behind the strike.
Roosevelt wanted to intervene, but he was told by his Attorney General, Philander Knox, that he had no authority to do so. Mark Hanna and many others in the Republican Party were likewise concerned about the political implications if the strike dragged on into winter, when the need for anthracite was greatest. As Roosevelt told Hanna, "A coal famine in the winter is an ugly thing and I fear we shall see terrible suffering and grave disaster."
Roosevelt therefore convened a conference of representatives of government, labor, and management on October 3, 1902. The union considered the mere holding of a meeting to be tantamount to union recognition and took a conciliatory tone. The owners told Roosevelt that strikers had killed over 20 men and that he should use the power of government "to protect the man who wants to work, and his wife and children when at work." With proper protection they would produce enough coal to end the fuel shortage; they refused to enter into any negotiations with the union. The governor sent in the National Guard, who protected the mines and the minority of men still working.
Roosevelt attempted to persuade the union to end the strike with a promise that he would create a commission to study the causes of the strike and propose a solution, which Roosevelt promised to support with all of the authority of his office. Mitchell refused and his membership endorsed his decision by a nearly unanimous vote.
The economics of coal revolved around two factors: most of the cost of production was wages for miners, and if the supply fell the price would shoot up because in an age before oil and electricity, there were no good substitutes. Profits were low in 1902 because of an over supply; therefore the owners welcomed a moderately long strike. They had huge stockpiles which grew in value daily. It was illegal for the owners to conspire to shut down production, but not so if the miners went on strike. The owners welcomed the strike, but they adamantly refused to recognize the union, for then it would control the coal industry.
Roosevelt continued to try to build support for a mediated solution, persuading former President Grover Cleveland to join the commission he was creating. He also considered sending the U.S. Army to take over the coalfields.
J.P. Morgan, the dominant figure in American finance, had played a role in resolving the 1900 strike. He was deeply involved in this strike as well: his interests included the Reading Railroad, one of the largest employers of miners, and he had installed George Baer, who spoke for the industry throughout the strike, as the head of the railroad.
Now, at the urging of Secretary of War, Elihu Root, Morgan came up with another compromise proposal that provide for arbitration, while giving the industry the right to deny that it was bargaining with the union by directing that each employer and its employees communicate directly with the commission. The employers agreed on the condition that the five members be a military engineer, a mining engineer, a judge, an expert in the coal business, and an "eminent sociologist". The employers were willing to accept a union leader as the "eminent sociologist," so Roosevelt named E. E. Clark, head of the railway conductors' union, as the "eminent sociologist" and, after Catholics exerted pressure, added a sixth, Catholic bishop John Lancaster Spaulding, and Commissioner Wright as the seventh member.
The anthracite strike ended, after 163 days, on October 23, 1902. The commissioners began work the next day, then spent a week touring the coal regions. Wright used the staff of the Department of Labor to collect data about the cost of living in the coalfields.
The commissioners then held hearings over the next three months, taking testimony from 558 witnesses, including 240 for the striking miners, 153 for nonunion mineworkers, 154 for the operators and eleven called by the Commission itself. Baer made the closing arguments for the coal operators, while lawyer Clarence Darrow closed for the workers.
Although the commissioners heard some evidence of terrible conditions, they concluded that the "moving spectacle of horrors" represented only a small number of cases. By and large, social conditions in mine communities were found to be good, and miners were judged as only partly justified in their claim that annual earnings were not sufficient "to maintain an American standard of living."
Baer said in his closing arguments, "These men don't suffer. Why, hell, half of them don't even speak English". Darrow, for his part, summed up the pages of testimony of mistreatment he had obtained in the soaring rhetoric for which he was famous: "We are working for democracy, for humanity, for the future, for the day will come too late for us to see it or know it or receive its benefits, but which will come, and will remember our struggles, our triumphs, our defeats, and the words which we spake."
In the end, however, the rhetoric of both sides made little difference to the Commission, which split the difference between mineworkers and mine owners. The miners asked for 20% wage increases, and most were given a 10% increase. The miners had asked for an eight-hour day and were awarded a nine-hour day instead of the standard ten hours then prevailing. While the operators refused to recognize the United Mine Workers, they were required to agree to a six-man arbitration board, made up of equal numbers of labor and management representatives, with the power to settle labor disputes. Mitchell considered that de facto recognition and called it a victory.
Organized labor celebrated the outcome as a victory for the UMWA and unions generally. Membership in other unions soared, and moderate leaders gained more than the radical Socialists who denounced capitalism but were forced to the fringe of organized labor. Young John Mitchell proved his leadership skills and mastery of the problems of ethnic, skill, and regional divisions that had long plagued the union in the anthracite region. By contrast the Western Federation of Miners' strikes in the West often turned into full-scale warfare between strikers and both employers and the civil and military authorities. This strike was successfully mediated through the intervention of the federal government, which strove to provide a "Square Deal"âwhich Roosevelt took as the motto for his administrationâto both sides. The settlement was an important step in the Progressive era reforms of the decade that followed. There were no more major coal strikes until the 1920s.
