Search is not available for this dataset
text
stringlengths
197
632k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
1.32k
file_path
stringclasses
740 values
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
44
200k
score
float64
1.5
5
int_score
int64
2
5
Docomomo US/Northern California Chapter is raising the awareness of the Modern Movement's rich legacy in the Bay Area and throughout Northern California. The gentle California climate allowed Modern buildings to achieve a response to the outdoors that was not possible in European or East Coast climates. This produced not only a uniquely Modern plan, but a Modern approach to landscape design. Established in San Francisco in 1996, our mission is to advance the concepts of the modern movement and preserve its built works. Northern California produced important modern designers who were both regionally and nationally influential. Much is known about the "Bay Region Style" (practiced by William Wurster, Joseph Esherick and others) and the work of the San Francisco office of Skidmore Owings & Merrill. Many lesser known, but no less significant, modern architects helped establish the modern movement in Northern California with works of great beauty. In landscape design, Northern California's modern landscape architects, led by Thomas Church, exerted national influence. Docomomo US/Northern California Gretchen Hilyard, President P.O. Box 29226 San Francisco, CA 94129-0226 The Northern California Chapter of Docomomo US engages in the following activities: Modern Register: The Northern California Modern Register, started in 1997 is an ongoing project that includes approximately 50 entries from around the Bay Area. Fieldwork is performed by volunteers who research and enjoy learning about local modern architectural history. San Francisco Modern Survey: An ongoing building and landscape survey highlighting selections from our register. This publication focuses only on San Francisco and includes a broad geographic and typological range. Programs: Lectures, tours, movie screenings, and exhibits on topics related to modern architecture and landscape design are held throughout the year. Past events include: Lecture series on Scandinavian architecture, California Eichler Developments and the work of Erich Mendelsohn. Tours have included a Bus tour of Modern San Francisco put on in conjunction with the San Francisco Heritage Modernism Symposium, a driving tour of Daly City highlighting the schools of Mario Ciampi and a tour of modernism at Stanford University. Advocacy: Presentations are frequently made to the City of San Francisco's Landmarks Advisory Board, San Francisco Chapter of the American Institute of Architects, San Francisco Heritage, California Preservation Foundation, Berkeley Architectural Heritage and to local architectural firms. Organizational Development. The Northern California Chapter is a 501c3 and has an 11 member board serving one and two year terms. Development goals include fundraising and forming partnerships with other nonprofit organizations to allow the continuation of programs and publications.
<urn:uuid:6f5fd7a6-2361-4be6-b2d0-9628b0f74d5f>
CC-MAIN-2015-35
http://docomomo-us.org/chapters/northern_california?mini=calendar%2F2013-05
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.921722
532
1.59375
2
- manipulate connect accounting records fwtmp reads from the standard input and writes to the standard output, converting binary records of the type found in /var/adm/wtmpx to formatted ASCII records. The ASCII version is useful when it is necessary to edit bad records. wtmpfix examines the standard input or named files in utmpx format, corrects the time/date stamps to make the entries consistent, and writes to the standard output. A hyphen (-) can be used in place of file to indicate the standard input. If time/date corrections are not performed, acctcon(1M) will fault when it encounters certain date-change records. Each time the date is set, a pair of date change records are written to /var/adm/wtmpx. The first record is the old date denoted by the string "old time" placed in the line field and the flag OLD_TIME placed in the type field of the utmpx structure. The second record specifies the new date and is denoted by the string new time placed in the line field and the flag NEW_TIME placed in the type field. wtmpfix uses these records to synchronize all time stamps in the file. In addition to correcting time/date stamps, wtmpfix will check the validity of the name field to ensure that it consists solely of alphanumeric characters or spaces. If it encounters a name that is considered invalid, it will change the login name to INVALID and write a diagnostic to the standard error. In this way, wtmpfix reduces the chance that acctcon will fail when processing connect accounting records. Denotes that input is in ASCII form, and output is to be written in binary form. history of user access and administration information See attributes(5) for descriptions of the following attributes:
<urn:uuid:697d2023-0b34-482e-a976-34785407f2d8>
CC-MAIN-2015-35
http://docs.oracle.com/cd/E18752_01/html/816-5166/wtmpfix-1m.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.847987
381
1.914063
2
- extended user attributes database /etc/user_attr is a local source of extended attributes associated with users and roles. user_attr can be used with other user attribute sources, including the LDAP people container, the user_attr NIS map, and the user_attr NIS+ table. Programs use the getuserattr(3SECDB) routines to gain access to this information. Each entry in the user_attr databases consists of a single line with five fields separated by colons (:). Line continuations using the backslash (\) character are permitted. Each entry has the form: The name of the user as specified in the passwd(4) database. Reserved for future use. Reserved for future use. Reserved for future use. An optional list of semicolon-separated (;) key-value pairs that describe the security attributes to apply to the object upon execution. Zero or more keys may be specified. The following keys are currently interpreted by the system: Specifies a comma-separated list of authorization names chosen from those names defined in the auth_attr(4) database. Authorization names may be specified using the asterisk (*) character as a wildcard. For example, solaris.printer.* means all of Sun's printer authorizations. Contains an ordered, comma-separated list of profile names chosen from prof_attr(4). Profiles are enforced by the profile shells, pfcsh, pfksh, and pfsh. See pfsh(1). A default profile is assigned in /etc/security/policy.conf (see policy.conf(4)). If no profiles are assigned, the profile shells do not allow the user to execute any commands. Can be assigned a comma-separated list of role names from the set of user accounts in this database whose type field indicates the account is a role. If the roles key value is not specified, the user is not permitted to assume any role. Can be assigned one of these strings: normal, indicating that this account is for a normal user, one who logs in; or role, indicating that this account is for a role. Roles can only be assumed by a normal user after the user has logged in. The default set of privileges assigned to a user's inheritable set upon login. See “Privileges Keywords,” below. The maximum set of privileges a user or any process started by the user, whether through su(1M) or any other means, can obtain. The system administrator must take extreme care when removing privileges from the limit set. Removing any basic privilege has the ability of crippling all applications; removing any other privilege can cause many or all applications requiring privileges to malfunction. See “Privileges Keywords,” below. Specifies whether an account is locked after the count of failed logins for a user equals or exceeds the allowed number of retries as defined by RETRIES in /etc/default/login. Possible values are yes or no. The default is no. Account locking is applicable only to local accounts. The following keys are available only if the system is configured with the Trusted Extensions feature: Contains a number representing the maximum number of minutes a workstation can remain idle before the Trusted Extensions CDE window manager attempts the task specified in idlecmd. A zero in this field specifies that the idlecmd command is never executed. If unspecified, the default idletime of 30 minutes is in effect. Contains one of two keywords that the Trusted Extensions CDE window manager interprets when a workstation is idle for too long. The keyword lock specifies that the workstation is to be locked (thus requiring the user to re-authenticate to resume the session). The keyword logout specifies that session is to be terminated (thus, killing the user's processes launched in the current session). If unspecified, the default value, lock, is in effect. Contains the maximum label at which the user can operate. If unspecified, in the Defense Intelligence Agency (DIA) encodings scheme, the default is specified in label_encodings(4) (see label_encodings(4) and labels(5) in the Solaris Trusted Extensions Reference Manual). Contains the minimum label at which the user can log in. If unspecified, in the DIA encodings scheme, the default is specified in label_encodings(4) (see label_encodings(4) and labels(5) in the Solaris Trusted Extensions Reference Manual). Except for the type key, the key=value fields in /etc/user_attr can be added using roleadd(1M) and useradd(1M). You can use rolemod(1M) and usermod(1M) to modify key=value fields in /etc/user_attr. Modification of the type key is restricted as described in rolemod and usermod. The defaultpriv and limitpriv are the privileges-related keywords and are described above. See privileges(5) for a description of privileges. The command ppriv -l (see ppriv(1)) produces a list of all supported privileges. Note that you specify privileges as they are displayed by ppriv. In privileges(5), privileges are listed in the form PRIV_<privilege_name>. For example, the privilege file_chown, as you would specify it in user_attr, is listed in privileges(5) as PRIV_FILE_CHOWN. Privileges are specified through the Solaris Management Console (smc(1M)), the recommended method, or, on the command line, for users, throughusermod(1M). See usermod(1M) for examples of commands that modify privileges and their subsequent effect on user_attr. Example 1 Assigning a Profile to Root The following example entry assigns to root the All profile, which allows root to use all commands in the system, and also assigns two authorizations: The solaris.* wildcard authorization shown above gives root all the solaris authorizations; and the solaris.grant authorization gives root the right to grant to others any solaris authorizations that root has. The combination of authorizations enables root to grant to others all the solaris authorizations. See auth_attr(4) for more about authorizations. See attributes(5) for descriptions of the following attributes: The command-line syntax is Evolving. The output is Unstable. auths(1), pfcsh(1), pfksh(1), pfsh(1), ppriv(1), profiles(1), roles(1), roleadd(1M), rolemod(1M), useradd(1M), usermod(1M), getdefaultproj(3PROJECT), getuserattr(3SECDB), auth_attr(4), exec_attr(4), nsswitch.conf(4), passwd(4), policy.conf(4), prof_attr(4), project(4), attributes(5), privileges(5) See the dtstyle(1X), label_encodings(4), and labels(5) man pages in the Solaris Trusted Extensions Reference Manual. When deciding which authorization source to use, if you are not using LDAP, keep in mind that NIS+ provides stronger authentication than NIS. The root user is usually defined in local databases for a number of reasons, including the fact that root needs to be able to log in and do system maintenance in single-user mode, before the network name service databases are available. For this reason, an entry should exist for root in the local user_attr file, and the precedence shown in the example nsswitch.conf(4) file entry under EXAMPLES is highly recommended. Because the list of legal keys is likely to expand, any code that parses this database must be written to ignore unknown key-value pairs without error. When any new keywords are created, the names should be prefixed with a unique string, such as the company's stock symbol, to avoid potential naming conflicts. In the attr field, escape the following symbols with a backslash (\) if you use them in any value: colon (:), semicolon (;), carriage return (\n), equals (=), or backslash (\).
<urn:uuid:6ad5dca3-89fc-4c0f-928c-66780073982c>
CC-MAIN-2015-35
http://docs.oracle.com/cd/E18752_01/html/816-5174/user-attr-4.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.789685
1,768
2.1875
2
|Skip Navigation Links| |Exit Print View| |Oracle Solaris Studio 12.3: Debugging a Program With dbx Oracle Solaris Studio 12.3 Information Library| You must prepare your program for source-level debugging with dbx by compiling it with the -g option, which is accepted by the C compiler, C++ compiler, Fortran 95 compiler, and Java compiler. For more information, see Compiling a Program for Debugging.
<urn:uuid:8dd24f29-44b3-4a10-929c-408faf1d86e6>
CC-MAIN-2015-35
http://docs.oracle.com/cd/E24457_01/html/E21993/blabc.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.805738
95
1.9375
2
This book addresses the on-going push for greater assessment in higher education, within the larger societal context in which a push for accountability and transparency has been rather selectively imposed. Addressing this context is done by means of addressing the specific higher education assessment literature, as well as such topics as unionization in higher education and the increase in “merit pay” schemes that diminish the collective power of union members and radically change the concept of academic freedom on college campuses. It addresses “dead weight” faculty that burden our institutions and drain our resources away from where they could be best spent. But, above all, it addresses the concept of assessment. While the focus of this work is upon assessment in higher education, it hopes to examine that growing phenomenon within the greater context of the larger social framework where assessment is lauded by the masses, but often frowned upon by those who may be the subject of any such assessment. Engvall, Robert P., "Corporatization of Higher Education: the Move for Greater Standardized Assessment Programs" (2010). School of Justice Studies Faculty Publications. Paper 13.
<urn:uuid:ae589b68-e823-4b32-a601-a208cd270e5a>
CC-MAIN-2015-35
http://docs.rwu.edu/sjs_fp/13/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.941203
224
2.015625
2
Door County voters may see some youthful faces casting ballots at the polls on Tuesday. They're part of the Kids Voting effort in Door County, a national program spearheaded locally by Mark Nelson in which students accompany their parents to the polls and go through the voting process. Nelson says older kids use a copy of the actual ballot while younger ones use a simplified version. All will get an "I voted" sticker after they're done. Nelson says results of the vote will take a day or two to compile and then will be emailed to the schools. Sturgeon Bay, Sevastopol and Southern Door are the school districts participating in the program this election. Aside from the vote, Nelson says the kids vote also has a curriculum component, one part of which is an analytical methodology for determining where the candidates stand on issues. Nelson feels so strongly about it that he says if the program were implemented broadly on a national basis, we wouldn't need campaign finance laws. "I know that sounds silly," says Nelson. "But if people took the time and their civic responsibility seriously to determine where the candidates actually stood on their history and not just ad bites and sound bites and last minute attack ads I think our country would be a lot better off."
<urn:uuid:6e774a1b-c8ea-495c-9574-9d5d611b49bd>
CC-MAIN-2015-35
http://doorcountydailynews.com/news/details.cfm?clientid=28&id=52784
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.969121
257
1.8125
2
#44 - Thirteen Things About Sphynx - Sphynx are a naturally hairless breed of cats. We are born this way. - Sphynx are not totally hairless; we can have fine down on the body. Some light hair is often present on the nose, tail and toes. I am hairless except on the bridge of my nose and my ears. - Sphynx have no whiskers, or very short whiskers. I have a few tiny, short whiskers that curl. - Sphynx get cold only if it is cold enough for a human to also be cold. If a human needs a sweater, chances are we need one too, although we're also happy to find a warm human to curl up with (or another cat or even a dog if they are around). - Sphynx are friendly, extremely inquisitive and love to be the center of attention. The CFA Sphynx Breed Profile uses the term "Love Mooch" to describe Sphynx. - Because of the lack of hair that would normally absorb body oils, Sphynx need to be bathed periodically. The oil builds up on our skin and can cause problems if it's not cleaned off. - Sphynx eyes are ears need to be cleaned as well, since we lack hair in our ears, and so ear wax builds up more quickly. We lack eyelashes, so dirt builds up more quickly in the corners of our eyes. - We Sphynx have a very high natural metabolism. Because of our higher metabolism, we eat more and more often than "regular cats" do, and we need to be fed very high quality pet food. Our bodies have to work harder than that of other cats to keep ourselves warm, since we lack fur. - Some people who suffer from cat allergies can tolerate living with Sphynx cats. However, depending on the type and severity of the individual's allergic reactions, there are still people who cannot live with this breed. My human dad is allergic to cats, but he can tolerate Sphynx without any problems. - In 1966 a domestic cat gave birth to a hairless kitten in Toronto, Canada. It was discovered to be a natural mutation and the Sphynx cat, as we know it today, came into existence. - Cat breeders in Europe and North America have bred the Sphynx to normal coated cats and then back to hairless for more than thirty years. The purpose of these selective breedings was to create a genetically sound cat with a large gene pool and hybrid vigour. - Sphynx hairlessness is produced by an allele of the same gene that produces the Devon Rex, which has only one of the usual two fur coats. The Sphynx allele is incompletely dominant over the Devon allele; both are recessive to the wild ("regular") type. - The most famous Sphynx is, of course, Mr. Bigglesworth, Dr. Evil's cat in the Austin Powers movies. Contrary to what some people believe, they did not shave a poor cat for the movie. They used a Sphynx! The cat who played Mr. Bigglesworth is a Sphynx named SGC Belfry Ted Nude-gent. Tags:Labels: Sphynx, Thursday Thirteen
<urn:uuid:6f109e11-f8a9-4beb-83d2-29e4dc022bba>
CC-MAIN-2015-35
http://dragonheartsdomain.blogspot.com/2007/11/thursday-thirteen-all-about-sphynx.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.954641
689
2.109375
2
Aug. 19 (Bloomberg) — Applications for unemployment benefits in the U.S. unexpectedly increased last week to the highest level since November, showing companies are stepping up the pace of firings as the economy slows. Initial jobless claims rose by 12,000 to 500,000 in the week ended Aug. 14, Labor Department figures showed today in Washington. Claims exceeded all estimates of economists surveyed by Bloomberg News and compared with the median forecast of 478,000. The number of people receiving unemployment insurance fell, while those getting extended benefits increased The continuing claims figure does not include those receiving extended benefits under federal programs. The number of Americans who’ve used up traditional benefits and are now collecting emergency and extended payments rose by 309,334 million to 5.59 million in the week ended July 31. That was the week after legislation resuming eligibility went into effect. Dr. Pinna says: It is quite obvious that there are no jobs to be found. The “jobs” were sent with the “factories” thirty years ago to China. Everything is made in China. The U.S. produces fruit in California. Where is the factory that cans that fruit? In China! Americans must get used to unemployment as a way of life. For centuries the people of Asia and South America had unemployment rates as high as fifty percent. We will see the same high rates in the USA. Get used to it! Only corrupt Government employees will have jobs. The rest of the American workers will lose all their excess fat and learn how to play chess.