This article is based on one or more articles in Wikipedia, with modifications and additional content contributed by
Connexions editors. This article, and any information from Wikipedia, is covered by a
Creative Commons Attribution-Sharealike 3.0 Unported License (CC-BY-SA) and the
GNU Free Documentation
We welcome your help in improving and expanding the content of Connexipedia articles, and in correcting errors. Connexipedia is not a wiki: please contact Connexions by email if you wish to contribute. We are also looking for contributors interested in writing articles on topics, persons, events and organizations related to social justice and the history of social change movements.
For more information contact Connexions | <urn:uuid:0f199a3b-8f88-4039-93c0-326e1f033103> | CC-MAIN-2017-26 | http://www.connexions.org/CxLibrary/Docs/CxP-Coal_Strike_of_1902.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321410.90/warc/CC-MAIN-20170627115753-20170627135753-00714.warc.gz | en | 0.974626 | 2,461 | 3.390625 | 3 |
Pathways out of Poverty in Western Kenya and the Role of Livestock
The objectives of the study were to obtain a better understanding of households' pathways into, and out of, poverty, with poverty defined from the communities' own perspective. The authors used a community-based methodology called the 'stages of progress' approach to assess household poverty dynamics in 20 communities and for over 1,700 households representing two different ethnic groups in Western Kenya. The proportion of households that had managed to escape poverty over the last 25 years was ascertained, as well as the proportion of households that had fallen into poverty during the same period. The major reasons for movements into or out of poverty were elicited at both the community and household-level, and in particular, the role that livestock play in the different pathways was examined. The results show considerable movement over the last 2½ decades by households in the study region both into and out of poverty, and the main reasons behind households' escape from poverty are completely different (i.e. not merely the opposite) from the reasons for descent into poverty, and hence have different policy implications in terms of what has been referred to as 'cargo net' versus 'safety net' interventions. Cargo nets help poor people climb out of poverty; safety nets stop people from falling into poverty. Redistributive programs to build up the assets of poor people (such as giving heifers to poor households) may be effective in achieving long-term reductions in chronic poverty, but will have to be complemented by safety net policies.
|Date of creation:||2004|
|Contact details of provider:|| Postal: Viale delle Terme di Caracalla, 00100 Rome|
Phone: +39(6) 57051
Fax: +39(6) 57053152
Web page: http://www.fao.org/ag/againfo/projects/en/pplpi/home.html
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Yamano, Takashi & Jayne, Thom S., 2002.
"Measuring the Impacts of Prime-Age Adult Death on Rural Households in Kenya,"
202675, Egerton University, Tegemeo Institute of Agricultural Policy and Development.
- Yamano, Takashi & Jayne, Thomas S. & McNeil, Melody Rebekah, 2003. "Measuring The Impacts Of Prime-Age Adult Death On Rural Households In Kenya," 2003 Annual Meeting, August 16-22, 2003, Durban, South Africa 25802, International Association of Agricultural Economists.
- Yamano, Takashi & Jayne, Thomas S., 2002. "Measuring The Impacts Of Prime-Age Adult Death On Rural Households In Kenya," Staff Papers 11632, Michigan State University, Department of Agricultural, Food, and Resource Economics.
- Yamano, Takashi & Jayne, Thomas S., 2002. "Measuring the Impacts of Prime-age Adult Death on Rural Households in Kenya," Food Security Collaborative Working Papers 55152, Michigan State University, Department of Agricultural, Food, and Resource Economics. | <urn:uuid:9debb2d6-8142-477f-99e4-9194812eb256> | CC-MAIN-2017-26 | https://ideas.repec.org/p/ags/faopwp/23779.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321410.90/warc/CC-MAIN-20170627115753-20170627135753-00714.warc.gz | en | 0.913137 | 686 | 2.515625 | 3 |
Our planet is home to around 1 million animal species that are familiar to us, and each one of these species is an amazing ancient biological code, that we are trying to break. There are so many things that we still need to learn, and there are so many speculations about things like dinosaur behaviors or communication among animals that live today. However, humans have managed to find out a lot of interesting facts about the rest of the animals that share this planet with us. So, we have made a list of Top 35 Unbelievable Facts About Animals You Probably Didn’t Know, as a tribute to all the scientists and biologists that have made it possible for us to learn something that we didn’t know about animals before. From extinct giant penguins to newly discovered species of wasps, these interesting facts reflect our curious nature and the will of our species to learn more about the world and the life around us. And speaking about the world around us, you can also check out our list of 20 Natural Phenomena You Won’t Believe Actually Exist, you might find it interesting.
So, without further ado, we present you the amazing and unbelievable facts about animals. Enjoy.
1. Immortal Jellyfish
Picture source: fiboni.com
A type of “immortal” jellyfish, the Turritopsis Nutricula, is capable of cheating death for ever. When she reaches the adult stage, this jellyfish can reverse the aging process and go back to the polyp stage. Once she is in that stage, it is like she is born again, and starts ageing and mating normally! She can repeat this process over and over again, and practically stay immortal. | <urn:uuid:d0ef5c79-f13b-42c1-b836-e4d3e567d65b> | CC-MAIN-2017-26 | http://www.ozar.com/top-35-unbelievable-facts-about-animals-you-probably-didnt-know/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323588.51/warc/CC-MAIN-20170628083538-20170628103538-00074.warc.gz | en | 0.952845 | 348 | 2.8125 | 3 |
This bust portrays one of American’s best-known cultural figures, Henry Wadsworth Longfellow (1807-82). Edmonia Lewis specialised in marble statues and busts, such as this one, executed in the neoclassical style. She is hailed as the first African-American woman to successfully develop a career as a professional sculptor.
Lewis spent the majority of her working life in Rome. She was part of a community of expatriate women artists who shared strong feminist and abolitionist views and sought to use their art to draw attention to these struggles. This ‘sisterhood’ centred around the sculptor Harriet Hosmer (1830-1908), and is also central to the history of art and homosexuality. This is not only because several members of the sisterhood lived in romantic relationships with other women, but because they also actively rejected heterosexual norms. Few of the group married and all were financially self-sufficient. They adopted masculine dress and demonstrated their physical prowess by undertaking the arduous task of marble carving without assistance. Lewis’s position in this group, and the lack of any known relationship with a man, has fuelled speculation about her sexuality.
On discovering that Longfellow was in Rome in 1869, Lewis went to remarkable lengths to portray him. She followed him around near his hotel so she could rough-out a portrait from memory and produce quick observational sketches, before inviting him for a formal sitting. His poetry, including the iconic ‘Song of Hiawatha’ (1855), significantly shaped popular Euro-American views of Native American culture. Longfellow’s description of the Native American people’s lives inspired Lewis, herself the daughter of a Native American (Chippewa) mother and an African American father. Longfellow’s earlier writing, including the poem ‘The Slave in the Dismal Swamp’ (1842), had also played a prominent part in the campaign for the abolition of slavery in America. Lewis’s earlier sculptures depicted scenes from Longfellow’s poetry and this portrait can be seen as the culmination of her admiration for him.
There is another version of this bust, also made by Lewis, in the collection of Harvard University in America. | <urn:uuid:5bb6b479-c371-41d2-8c43-5b15932b2aa7> | CC-MAIN-2017-26 | http://www.liverpoolmuseums.org.uk/collections/lgbt/activism-rights/feminism-sexuality/item-238114.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00154.warc.gz | en | 0.975841 | 467 | 3.40625 | 3 |
Intrauterine insemination (IUI), frequently called artificial insemination, is a fertility treatment where specially prepared sperm is inserted with a catheter into a woman’s uterus. The goal is to get as many sperm as possible near the fallopian tubes to increase the chances of fertilization and pregnancy.
Because it is less expensive and complicated than IVF, we typically start patients on several rounds of IUI before proceeding to assisted reproductive technologies.
The timing of the IUI is enhanced by the simultaneous use of fertility medications. Ovulation induction occurs with either pills (Clomid) or medication administered by injection (gonadotropins). Because these medications induce the female to ovulate multiple eggs, she must be carefully monitored with blood tests and ultrasounds. Once a surge in LH, luteinizing hormone, is detected, ovulation occurs 24-36 hours later and the IUI is timed to coincide.
Semen is prepared in the laboratory by separating the sperm cells from the seminal fluid, and placing the sperm in a sterile nutrient solution that is inserted directly into the uterus.
This procedure is used when there is a hostile cervical environment that impedes the sperm’s progress, when the sperm quantity and/or quality is suboptimal, or for unexplained infertility.
Prior to undergoing the Intrauterine Insemination (IUI) we specially prepare the semen sample used for this procedure in one of the following ways listed below.
Semen washing is a procedure in which a semen specimen is prepared for therapeutic insemination. The main purpose for washing semen is to remove the seminal plasma from the ejaculate and concentrate all of the sperm into a small volume for insemination into either the cervix or uterus.
Sperm isolation is a procedure in which the motile sperm is separated from the seminal plasma by using a special medium to isolate sperm from the seminal plasma. This procedure will usually produce a sample enriched with motile sperm and minimal particulate contamination. The specimen is then concentrated into a small volume for insemination into either the cervix or uterus.
Sperm freezing is a procedure in which a sperm sample is stored for later use using cryopreservation. Sperm is frozen in liquid nitrogen and most often thaws well. Conception rates are usually excellent. Using this procedure can guarantee the ready availability of semen required for any of our reproductive techniques where there may be an issue with co-location of the egg and semen when needed. | <urn:uuid:6b51894a-ec03-43bb-896e-b3e28ba2a87b> | CC-MAIN-2017-26 | http://www.westchesterfertility.com/basic-treatments/intrauterine-insemination-iui/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323864.76/warc/CC-MAIN-20170629033356-20170629053356-00154.warc.gz | en | 0.922372 | 508 | 2.875 | 3 |
Designed for introductory social foundations or multicultural education courses, this text offers a powerful model for cultural ecological analysis and pedagogy of responsibility, providing teachers and teacher educators with the information and classroom practices they need to help develop citizens who are prepared to support and achieve diverse, democratic, and sustainable societies in an increasingly globalized world.