<urn:uuid:37baa8b8-0eae-4c74-a258-6be008538964>
CC-MAIN-2015-35
http://drpinna.com/jobless-up-up-and-up-8650
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.960738
327
1.734375
2
Growing up I was more into Superman due in no small part to the Richard Donner films. Batman was still personified as Adam West so the desire to run around in poor fitting spandex with Robin “the Boy Wonder” like an ambiguously gay crime-fighter didn’t quite measure up to dreaming about incinerating the school bullies with heat vision. So for a time Batman played second fiddle to the Last Son of Krypton. But in an age where grittier reboots are king, Batman has emerged the ruling champion. Thanks to Christopher Nolan who gave us a Batman that wasn’t (A) Fat and (B) Michael Keaton, young boys can once again dream about becoming a superhero. Batman is portrayed in comics and film as a completely human superhero. So naturally this begs the question: “Is it possible to actually become Batman?”. Thanks to E. Paul Zehr, we now have the closest thing to a complete answer to that question! Becoming Batman is a book that is certainly more complex than you might expect from the cover. It goes in-depth into each facet of what it takes to be the Dark Knight. The chapters cover everything from hormones, stress, training, fighting skills, injury recovery and chronic nocturnal living. There are many charts to illustrate the journey from Man, to Bat-Man, to Batman. It is truly a remarkable and original work. So despite what you may think, this is not fluffy light reading nor silly. It is very well written and takes the quest to find practical answers very seriously. An added bonus is that while immersing oneself in geek-lore, Becoming Batman is also a study into human physiology that sees how much abuse a body can take. In the case of Batman, the truth is a lot less impressive than fiction. Years of conditioning and rigorous combat training might enable one to achieve superhero status for at best, a couple of years. And even then, don’t expect to be swinging on a bat-line from building to building! And that’s one of the conclusions of the book, that becoming Batman is not the hard part of an already unlikely scenario. Instead, it is staying Batman. Even the most gifted MMA fighters have only a few short years at the top before they must step aside. How much more so a superhero that has a championship fight almost every night, and any loss is an almost certain death. Being a student of Okinawan karate, Zehr has a good understanding about the logistics of martial arts training, and that the idea of being an “expert” in all ( heck even one! ) of the martial arts is not a practical goal, even for Bruce Wayne! Zehr also points out that merely having your parents killed and being the owner of an outlandish fortune is not enough to kickstart the process. You also must be genetically gifted beyond your peers both physically and mentally, and have an almost insane drive to accomplish your goal. Most of us can barely drag our asses to the coffee pot in the morning let alone fight Bane or Killer Croc, so I think anyone reading this can safely remove themselves from the list of possible candidates. So is becoming Batman possible? In practicality, not really. But it is that .00000001% chance that keeps the mind of a child thinking that if he dreams hard enough, perhaps he too can become the hero Gotham needs. © 2012 – 2015, Dysfunctional Parrot. All rights reserved. No reproduction of written material is permitted.
<urn:uuid:96b26479-e661-4d53-b762-a1d7cda242ad>
CC-MAIN-2015-35
http://dysfunctionalparrot.com/book-reviews/becoming-batman/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.960641
729
1.820313
2
Gulf Oil Spill—What Might We Expect? (Earthjustice Media Director John McManus remembers what it was like covering the Exxon Valdez oil spill as a CNN journalist) The oil now washing up on the Gulf Coast reminds me of the last big oil spill America lived through, the Exxon Valdez spill 21 years ago. On March 24, 1989 a supertanker that had just topped with oil left the port of Valdez and crashed into a submerged rock reef in Alaska's Prince Williams Sound. Eleven million gallons of north slope crude oil gushed from the side of the ship into the Sound. Authorities immediately discussed lighting it on fire. There was even talk of the military firing missiles at the oil slick to ignite it. But the fires never happened. Maybe it was too cold, being Alaska. Instead the oil washed up on the beaches, headlands, harbors, villages and rocks that ring this giant bay. Some of the oil washed out of the Sound and into the Gulf of Alaska, fouling beaches hundreds of miles away on Kodiak Island and beyond. News reporters, producers and camera crews descended on the scene from around the world. I worked for CNN at the time and was one of them. Over the next six months I went back and forth to cover the spill and didn't finally make it home for the year until October. We'll likely see similar news interest in the developing spill in the Gulf. Some reporters may be on this story all summer long. The once-huge herring schools that used to swim annually into the Sound to spawn were poisoned by the oil. Their numbers plummeted and have not recovered to this day. Three years after the oil spill scientists documented suppressed immune systems in these critical food fish that made them sucseptible to disease. If the fish species at the base of the food chain in the Gulf of Mexico are badly hurt by the spill, as the herring were in Alaska, one can safely assume all dependent species higher on the food chain, including humans, could be badly hurt for many years to come. Herring are a small fish that naturally school in large numbers. They are a main source of food for other fish and wildlife up the food chain. Sea lions love to eat them, so do salmon, halibut, sea birds and many other species. The hit to herring was a very hard hit to all wildlife in the Sound. Before the spill there were an estimated 120,000 tons of herring that would spawn annually in Prince William Sound. Today, there are an estimated 20,000 tons of herring. The Sound supported a number of vibrant, economically robust commercial fisheries prior to the spill. Herring, salmon and other species provided for a good living for many fishing families. Things are very different there today. Oil still persists in Prince William Sound. Last time I was back to check on the Sound was in 1999. We could still easily find oil under rocks on many beaches. The stuff was still sticky and extremely hard to get off your hands or clothes.
<urn:uuid:17af6f54-a36b-48d5-b42a-c04aeb8e44cd>
CC-MAIN-2015-35
http://earthjustice.org/blog/2010-april/gulf-oil-spill%E2%80%94what-might-we-expect
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.972024
621
3.3125
3
After the U.S. Army Corps of Engineers breached a levee to save the city of Cairo, Illinois, on May 2, 2011, agricultural fields remained flooded two days later. The levee breach flooded roughly 130,000 acres of nearby farmland in the Birds Point-New Madrid Floodway. The Moderate Resolution Imaging Spectroradiometer (MODIS) on NASA’s Terra satellite captured these images of the area on May 4, 2011 (top), April 29, 2011 (middle), and April 29, 2010 (bottom). All three images use a combination of visible and infrared light to increase contrast between water and land. Water ranges in color from electric blue to navy. Vegetation is green. Bare ground is earth-toned. The most striking difference between May 4 and April 29, 2011, is the inundation of the Birds Point-New Madrid Floodway. Both scenes, however, show severe flood conditions along the Mississippi and Ohio Rivers. The image from 2010 shows the rivers under more normal circumstances. NASA images courtesy MODIS Rapid Response Team, Goddard Space Flight Center. Caption by Michon Scott. - Terra - MODIS
<urn:uuid:217b5535-d3f0-4f43-8391-b9caeccced8d>
CC-MAIN-2015-35
http://earthobservatory.nasa.gov/NaturalHazards/view.php?id=50457
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.888824
234
3.34375
3
Events in the Department of Earth Sciences The Department of Earth Sciences sponsors a number of regularly scheduled events that are open to the public. These include weekly departmental seminars and discussion groups as well as larger symposia engaging a much broader audience. Schedules for these events can be found on this website. Our weekly colloquium, the K. Douglas Nelson Lecture Series, features scientific talks by outstanding invited investigators from all over the world. The talks are generally less than one hour in length at 4:00 PM Thursday afternoons. WAGGS, the Waggoner, Geology Graduate Student Seminar, is as weekly seminar organized and presented by the Earth Sciences Graduate Students. Students report on their recent or ongoing research projects and receive feedback from their fellow students and faculty. AWSOME Rad is a lively, discussion group of students and faculty focusing on a different recent publication weekly. Publications are posted in advance and range across all of the Earth Sciences. Each spring, the Earth Sciences Graduate Students organize and sponsor the Central New York Earth Science Student Symposium. This event features keynote talks by distinguished invited speakers, poster presentations of student research, and opportunities to interact with faculty and industry representatives. Students and faculty from across Central NY participate in this event.
<urn:uuid:34882154-7772-44be-a25d-ed3ffc89f373>
CC-MAIN-2015-35
http://earthsciences.syr.edu/Events_EAR.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.942094
257
1.6875
2
To reach the nations, Christians must reach its cities. More people in the world live in urban areas than in rural areas, according to reports by the United Nations. The United Nations also reported that there are 28 megacities around the world. Megacities have populations of 10 million people or more. Workers and believers from Tibetan people groups share their stories from the quake and the aftermath and seek prayer in the midst of a national crisis.
<urn:uuid:ec6777d8-315e-4425-ae8d-35d544255f9f>
CC-MAIN-2015-35
http://eastasianpeoples.imb.org/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.956306
90
1.960938
2
How to calculate the service for a single-family or a multifamily dwelling The NEC defines a dwelling unit as a single unit that provides complete and independent living facilities for one or more persons that must include permanent provisions for living, sleeping, cooking, and sanitation (Fig. 1 on page xx). A dwelling becomes "multifamily" when it contains three or more dwelling units [Art. 100 Definitions] (Fig. 2 on page xx). When you size the service for a single-family dwelling, you calculate the load and apply the appropriate demand factors. For a multifamily dwelling, you do the same thing, except you apply the appropriate demand factors to the sum of the individual dwelling units of that multifamily dwelling. You are allowed to use the standard method from Part III of Art. 220 or the optional method from Part IV of Art. 220. Standard method. The same method used for single dwellings can be applied to multifamily dwellings. The NEC allows some additional demand factors for multifamily dwellings, on the presumption that there will be diversity of usage between the various units. For example, it's very unlikely that four families will run their clothes dryers, ranges, and small appliances at exactly the same time. The following steps can be used to determine feeder and service sizes for a multifamily dwelling using the standard method contained in Art. 220, Part III: Step 1: General Lighting, Small Appliance, and Laundry Demand [Table 220.42] - 3VA per sq ft for general lighting and general-use receptacles [Table 220.12]. - 1,500VA for each small-appliance circuit (minimum of 2 circuits) [220.52(A)]. - 1,500VA for each laundry circuit [220.52(B)]. Step 2: Air-Conditioning versus Heat [220.51] The larger of the air-conditioning load or the space-heating load. Step 3: Appliance Calculated Load [220.53] Nameplate ratings of all appliances (except heating, air-conditioning, cooking equipment, and dryers) are taken times a 75% multiplier if there are four or more on the feeder. Step 4: Household Dryer Calculated Load [220.54] Dryers are allowed the demand factors of Table 220.54, but this table does not allow less than 100% demand until there are five units or more. The 5kW minimum per dryer applies to all dwelling units [220.54]. A laundry circuit isn't required for an individual dwelling unit if the multifamily unit has common laundry facilities. Step 5: Household Cooking Equipment Calculated Load [220.55] Perhaps one of the most confusing tables in the NEC is Table 220.55 for household ranges. This table is confusing because the first two columns are percentage multipliers, while the third column is a final kVA value. The notes to this table further complicate matters. Be sure you study this table carefully and pay close attention to how to properly apply each column. Step 6: Service Conductor Size [Table 310.16] When sizing the service or feeder conductors for a single-family dwelling, you can use Table 310.15(B)(6), but that is not the case when sizing conductors for the service or feeder to a two-family or multifamily dwelling. For sizing those conductors, use Table 310.16 instead. Use Table 310.15(B)(6) for the feeders to an individual dwelling unit within the building. Optional method. When should you use the optional method instead of the standard one? If you have the necessary information, you'll probably want to use the optional method, because it's faster and easier to calculate. The optional method for multifamily dwellings is different from the one for single-family dwellings. That's because with multifamily dwellings, you apply demand factors in recognition of the diversity of usage of all the loads in all the separate units. Let's make sure this is clear. In a single family unit, you have diversity among the various types of loads. Although you have that in multifamily units as well, you have diversity among the units that make up the multifamily dwelling — all of the families in a multifamily dwelling aren't using identical loads at identical times. You can use the optional method [220.84] for multifamily dwelling unit feeder and service calculations only if each dwelling unit is equipped with electric cooking equipment and electric heating and/or air-conditioning, and is supplied by no more than one feeder. Follow these rules: - Use the demand factors of Table 220.84, based on the number of dwelling units. - Determine the feeder/service neutral calculated load per 220.61. - Calculate house loads for common areas per Art. 220, Part III and then add them to the Table 220.84 calculated load. House loads are those not directly associated with the individual dwelling units of a multifamily dwelling. Some examples include landscape and parking lot lighting, hall and stairway lighting, common recreation areas, and common laundry facilities. Follow these steps: - Determine total connected load. - Calculate the load. - Size feeder and service conductors. Let's look at these three steps in a bit more detail by walking through an example. In practice, you may see NEC-compliant variations of executing these steps. Step 1: Determine total connected load [220.84(C)]. Add the following loads (from all the dwelling units) together, then apply the Table 220.84 demand factor: - 3VA per sq ft for general lighting and general-use receptacles. - 1,500VA for each small-appliance circuit (minimum of two circuits). - 1,500VA for each laundry circuit. - The nameplate rating of all appliances. - The nameplate rating of all motors. - The larger of the air-conditioning load or the space-heating load. A laundry circuit isn't required for an individual dwelling unit if the multifamily unit has common laundry facilities. Step 2: Calculate the load. Apply the demand factor from Table 220.84 to the total connected load (Step 1). You can convert the calculated load (kVA) to amperes by: Single-Phase Formula: I = VA ÷ E Three-Phase Formula: I = VA ÷ (1.732 x E) Step 3: Size feeder and service conductors. Size the ungrounded conductors per Table 310.16, based on the calculated load. A 120/240V, single-phase system supplies a 12-unit multifamily building (Fig. 3 on page xx). Each 1,500 sq ft unit contains: Dishwasher — 1.5kVA Water Heater — 4.0kVA Washing Machine — 1.2kVA Dryer — 4.5kVA Range — 14.4kVA A/C (230V x 17A) — 3.91kVA Electric Space Heating — 5.0kVA Question: What size conductor is required if the service is rated 120/240V, single-phase and the conductors are installed in parallel in two separate raceways? Step 1: Total Connected Load Step 1a: Determine the General Lighting Load: (1,500 sq ft x 3VA = 4,500VA) (2 circuits x 1,500VA = 3,000VA) Laundry Circuit (1,500VA) 4,500 + 3,000 + 1,500 = 9,000 9,000VA x 12 units = 108,000VA Step 1b: Determine the Appliance Calculated Load: Water Heater (4,000VA) Dryer [nameplate] (4,500VA) Range [nameplate] (14,400VA) 1,500 + 4,000 +4,500 + 14,400 = 24,400 24,400VA x 12 units = 292,800VA Step 1c: Compare the Air-Conditioning versus Heat Load: A/C = 3,910VA (omit) Heat = 5,000VA x 12 units = 60,000VA Step 2: Total Connected Loads General Lighting, Receptacles (108,000VA) Appliances Connected Load (292,800VA) 108,000 + 292,800 + 60,000 = 460,800 Total Connected Load = 460,800VA Total Calculated Load = Total Connected Load x Demand Factor [Table 220.84] Total Calculated Load = 460,800VA x 0.41 [Table 220.84] Total Calculated Load = 188,928VA Step 3: Service Conductor Size (Fig. 4 on page xx) I = VA ÷ E I = 188,928VA ÷ 240V I = 787A Conductor size if paralleled in two raceways [240.4(B)]: 787A ÷ 2 raceways = 393A per conductor Parallel 600kcmil conductors rated 420A at 75ºC [Table 310.16] would meet these load requirements. Grounding electrode conductor sizing. What size grounding electrode conductor is required if the service ungrounded conductors are 600kcmil with two conductors in parallel in two separate raceways? 600kcmil x 2 = 1,200kcmil (equivalent area of the ungrounded conductors) [Table 250.66, Note 1]. Over 1,100kcmil for ungrounded conductors requires a grounding electrode conductor of 3/0 AWG [Table 250.66]. Feeder installation. When installing feeders, include an equipment grounding conductor in each raceway. Section 250.118 lists allowable equipment grounding conductors. To size this conductor using a wire-type equipment grounding conductor, go to Table 250.122 and select the equipment grounding conductor based on the overcurrent device protecting the conductors in the raceway [250.122(F)]. For instance, the equipment grounding conductor in each raceway of an 800A feeder, which is paralleled using two 600kcmil conductors per phase, will require a 1/0 AWG equipment grounding conductor in each raceway. Two more samples. Working these two additional sample problems will reinforce what we've learned thus far. Size the grounding electrode conductor. Question: What size grounding electrode conductor is required if the service ungrounded conductors are 300kcmil with three conductors in parallel in three separate raceways? 300kcmil x 3 = 900kcmil equivalent area of the ungrounded conductors [Table 250.66, note 1] 900kcmil for ungrounded conductors requires a grounding electrode conductor of 2/0 AWG [Table 250.66] Size the parallel service conductor. Question: What size conductor is required if the service with a calculated load of 787A is rated 120/240V, single-phase and the conductors are installed in parallel in four separate raceways? 787A ÷ 4 raceways = 196.75A 3/0 AWG copper is rated 200A at 75ºC [Table 310.16], so four 3/0 AWG conductors can be paralleled for this service. A word about two-family dwellings. The feeder for a two-family dwelling unit is calculated using the standard method in Part III of Art. 220. When that calculated load exceeds the calculation for three identical units using the optional method of 220.84, the lesser of the two calculations is permitted to be used [220.85]. Avoiding confusion. The sizing of branch circuits, feeders, and service conductors for multifamily dwellings is similar to the sizing for single-family dwellings. You size the feeders to individual dwelling units in the same manner, whether that dwelling unit is a single-family dwelling or an individual unit of an apartment building. The NEC allows the use of Table 310.15(B)(6) for sizing the feeders or service conductors to an individual dwelling unit. However, to size the conductors that provide the service to a two-family or multifamily dwelling you must use Table 310.16. Whether calculating the service for a single-family or a multifamily dwelling, be sure to follow the Code rules for the specific calculation you are working on and do not intermix the standard method with the optional method. Follow the steps outlined in this article and apply the demand factors allowed for each method carefully, and you will be successful.