"Authentic hope is the gift Rebecca Martusewicz, Jeff Edmundson, and John Lupinacci offer readers of EcoJustice Education [...]. We learn what it means to recover the ancient arts and skills of cultivating commons, common sense, and community collaborations in our hard times."
- Madhu Suri Prakash, Pennsylvania State University
"EcoJustice Education should become a core part of teacher education programs across the country as it provides both the theory and examples of classroom practices essential for making the transition to a sustainable future."
- C. A. Bowers, author, international speaker, and retired professor
1: Introduction: The Purposes of Education in an Age of Ecological Crises and Worldwide Insecurities
2: Rethinking Diversity and Democracy for Sustainable Communities
3: Cultural Foundations of the Crisis: A Cultural/ Ecological Analysis
4: Learning Androcentrism: Gender and Education
5: Learning our Place in the Social Hierarchy: An EcoJustice Approach to Class Inequality
6: Learning Racism: An EcoJustice Approach to Racial Inequality Co-authored by Gary Schnakenberg
7: Learning about Globalization: Education, Enclosures, and Resistance
8: Learning from Indigenous Communities
9: Teaching for the Commons: Educating for Diverse, Democratic, and Sustainable Communities
There are currently no reviews for this product. Be the first to review this product!
Rebecca A. Martusewicz is a teacher educator at Eastern Michigan University, where she has developed a concentration in EcoJustice Education for the Masters in Social Foundations program.
Jeff Edmundson directs the teacher licensure program at the University of Oregon and teaches courses in EcoJustice at the undergraduate and graduate level.
John Lupinacci is Adjunct Faculty at Eastern Michigan University, where he teaches pre-service teachers using an EcoJustice framework. He is a high school mathematics teacher and community activist in Detroit.
All three authors are active in EcoJustice Education, an international organization that includes the Center for EcoJustice Education offering faculty development workshops and the journal The EcoJustice Review: Educating for the Commons. | <urn:uuid:335c46e0-8a95-4c56-b528-2ecce13b8e2c> | CC-MAIN-2017-26 | http://www.nhbs.com/title/182887?title=ecojustice-education | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319902.52/warc/CC-MAIN-20170622201826-20170622221826-00513.warc.gz | en | 0.898015 | 507 | 2.71875 | 3 |
A radio engineer can hardly think about smaller amount of electromagnetic radiation than given by a single oscillation cycle of a unit charge in a dipole. When solved from Maxwell’s equations for a dipole of one wavelength, the energy of the emitted radiation cycle obtains the form E? = 2/3 hf, where the Planck constant h can be expressed in terms of the unit charge, e, the vacuum permeability,? 0, the velocity of light, c, and a numerical factor as h = 1.1049?2? 3 e 2? 0 c = 6.62607?10 34 kg?m 2 /s. A point emitter like an atom can be regarded as a dipole in the fourth dimension. The length of such dipole is measured in the direction of the line element cdt, which in one oscillation cycle means the length of one wavelength. For a dipole in the fourth dimension, three space directions are in the normal plane which eliminates the factor 2/3 from the energy expression thus leading to Planck’s equation E? = hf for the radiation emitted by a single electron transition in an atom. The expression of the Planck constant obtained from Maxwell’s equations leads to a purely numerical expression of the fine structure constant? = 1/(1.1049?4? 3) ~1/137 and shows that the Planck constant is directly proportional to the velocity of light. When applied to Balmer’s formula, the linkage of the Planck constant to the velocity of light shows, that the frequency of an atomic oscillator is directly proportional to the velocity of light. This implies that the velocity of light is observed as constant in local measurements. Such an interpretation makes it possible to convert relativistic spacetime with variable time coordinates into space with variable clock frequencies in universal time, and thus include relativistic phenomena in the framework of quantum mechanics.
Keywords: Photon, Maxwell’s equations, quantum of radiation, Planck’s equation, absolute time | <urn:uuid:76133daa-938a-46d9-ac8d-2fae23c05f72> | CC-MAIN-2017-26 | http://worldnpa.org/photon-the-minimum-dose-of-electromagnetic-radiation/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320070.48/warc/CC-MAIN-20170623151757-20170623171757-00594.warc.gz | en | 0.90002 | 419 | 3.859375 | 4 |
Another misconception held by many in both “rich” and “poor” countries is that the “rich” should go on making and using ever more goods and services, thereby “creating wealth” that can somehow find its way to the “poor” nations, making them “richer”.
The true picture is quite different.
Some nations, the so-called rich, actually have much higher throughput than others. We can call these nations the more perfluent. The word “rich” denotes possession of wealth while “affluent” denotes wealth flowing to. Perfluent denotes wealth flowing through, which is the point here.
If these more perfluent economies keep boosting their throughput, using wealth not only from within their own borders but from all over the world, then the throughput available to less perfluent nations is subject to restriction and reduction. Not only do these nations become no more perfluent as a result of the increasing perfluence of the others, they become less so.
In terms of actual wealth, many less perfluent nations, because of great resources contained within their borders, are wealthier than many of the more perfluent ones.
Transfer of wealth between rich and poor nations, called for by the less perfluent, is already taking place with great vigour, but in the opposite direction to that intended by the advocates of the transfer.
The resources wealth of the less perfluent nations is being transferred to feed the greater throughput stream of the more perfluent. Too much wealth is going to the latter in exchange for too little throughput.
An analogy may be drawn between the world today and, for example, Britain in the eighteenth century.
At that place and time, a fraction of the population commanded most of the throughput. They claimed a right to do so by birth and station, a right that was taken for granted by them and conceded by most of the rest of the people.
If members of the perfluent class had a change in circumstances that caused them to make do with one servant, a small mansion, and only their legs to get about with, they thought of themselves as suffering hardship, even though their situation was vastly better than members of the majority could hope to achieve.
More recently, a person in the more perfluent (“developed”) nations is categorised by their government as living below the poverty line if they earn less than a certain amount per annum, even though this might enable them to enjoy a level of consumption of goods and services far above what the majority of the world’s people can hope to aspire to. Far from being impoverished or deprived, the “poverty-line” dwellers in the most perfluent nations are members of the world’s aristocracy, the privileged class.
If disparities in material living standard among the world’s people can be reduced, this must be done by transferring throughput while slowing the transfer of actual wealth.
Rises in material living standards in more perfluent nations are in competition with such rises in the less perfluent, in the sense that both involve accelerated depletion of the world’s limited store of wealth. It is true that throughput in some places stimulates throughput in others, through the mechanism of trade and investment. Thus rises in throughput in more perfluent places would, in a hypothetical unlimited world, always be able to raise throughput in others, however far behind. This is one assumption on which economic policies the world over are currently based. It is assumed that people in more perfluent areas should go on consuming more and more and thus eventually drag even the least perfluent of the world’s people up to their level.
However, we do not live in an unlimited world but in a real, limited one, and material living standards must stabilise and, under present conditions, fall in more perfluent regions in order to give less perfluent countries a better chance of improving living standards. There’s no other way.
- Rapidly increasing consumption of oil over decades in the more perfluent world led to depletion of this non-renewable resource, thence to increases in oil prices that meant that less perfluent people had less access to oil. Not only does this directly reduce the availability of fuel, but in some places valuable agricultural land and vast areas of forest have been taken over for growing crops specifically for the purpose of providing alcohol fuel and ‘bio-diesel’ oil for motor vehicles.
- Overfishing to feed over-consumption in the more perfluent countries depletes the ocean’s fish resource, whose renewal rate depends, inter alia, on the size of stocks and makes this food scarcer and more expensive for others.
Other examples could be found.
People in less perfluent countries work harder in exchange for less spending power, that is command of goods and services, than those in more perfluent places. This is not due to any intrinsic inferiority of some people to others, bit rather to historical legacies and artificial circumstances that are probably unjust and certainly changeable.
Money flowing from one nation to another can transfer throughput under these conditions:
- If more money is demanded in exchange for the same unit of wealth. This happened with oil from 1973 onwards. It must happen with all other forms of wealth. Money represents throughput here, but of course the amount of throughput a unit of money represents falls over time. It is necessary for the money price rises to stay ahead of the rate of decrease in money value.
- If the money is a straight-out gift, or a loan that becomes a gift through default. Many countries in recent years have come dangerously close to defaulting on huge loans from international banks. The loans were initially arranged as a result of mistaken thinking by the borrowing governments.
Posts in this Series
- Review of 1988 edition of Economics for a Round Earth
- Ends and Means
- Evolution Not Revolution
- Notes on Evolution Not Revolution
- Concepts and Terms – What is ‘wealth’?
- The Throughput Chain
- The Derivatives of Wealth
- Global Inequalities in Wealth
- Economic Growth Redefined
- Misconceptions in Practice
- Borrowing to Invest to Get Rich
- Environment versus Economic Progress
- Digression: Pollution Red Herrings
- Digression: Depletion and Inflation
- Value Inflation – the Trigger, not the Bullet
- Living Standard and Quality of Life
- Digression: Resource Consumption, Jobs, and Hands Off
- When the Boom comes
- The Effect of People’s Expectations
- Hard Work – Virtue or Vice?
- Who needs the Snail Darter?
- More Dollars for Conservation?
- Non-renewable Resources – Leave Them in the Ground?
- Digression: Fast Breeder Nuclear Fission Reactors
- Minerals in National Parks – Leave Them in the Ground?
- Population and Wealth
- Left, Right and The Environment
- Digression: “So Long As We Profit, Costs Elsewhere Aren’t Our Problem”?
- Limits to Growth?
- Solar Energy – a Special Case
- The Solar-Powered Car
- Money Supply, Throughput and Inflation
- Real and Money Wages: Living Standards
- Digression: Caution about “Increases” and “Decreases”
- The Idea of Proportionate Flows Applied to Wages: the Great Depression
- Deficit Financing
- The Optimum Proportionate Flow Condition
- Digression: Thrift versus Spendthrift
- Digression: the Private Motor Car – a Basic Necessity?
- The Idea of Proportionate Flows Applied to Wages – the Stagflation of the 1970’s and 80’s
- Excessive Wages Can Cost Jobs
- Fight Unemployment or Inflation First?