<urn:uuid:043e0cef-dbd9-47d7-82c8-d0172d5af40b>
CC-MAIN-2015-35
http://ecmweb.com/code-basics/multifamily-dwelling-unit-service-and-feeder-calculations
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.859346
2,677
2.390625
2
If an enzyme name is shown in bold, there is experimental evidence for this enzymatic activity. |Superclasses:||Degradation/Utilization/Assimilation → Carbohydrates Degradation → Polysaccharides Degradation → Glycosaminoglycan Degradation| |Degradation/Utilization/Assimilation → Polymeric Compounds Degradation → Polysaccharides Degradation → Glycosaminoglycan Degradation| Expected Taxonomic Range: They are both glycosaminoglycan polymers composed of repeating disaccharide units, each containing N-acetyl-β-D-galactosamine linked by a (1,3) or (1,4) linkage to a uronic acid, β-D-glucuronate or α-L-iduronate, with extensive N and O-sulfation. Sulfation occurs to various degrees at position 2 of uronic acid and at positions 4 or 6, or both, of galactosamine. In addition, the amino group of galactosamine is acetylated Many microorganisms have enzymes that enable them to degrade glycosaminoglycans [Sutherland95]. This ability is particularly important for soil bacteria, which may depend on connective tissues in animal carcasses as a nutrient source. There are several steps in the degradation process. It starts with the cleavage of the polymer into smaller fragments, initially tetra- and hexasaccharides, but ultimately disaccharides. The process continues with the removal of the sulfate groups, and ends with the final degradation of the disaccharides into individual sugars, a step that has not been characterized yet. The lyases that break the polymer to smaller fragments are classified based on the position of cleavage as either endo-lyases or exo-lyases. The endolytic enzyme can produce products of several sizes, although the final product tends to be disaccharides. The exo-lyases cleave dissaccharide molecules from the non-reducing end of the polymer chain [Hamai97]. Some lyases, known as chondroitinase AC, can act only on chondroitin sulfate A and chondroitin sulfate C (that contain β-D-glucuronate), some, known as chondroitinase B, can act only on dermatan sulfate (that contains α-L-iduronate), and some, known as condroitinase ABC, can act on both [Tkalec00, Hamai97]. The lyases act by the removal of a relatively acidic C5 proton of the uronic acid (C5 is the carbon linked to the carboxylic group) followed by the elimination of the hexosamine linked to C4, resulting in the formation of an unsaturated C4-C5 bond on the hexuronic acid moiety of the resulting disacchrides. Chondroitin ABC lyases may help in the regeneration of spinal cord injuries that were thought for a long time to be incurable. Injection of chondroitinase ABC at sites of central nervous system injury, where a glial scar develops, removes the GAG components of ECM chondroitin sulfate proteoglycans and attenuates the inhibitory effects to axon growth [Bradbury02, Bradbury02, Olson02]. The removal of the sulfate groups is catalyzed by specialized sulfatases that can remove the sulfate groups at either the 4 or 6 positions. The sulfatases have been purified from Proteus vulgaris but the genes that encode them have not been identified [Yamagata68]. Bradbury02: Bradbury EJ, Moon LD, Popat RJ, King VR, Bennett GS, Patel PN, Fawcett JW, McMahon SB (2002). "Chondroitinase ABC promotes functional recovery after spinal cord injury." Nature 416(6881);636-40. PMID: 11948352 Hamai97: Hamai A, Hashimoto N, Mochizuki H, Kato F, Makiguchi Y, Horie K, Suzuki S (1997). "Two distinct chondroitin sulfate ABC lyases. An endoeliminase yielding tetrasaccharides and an exoeliminase preferentially acting on oligosaccharides." J Biol Chem 272(14);9123-30. PMID: 9083041 Tkalec00: Tkalec AL, Fink D, Blain F, Zhang-Sun G, Laliberte M, Bennett DC, Gu K, Zimmermann JJ, Su H (2000). "Isolation and expression in Escherichia coli of cslA and cslB, genes coding for the chondroitin sulfate-degrading enzymes chondroitinase AC and chondroitinase B, respectively, from Flavobacterium heparinum." Appl Environ Microbiol 66(1);29-35. PMID: 10618199 Fethiere99: Fethiere J, Eggimann B, Cygler M (1999). "Crystal structure of chondroitin AC lyase, a representative of a family of glycosaminoglycan degrading enzymes." J Mol Biol 288(4);635-47. PMID: 10329169 Hashimoto99: Hashimoto W, Kobayashi E, Nankai H, Sato N, Miya T, Kawai S, Murata K (1999). "Unsaturated glucuronyl hydrolase of Bacillus sp. GL1: novel enzyme prerequisite for metabolism of unsaturated oligosaccharides produced by polysaccharide lyases." Arch Biochem Biophys 368(2);367-74. PMID: 10441389 Huang01a: Huang W, Boju L, Tkalec L, Su H, Yang HO, Gunay NS, Linhardt RJ, Kim YS, Matte A, Cygler M (2001). "Active site of chondroitin AC lyase revealed by the structure of enzyme-oligosaccharide complexes and mutagenesis." Biochemistry 40(8);2359-72. PMID: 11327856 Huang03a: Huang W, Lunin VV, Li Y, Suzuki S, Sugiura N, Miyazono H, Cygler M (2003). "Crystal structure of Proteus vulgaris chondroitin sulfate ABC lyase I at 1.9A resolution." J Mol Biol 328(3);623-34. PMID: 12706721 Maruyama09: Maruyama Y, Nakamichi Y, Itoh T, Mikami B, Hashimoto W, Murata K (2009). "Substrate specificity of streptococcal unsaturated glucuronyl hydrolases for sulfated glycosaminoglycan." J Biol Chem 284(27);18059-69. PMID: 19416976 Nakamichi10: Nakamichi Y, Maruyama Y, Mikami B, Hashimoto W, Murata K (2010). "Structural determinants in streptococcal unsaturated glucuronyl hydrolase for recognition of glycosaminoglycan sulfate groups." J Biol Chem 286(8);6262-71. PMID: 21147778 Pojasek01: Pojasek K, Shriver Z, Kiley P, Venkataraman G, Sasisekharan R (2001). "Recombinant expression, purification, and kinetic characterization of chondroitinase AC and chondroitinase B from Flavobacterium heparinum." Biochem Biophys Res Commun 286(2);343-51. PMID: 11500043 Sato94a: Sato N, Shimada M, Nakajima H, Oda H, Kimura S (1994). "Cloning and expression in Escherichia coli of the gene encoding the Proteus vulgaris chondroitin ABC lyase." Appl Microbiol Biotechnol 41(1);39-46. PMID: 7512814 Shaya08: Shaya D, Hahn BS, Bjerkan TM, Kim WS, Park NY, Sim JS, Kim YS, Cygler M (2008). "Composite active site of chondroitin lyase ABC accepting both epimers of uronic acid." Glycobiology 18(3);270-7. PMID: 18227125 Zhang09b: Zhang Z, Park Y, Kemp MM, Zhao W, Im AR, Shaya D, Cygler M, Kim YS, Linhardt RJ (2009). "Liquid chromatography-mass spectrometry to study chondroitin lyase action pattern." Anal Biochem 385(1);57-64. PMID: 18992215 ©2015 SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493
<urn:uuid:5b5a55f7-0c45-4691-afb4-fa3a1e95d5cb>
CC-MAIN-2015-35
http://ecocyc.org/META/NEW-IMAGE?type=PATHWAY&object=PWY-6572
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.74006
1,932
2.796875
3
The response of the regional cerebral blood flow (CBF) to brain topical superfusion of an increased K+ concentration in the artificial cerebrospinal fluid (ACSF) ([K+ ]ACSF ) at 20 mM was characterised in a closed cranial window preparation in barbiturate anaesthetised and ventilated rats. It was concluded that the vasodilator nitric oxide (NO) is a modulator of the rise in CBF following increased [K+ ]ACSF . As a by-product of this study, we accidentally discovered spontaneous ischaemic responses of an unknown mechanism in response to the co-application of an inhibitor of the NO-synthase (NOS) with increased [K+ ]ACSF . These spontaneous ischaemic responses were characterised in the next study. It turned out that the spontaneous ischaemic responses to the co-application of a NOS inhibitor with increased [K+ ]ACSF were caused by an inverted coupling between neuronal/astroglial metabolism and CBF: The increased [K+ ]ACSF triggered a neuronal/astroglial depolarisation wave which, under physiological conditions, leads to a cortical spreading hyperaemia. However, under the conditon of NOS inhibitor with increased [K+ ]ACSF , the coupling was inverted so that vasoconstriction was induced instead of vasodilatation resulting in energy compromise. Under this condition, the neuronal/astroglial [Seite 15↓] network was unable to repolarise since the process of repolarisation requires energy. Because the vasoconstrictive stimulus was coupled to the neuronal/astroglial depolarisation, a vicious circle of prolonged ischaemia was established. That neuronal activation can induce ischaemia, was an unexpected finding. The most characteristic feature of this new ischaemic variant was its propagation in the cerebral cortex together with the neuronal/astroglial depolarisation wave. This caused us to name it ‘cortical spreading ischaemia’. The most potent natural NO-lowering agent is haemoglobin when it is released into the extracellular space. Haemoglobin binds NO with an affinity 1500 times higher than its affinity for oxygen at its haeme iron and reactive sulfhydril groups at cysteineβ 93. Therefore, we investigated whether cortical spreading ischaemia also occurred in response to haemoglobin and increased [K+ ]ACSF . We showed that this protocol was at least similarly effective as NOS inhibition with increased [K+ ]ACSF (Fig. 2). Haemoglobin (21.03 ± 0.75 mM) and K+ (102.4 ± 3.9 mM) are the protein and ion, respectively, with the highest concentration in the red blood cell. As described in PART I, DINDs occur in a close temporal correlation with haemolysis of the subarachnoid blood. The subarachnoid level of haemoglobin reaches its maximum on the seventh day after SAH (Pluta et al. 1998). Values of up to 500 µM have been reported from intracranial haematomas in humans (Ohta et al. 1980). Similarly, extracellular K+ concentrations of up to 50 mM were measured in intracranial haematomas in neurosurgical patients (Ohta et al. 1983). This led to the hypothesis that DINDs may be caused by a mechanism related to cortical spreading ischaemia. Under physiological conditions, a cortical spreading hyperaemia (upper trace, left part) (CBF = cerebral blood flow) is coupled to a spreading neuronal depolarisation wave (lower trace, left part) (DC = slow direct current potential) propagating from cranial window 1 to cranial window 2. However, when red blood cell products, haemoglobin and increased K+, are in the subarachnoid space, the coupling between neuronal activation and cerebral blood flow is inverted so that a cortical spreading ischaemia (upper trace, right part) is coupled to the spreading neuronal depolarisation wave (lower trace, right part). Due to a vicious circle, both depolarisation wave and its CBF response are prolonged under this condition (see text). In this study, we showed that cortical spreading ischaemia induced by haemoglobin and increased [K+ ]ACSF in the rat led to bell-shaped or laminar infarcts in the cortex very similar to the pathoanatomical pattern of DINDs in man (Fig. 1 ). That the lesions are essentially restricted to the brain cortex is explained by the fact that spreading neuronal depolarisation waves do not run in the white matter. Deeper structures may only be damaged [Seite 17↓] by the waves when long penetrating arteries are constricted at the cortical level. In this study, we investigated the effect of an NO-dependent and NO-independent vasodilator, S -nitroso-N -acetylpenicillamine and papaverine, respectively, on cortical spreading ischaemia produced by NOS inhibition with increased [K+ ]ACSF . We found that particularly the NO-donor but also papaverine was able to convert cortical spreading ischaemia to cortical spreading hyperaemia. The Brazilian physiologist Leão first described neuronal/astroglial depolarisation waves. He coined the name ‘cortical spreading depression’ in 1944. One year later, together with his colleague Morison, he came up with the hypothesis that cortical spreading depression may be the correlate of migrainous aura based on the striking resemblance of its electrophysiological features and the clinical presentation of migrainous aura. Cortical spreading depression is a short, regenerative depression of spontaneous neuronal activity in the grey matter that propagates at a rate of approximately 3 mm/min (Lauritzen 1994). The neuronal/astroglial depolarisation wave underlying cortical spreading ischaemia is not the same as but closely related to cortical spreading depression. Therefore, it was obvious to investigate whether migrainous aura-like symptoms may occur during the clinical course after SAH. Interestingly, within a short period of time, we found two patients with migraine who [Seite 18↓] experienced migrainous-aura like symptoms several minutes after the onset of acute headache induced by SAH. Both patients developed a DIND later on. Unfortunately, at the time of DIND, the patients were unable to adequately describe their symptoms because of a profoundly altered mental status. However, also the initially gained information on a migrainous aura-like attack as a symptom of SAH was remarkable since literature suggests the occurrence of spreading depression-like depolarisations at the acute stage of SAH in animal models (Hubschmann and Kornhauser 1980; Busch et al. 1998). Our findings were also of clinical value since migraine is the most important misdiagnosis of SAH, which can lead to a delay of aneurysm surgery (Edlow and Caplan 2000). The 21-residue peptide endothelin-1 has gained much attention in neurological and neurosurgical research being both a powerful vasoconstrictor and a neuronal and astroglial modulator. Numerous studies have investigated whether endothelin-1 is involved in the pathogenesis of arterial spasm after SAH (reviewed by Zimmermann and Seifert 1998). Endothelin-1 was also suggested to play a role in stroke and migraine. In our animal study, we demonstrated that this endothelium-derived factor is the most potent inductor of cortical spreading depression currently known. This may have implications particularly for migraine research since clinical observations strongly suggest that endothelial irritation may somehow initiate one of the pathways leading to cortical spreading depression. In addition, it may be of significance for DINDs since preliminary results indicate that endothelin-1 can replace increased [K+ ]ACSF in the protocol used to initiate cortical spreading ischaemia. Over the last 20 years, the risk to develop a DIND has significantly decreased. This has been related, at least partially, to the prophylactic use of nimodipine and improved fluid management (see above). In this study, we investigated whether nimodipine or moderate hypervolaemic haemodilution convert cortical spreading ischaemia produced by haemoglobin with increased [K+ ]ACSF to cortical spreading hyperaemia (compare II 4). The positive result of our study supported a link between DINDs and cortical spreading ischaemia (Fig. 3 ). It is often erroneously believed that the typical substrate of DINDs after SAH are territorial infarcts. This is not supported by the autopsy studies, which showed a large predominance of triangular, round or laminar cortical ischaemic lesions and, in addition, ischaemic patches in deeper cerebral structures (Robertson 1949; Falconer 1954; Birse and Tom 1960; Crompton 1964; Stoltenburg-Didinger and Schwarz 1987; Neil-Dwyer et al. 1994). In non-operated patients, the relation between autopsy cases with cortical to those with territorial infarcts was 13:1, while in operated patients, it was 3:1 due to a relative increase in the frequency of territorial infarcts (Stoltenburg-Didinger and Schwarz 1987). The significance of the cortical lesions is clinically underestimated because they are typically undetected by CT (Stoltenburg-Didinger and Schwarz 1987; Neil-Dwyer et al. 1994). We presented two cases demonstrating the suitability of magnetic resonance (MR) imaging to visualize such cortical lesions (Fig. 1 ). Comparison of cerebral blood flow (CBF)- and direct current (DC)-responses to the spreading neuronal/astroglial depolarisation wave (SND). While the upper two traces represent CBF at two different laser-Doppler positions, the lower trace gives the DC-potential at one cranial window. A Physiological artificial cerebrospinal fluid (ACSF) topically, 0.9% saline intravenously (control): The depolarisation wave is associated with a cortical spreading hyperaemia (CSH) under physiological conditions (= cortical spreading depression (CSD) of Leão). B ACSF containing haemoglobin ([Hb]ACSF ) and elevated K+ ([K+ ]ACSF ) topically, 0.9% saline intravenously: Cortical spreading ischaemia (CSI) in response to the depolarisation wave. C ACSF containing the red blood cell products topically, nimodipine is given intravenously at a dose of 2 µg/kg bodyweight/min (i.v.): Cortical spreading ischaemia reverts to a cortical spreading hyperaemia in presence of nimodipine. Only a short initial hypoperfusion (*) preceding cortical spreading hyperaemia indicates the presence of the red blood cell products in the subarachnoid space. The effect of moderate hypervolaemic haemodilution was similar to that of nimodipine. |© Die inhaltliche Zusammenstellung und Aufmachung dieser Publikation sowie die elektronische Verarbeitung sind urheberrechtlich geschützt. Jede Verwertung, die nicht ausdrücklich vom Urheberrechtsgesetz zugelassen ist, bedarf der vorherigen Zustimmung. Das gilt insbesondere für die Vervielfältigung, die Bearbeitung und Einspeicherung und Verarbeitung in elektronische Systeme.| |DiML DTD Version 3.0||Zertifizierter Dokumentenserver| der Humboldt-Universität zu Berlin |HTML-Version erstellt am:
<urn:uuid:e823fdd5-4a26-4dbc-9fee-ef701f67eb2b>
CC-MAIN-2015-35
http://edoc.hu-berlin.de/habilitationen/dreier-jens-p-2003-07-21/HTML/chapter2.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.865746
2,528
1.828125
2
Emacs-lisp (elisp) is a nice language to play around with code and try things as you develop them – explorative programming. I often use the buffer for that, but sometimes it's nice to use a so-called 'REPL' ( Read-Eval-Print-Loop) instead. A REPL is a sort-of command-line interface where your expressions are evaluated as soon as they are considered 'complete' and you press So, enter Emacs's built-in repl: IELM. You can activate it with and the interaction looks something like the following: *** Welcome to IELM *** Type (describe-mode) for help. ELISP> 123 123 ELISP> (+ 1 2) 3 ELISP> ;; comment ELISP> (defun fac (n) (if (= 0 n) 1 (* n (fac (- n 1))))) fac ELISP> (fac 5) 120 ELISP> By default, IELM evaluates complete expressions automatically as soon you as you press Enter. So one thing to remember is that if you want to have multi-line expression (like above), you must make sure that after each line the expression is not complete (i.e., the brackets are not balanced) -- otherwise the expression will be evaluated too early. That makes modes like autopair or paredit a bit inconvenient for this. If you don't like that behavior, you can do: (setq ielm-dynamic-return nil) which will allow you to Enter as much as you want and only evaluate things when C-j. But then you might as well use suppose. Personally, I use IELM mostly as a calculator.