- Digression: Work and Jobs
- Other “Job Creation” Schemes
- Visual and Noise Pollution
- Digression: Renewal and Recycling of Resources; Wages and Jobs
- Ratio Distortion and Consumption
- Aggregate Demand – Components and Internal Ratio
- The Slave Economy
- Employment and the Steady State
- Consumer-Led Recovery
- Interest Rates and Ratio Distortion
- Demographic Trends and Living Standards
- Digression: Bad Economics Good for Conservation?
- Coping with Aging Populations
- Stabilising the Human Population
- Costs – What Really Costs Us and What Doesn’t?
- Digression: Other Comments on Statements in UN Report
- Discussion of Costs Resumed
- Budget Balancing Methods – Cost or Gain?
- Digression: Government Expenditure – Government Employees
- Expenditure on Weapons | <urn:uuid:6ca74091-3803-4574-a13b-8503270348aa> | CC-MAIN-2017-26 | http://www.economicsforaroundearth.com/global-inequalities-in-wealth/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00034.warc.gz | en | 0.928038 | 1,825 | 3.078125 | 3 |
Agriculture and global food security are two interconnected topics. Simply put, agriculture is the science of farming, which involves the harvesting of food products, most commonly animals and plants. Alternatively, global food security is a concept related to the availability of food sources and their accessibility.
Once agriculture was developed, the domestication of animals and plants through selective breeding began occurring, expanding the food sources available and quantity of food which could be produced. Agriculture allows humans to manipulate animals and plants so that organisms with the most optimal traits can be produced.
In the Western world, food security, or rather food insecurity is not as visible of an issue as it is in the underdeveloped world. However, it does still exist. As the world’s population continues to rise, food security is becoming a very important issue since it is becoming increasingly more difficult to feed the world’s population. Unfortunately agricultural production has been suggested to have peaked and the price of food is increasing.
Some of the main reasons for why agricultural production has slowed are:
- The planet is running out of arable land for food production
- Past decades of intensive agriculture have resulted in extreme soil degradation
- Drought is more frequent due to climate change
- Suitable land is being used for other purposes such as growing biofuels
This list is by no means exhaustive, but it illustrates how a decrease in agricultural productivity is increasing the existence of global food security concerns. Clearly these two concepts are inextricably linked. However, agriculture and global food security are connected to many other environmental issues, such as climate change and soil degradation. Thus, in order to solve the problems associated with food availability and food production, other environmental problems will need to be subsequently addressed.
Title Image Credit: Wikimedia Commons | <urn:uuid:da45c256-ee9e-4d2c-80a3-4417c733d63c> | CC-MAIN-2017-26 | https://brainmass.com/earth-sciences/agriculture-and-global-food-security | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00034.warc.gz | en | 0.962053 | 360 | 3.5625 | 4 |
Here we have the inspiration for the movie tremors. Teredo clams are worm-shaped clams that use shell-shaped jaws to chew through wood. Because these clams do look an awful lot like worms, and perhaps because the idea of a wood eating clam is too strange to believe, people refer to these animals as shipworms or termites of the sea. But no. These are marine clams that eat wood, creating something called wormwood. Here's a teredo clam, with its worm-like body and head of shells:
A special enzyme allows the clams to digest cellulose, but most species supplement this wooden diet with planktonic protein. The clams line their tunnels (which can be up to 6 feet long in some species) with a white calcareous substance. The most common species of teredo in Puget Sound is Bankia setacea, which can grow to be 1/2 inch thick and 3 feet long and eat up to 3/4" of wood a day. Shipworms have wreaked havok on ships and pilings for as long as mankind has been putting wood into the water. 18th century shipwrights used copper sheathing to protect their hulls from teredo clams; nowadays people paint submerged parts of their boats with a copper paint to prevent the clams from establishing. Last year we got some teredo wood tables made by the folks at Trinity River Marine from old boomsticks at the Port Gamble mill. (Boomsticks are the logs used to hold log booms together). A wormwood piling:
The white calcareous substance that the clams use to line their burrows:
Let us know if you want to buy a teredo table for yourself and we'll put you in touch with the fabricators! | <urn:uuid:57ae955d-687d-497f-93d4-d5314a541145> | CC-MAIN-2017-26 | https://www.hamahamaoysters.com/blogs/learn/18296815-nov-3-2010-clamwood | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00034.warc.gz | en | 0.961133 | 368 | 2.875 | 3 |
Love and Logic Resource KitLove and Logic is a program that has been used for many years to help children focus their energy on making positive choices. It presents parents with a way to talk their children through behavioral issues in a calm manner that will enable children to make positive, independent choices in the future.
We have organized a lending library with materials that may be helpful if you are looking for new ideas and proven methods for parenting your children. The materials are available for check out through the library. See Mrs. Lamb or a classroom teacher if you would like to borrow any of the materials listed below.