<urn:uuid:50f33b06-071a-4de9-b726-3e78075b06d1>
CC-MAIN-2015-35
http://emacs-fu.blogspot.com/2011/03/ielm-repl-for-emacs.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.903553
370
2.578125
3
The Ministry of Health on Saturday launched a hygiene campaign to prevent hand, foot and mouth disease (HFMD), which has killed 153 people, mostly children, in Vietnam this year. The campaign called on parents and caregivers to instruct children to frequently wash their hands with soap in an attempt to prevent the HFMD viruses from spreading, the Lao Dong newspaper reported. The campaign's kick-off ceremony took place in the central province of Ninh Thuan, the first province in Vietnam to have declared the HFMD epidemic. According to the Health Ministry, HFMD has claimed 153 lives among around 90,190 infections in all parts of the country as of November 15. Ninety-one percent of the infections and 98 percent of the fatalities occurred in children under five, it said. In Ninh Thuan Province, four children among 630 infections have died from HFMD. The most common strains causing HFMD are Coxsackie A virus and Enterovirus 71 (EV-71). HFMD is moderately contagious and is spread through direct contact of the mucus, saliva, or feces of an infected person.
<urn:uuid:10f913fc-1590-4a48-bb14-943de4eb3fac>
CC-MAIN-2015-35
http://en.baomoi.com/Info/Health-ministry-launches-hygiene-campaign-as-HFMD-kills-153/9/207546.epi
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968555
229
2.890625
3
Syria said it had detected Israeli spying devices planted at certain point on the Syrian coast, the state-run SANA news agency said Wednesday. Syrian authorities have recently detected Israeli espionage devices at the Syrian coast, the report said, citing an official source as saying that the devices' functions include tapping, imaging and recording. The report, however, stopped short of spelling information about the exact location of the devices and the time of their discovery. Last month, Israeli war jets sneaked off radars and hit a center for scientific research in a suburb of Syrian capital Damascus. Western media said that the airstrike also hit another target: a convoy that was believed to be carrying weaponries to the Lebanese Hezbollah militant group, a staunch ally to Syria. Syria has technically been in a state of war with Israel since its creation in 1948. Their enmity has risen with the Syrian administration rendering support to the Hezbollah.
<urn:uuid:a9c9b60e-da0b-42ab-86a1-8bdebaf8af2f>
CC-MAIN-2015-35
http://english.cri.cn/6966/2013/03/07/2982s752224.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.95975
184
1.632813
2
I hear people use the term vis-à-vis all the time in place of what I believe should more correctly be for example or that is. What is the most generally accepted correct and appropriate use of vis-à-vis, and what are its origins? According to The Phrase Finder, the term is French and literally meant face-to-face. When the English picked it up in the 18th century, they started using it to describe a type of horse-drawn carriage wherein there are two seats, allowing occupants to sit across from one another in a face-to-face fashion. Usage eventually extended to include the alternate meaning of with regard to, and in modern-day discourse it is accepted to use with regard to and vis-à-vis interchangeably. In fact, many people will get confused when you use it to convey its original meaning since the alternate meaning has overshadowed it. As a complement to the other answers, as to the origins, here are the ways the phrase is used in French, which maybe helpful to gain a better insight of the various usages in English. In French, 'vis-à-vis' can be used as a preposition, an adverb or a noun. Facing, in the presence of: (archaic, regional Canada) Compared to : Relative to, figuratively: To be facing: Phrasal adverb, qualifier: Person facing someone else: The opposite facade: To be facing: To be facing, reflexively: To move into a facing position: (rare) To be facing (in English this renders no differently to the above) : Carriage with two facing seats: Small sofa, where two people can talk conveniently: (adapted from cntrl.fr) IMO, these days the expression vis-à-vis is often used in sentences where a comparison is being made. ---- and so forth. It is mostly used to paint a picture of something "pitted against" or "in the face of" or "as opposed to" something else. Hope this helps. When I hear/see people use it, I usually find they are using it to mean "as opposed to". I guess the face-to-face metaphor can mean the opposing opinion. Whether or not that is correct usage is slightly arbitrary, just my observation of how people seem to use it. Accepted English usage in the military and in corporate meetings I have personally been a part of are "in relation to" or "concerning". They can be used to refer to a geographic location, opinions, or two or more items. Thank you for your interest in this question. Because it has attracted low-quality answers, posting an answer now requires 10 reputation on this site. Would you like to answer one of these unanswered questions instead?
<urn:uuid:c66e9624-d065-48e7-ae1a-223f3e634c5a>
CC-MAIN-2015-35
http://english.stackexchange.com/questions/10010/what-is-the-correct-usage-of-vis-%c3%a0-vis/10064
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.947668
597
2.609375
3
What is the difference between "engaging with someone" and "engaging someone"? For example, what is the difference between these two expressions: - How do you engage with your employees? - How do you engage your employees? Engage with somebody means, as others have said, to interact with that person, usually from a position of greater power (managers are frequently exhorted to engage with employees, but rarely the other way round). Engage somebody has many possible meanings, depending on context: the army engage the enemy, you may engage somebody in conversation by simply going up and speaking to him, a pretty giri may engage (or behave engagingly to) the man she is interested in. The basic meaning is 'get involved with', which is similar to but not the same as the buzzword engage with. And, as Barrie says, the usual meaning without explanation of engage a man is to hire him (at least in Britain). The expressions mean the same thing, so I'd pick the shorter one. However, "engage" is a bit of a buzzword. I'd phrase this differently, depending on what's really meant. For example: Engage employees means recruit employees. Engage with employees means interact with them in a postive and mutually beneficial way. Thank you for your interest in this question. Because it has attracted low-quality answers, posting an answer now requires 10 reputation on this site. Would you like to answer one of these unanswered questions instead?
<urn:uuid:8ac66720-4986-41fd-9525-89ff7d406569>
CC-MAIN-2015-35
http://english.stackexchange.com/questions/60849/difference-between-engage-with-someone-and-engage-someone
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.969297
312
2.796875
3
Many people know that the cuckoo doesn't breed its own eggs. The female lays her eggs in the nest of other species, often times the meadow pipit, dunnock, sedge warbler, wagtail or the common redstart. These small birds brood the eggs and take care of the young cuckoos, which don't take long to grow bigger than their foster parents. Should they have any foster sisters or brothers, the cuckoo makes sure that they disappear. Adult cuckoos migrate to their winter homes starting in June. The young leave in August to tropical Africa. They have to figure out the route by themselves since they have never even seen their true parents. Cuckoos eat caterpillars. Even the hairy caterpillars which other birds avoid are eaten by the cuckoo. They merely spit out the hairs as a pellet. Furthermore, the bird gladly eats other insects such as beetles. No one has provided updates yet.
<urn:uuid:49e3822d-b6b9-48e4-b2fb-2024d0a0b341>
CC-MAIN-2015-35
http://eol.org/data_objects/23204447
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.978003
199
3.359375
3
Scientists aim to describe a single 'tree of life' that reflects the evolutionary relationships of living things. However, evolutionary relationships are a matter of ongoing discovery, and there are different opinions about how living things should be grouped and named. EOL reflects these differences by supporting several different scientific 'classifications'. Some species have been named more than once. Such duplicates are listed under synonyms. EOL also provides support for common names which may vary across regions as well as languages. marks the preferred classification for this taxon. EOL content is automatically assembled from many different content providers. As a result, from time to time you may find pages on EOL that are confusing. To request an improvement, please leave a comment on the page. Thank you!
<urn:uuid:850a9681-f375-4b54-944d-278c8c79631d>
CC-MAIN-2015-35
http://eol.org/pages/1157336/names
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.934115
155
2.328125
2
Lueck, C. J. and Tanyeri, S. and Kennard, C. and Crawford, Trevor and Henderson, L. (1992) Saccadic Eye Movements in Parkinson's Disease: I. Delayed Saccades. Quarterly Journal of Experimental Psychology Series a Human Experimental Psychology, 45 (2). pp. 193-210. ISSN 0272-4987Full text not available from this repository. The saccadic eye movements of nine patients with Parkinson’s disease were compared to those of nine age-matched controls in two paradigms generating volitional saccades. In both paradigms. subjects had to make delayed saccades to peripheral LED targets: a peripheral target appeared 700 msec before a buzzer sounded, the buzzer being the signal to make a saccade to the target. In the first paradigm (“centre-off“), the fixation target was extinguished simultaneously with buzzer onset. In the second (“centreremain”) it was not extinguished until 1000 msec later. The results showed that for outward saccades in both paradigms, there was no difference between Parkinsonian patients and controls, but saccadic latencies were significantly shorter in the “centre-remain” paradigm. The initial outward saccades were indistinguishable from the normal, reflex saccades of the same subjects. However, saccades returning to the centre (a type of remembered target saccade) were hypometric and showed multistepping. Both effects were more pronounced in patients with Parkinson’s disease. The significance of these findings in terms of current hypotheses about the nature of the Parkinsonian saccadic deficit is discussed. |Journal or Publication Title:||Quarterly Journal of Experimental Psychology Series a Human Experimental Psychology| |Uncontrolled Keywords:||Saccade ; Parkinson's disease| |Subjects:||B Philosophy. Psychology. Religion > BF Psychology| |Departments:||Faculty of Science and Technology > Psychology| |Deposited On:||16 Oct 2012 14:50| |Last Modified:||07 Jan 2015 17:53| Actions (login required)
<urn:uuid:534e23d7-a26f-4f2b-ab36-cf6a46b0879d>
CC-MAIN-2015-35
http://eprints.lancs.ac.uk/58201/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.875528
458
1.828125
2
Item and error analysis on Raven's coloured progressive matrices in Williams syndrome Van Herwegen, Jo and Farran, Emily and Annaz, Dagmara (2011) Item and error analysis on Raven's coloured progressive matrices in Williams syndrome. Research in Developmental Disabilities, 32 (1). pp. 93-99. ISSN 0891-4222 Full text is not in this repository. Official URL: http://dx.doi.org/10.1016/j.ridd.2010.09.005 This item is available in the Library Catalogue Raven’s Coloured Progressive Matrices (RCPM) is a standardised test that is commonly used to obtain a non-verbal reasoning score for children. As the RCPM involves the matching of a target to a pattern it is also considered to be a visuo-spatial perception task. RCPM is therefore frequently used in studies in Williams Syndrome (WS), a rare genetic disorder, in order to match WS participants to a control group or as a single measure to predict performance on a test-condition in developmental trajectory analyses. However, little is known about the performance of participants with WS on the RCPM. The current study compared the type of errors and the difficulty of each item for 53 participants with WS to 53 typically developing children who were individually matched by the total raw score for RCPM. Results showed that the participants with WS made the same proportion of error types and that the proportion of error types changed similarly to those of typically developing controls over development. Furthermore, the differential item difficulty between the two groups was highly similar. It is therefore argued that, although participants with WS are delayed on RCPM, their performance is not atypical which suggests that RCPM performance is supported by typical mechanisms. The RCPM is therefore a useful tool to match WS to control groups or to construct developmental trajectories. |Research Areas:||A. > School of Science and Technology > Psychology| |Citations on ISI Web of Science:||4| |Deposited On:||18 Apr 2011 10:53| |Last Modified:||17 Oct 2013 14:35| Repository staff only: item control page Full text downloads (NB count will be zero if no full text documents are attached to the record) Downloads per month over the past year
<urn:uuid:4a10a057-d0c1-46cc-b703-a4c5cab849c5>
CC-MAIN-2015-35
http://eprints.mdx.ac.uk/7651/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.899188
483
1.820313
2
Multirate Space-Time-Frequency Linear block coding Zhang, Min, Abhayapala, Thushara D., Jayalath, Dhammika, Smith, David, & Athaudage, Chandranath R. N. (2008) Multirate Space-Time-Frequency Linear block coding. In IEEE International Conference on Communications, 2008. ICC '08., 19-23 May 2008, Beijing, China. This paper presents a multirate space-timefrequency linear block coding scheme (STFBC) with full transmit diversity for a variety of transmission rates. The proposed multirate STFBC can achieve relatively smooth balance between the performance and the transmission rate for a given constellation size. Design of a space-time linear block coding (STBC) scheme is presented as a special case of the proposed multirate STFBC, which perform better than some of the existing STBCs. Moreover, optimized multirate STFBCs have also been compared with some of the existing STFBCs. Simulations results show that the design parameter has sufficient flexibility to achieve improved performance with reduced computational complexity. Impact and interest: Citation counts are sourced monthly from and citation databases. These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards. Citations counts from theindexing service can be viewed at the linked Google Scholar™ search. Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one. |Item Type:||Conference Paper| |Keywords:||Space, Time, Frequency Coding, Linear Block Codes, MIMO, OFDM| |Subjects:||Australian and New Zealand Standard Research Classification > TECHNOLOGY (100000) > COMMUNICATIONS TECHNOLOGIES (100500) > Communications Technologies not elsewhere classified (100599)| |Divisions:||Past > QUT Faculties & Divisions > Faculty of Built Environment and Engineering| |Copyright Owner:||Copyright 2008 IEEE| |Copyright Statement:||Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.| |Deposited On:||12 Jun 2008| |Last Modified:||29 Feb 2012 13:42| Repository Staff Only: item control page
<urn:uuid:03b464a6-da61-4316-a2c3-975327e44881>
CC-MAIN-2015-35
http://eprints.qut.edu.au/13680/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.847893
610
1.765625
2
Browse by Creator Number of items: 13. Condon, L. and Ingram, J. (2011) Increasing support for breastfeeding: What can Children’s Centres do? Health and Social Care in the Community, 19 (6). pp. 617-625. ISSN 0966-0410 Condon, L., Ingram, J., Hamid, N. and Hussein, A. (2003) Cultural influences on breastfeeding and weaning. Community Practitioner, 76 (9). pp. 344-349. ISSN 1462-2815 Deave, T., Johnson, D. and Ingram, J. (2008) Transition to parenthood: the needs of parents in pregnancy and early parenthood. BMC Pregnancy and Childbirth, 8:30. Ingram, J., Deave, T., Towner, E., Errington, G. and Kay, B. (2012) Identifying facilitators and barriers for home injury prevention interventions for pre-school children: A systematic review of the quantitative literature. Health Education Research, 27 (2). pp. 258-268. ISSN 0268-1153 Ingram, J., Johnson, D. and Condon, L. (2011) The effects of Baby Friendly Initiative training on breastfeeding rates and the breastfeeding attitudes, knowledge and self-efficacy of community health-care staff. Primary Health Care Research and Development. ISSN 1463-4236 Ingram, J. and Salmon, D. (2010) Young people’s use and views of a school-based sexual health drop-in service in areas of high deprivation. Health Education Journal, 69 (3). pp. 227-235. ISSN 0017-8969 Ingram, J. and Salmon, D. (2010) An evaluation of a nurse led Sexual Health Outreach Service in schools. Health Education Journal, 69 (3). pp. 227-235. ISSN 0017-8969 Ingram, J. (2008) Are farmers in England equiped to meet the knowledge challenge of more sustainable soil management? An analysis of farmer and advisor views. Journal of Environmental Management, 86 (1). pp. 214-228. ISSN 0301-4797 Ingram, J. and Salmon, D. (2007) “No worries!” Young peoples experiences of nurse-led drop-in sexual health services in South West England. Journal of Research in Nursing, 12 (4). pp. 305-316. ISSN 1361-4096 Ingram, J. and Morris, C. (2007) The knowledge challenge within the transition towards sustainable soil management: an analysis of agricultural advisors in England. Land Use Policy, 24 (1). pp. 100-117. ISSN 0264-8377 Mytton, J., Ingram, J., Manns, S., Stevens, T., Mulvaney, C., Blair, P., Powell, J., Potter, B., Towner, E., Emond, A., Deave, T., Thomas, J., Kendrick, D. and Stewart-Brown, S. (2014) The feasibility of using a parenting programme for the prevention of unintentional home injuries in the under-fives: A cluster randomised controlled trial. Health technology assessment, 18 (3). pp. 1-184. ISSN 2046-4924 Mytton, J., Ingram, J., Manns, S. and Thomas, J. (2013) Facilitators and barriers to engagement in parenting programmes: A qualitative systematic review. Health Education and Behavior, 41 (2). pp. 127-137. ISSN 1090-1981 Mytton, J., Towner, E., Kendrick, D., Stewart-Brown, S., Emond, A., Ingram, J., Blair, P., Powell, J., Mulvaney, C., Thomas, J., Deave, T. and Potter, B. (2013) The first aid advice and safety training (FAST) parents programme for the prevention of unintentional injuries in preschool children: A protocol. Injury Prevention. ISSN 1353-8047 This list was generated on Thu Aug 27 02:51:06 2015 BST.
<urn:uuid:403c129c-d1a8-4293-a2fe-67ac8ee8def3>
CC-MAIN-2015-35
http://eprints.uwe.ac.uk/view/author/Ingram=3AJenny=3A=3A.creators_name.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.778667
877
1.882813
2
ESRL Global Systems Division Speeding Up Science Using GPUs ESRL's Global Systems Division (GSD) develops next-generation weather models and has historically advanced high-performance computing for NOAA due to their need for larger, more powerful computers. Researchers at GSD began exploring GPUs a year ago and recently completed the parallelization of a large portion of the Non-hydrostatic Icosahedral Model (NIM) (the next generation Flow-following, finite-volume Icosahedral Model or FIM) and ran it on a GPU. The model ran twenty-five times faster on the GPU than the CPU. This is a significant and exciting result: it will allow NOAA scientists to continue developing weather and climate prediction models that use next-generation HPC systems to produce more timely and accurate forecasts. Graphical Processor Units (GPUs) are considered by many to be the next frontier in High Performance Computing (HPC). CPU systems requiring over 200,000 cores are being built toward achieving over a petaFLOPS of computing necessary to run climate models and global weather models at cloud-resolving scales (3-4 km horizontal resolution) within three years. However, systems of this size are impractical for weather forecasting for many reasons including power and cooling requirements, infrastructure costs, system reliability, and power costs. Power bills alone account for over $1M in moderate-sized systems today; future CPU-based systems being proposed could require $100M annually if conventional CPUs are used. GPUs are cheap, powerful processors designed for life-like video games and until recently used primarily by the gaming community. The HPC community's interest in GPUs was sparked when a high-level language called CUDA was released that allows programmers to write code for GPU processors. With CPU performance stalling, vendors have been forced to increase the number of cores per chip at the expense of increased power and cooling requirements. By providing faster, cheaper calculating power and volume-handling storage of our supercomputers, our scientists can produce more accurate ocean, air quality, and environmental models that lead to a better understanding of our complicated Earth system. Name: Mark W Govett
<urn:uuid:8a8afd31-ecb9-4bf2-92da-d8259e5ef7b3>
CC-MAIN-2015-35
http://esrl.noaa.gov/gsd/media/hotitems/2009/09Oct19.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.935957
443
3.171875
3
Snow Level Radar PSD staff designed, built, and deployed a new network of snow-level radars in California. Snow level, the altitude in the atmosphere where snow changes into rain, is a critical parameter influencing runoff in mountainous watersheds because it determines the surface area of the watershed that will be exposed to rain versus snow. When the snow level is above most or all of the terrain in a watershed, a storm is more likely to produce enough rapid runoff to cause flooding. If the snow level is low in a watershed, then a storm increases the snowpack, providing valuable storage of water for potential later use. The snow-level radar (Fig. 1) was designed specifically as part of a project with the California Department of Water Resources (CA-DWR) to provide a 21st century observing systems to help address water resource and flood control issues. This project will apply lessons learned from more than a decade of research on West Coast winter storms conducted by ESRL and partners under HMT, including the first-ever evaluations of operational snow-level forecasts that used an earlier generation of radar technology. The snow-level radar utilizes modernized frequency-modulated, continuous wave (FM-CW) technology, which only uses less than a watt of transmitted power. This dramatically reduces the price of the radar components. The snow-level radar can be built for approximately 1/10th of the price of one of the current state-of-the-art pulsed radars used for the same purpose. The radar operates at 2.835 GHz, which is ideal for measuring the properties of precipitation because at this frequency there is very little weakening of the radar signals by precipitation. Snow-level detection (Fig. 2) is based on an automated algorithm1 developed by CIRES and ESRL scientists. A five-year agreement with CA-DWR calls for ten snow-level radars to be deployed in key watersheds across the state. Four of these radars have already been deployed at or near major California reservoir dams: Shasta Dam, Colfax (above Folsom Dam), New Exchequer Dam, and Pine Flat Dam. Figure 3 shows where these radars are located along with the deployment plan for the six remaining radars. The radars are part of an unprecedented observing network that will provide critical information on the forcings of extreme precipitation and flooding, as well as long-term climate observations to help decision makers adapt to a changing climate.
<urn:uuid:640250e3-5551-4644-be18-da9f5eecd035>
CC-MAIN-2015-35
http://esrl.noaa.gov/psd/psd2/technology/snow-level-radar.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.942186
500
3.359375
3
There has been a lot of talk recently about the cost of petrol, Colin Charles is one of the few people to consider the issue of wages in this discussion . Unfortunately almost no-one seems to consider the overall cost of running a vehicle. While I can’t get the figures for Malaysia (I expect Colin will do that) I can get them for Australia. First I chose a car that’s cheap to buy, reasonably fuel efficient (small) and common (cheap parts from the wreckers) – the Toyota Corolla seemed like a good option. A search on www.drive.com.au shows adverts for Corollas made in 1990 and 1991 for prices ranging from $3000 to $5000. Assuming some optimism on behalf of the advertisers I could probably buy one for about $2500. The current term deposit rate from the major Australian banks is just over 8%, so spending $2500 on a car (instead of having the money in a term deposit) means a loss of $200 per annum interest, if instead the car was purchased with a bank loan the rate would be significantly higher (car loans have quite high interest rates). Of course the real cost is whenever you sell a car and buy a newer one that costs more – but this is harder to estimate. The next issue is insurance, for a 1990 Corolla of the smallest engine size (as a rule of thumb the smaller the engine the smaller the insurance bill) comprehensive insurance (sans optional extras such as windscreen protection) would cost me $489 per annum, and third-party fire and theft would cost me $398. Of course those rates are for someone who is more than 25 years old and has a good driving record. The majority of people who “flip burgers” appear to be younger than 25 and would therefore pay more. Car registration starts at about $550 per annum (varies by state). Car service would cost at least $200 a year (for scheduled services). So it seems that the cost of a cheap car is around $1,350 per annum before you even drive it! Now with a car that’s 18 years old you have to expect that some parts are wearing out, including parts that make it unroadworthy and must be replaced. Assuming that $300 per annum is spent on parts and labor to repair parts that wear out seems quite conservative (especially if driving a car that costs less than $3,000 – one of the cheaper cars in that age range). That brings the total cost per year to $1,650 if you are lucky (if unlucky then expensive parts could wear out at financially inconvenient times). The amount of driving that I do is around 5,000 to 7,000km per annum (according to the ABS the average passenger vehicle was driven 14,100Km in 2005 ). Assuming 7.5L/100Km (one of the results that has been quoted for fuel efficiency of a car of that age) and 7,000Km of driving that would be 525L of petrol per year, at $1.70 that is $892. So at current fuel prices when driving a small car for minimal distances (either for environmental or financial reasons) the cost of petrol may be about 35% of the vehicle operating cost. If driven for the average distance the fuel cost will be about 52% of the total vehicle operating cost (which is about $3,400) – which seems like a reasonable incentive to save fuel. If someone wants to advocate measures to make cars more affordable for poor people then the first thing to consider would be a reduction in the vehicle registration fees (which are a significant part of the vehicle operating costs). Another would be government incentives for car sharing schemes (see my previous post on car sharing for details on what is on offer in Melbourne at the moment ), $3,400 would give 340 hours (or more with the weekend deals) of driving a shared car (including fuel) at current prices. A shared car would not be suitable for driving to work but would be good for most other car use. Also it should be noted that share cars are new and have all the latest safety features – I really wouldn’t want to be involved in a crash while driving a 20yo car. Unlike the costs of registration etc for owning a car, all the costs of a shared car will be reduced if you use it less. The tax rate for someone earning $28,579.20 is $2,850 plus 30c for each $1 over $25,000 , which is $3,923.76, which leaves a total after tax income of $24,655.44. Someone working 40 hours a week on the minimum income who drives an average distance will spend about 14% of their after-tax income on their car if they have a small old car and were able to buy it without borrowing money. According to the ABS the median income is actually slightly lower than full-time work at the minimum wage . So it seems that there are many people who are working part-time and earning less money than they would if they worked full-time at the minimum wage. So the question for Colin is, how does this compare to Malaysia? Is someone on a minimal income in Malaysia going to spend ~7% of their after-tax income on paying insurance, tax, and basic maintenance on a car without the additional expense of driving it? How does the cost of the basic car ownership compare to the cost of fuel in Malaysia? - http://www.bytebot.net/blog/archives/2008/06/15/on-fuel-subsidies-and-earningspending-power - http://www.abs.gov.au/AUSSTATS/abs%40.nsf/mediareleasesbyReleaseDate/66E24E957EB09229CA2571E10077D71D?OpenDocument - http://www.ato.gov.au/individuals/content.asp?doc=/content/12333.htm&mnu=5053&mfp=001 - http://www.abs.gov.au/AUSSTATS/abs%40.nsf/7d12b0f6763c78caca257061001cc588/96e08af8f4178a45ca257306000d4fd4!OpenDocument - http://etbe.coker.com.au/2008/04/13/car-sharing-in-melbourne/
<urn:uuid:dd4defb9-5305-4f7d-bc32-6d37cdf448d5>
CC-MAIN-2015-35
http://etbe.coker.com.au/2008/06/16/cost-owning-car/comment-page-1/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.96651
1,357
1.765625
2
On 31 August and 1 September 2009, Berlin was the venue for the symposium "Child poverty – a European challenge”, organised by the Commission of the Associations of German Associations for Family Affairs (AGF). The event brought together over 100 participants from 17 European counties, including representatives of NGOs and family associations, as well as national governments and EU officials. The first day presentations and discussions covered a wide range of themes, from the current poverty rates of children and adolescents in the EU, tools and methods for measuring child poverty at the national and international levels, to child poverty and children’s rights from the child’s perspective. "19 million children in the EU are currently living in poverty and experiencing many forms of exclusion", said Edith Swab, Chairwoman of the AGF, who opened the event. "Children living in single-parent, low-income and large families, as well as those coming from an immigrant background, are the most affected." Mrs Swab also warned that the number of poverty-stricken children is likely to increase, considering the current financial and economic crisis in many EU countries. Participants stressed that there was a long way to go to eradicate child poverty in the EU. Poverty rates vary enormously across the EU, ranging from low levels in Scandinavian countries (13% in Denmark, 15% in Sweden) to acute levels in others, such as 36% in Portugal or 42% in Romania. The second day focussed on the EU strategy in the fight against child poverty, in terms of its tools but also its limits. In recent years, the European Union has increasingly been concerned with the problem of child poverty, which is reflected in the decision to designate 2010 as the European Year for combating poverty and social exclusion. Antonia Carparelli from the European Commission’s unit for Inclusion and Social Policy gave a comprehensive overview of the EU strategy in place for fighting poverty and social exclusion of children. Mrs. Carparelli reiterated the EU’s commitment in the fight against poverty and social exclusion of children and explained the Open Method for Cooperation in the field of social policy – a mechanism for coordinating and taking forward the agenda on fighting child poverty. She also stressed that in 2006-2008 reports, the EU Members States pledged to develop a strategic, integrated and long-term approach to preventing and addressing poverty and social exclusion among children. She noted however that "delivery on common objectives remains a challenge for many countries". Discussions turned to a position paper prepared by the AGF, which highlighted key areas in the fight against child poverty and recommended measures to be taken by national governments and the EU. The symposium participants called for a holistic, child-centred approach to addressing child poverty, ensuring educational opportunities irrespective of social background, as well as allowing children and their parents to make their voices heard in the decision-making process. Concrete recommendations included setting an EU-wide target to reduce child poverty by 50% by 2020. The paper also urged streamlining of the indicators for measuring and evaluating child poverty in order to target them more at the real problems encountered by children and their families, in particular the most vulnerable groups. The agenda, the position paper and presentations will soon be available at the website of the Commission of the Associations of German Associations for Family Affairs (AGF).
<urn:uuid:8b043e40-39ac-4ea3-8494-394fb07612ac>
CC-MAIN-2015-35
http://europa.eu/epic/news/2009/20091201_en.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.948067
684
2.140625
2
Middle class sitting in the driver's seat for consumption Updated: 2013-11-14 00:51 By Shi Jing (China Daily) Consumers wield influence with brands, reports Shi Jing in Shanghai China's emerging middle class is growing up, preparing to make its presence known in terms of the nation's economic growth. According to the Discover China's Emerging Middle Class survey released by ZenithOptimedia, China's emerging urban middle class totaled 125 million in 2012, and the number is expected to reach 356 million by 2020. It's a group with great potential to boost the country's consumption, and in the long term, the economy. "The Chinese middle class is not necessarily the richest, as a large number of young people are put into this category, but they definitely promise more wealth with a bigger purchasing power in the near future," said Steven Chang, CEO of ZenithOptimedia Greater China. The report is based on the findings of a survey of about 17,700 respondents in 150 cities, the largest study of its kind so far. Definitions of China's middle class vary among the different research firms and institutions. But as Gerry Boyle, chairman of ZenithOptimedia Asia Pacific explained, middle-class families in the West have about 30 percent of their income left over after all their basic expenditures have been made, with the lion's share of that leftover income devoted to healthcare and their children's education. According to a recent Pew Research Center survey, people across a wide range of income levels, including those making less than $30,000 and more than $100,000 a year, identify as being middle class in the United States. ZenithOptimedia believes that the Chinese middle class includes those with an annual household income of at least 72,000 yuan ($11,815) in tier-one and tier-two cities, and 48,000 yuan in tier- three and -four cities. Among the respondents, 57 percent reported an average annual household income of 179,000 yuan, with most of these possessing higher academic degrees. About 70 percent of this wealthy group was above 35 years old. Huang Haibo is a well-known actor who has had frequent appearances on the TV series We Get Married. Playing a civil servant on the show, Huang learned that a person earning a monthly salary of 8,000 yuan or an annual income of around 120,000 yuan, roughly the income of a civil servant, is qualified to be called middle class. "Working as an actor in China helps me to live quite well. To be honest, I think my income is way beyond the entry level of the middle class," Huang said at a news conference held by ZenithOptimedia. In addition to having a comfortable income, members of China's middle class also own their own cars or at least have the intention of purchasing one soon. That is reflected in ZenithOptimedia's survey, in which 71 percent of the respondents said they own a car, while 50 percent plan to buy one within the next six months. In tier-four cities, 75 percent of those identifying as middle class are more anxious to buy a car than a luxury watch. In addition, the Chinese middle class seems drawn to modern technology, such as the Internet, smartphones or tablets. Daily use of the Internet among the Chinese middle class is 34 percent higher than the general public, the survey said. Time spent on digital media also was reportedly higher than was devoted to TV, said ZenithOptimedia CEO Chang. "But the advertisers have not invested enough regarding the new habits of the emerging middle class. About 45 percent of their time is devoted to the Internet, but money invested to that end only takes up about 16 percent," Chang said. "The middle class spent about 10 percent of their time on online video, but only 1.5 percent of advertising money is targeting this part. It means that advertisers or brands still have much room of improvement," he said. The study comes at a time when the central government is addressing the importance of consumption, which is said to be the major driving force for the country's economic growth. By 2020, China's household domestic consumption is expected to account for half of the nation's total output, according to the National Bureau of Statistics. The middle class is said to be spearheading that consumption. Not only does this group have a better understanding of brands, but ZenithOptimedia said its members are enthusiastic consumers. The luxury watches they buy each year are worth an estimated 49 billion yuan. They reportedly consume 2.7 billion cups of coffee and buy 5.1 million cars a year. And the amount they spend on travel will soon reach 300 billion yuan annually. Andrew Leong, head of strategic resources for ZenithOptimedia Greater China, believes it is a dream many aspire to. About one-tenth of China's population belongs to the middle class, but many are working hard to reach that kind of lifestyle soon. Zhu Xiangyang, chief content officer for China's leading online video provider Youku, said it is adjusting its content to reflect the taste of the middle class, with its growing influence and higher purchasing power. "Although the middle class is a relatively new concept in China, it has already grown into a dream that a lot of people look up to. We have seen that quite a large number of people are working hard to attain that goal," he said. Apart from the income, middle class is more of lifestyle or a sense of what you have, Boyle concluded. "Middle-class people usually desire more in their lives, and they are very ambitious." Contact the writer at email@example.com
<urn:uuid:3ebcf426-c373-41e2-bfdf-c8cc413def90>
CC-MAIN-2015-35
http://europe.chinadaily.com.cn/business/2013-11/14/content_17103506.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.96774
1,168
1.796875
2
Pi"broch (?), n. [Gael. piobaireachd pipe music, fr. piobair a piper, fr. pioba pipe, bagpipe, from English. See Pipe, n.] A Highland air, suited to the particular passion which the musician would either excite or assuage; generally applied to those airs that are played on the bagpipe before the Highlanders when they go out to battle. © Webster 1913.
<urn:uuid:fd1d5aa5-61fd-440a-998a-dc1213844f7b>
CC-MAIN-2015-35
http://everything2.com/title/Pibroch
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.897627
96
2.765625
3
Monday, April 14, 2008 Sunday, January 09, 2005 Love & Sex the vole story - Enhanced partner preference in a promiscuous species by manipulating the expression of a single gene. Lim MM, Wang ZX, Olazabal DE, Ren XH, Terwilliger EF, and Young LJ (2004). Nature. 429(6993): 754-757. (PDF) - Love Is A Virus Posted by Carl Zimmer The prairie vole is a five-percenter. When a male prairie vole mates, something happens to his brain. He tends to stay near her, even when other females are around, and then helps out with the kids when they arrive--grooming them, huddling around them to keep them warm, and so on. By contrast, the meadow vole, a close relative, is a ninety-five percenter. Male meadow voles typically couldn't care less. They're attracted to the scent of other females and don't offer parental care. Scientists have searched for years now for the molecular basis for this difference. One promising candidate was a molecule called the vasopressin V1a receptor (V1aR). In certain parts of the brains, male prairie voles produce more V1aR than meadow voles. To test whether this difference had anything to do with the dedication of male meadow voles, Larry Young of Emory University and his colleagues injected a virus carrying the V1aR gene into the brains of medow voles. As they report today in Nature, the virus caused the meadow voles to begin huddling with their mates almost as loyally as prairie voles.