Simple Parenting: Strategies for Raising Great Kids in Complicated Times
Real World Parenting Solutions that Prepare Kids for the Real World
Painless Parenting for the Pre-school Years
Allowing Kids to Choose Success
Surviving Sibling Rivalry: Healthy Options for Managing Your Children’s Conflicts
Winning the Homework Battle: Helping Children Discover and Celebrate Their
Parents and Teachers:
Calming the Chaos: Behavior Improvement Strategies for the Child with ADHD
Love and Logicism: Wise Words About Kids
Words Will Never Hurt Me: Helping Kids Handle Teasing, Bullying and Putdowns | <urn:uuid:3df9d504-e03a-4ef2-93ae-1b0fe24baa5e> | CC-MAIN-2017-26 | http://holly.rpes.schoolfusion.us/modules/cms/pages.phtml?pageid=309065&SID | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00194.warc.gz | en | 0.89508 | 249 | 2.828125 | 3 |
In the event of fire, people need to know exactly what they need to do. The person discovering the fire in the first place might need to raise the alarm, call the fire brigade and inform someone in charge.
People who hear an alarm might need to be given instructions on how to evacuate the building. In fact, this is quite an important consideration in many Churches and Places of Worship which are occupied by members of the public as they might not know what the alarm sounds like or know what to do in a fire
The Fire Procedures document outlines what needs to be done in the event of a fire emergency within a building. For the smallest of Churches and Places of Worship, a small 'Fire Action' poster might be adequate, as long as it is comprehensive enough to ensure people know what to do.
The following sections would normally be included:
- Action to be taken by a person who discovers or suspects a fire. This might include raising the alarm, contacting the emergency services or informing someone about the fire. Additionally, a fire extinguisher use policy might be included to make sure that only trained and authorised personnel are encouraged to use extinguishers.
- The evacuation procedure to be followed when the alarm has been raised, such as leaving the building by the nearest available exit route and assembling at a specified location. This part might also include plans for stewards to inform the public if this is required as part of the plan.
- The measures to be taken to ensure that the building has been evacuated. It is common practice for nominated fire wardens or marshals to systematically check all parts of a building, and these trained people will need instruction on how to do this safely. An alternative might be a register, which is useful for smaller groups.
- The procedure for calling and liaising with the emergency services.
- The procedure for silencing the fire alarms, making sure that a fire alarm is never silenced by an unauthorised person or when it is not safe to do so.
The document can also outline preventative and proactive fire safety measures, such as:
- Responsibility for fire safety, including who undertakes Risk Assessments, testing fire alarms, checking fire extinguishers and ensuring exits are kept clear.
- The company name, address and telephone number of fire extinguisher and fire alarm service companies.
- Fire prevention measures, including any specific requirements needed in the building to prevent fire and allow people to evacuate the building quickly. This might cover, for example, the safe use of candles and instructions to keep fire exits clear.
- Details of where specific fire safety documents are kept, such as the fire log book and Risk Assessments.
There are some groups of building user who might not be able to respond to a fire alarm warning, such as those who are physically unable to evacuate, those who do not recognise danger and people who have an adverse reaction to emergencies or alarms and who might panic. An evacuation plan needs to be put into place to make sure that people are identified and assisted if this is required.
An Evacuation Plan is simply a floor plan showing where fire safety equipment and exit routes are located. In all but the simplest of buildings, where the exits routes are obvious and equipment easy to find, an Evacuation Plan is a good way to portray important safety information. Standard symbols can be used to show fire equipment and arrows can point towards exit routes.
A plan like this needs to be on display next to any fire alarm system controller, especially if the system uses more than one detection 'zone'. This is mainly for the benefit of the Fire and Rescue Seri vice but is also useful for routine testing and maintenance. Such zone maps are usually provided by the alarm system installer.
Fire Action Poster
The Fire Action Poster is a version of the Fire Procedure document (and in a number of very small premises it might be adequate on its own). Posters should be on display throughout the building to remind people exactly what the need to do if they discover a fire. The format you use is up to you, but there must not be any confusion about what needs to be done.
Many sign suppliers stock a range of fire action posters, but it is important to check that the instructions fit in with the Fire Procedures as some generic posters might not be suitable. It is possible to create your own poster, in which case the font should be clear and easy to read and it is recommended to laminate the poster to make it durable. We have some examples on this Website.
Any person directly affected by the procedures, such as staff, stewards and group leaders, would need to be instructed and trained as to their responsibilities. This can be a one-to-one talk (especially where the responsibilities are more complex), a presentation or short film. Those needing to perform specific tasks, such as a fire warden, needs to have specific training for that task given the very risk of them being in a building where there might be a fire while they check the building has been evacuated.
Practice fire drills are useful to make sure that everyone who has a specific responsibility knows how to put the procedure into practice. Fire drills are also a good way to identify flaws in the procedure or safety systems and equipment within the building. It is recommended that fire drills should be undertaken every 6 months. | <urn:uuid:cbd2548e-361a-4de4-98e6-b5ecd485bf4f> | CC-MAIN-2017-26 | http://churchsafety.org.uk/information/fire/f_procedure.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00274.warc.gz | en | 0.960923 | 1,081 | 3.171875 | 3 |
It may be a small comfort to those planning their one-way trip to Mars to know that Earth and our moon are visible from the foreign planet. The Curiosity rover has sent home the view of Earth over the Mars skyline.