<urn:uuid:afbcc9d2-aad6-4272-a303-f1e793204d26>
CC-MAIN-2015-35
http://evolutionnews.blogspot.com/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.950811
355
2.390625
2
- Take Action - Donate Now Racial Wealth Divide Racism and inequality are not relics of the past. Both historical and contemporary barriers to wealth creation among communities of color have resulted in a disproportionate wealth divide among people of color that exists today. UFE’s Racial Wealth Divide (RWD) program seeks to deepen the public’s understanding about boundaries to economic parity among communities of color. It does this by providing resources that emphasize the importance of wealth and wealth-building strategies among communities struggling to attain greater economic equality. Continue... March 12, 2015 Our Popular Economics Education Team is co-hosting UFE's renowned Popular Economics Training of Trainers in May 2015 in Aurburndale, MA. We invite organizers, activists, educators, students, and others across the U.S. who want to join and advance the movement for a just economy, to attend.
<urn:uuid:0b5f3bf7-5708-4c3f-a747-baeea8f9d55b>
CC-MAIN-2015-35
http://faireconomy.org/racial_wealth_divide
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.922188
186
2.0625
2
The amount of trans fat in the American bloodstream fell by more than half after the Food and Drug Administration required food manufacturers to label how much of the unhealthful ingredient is in their products, according to a new study. Blood levels of trans fat declined 58 percent from 2000 to 2008. FDA began requiring trans-fat labeling in 2003. During the same period several parts of the country — New York most famously — passed laws limiting trans fats in restaurant food and cooking. The makers of processed food also voluntarily replaced trans fats with less harmful oils. The decline, unusually big and abrupt, strongly suggests government regulation was effective in altering a risk factor for heart disease for a broad swath of the population. Thursday, February 09, 2012 It Ain't All Bad For all those who insist that government regulation is bad and always a failure there is this little bit of good news.
<urn:uuid:f6112c12-fa01-4f11-8f6f-da64b1966326>
CC-MAIN-2015-35
http://fallenmonk.blogspot.com/2012/02/it-aint-all-bad.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.945955
177
2.3125
2
Negroes Quotes and Quotations Not for myself I make this prayer, But for this race of mine That stretches forth from shadowed places Dark hands for bread and wine. The image of God cut in ebony. O black and unknown bards of long ago, How came your lips to touch the sacred fire? How, in your darkness, did you come to know The power and beauty of the minstrel's lyre? In the Negro countenance you will often meet with strong traits of benignity. I have felt yearnings of tenderness towards some of these faces. The best way to uncolor the Negro is to give the white man a white heart. The Negro is an exotic of the most gorgeous and superb countries of the world, and he has deep in his heart a passion for all that is splendid, rich and fanciful.
<urn:uuid:887141d4-fd8e-4d4b-80ac-7ad1f3650926>
CC-MAIN-2015-35
http://famousquotesandauthors.com/topics/negroes_quotes.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.949762
180
1.859375
2
Prime Minister Stephen Harper and his cabinet have approved an extensive new long-term plan for renovation and reconstruction of the aged and decaying buildings on Parliament Hill. But the Department of Public Works says the plan will remain secret until September, when the government will also reveal a new timetable for vacating MPs and Commons staff from the crumbling and asbestos-ridden West Block. Meanwhile, as tourists flock to the Hill this summer, even the deteriorated conditions of pedestrian areas have proven dangerous. A section of stone sidewalk directly under the Peace Tower is now blocked off with a steel fence after an elderly woman recently stumbled on a section that had become loose and struck her head. The government has now budgeted $13.4 million for an "emergency" stabilization and restoration project for the southeast tower of the West Block alone, Ms. Brosseau said in another e-mail. A further $6.5 million has already been spent simply erecting scaffolding and protective wrapping -- to protect pedestrians and cars from falling rock or mortar -- on three other West Block towers. The reconstruction is yet to begin, and the cost of the scaffolding and wrapping nets alone, along with supportive steel cables around the towers, suggests the eventual cost of reconstruction will be enormous. Key word "enormous" cost. The last time I was in Ottawa, I remember the Parliament building being shrouded in scaffolding, which apparently lasted for quite some time. As a student of history, I can appreciate the automatic desire to repair, renovate, re-tool, update, re-model, modernize, afterall the building is a key national symbol. However, if you can detach yourself from the romantic for a minute, I think it an open question whether the nation is better served by a new building, that is naturally equipped to deal with the modern circumstance. Much of the history could be salvaged within a new structure, not to mention the practical, with a government building able to accomodate growth. Is it better to have structures in perpetual repair? I'm just throwing this opinion out there, should we start fresh?
<urn:uuid:e37fc4b1-aa74-46bb-8b49-80430b8b4aed>
CC-MAIN-2015-35
http://farnwide.blogspot.com/2007/08/repair-or-bulldoze.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.956349
428
1.65625
2
Joint fundraising is fundraising conducted jointly by a political committee and one or more other political committees or unregistered organizations. Joint fundraising rules apply to: - Party committees; - Party organizations not registered as political committees; - Federal and/or nonfederal candidate committees; - Nonparty, unauthorized political committees (nonconnected PACs); and - Unregistered nonparty organizations. 11 CFR 102.17(a)(1)(i) and (2). Joint fundraising rules do not apply to fundraising by separate segregated funds and their collecting agents 11 CFR 102.17(a)(3). Instead, such organizations may only jointly raise funds with another affiliated committee or organization (for example, a related state PAC of a federal SSF) under FEC regulations at 11 CFR 102.6. See Chapter 3, Section 9 of the Campaign Guide for Corporations and Labor Organizations. Joint Fundraising Representative Joint fundraising participants must either establish a new political committee (using a Statement of Organization, FEC Form 1) or select a participating political committee to act as the joint fundraising representative. 102.17(a)(1)(i). If the joint fundraising committee is a new committee, it must file a Statement of Organization (FEC Form 1) and check box 5(g) or (h) for the type of committee. If, on the other hand, the representative is an existing committee, it must amend its Statement of Organization. In either instance, the Statement of Organization must: - Identify the committee as the joint fundraising representative; - List the names and addresses of all federal committees participating in the joint fundraising effort; and - Name the depository institution being used by the joint fundraising committee. In the case of a representative that is an existing committee, the depository is named only if it is different from the depository named on the committee’s current Statement of Organization. 11 CFR 102.2 and 102.17(c)(3)(i); See also the instructions for FEC Form 1. Establishing the Account Joint fundraising participants or the joint fundraising representative must establish a separate account to be used solely for the receipt and disbursement of all joint fundraising proceeds. 11 CFR 102.17(c)(3)(i). The joint fundraising representative must deposit contributions into the separate account within 10 days of receiving them. Only contributions permissible under the Act may be deposited in the joint fundraising account. If any participant is an unregistered organization which may, under state law, accept prohibited contributions, the participants may either establish a second account for such contributions or forward them directly to the participants that may accept them. 11 CFR 102.17(c)(3)(i) and (ii). Before conducting a joint fundraiser, all participants must enter into a written agreement that identifies the joint fundraising representative and states the allocation formula—the amount or percentage that the participants agree to use for allocating proceeds and expenses. 11 CFR 102.17(c)(1). Prior to a fundraising event, participants may advance funds to the joint fundraising representative for start-up costs of the fundraiser in proportion to the agreed upon allocation formula. 11 CFR 102.17(b)(3). Following the event, participants divide the gross proceeds based on the agreed upon allocation formula. If, however, the allocation formula results in an excessive contribution to any of the participants, the excessive portion must be divided among the other participants. If the reallocation would exceed all of the remaining participants’ limits, the excessive portion must be returned to the contributor. The allocation formula must then be recalculated based on each participant’s actual share of proceeds. 11 CFR 102.17(c)(6). If the final allocation formula differs from the original formula, the joint fundraising representative must recalculate expenses based on the formula used for proceeds. 11 CFR 102.17(c)(7). Committees A, B, and C decide to form a joint fundraising committee for a fundraising event. Prior to the event, the committees decide upon an allocation formula for expenses: Committees A and B will each contribute 25 percent; Committee C will contribute 50 percent. Since the event will cost $10,000, Committees A and B advance $2,500 and Committee C advances $5,000. Following the event, the joint fundraising representative determines that reallocation is necessary to avoid excessive contributions to Committee C. The new formula states that Committees A and B will each receive 30 percent each of the proceeds and Committee C will receive 40 percent of the proceeds. Since the allocation formula changed, the committees must recalculate the allocation of expenses. Committees A and B are responsible for 30 percent of the cost of the event and Committee C is responsible 40 percent of the cost of the event. Joint Fundraising Notice In addition to disclaimer notices, every solicitation for the joint fundraiser must contain: - The names of all participants, regardless of whether they are registered political commit-tees or unregistered organizations; - The allocation formula to be used for distributing contributions; - A statement informing contributors that they may designate contributions for a particular participant (notwithstanding the formula); and - A statement that the allocation formula may change if any contributor makes a contribution which would exceed the amount he or she may lawfully give to any participant. 11 CFR 102.17(c)(2)(i). Reporting: Joint Fundraising Representative The fundraising representative reports all joint fundraising proceeds in the reporting period in which they are received. Any Schedules A used to itemize contributions must clearly indicate on the schedule that the receipts are joint fundraising proceeds. 11 CFR 102.17(c)(3)(iii) and (c)(8)(i)(A). The fundraising representative must also report all disbursements made for the joint fundraiser in the reporting period in which they are made. 11 CFR 102.17(c)(8)(ii). Transfers of net proceeds to the joint fund-raising participants are reported as transfers to affiliated committees and itemized on a separate Schedule B for that category. Each participating political committee reports its share of net proceeds as a transfer-in from the fundraising representative. A participating committee itemizes (if itemization is required) its share of gross receipts as contributions from the original donors on a memo entry Schedule A. When itemizing gross contributions, the participant must report the date of receipt as the day the fund-raising representative received the contribution. 11 CFR 102.17(c)(3)(iii) and (c)(8)(i)(B). For more information on Joint Fundraising, please consult the Campaign Guide for Congressional Candidates and Committees, the Campaign Guide for Political Party Committees, or the Campaign Guide for Nonconnected Committees. (Posted 11/9/11; By: Stephanie Caccomo) RETURN TO FEC RECORD HOME
<urn:uuid:39adc70b-f1a8-4b28-b8d2-2f78e769f5e0>
CC-MAIN-2015-35
http://fec.gov/pages/fecrecord/december2011/jointfundaising.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.897988
1,401
1.648438
2
One of the hidden tragedies of homelessness is that families move from shelter to shelter with their children constantly changing schools. Facing Forward to End Homelessness breaks the cycle of homelessness by creating a stable family environment where both individuals and families can thrive. A place where change is possible Facing Forward residents are determined women who, finding themselves homeless and broken, made the decision to face forward and move down a new path. By surrounding these women with a framework of support and holding them accountable for their progress, Facing Forward gives them the best chance for a new life. We foster an atmosphere of achievement where goals are set, met and celebrated. By providing permanent housing and a full array of services, including case management, healthcare, referrals for substance abuse treatment, mental health issues, education and job training, we give Chicago's homeless individuals and children the tools they need to reclaim their lives. Be a part of change We have a proven track record of success. Eighty-four percent of Facing Forward alumnae families are self-sufficient and paying full market rent. And seventy-five percent of Facing Forward children are currently working at grade level and twelve percent are on the honor roll. Education and a secure place for children to learn and grow are cornerstones of Facing Forward to End Homelessness’s mission. This past year: * 98% of our children are currently enrolled in and attending school * 8 of our young adults are currently enrolled in and attending college * 93% of our residents have been in permanent housing for at least one year These statistics are indicative of the success that Facing Forward has earned through years of experience and the development of best practices. Your support helps Chicago’s homeless women and children reclaim their lives. Join us in breaking the generational cycle of homelessness by transforming the lives of those in need.
<urn:uuid:8f1c73b8-c1c9-4704-8508-500c549df1df>
CC-MAIN-2015-35
http://ffchicago.org/Ending-Homelessness
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.95681
380
1.898438
2
Each week we scour the web for insightful articles to share with the Founder Institute network. This week's top articles include tips for decoding a term sheet, how to transform your business, how to get everything you want, and more. Check out our must read articles for the week of June 23rd - June 30th: |Entrepreneurs Get Better With Age| |In today's world, there is still a bias against older people — employers in particular often think (in their mind) what Shark Tank's Kevin O'Leary is fond of saying to entrepreneurs he doesn't like, "You are dead to me." If we're being honest, we probably agree with O'Leary. Who of us hasn't said, "I'm looking for someone young and hungry." The implication is clear: If you aren't young, you have nothing to contribute.| |Disrupt Your Thinking, Transform Your Business| |Plenty of entrepreneurs claim that they are "disrupting" their industry. But, Luke Williams, a professor of innovation at NYU Stern School of Business and author of Disrupt (FT Press, 2010), says most companies deal only in incremental changes that support their current business model -- and that's not enough.| |How to Get Everything You Want. Seriously.| |Getting what you want in your career and in life isn't as difficult as it may seem. I mean it. I've been very fortunate, both professionally and personally, and along the way learned seven key ways to help make it happen. In essence, I work to put others first, and to be more likeable, to end up with what I want in everything I do. |How to Decode a Term Sheet| |Unless you did a stint in law school before founding your company it’s likely you speak English, not legalese, which may cause problems when you’re handed your first term sheet by a venture capitalist.|
<urn:uuid:68539726-0b01-4246-8fd9-936af8fb2090>
CC-MAIN-2015-35
http://fi.co/posts/1214?target=honolulu
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968137
404
1.609375
2
It used to be that people with a history of serious health issues -- ranging from cancer to diabetes to heart problems -- could forget about purchasing life insurance at decent rates. But the insurance landscape has shifted dramatically, says Marvin Feldman, CEO and president of the Life and Health Insurance Foundation for Education. "The rules vary greatly depending on the insurer," he says. "But it is now a lot easier for people with pre-existing conditions to get life insurance policies." "The first thing is to not assume that you can't" get coverage, says Joe Monk, chief administrative officer for State Farm life insurance. Insurers respond to medical advances Better detection, earlier diagnosis and more effective treatment of illness mean today's patients live longer, healthier lives, notes Dr. Valerie R. Kaufman, vice president and chief medical director at MassMutual. "Insurance companies are offering (life) insurance to those with chronic medical conditions because there is much more medical information available," she says. And, as both care and outcomes improve, many patients who formerly could not get life insurance at all now might even obtain standard rates for coverage, says Craig Davidson, a vice president with Prudential individual life insurance. "We in the industry look ahead," he says, adding that insurers expect the trend of better treatments and outcomes to continue, and they will develop their rates accordingly. Soaring survival rates Historically, life insurers have evaluated potential policyholders based on criteria such as life expectancy, risk factors, income, family medical history and lifestyle. People with a history of serious medical conditions -- which also might include high blood pressure, high cholesterol and HIV -- were likely to be denied coverage because the risk of having to pay out a death benefit in the short run was considered too great. Today, ailments can be diagnosed and treated more effectively. Davidson says survival rates for many diseases have increased dramatically since the 1970s, particularly for certain cancers, such as those of the esophagus, pancreas, breast and prostate. Five-year survival rates for breast cancer and prostate cancer that is caught and treated early now hover around 98 percent, he says. In the mid-1970s, just 75 percent of breast cancer patients survived five years, and only 69 percent of prostate cancer patients did, according to the National Institutes of Health. Stable condition can bring standard rates Such dramatic improvement in treatment outcomes means patients with a history of serious illness may qualify for standard life insurance rates -- the same rates paid by people without pre-existing conditions -- once their disease is under control. Davidson gives the example of a hypothetical prostate cancer patient who has been treated successfully for the disease. The man sees his doctor at regular intervals, and each time undergoes a test -- known as a prostate-specific antigen, or PSA, test. "If the PSA is OK, then you have a very good chance of survival," Davidson says. "When that gets down to acceptable levels, that's when we would be able to offer standard rates." It's not just cancer Kaufman says other ailments besides cancer also might qualify for standard or near-standard rates once the condition is under control. She says her company, MassMutual, has broadened life insurance eligibility for persons with cardiovascular conditions, such as valvular and congenital heart diseases. Insurers also are more likely to consider offering standard rates to patients with well-controlled Type 2 diabetes or obstructive sleep apnea. Other medical conditions -- such as if you've had a kidney transplant -- may keep you from getting standard rates. However, you're still likely to be offered a better rate than in past years, Davidson says. Word 'hasn't gotten out' Despite these improvements, many patients with a history of serious illness do not realize they now may qualify for life insurance at more affordable rates. "I think the word really hasn't gotten out," Davidson says. "The people who sell insurance are aware, but a lot of people who have cancer -- that used to be a death sentence. So people say, 'I'm never going to get insurance,' so they don't even try." Kaufman stresses that not everybody with a history of a serious illness will be able to obtain life insurance coverage. "Some with a condition may be able to get standard rates, where others may not be eligible for coverage at all," she says. Key factors to obtaining coverage Factors likely to influence a person's ability to secure life insurance coverage include the: - Specific type of illness. - Severity of the illness. - Time elapsed since diagnosis. - Stability of the applicant's health. - Treatment regimen. "There are a lot of variables," Kaufman says. Feldman says one key to securing a good rate is to simply follow your doctor's orders. "If a patient is seen to be cooperating with his or her doctor's instructions and the condition is either stable or improving, the patient is more likely to be approved for insurance coverage," Feldman says. Seek advice from a pro If you are shopping for life insurance and have or have had a serious illness, Feldman suggests working with an impaired-risk specialist. This type of insurance agent knows which life insurance companies offer the most competitive prices to applicants with pre-existing health conditions. "Costs vary drastically from company to company," he notes. Of course, one way to avoid the problem of trying to secure affordable life insurance after an illness is to sign up before you develop medical problems. "It's really important to look at it before you have something," Davidson says, adding that young, healthy people can get life insurance "usually at a much lower rate." More From Bankrate.com - Investing Education - Craig Davidson - prostate cancer - breast cancer
<urn:uuid:2748cb31-ea89-4416-909c-e8db0f3be555>
CC-MAIN-2015-35
http://finance.yahoo.com/news/illness-no-longer-barrier-life-070127405.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.967294
1,202
1.914063
2
The Old First Church Battle Monument Hill Bennington Vermont Photograph - Prints Or Digital Files The Old First Church on Battle Monument Hill and location of Vermont's Sacred Acre--where most important personages from war and peace are buried--such as Robert Frost and Revolutionary War Dead from the nearby famous Battle of Bennington. It is a classic New England white church with the steepe reaching to the sky among the autumn leaves. Please feel free to just share this image or others with family and friends or associates, by forwarding the link. If you would like to receive announcements of events or periodic discounts and coupons; please click on our name at the top of the page. Then below our photo, just Join the E-Mail-list. We send out Limited time Discounts for Paintings or Photographs and Prints, etc. If you have specific interests or subject matter you would like to see, leave us an email to let us know. You can see more of my images or those of my colleagues at: http://geobobford.com/ http://geobobford.com/myphotography.html or http://fineartamerica.com/art/all/geobob/prints or http://2-robert-ford.artistwebsites.com/ or BLOG http://geobobford.blogspot.com/ or http://geobobford.com/geotourism.html July 19th, 2013 Viewed 157 Times - Last Visitor from Beverly Hills, CA on 08/15/2015 at 9:44 AM
<urn:uuid:00b7c33a-1b93-4adf-a70d-77784c370dc4>
CC-MAIN-2015-35
http://fineartamerica.com/featured/the-old-first-church-battle-monument-hill-bennington-vermont-robert-ford.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.813818
328
1.539063
2
Halloween Safety Tips Posted on 10/26/2012 General Safety Tips - Check with the North Carolina Sex Offender website to determine if any registered sex offender lives in your neighborhood. - You can also search the National Sex Offender registry. - Homeowners should prepare their home for trick-or-treaters by removing obstacles from the front yard, restraining dogs and other animals, and lighting the house well. - Artificial lights and artificial candles are a safer alternative to real candles with a flame that can pose a fire hazard. - Choose a costume made of flame retardant material. - Costumes should be short enough so that they don't cause your child to trip and fall. - For good visibility, add some reflective tape to the costume or bag he is using to carry candy or make/choose a costume made of bright material that is visible in the dark. - Masks should fit securely and allow your child to see well and not hinder visibility. - If using face paint, make sure it is nontoxic and hypoallergenic. - Knives, swords and other props should be made of a flexible material, so that they don't pose a hazard if a child were to fall. Halloween should be an exciting and enjoyable event for children, but it is also an important time to be vigilant for possible safety hazards. Following the common sense practices below can keep events safer for all. Children should be well supervised by an adult when trick-or-treating. - Older children should trick-or-treat in large groups in well known neighborhoods. - Carry a flashlight - Visit well lit houses in familiar neighborhoods only. - Never go into a house; stay in the porch. - Never go into a stranger’s vehicle. - Avoid taking shortcuts across backyards or alleys. Remind children to use the sidewalks of well lit streets. - Instruct your children to bring all candy home before eating it so that you can carefully inspect it for tampering. Children shouldn't snack while they're out trick-or-treating, before parents have a chance to inspect the goodies. To help prevent children from munching, give them a snack or light meal before they go -- don't send them out on an empty stomach. - Tell children not to accept -- and, especially, not to eat--anything that isn't commercially wrapped. - Throw out candy or treats that are homemade, unwrapped or if they appear to have been tampered with (pinholes in wrappers, torn wrappers, etc.) - Parents of young children should remove any choking hazards such as gum, peanuts, hard candies or small toys. - Wash all fresh fruit thoroughly, inspect it for holes, including small punctures, and cut it open before allowing children to eat it.