While they do just look like stars in the sky, our home planet and moon are the brightest lights in the sky seen from Mars. With 99 million miles separating Mars from Earth, the lights look like just specks in the sky, serving as a reminder of how far that distance is. Though those who take the one-way trip won’t home back to live on Earth, they will be able to get glimpses of their home planet over the Martian horizon. | <urn:uuid:51ee7105-5715-47c0-a4d7-d6c1b39d3344> | CC-MAIN-2017-26 | http://insideindustrynews.com/curiosity-gives-us-view-home/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321458.47/warc/CC-MAIN-20170627152510-20170627172510-00274.warc.gz | en | 0.938971 | 141 | 2.96875 | 3 |
A 13-year-old middle school student is working to determine if cell phones are a hazard on the road.
Grayson Carlile, an eighth-grader at Dzantik'i Heeni Middle School, has teamed up with National Council on Alcoholism and Drug Dependence driver safety instructor John d'Armand to conduct a controlled experiment to see how cell phones may affect a driver's reaction time. Carlile is testing licensed drivers on one of NCADD's high-tech driving simulators for his school's science fair in mid-January.
"Whether you should drive with a cell phone or not is such a big issue right now, and I thought it would be interesting to see if driving with a cell phone and talking on it did affect your reaction time in a car," Carlile said.
For the experiment, subjects accelerate in the simulator as fast as possible down a straight stretch of road while staying in the far right lane. A stop sign appears on the screen when the vehicle reaches approximately 50 miles per hour. The tester then stops as fast as possible and is given a computer readout of their reaction time that measures up to one thousandth of a second.
After doing this three times to become familiar with the machine, the test subject does it six more times - three with a cell phone and three without in a preselected, random order. While conducting the experiment with the cell phone, the subjects are asked to repeat a series of letters and numbers while concentrating on the road.
"It's kind of exciting to do this experiment because I've had the same reservations myself," said d'Armand, who is Carlile's mentor for the project. "I see people using cell phones, and I wonder how distracted they are."
Using cell phones while driving has been a subject of international debate and legal action for multiple years. Dozens of countries have banned drivers from using them while driving, including Australia, Czech Republic, France, Germany, Malaysia, Italy, Turkmenistan and Zimbabwe. Most U.S. states have not imposed bans, including Alaska, but several states have placed partial or full restrictions on drivers from using cell phones while driving.
Some states, including Oregon and Nevada, have imposed state legislation restricting county and municipal governments from placing their own bans on the use of cell phones.
Carlile's mother, Jan Carlile, said she hopes her son's science project will provide more information on the ongoing debate.
"I'd like to think that it might raise people's awareness," she said. "It's an issue, and one that should be looked at more carefully."
Along with help from his mother and d'Armand, Grayson Carlile spent Friday running volunteers through the experiment at the Marie Drake building downtown to test his hypothesis that using a cell phone while operating a vehicle will affect a driver's reaction time.
Brittany Lehnhart, a 17-year-old junior at Juneau-Douglas High School, was one of the test subjects Friday afternoon.
"I think trying really hard to listen to those letters and repeat every single one made it so you really weren't paying attention to what you were looking at at all," she said.
Lehnhart, who said she doesn't talk on a cell phone while driving, said this type of experiment would be beneficial for all drivers, especially younger ones.
"I think it's a good (experiment), especially for teens because a lot of kids are just so into being on their cell phone and knowing where everyone is at once," she said. "It would be nice if people could actually do this whole test because I didn't think it would have that much affect on my driving, but just doing it made me feel like I was totally not in control at all."
Grayson Carlile said the idea for the experiment blossomed out of observing drivers that seemed to be distracted while using cell phones.
"It's obvious that they're very distracted from everything around them and they're mostly just concentrating on their conversation - and maybe a little bit on the lights - but not the other cars around them," he said.
Carlile said the requirement of a science fair project gave him an opportunity to test out one of his concerns.
"I always look at the science fair as a really good opportunity for one to practice and learn what it takes to do a long and involved project, especially when you need someone like a coach or a mentor or a helper," he said. "I think it's just really interesting to learn about the scientific process and what it takes to complete a controlled experiment."
Carlisle isn't old enough to get a driver's permit. Watching him has been rewarding, d'Armand said.
"To have someone like Grayson, with his very positive attitude and his humanitarian attitude, who obviously wants to point out a possible hazard and help humanity, it's quite refreshing," he said.
Carlile said he wants to make his findings available to the public when he finishes the project. He is still looking for more people to help him today. Anyone who is interested can contact JDHS for more information.
When the project is complete, d'Armand said he thinks the results will be telling.
"My suspicion is that is what this experiment will show is selective attention," he said. "You select the cell phone as the thing to which you're going to give your primary attention, therefore it deprives other things deserving of that attention."
© 2017. All Rights Reserved. | Contact Us | <urn:uuid:5f525003-bf93-42d1-b05b-29a50aacfb63> | CC-MAIN-2017-26 | http://juneauempire.com/stories/120505/loc_20051205012.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323604.1/warc/CC-MAIN-20170628101910-20170628121910-00354.warc.gz | en | 0.981334 | 1,131 | 2.859375 | 3 |