<urn:uuid:9f1f208a-4829-4dc0-b90f-e771c5cd811b>
CC-MAIN-2015-35
http://forsyth.cc/Sheriff/victim_trauma.aspx?StoryID=18051
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.920864
587
2.4375
2
Just bought me a MinBrute, and I love how it sounds, and the simple, intuitive hands-on approach for making sounds. However: I have two problems. When I turn the pulse width knob at 50%, I would expect to hear a perfect pulse wave like the one heard in the suboscillator. However, it doesn't and sounds something like a 55-45 % or so... Is there something wrong with my machine, or is this the way it's supposed to sound? If possible, how can i get this fixed? Another small oddity I encountered: the bend range (for the bending wheel) is supposed to go up to 12 steps. However, on my machine it's limited to only 11 steps. How can this be fixed? Can you please help me?
<urn:uuid:6ceabd06-a5a3-4a2b-90c7-a38923f43741>
CC-MAIN-2015-35
http://forum.arturia.com/index.php?topic=12634.msg32136
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.964264
168
1.84375
2
Hardboard is a common name, with the little holes folks know it as pegboard. Masonite is a name brand, I don't know how many different manufacturers produce it or if they are all equal...I should be a little careful recommending it as I have not used it extensively myself. Kirk Webster and Michael Palmer have been making division feeders with the stuff for years. I got a few of Kirk's old ones in the nucs I bought this spring, and they looked and continue to hold up well. So it does have a proven record in hive use. I believe all the common adhesives work on it but I do NOT know that. Spores are always present everywhere. The conditions required for fungus to become established are a bit different (more specific) than the conditions required for it to grow and thrive once established. So if you accidentally use a piece of wood that already has fungus growing in it, even if presently dormant, it doesn't take much for things to go south quickly. I doubt you will see the super rapid degradation in all your luan work that you did in those nucs.....you got a bad sheet, all the pieces from that sheet will be iffy. A better, uninfected sheet will probably hold up longer.... Broadly speaking rot resistance comes in 2 forms: chemical and density. Many species of timber have natural rot resistance from extractives(chemicals) they deposit into the wood as they grow:Cedar, black locust, osage orange.... Density comes into play with regard to your points about O2 and water. Simply put water and o2 migrate more slowly in dense media and this slows down the rate of fungal growth. Luan is a species that has no inherent rot resistance chemically and is extremely low-density...so it gets the double whammy I really can not speak to the long term rot resistance of the masonite...I wouldn't expect much, probably on par with Pine, But it is relatively dense and absorbs water very slowly. And as you mention it has been heat treated which at least starts it with a "clean slate". Failures are a drag but at least we can learn. I wish I had mentioned my reservations on luan to you this past summer, but it seemed presumptuous since you had been making these for awhile and I was "new to the scene". I really can't think of a good "fix". Most of the applied fungicides are also pretty toxic to insects. You might try to "salt" the surface with strong saline solutions...but I don't know how the bees would like it, nor how effective it would be (it is usually done with prolonged immersion in seawater). Surface films (paint ect) won't stop rot, but they can help keep it from getting started, or at least slow the "Seeding" by spores. Ultimately good air circulation is necessary to keep Moisture content down unless the material is inherently rot resistant. Hope this helps. It is a bit of over simplification but probably still more than you wanted to know!
<urn:uuid:ef9b0ceb-fc94-4329-95c9-e41d323d4c6c>
CC-MAIN-2015-35
http://forum.beemaster.com/index.php?topic=34274.msg301237
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.973348
642
1.84375
2
Having worked on dryers more times than I care to count I can attest to the fact that it is not only possible that they may escape through the dryer; they are actually induced to make the attempt because the very design of the dryer invites such activities. I have seen socks, coins, paper money, sundry items such as paperclips, small toys and yes I have even seen a hanger or two manage to make a getaway. The drum is fixed to a short motor shaft at the rear of the dryer. The front of the drum is not actually attached to the dryer. The front of the dryer has a handful of slightly curved tab like projections that find themselves inside the drum when the front of the dryer is assembled. The seal is also attached to the front of the dryer and wears out as time goes by. This allows the drum to float to some degree rather than being fixed to something. It is through these seemingly doubtful gaps that the socks make good their escape. It usually starts with the occasional sock finding its way out. As the dryer ages the number (and size) of the items that escape increases until finally, you guessed it; mass exodus. In most cases the escapees make things worse as they will usually find themselves outside the drum ( therefore beyond the sight and reach of their human masters ) but trapped within the dryer itself. That part of their bold journey is fraught with danger and disappointment. Especially if it is a gas dryer. I have found them in the dryer duct. Perhaps this is an indication that some of their counterparts actually made it outside the dwelling. I doubt that I will ever know because they are no where to be seen ( although I have heard stories ). In any event if you notice that you are losing large numbers of socks it is time to have the local technician or your otherwise useless brother-in-law run routine maintenance on the dryer. This will increase the efficiency of the dryer, prevent the machine from wearing out altogether and in the case of a gas dryer or situation where air flow has been severely obstructed by the bodies of unsuccessful escapees the routine maintenance may very well prevent a fire. It may also prevent the number of escapees from rising to the point that they feel confident about returning to rescue their fellows that were left behind.
<urn:uuid:16df7bea-ae80-4e31-a8e2-338c1cb6924b>
CC-MAIN-2015-35
http://forum.vectorlinux.com/index.php?topic=6692.msg46251
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.97362
474
1.796875
2
I have recently noticed how difficult it seems to be for non-native speakers of Dutch to distinguish between - the conditional if in English (if you do that, then I will ...: that would be als or indien in Dutch) and - the if introducing (suggest a more adequate word here please) indirect questions (I wonder if you are coming, which can only be translated by of in Dutch, ob in German) Of course it is simple in English as the latter if can be replaced by whether. But there is certain some semantic similarity between both uses, which explains why it is the same si in French - or is there a synonym for one of both or for both ? How about in your language ? And would you have simple tricks to help (French) learners ? I think place shows something: you cannot move an indirect question to the front of the sentence, I think. But I would welcome other suggestions !
<urn:uuid:5b088017-eb52-4ca3-b8e8-986fee85e3e0>
CC-MAIN-2015-35
http://forum.wordreference.com/threads/if-and-if.1198606/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.970142
187
2.453125
2
I see from several sources that the word "Christ" should be pronounced with a long I sound, like in "time". However, several minced oaths seem to be constructed to sound like "Christ" with a short I (rhyming with "mist"): for instance, Jiminy Cricket or Judas Priest. Is it a word that changed its pronunciation over time? If so, why do the dictionaries only report the long-I version? Or are these cusswords really not meant to have the same final vowel sound as "Christ"? Thanks in advance.
<urn:uuid:5fbe502d-4063-41d0-bfef-633c8979f411>
CC-MAIN-2015-35
http://forum.wordreference.com/threads/pronunciation-of-christ.2599778/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968448
116
2.328125
2
Xperia Z Ultra can use the pen or pencil made of wood or metal as stylus, but Z1's screen also supports it and Sony disabled it for some reason. root is needed to enable this. To enable pen mode, there's three methods. One of them is enough. ● Create init.d script in /system/etc/init.d (requires init.d support): #!/system/bin/sh chown system:system /sys/devices/virtual/input/clearpad/pen echo 1 > /sys/devices/virtual/input/clearpad/pen chown system:system /sys/devices/virtual/input/clearpad/pen echo 1 > /sys/devices/virtual/input/clearpad/pen I created pen mode enable/disable toggle app with Tasker. Now you can use anything made of wood, metal or rubber. I couldn't use a plastic pen, though... I recommend changing one value in /system/usr/idc/clearpad_pen.idc for more accuracy. # Pressure touch.pressure.scale = 0.2 # Pressure touch.pressure.scale = 0.1 there is "grove" but I could only show circle with pen and I couldn't use with glove. Thanks championswimmer for finding this.
<urn:uuid:7a2ab3ed-8fbb-4ce6-a7fe-749cce3ab713>
CC-MAIN-2015-35
http://forum.xda-developers.com/showthread.php?t=2652762
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.812341
287
1.757813
2
One of the greatest photographers/artists of our time, and a true legend, has passed away at age 95: Henri Cartier-Bresson:<br><br><br><br><blockquote>Regarded as one of the greatest photographers of his time, Henri Cartier-Bresson was a shy Frenchman who elevated "snap shooting" to the level of a refined and disciplined art. His sharp-shooter’s ability to catch "the decisive moment," his precise eye for design, his self-effacing methods of work, and his literate comments about the theory and practice of photography made him a legendary figure among contemporary photojournalists.<br><br>His work and his approach have exercised a profound and far-reaching influence. His pictures and picture essays have been published in most of the world’s major magazines during three decades, and Cartier-Bresson prints have hung in the leading art museums of the United States and Europe (his monumental ‘The Decisive Moment’ show being the first photographic exhibit ever to be displayed in the halls of the Louvre). In the practical world of picture marketing, Cartier-Bresson left his imprint as well: he was one of the founders and a former president of Magnum, a cooperative picture agency of New York and Paris.</blockquote><br><br>More of his biography found here.<br><br>Armed with his Leica camera... <br><br><br><br>...Bresson created images that have moved me beyond words. <br><br><br><br><br><br><br><br><br><br>****************<br><br>[color:red]VOTE for President George W. Bush on November 2, 2004</font color=red> ***************<br><br>This space left intentionally blank Xplain's use of MacNews, AppleCentral and AppleExpo are not affiliated with Apple, Inc. MacTech is a registered trademark of Xplain Corporation. AppleCentral, MacNews, Xplain, "The journal of Apple technology", Apple Expo, Explain It, MacDev, MacDev-1, THINK Reference, NetProfessional, MacTech Central, MacTech Domains, MacForge, and the MacTutorMan are trademarks or service marks of Xplain Corp. Sprocket is a registered trademark of eSprocket Corp. Other trademarks and copyrights appearing in this printing or software remain the property of their respective holders. All contents are Copyright 1984-2010 by Xplain Corporation. All rights reserved. Theme designed by Icreon.
<urn:uuid:9c1d23cb-08fd-440a-b4eb-5aeda830632b>
CC-MAIN-2015-35
http://forums.applecentral.com/ubbthreads.php/topics/182613/Henri_Cartier-Bresson
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.922462
537
1.773438
2
Originally Posted by MacTripper Also it seems Apple has introduced it's own processor and graphics chip, so this will be interesting. Also it gives Apple a very nice hardware lock, something they lost when they had to switch from hot PPC's to Intel processors. Oh, no SD slot and no USB port. The only way to get content on it is from the device itself or via another computer. No iSight cam or camera, means no video or taking pictures. No visible way to get the pictures to the device via a camera. Also it's a closed and limited box, people are going to have to accept that, a tough sell as well. This is not entirely accurate. First, Apple is a fab-less ARM design licensee. Their license grants them the write to make proprietary design changes to the reference ARM designs as is the case with many other developers, but the underlying core design and technology is very much ARM. Although Apple is calling their chip the "A4" it is likely based on a goosed-up version of the Cortex A8 (iPhone 3GS) or A9 (multi-core/multi-thread capable). Additionally, Apple holds a small but significant stake in PowerVR which makes the SGX graphics core for the iPod touch and iPhones. There is no reason for Apple to use anything else at this point. So we can also assume that a PowerVR graphics core (unmodified) is either integrated into the A4 SoC, or sits on its own on the board. To the issue of camera connectivity, if you look at Apple's spec page for the iPad, you will see that they are offering a camera connectivity kit specifically to address the lack of USB and SD card slot. I can imagine plenty of people who will never have use for it on a mobile device and will simply wait to get home to load their photos on their computer. But for those who want that functionality, the kit provides two adapters that plug into the 30-pin dock connector in the iPad. One allows you to hook up a camera directly using its USB cable, while the other is basically an SD-card reader on 30-pin connector so that you can bypass the camera itself. Photos can then be transferred directly into the Photos app. This is clearly an advantage of using OS X as the basis for the iPhone OS, since you don't need to re-engineer the functionality of camera connectivity. It's already there, and you avoid the complexities of needing to make specific drivers for every iteration of camera out there. My hope is to see Apple extend this adapter's functionality to the iPhone an iPod touch in the next software update. It only seems logical. But it should also serve as a reminder that there is a lot of untapped functionality that can be added to the iPhone OS should Apple decide to do so. Finally, my $0.02 on this product is that Apple is on the right track. Yes, there was nothin earth shattering today, certainly not on the level of the original iPhone. However, if you pay attention to where Apple is going with this, they are focusing on the core mobile experience; NOT computing. It has a more than capable web browser and now in an easier to use 9.7" screen. It plays music and videos, reads newspapers and textbooks and novels, etc. None of these functions requires an optical drive, a physical keyboard, or a trackpad, or even a 13"/15"/17" screen. You just need something big enough to use for these purposes without the extra weight and heft of all the unnecessary "stuff" on a full funtion laptop/desktop. And Jobs is right, this is the job that netbooks attempted to accomplish, and in many ways, even the new slate (no pun intended) of tablet devices from other manufacturers are attempting to bring a desktop-like computing experience to a tablet form. But yet again, Apple has demonstrated that what people are looking for in the mobile space is a streamlined and highly focused device that handles the majority of core mobile functions exceptionally well. I know some people disagree, but to me, this device really does make sense. P.S. I don't recall a single mention of McGraw-Hill during the presentation. Hahahaha!
<urn:uuid:f2382c60-ae65-4698-bdb9-40a1f9fca641>
CC-MAIN-2015-35
http://forums.appleinsider.com/t/106614/at-ts-no-contract-ipad-data-plans-run-15-mo-250mb-30-unlimited/80
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.959304
877
1.5625
2
Since you changed your post, I guess I'll respond to that too "paul_b_18-ga" has one of the most oft-repeated misunderstandings about digital versus analog sound, that digital sampling throws out information that records perfectly preserve. This is untrue. While the process of sampling does throw out information, so does the process of putting something into plastic. Grooves can only go so deep before the needle gets stuck and breaks. Only so much information can be packed in before the valleys and troughs become smaller than vinyl molecules. Dust, broken pieces of vinyl, warping, and pressing errors introduce "noise" that often overpowers the signal. This is why vinyl is so bad. Sounds quieter than, say, 50 dB below peak, just can't be heard because they're overwhelmed by noise. To compensate, you have to significantly compress the audio (increase the loudness of the quieter noises) so that these will be heard and not fade out entirely. Also bad for vinyl, if you're playing a record at around 100 dB, you have at least 30 dB of constant noise and hiss, more on cheaper equipment or an older record. Again, CDs aren't perfect and do have problems, but again, these imperfections aren't noticeable until you crank the CD up painfully loud to begin with, and are likely to be smaller than the imperfections in your sound system. As I stated before, CDs faithfully record over 100 dB of dynamic range. The only other benefit of vinyl in that thread, by rayljr-ga, is that records can theoretically hold information above 22,500 hertz, whereas CDs clamp them here. While these frequencies, individually, are inaudible to humans, recent research seems to imply that we can hear the effect they have with other, lower frequencies when played simultaneously. Of course, as rayljr points out, you need a really expensive needle and system to pick these up, but also a record that hasn't been played more than a few times before, since needles will eat away at this information after a few plays. The only genuine solution to hear these is to go with SACD or DVD-Audio.
<urn:uuid:155ebbd3-c5c6-493f-b8e6-d5606e7b5167>
CC-MAIN-2015-35
http://forums.appleinsider.com/t/70641/beatles-catalog-to-reach-apples-itunes-by-valentines-day/40
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.963978
452
2.046875
2
I also use my bell questions to have the students read the "extras" in their text book. In my World History text, each chapter ususally has a sidebar about art, people, geography to read followed by a few questions. I also ask open ended questions - When is it okay to rebel against authority? Does History have a point of view? When is it okay for a nation to intervene in another nation's affairs? What acts justify a nation's right to declare war? I usually always start a new unit with this type of question - Tell me what you know about the French Revolution On the day before testing I always use this one - List at least one thing your learn in this unit and why it was interesting to you I also ask personal questions such as What would you do with a million dollars? If you could live anywhere in the world, where would you live and why? Who do you admire the most and why? Just a small sample of my bell questions - I have a ton since I have used them in World History, US History and Geography for the past 5 years.
<urn:uuid:1b41688a-8f27-463d-adbd-e6c2835f4ae9>
CC-MAIN-2015-35
http://forums.atozteacherstuff.com/showthread.php?t=62401
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.964494
234
2.921875
3
#1Apr 22nd, 2014 US aircraft maker and defence supplier Boeing has revisited the original jeep’s winning formula in a stocky little bruiser of a car called the Phantom Badger. Like the MB, the Phantom Badger is compact – just 60 inches wide – and, with four-wheel steering, it is highly maneuverable. The setup gives the vehicle a turning circle of just 24ft – fully 10ft tighter than a Mini Cooper’s. Such agility is particularly valuable in urban environments, where the ability to make tight turns and slip through narrow alleys can change the outcome of a battle. Boeing Phantom Badger Gross vehicle weight: 7,850lbs Payload capacity: 3,356lbs Towing capacity: 4,000lbs Dimensions: 60in wide x 180in long Engine: 3-litre turbocharged V6, multi-fuel capable (diesel or JP8 ) Drivetrain: Four-wheel drive with all-wheel steering Fuel consumption: 21mpg Cruising range: Approx. 450mi And like the original jeep, which employed a version of the Go Devil L-head engine from Willys’ civilian Americar line, the Phantom Badger makes use of the 3-litre turbo-diesel V6 from the Jeep Grand Cherokee. The engine – which can run on JP-8 jet fuel as well as diesel – produces 240 horsepower and 420 pound-feet of torque, sufficient to enable the four-wheel-drive Badger to reach a breezy 80mph on paved surfaces. In designing the Phantom Badger, amid the usual military concerns for battlefield capability and occupant protection, Boeing remained conscious of such factors as mechanical simplicity, global parts availability and field serviceability. So the vehicle is light on expensive futuristic technology, and heavy on proven, commercially available hardware. It embodies, says Boeing spokesman Garrett Kasper, “the best of what’s out there today – tires, lug nuts, seatbelts, you name it.” BBC - Autos - Phantom Badger, reporting for duty (external - login to view)
<urn:uuid:821b3020-327e-4425-a429-e57980c760bb>
CC-MAIN-2015-35
http://forums.canadiancontent.net/hot-topics/124184-phantom-badger-reporting-duty.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.887188
447
1.78125
2
January 24th, 2013, 01:49 PM Fetcing ajax based content of the website in JAVA I'm research student. Currently I want to do research on Yahoo news. I found that there are lot of comments on yahoo news. 10 comments come when we open some news, when we click more button, ajax request fire and 10 more comments appear on the screen an so on. What I want on my first step is that I want to write a code that simply fetch news and all the comment and put it into the database. Now I have following code that give me html of the news. String news= "http://news.yahoo.com/yemen-says-regional-al-qaedas-deputy-head-dead-184541137.html"; URL urlObject = new URL( news); URLConnection con = urlObject.openConnection(); con.setRequestProperty("User-Agent", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"); Scanner scanner = new Scanner(con.getInputStream()); String content = scanner.next(); Now in actual when i click on the "more" 10 comments added on the page, but how can I achieve this on my code because I donot have link to click. If I parse the more button link and the again fetch the code through recursion then same html will give me again. Any idea please ????? Tags for this Thread Click Here to Expand Forum to Full Width This is a Codeguru.com survey!
<urn:uuid:49d250ed-cbc2-4afb-9902-8ed190378490>
CC-MAIN-2015-35
http://forums.codeguru.com/showthread.php?533739-Fetcing-ajax-based-content-of-the-website-in-JAVA&mode=hybrid
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.799654
345
1.789063
2
I saw youtube video of a guy that installed ubuntu on an android tablet. But I think he did it through an app , similar to how WINE allows you to run windows in linux. I was more thinking if it was possible to use linux only. The Youtube video which I saw installed Ubuntu as an app, more like a virtual machine, started and displayed over VNC and controlled initially by a terminal app in Android. It was 12.04, but I think it was the ARM version of Ubuntu, and the demonstration I saw was on an HTC Android cellphone. It looked as if this method might be more widely useful, that is not hardware specific, but on the other hand, it was slower and required root access: http://www.youtube.com/watch?v=I0PNsnNe3E0 You could try the pengpad. Mint doesn't support the ARM processors in most Android tablets, you would have to run Debian or Ubuntu or one of the other distributions which support ARM. See https://wiki.ubuntu.com/ARM/TabletList for a list. Another problem: No tablet that I have seen listed even has a USB port from which you can boot, only micro-SD (possibly mini-USB port, but not for memory devices without modification.)
<urn:uuid:7218765b-bd1d-403e-ae30-5e4597211655>
CC-MAIN-2015-35
http://forums.linuxmint.com/viewtopic.php?p=657511
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.962321
266
1.71875
2
I've been trying to figure out how to zoom a UIScrollView without using CATiledLayer. Almost every example I've found and Apple's documentation says you should use CATiledLayer since it handles the automatic zooming for you and you just need to draw your content like normal via the layer's delegate. If you don't use CATiledLayer you get simply a blurred image of your layer/view. However if you try to add sublayers to CATiledLayer, you don't get the nice sharpened scaling automatically (CAShapeLayer does work though). The other problem with CATiledLayer is you have very little control over it. Lots of various people have played around with altering the transform which I didn't have much success with (could be due to iOS 4 changes?). However, I think I have found a solution which would make sense based on how Apple's CATiledLayer works and CAShapeLayer's documentation. You just need to redraw the layer's image at the scaled value into a CGImage (CGBitmapContext) and set that as the layer's contents. It's working well right now in the simulator, but I feel like there should be a better way to go about it. What do you guys think? I can post a sample project.
<urn:uuid:70c24aca-066c-4038-a6d5-a8746cb03dc8>
CC-MAIN-2015-35
http://forums.macrumors.com/threads/zooming-a-uiscrollview-without-a-catiledlayer.963372/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968762
264
1.570313
2
Originally Posted by Handsome Rob The market should determine salaries/wages. If I'm an employer struggling in the economy and want to hire someone to help out for $3/hour, I should be able to. And, if no one will work for so little, then my options are to 1) not hire anyone or 2) raise the hourly wage I'm willing to pay. If someone will work for $3/hour, why shouldn't they be allowed to? What happened to liberty? It also reduces costs and prices. I was reading an article how, from the 50's during the 80's, you could live on minimum wage. Not a fantastic living, but a fair one. Rent cost less than 2 weeks pay the entire time, and got really good during the 70's when the cots of rent and gas dropped way down (compared to the 60's). I don't think having a higher minimum wage is a solution (we've raised it more in in the last 2 decades than in the previous 4). I think the problem is that we've been systematically reducing competition in the marketplace. If there's no competition, then there's no pressure for companies to keep prices low because they know they're not going to lose (many) customers. It also means less jobs, and makes it harder for employees to leave companies that treat them badly for better conditions and/or pay. It also doesn't help that there's huge resistance to foreign trade and insistence that everything be done in the US because "'Merican jobs!". When, to put it simply, there aren't enough jobs because we don't need that many to support the current US population. But there are literally billions of undeserved people on this planet we could be using to grow our economy, but don't because that requires trade, and trade is somehow bad unless we're the only ones doing it.
<urn:uuid:def093b4-9e04-4797-97ad-818c1446f27b>
CC-MAIN-2015-35
http://forums.superherohype.com/showpost.php?p=25221223&postcount=729
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.976496
387
1.921875
2
On Passover's Role in Fostering Female Friendships I hadn’t realized how significant Passover has been in forming friendships in my life. Two different friends reminded me this week about how the holiday was significant in the creation of our relationships. They both bave had such big influences on me that I thought it is worth talking about them both. Dr. Chaya Gorsetman started as a virtual friend. It was March 2003; I was pregnant and living in Melbourne, Australia, and Chaya was living in New York and working on the JOFA Bible curriculum. She contacted me by email to discuss issues of feminism and Jewish education, but before long we were talking about pretty much everything else — motherhood, community, work, family. At a certain point, we were writing several times a day, sharing struggles and challenges, and looking to one another as kindred spirits, for camaraderie and counsel in the journey. For that first month, as we discovered our bond, our conversations seemed to revolve around Passover, which was imminent. The family Haggadah that I made that year, inspired by her ideas and worldview, has remained one of our greatest Passover projects. We talked about the challenges of making the holiday about education rather than about cleaning, and of not falling into the trap of becoming a woman defined by the efficiency of completing household chores. Our dialogue became a pillar of support for me, and it continues today. Although it was nearly a year before we met in-person, when we did, I felt like we’d known each other forever. Chaya, a professor at Stern College whose doctorate is in education and whose passions include early childhood, mentoring, and feminism, is a generation ahead of me, and perhaps the relationship is counter-intuitive in that way. In some ways she is my mentor, someone who has been through it all before me and survived. I find her descriptions of her relationships with her children — who are mostly around my age — comforting, wise, and remarkably healing. She also treats me like an equal (even though I wonder if she should claim her rightful place as the elder stateswoman). This is her way of demonstrating what education, parenting and friendship are all about: respect. We are now working on a book about gender issues in modern Orthodox schooling, and our text is filled with this spirit. It is built not only on our research and scholarship, but also on eight years of deep friendship. Ilana Teitelbaum Reichert, an exceptionally gifted writer whose first novel I await with bated breath, reminded me that we are friends because of Passover. I actually hadn’t realized it, but she said that she contacted me after reading a column I wrote a few years ago about the connection between Passover, food and body image in the Orthodox community. Lucky me, I thought. We share more than a first name (our husbands have the same first name as well, which is just eerie). We share an entire journey, a struggle to create a strong, meaningful identity as women while grappling with religion. We get what the other is going through, even if it’s sometimes hard to explain. And before we had met (with her, too, it took a year for an in-person meeting to happen), the relationship had been powerful and healing. She’s a decade younger than me, and her compelling voice has yet to fully emerge. (Actually, Anne Rice tweeted about her Huffington Post article this week, to which I commented that some of us already knew that she’s a great writer.) I think Ilana sometimes wonders why our relationship is so important to me, as if finding someone who really understands and appreciates you, who is a real equal and almost a comrade-in-arms, is an everyday occurrence for me. Even if it were, it wouldn’t make the relationship less special. Ilana’s friendship is a gift, and apparently I have Passover writing to thank for it. The truth is, writing has connected me with many wonderful women over the years, some of whom I still haven’t met in person but feel like I know intimately. Others I knew long ago and rediscovered after some meanderings. One day I’m going to write about the long lost cousins with whom I’ve found new, meaningful connections because of the writing. Some of this has been truly remarkable, and I’m sorry for not describing all of you by name now. (But you may find yourselves in a future column yet). It’s not always easy to be the one speaking out and making sometimes-unpopular arguments. But when I think back to these relationships formed with others who are also on the journey, it feels great. So I guess this is a good time for me to take a moment to say thank you. Thank you to all the readers out there who have connected with me and who share ideas and struggle; thanks for the conversation and for the mutual support. And anyone who wants to be friends or share experiences is welcome to write to me anytime. I really enjoy that.
<urn:uuid:b0c2debf-84a4-4a7b-a855-e465fd75a532>
CC-MAIN-2015-35
http://forward.com/sisterhood/137245/on-passovers-role-in-fostering-female-friendships/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.979243
1,061
2.015625
2
MILWAUKEE — Co-sleeping has been a big problem in the city of Milwaukee, resulting in preventable infant deaths, and officials are urging parents to create safe sleep environments for their infants. On Wednesday, September 12th Columbia St. Mary’s, Mayor Tom Barrett, the Milwaukee Health Department and area churches gathered for a luncheon to kick off their second annual “Safe Sleep Sabbath.” Safe Sleep Sabbath is a program that promotes infant safe sleep practices. Milwaukee health officials say there are growing concerns of the dangers of co-sleeping and they want to educate parents about a safe sleeping environment. The second annual event comes just one day after another infant death occurred in the City of Milwaukee. On Tuesday, September 11th an infant boy who was one-day shy of being two months old was found unresponsive while sleeping in a full-size mattress with his mother. That boy is identified as Traven Williams Jr. The family acknowledges the baby was sleeping with his mother, but say that did not lead to the child’s death. The Medical Examiner’s report seems to agree with the family at this point. The investigation report released on Wednesday, September 12th says “there’s no evidence of external trauma to the body” of Traven Williams Jr. The report also says there have not been any recent illnesses reported by family members. The cause of death is pending further testing. Family members of the child say Traven was laying on the bed next to his mother when she sensed something was wrong. “When she looked at him, he wasn’t breathing. She woke me up. I was sleeping on the floor,” the child’s father, Traven Williams said. Williams immediately called 911 for help. “They told me to put him up on the floor, hold his neck up and put my two index fingers up on him and that’s what I did,” Williams said. But it was too late. The child was pronounced dead at 2:15 a.m. Williams contends the child’s mother never even fell asleep — so it couldn’t be co-sleeping. “She ain’t roll over. She was woke with him the whole time,” Williams said. Health officials argue a baby’s surroundings while sleeping can be just as dangerous as a co-sleeper. “It’s really about the basics. Always alone, in a pack and play, on their back,” Jessica Gathirimu from the Milwaukee Health Department said. Health officials advise parents to keep infants in a crib, removing pillows, blankets and keeping them away from second-hand smoke. “We want to make sure there are not extra pillows, bumper pads, blankets or anyone sleeping with the infant. Those are really, really the messages we want to hit home,” Gathirimu said. The Safe Sleep Sabbath will be held Sunday, September 16th at area churches. CLICK HERE for additional Safe Sleeping tips via the City of Milwaukee’s website. CLICK HERE for questions/answers regarding the Milwaukee Health Department’s “Safe Sleep Summit.” CLICK HERE to visit the City of Milwaukee Health Department’s “infant mortality” info. page.
<urn:uuid:22d520db-f691-4bcf-a86e-46326a984f0c>
CC-MAIN-2015-35
http://fox6now.com/2012/09/12/columbia-st-marys-city-leaders-to-kick-off-second-safe-sleep-sabbath/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.968891
707
2.09375
2
With military intervention against Assad unlikely and a protracted civil war ensuing, Turkey is in a quandary due to its rapidly deteriorating relationship with Damascus. A war of words was to be expected, with Turkey lumped into the group of nations “legally, ethically, and politically responsible for the crimes committed by the terrorist groups” according to Syria’s information minister.1 Turkish officials claim Syria is now supporting the Kurdistan Workers’ Party (PKK) separatists, whom the Turks have been battling in the Southeast and Iraq.2 But there are more pressing matters: Not only are refugees multiplying, but as of April, cross-border skirmishes have started to flare up—and these are poised to escalate. The Turkish army has mobilized at the border and scrambled warplanes, after Syrian anti-aircraft guns downed a Turkish F4 that briefly strayed into it neighbor’s airspace. This posturing, without any diplomatic front, may lead to Prime Minister Erdogan’s most extreme option, full-on war. Though his citizenry is less than thrilled about this prospect.3 In fact, Turkey’s foreign ministry has already had to deny reports that it is gearing up for an attack on Syria aimed at regime change.4 As noted above, there are several reasons military escalation is a bad idea. First and foremost, United States Secretary of State Hillary Clinton has rejected it, implying that Turkey would be on its own.5 Without U.S./NATO support, there is no guarantee of victory against Syrian forces bolstered by Iranian and Russian weapons and advisors as well as terrorist proxies. Should Turkey conspire with anti-Assad nations such as Saudi Arabia and Qatar to remove the dictator covertly, the result would invite a similarly destabilizing mess, if not a Syrian declaration of war. On the purely hypothetical other hand, if Erdogan were to make a friendly deal with Damascus and expel the Syrian National Council and the Free Syrian Army, he risks alienation and anger from the U.N., NATO and all of his Sunni neighbors. The rather unthinkable move would be a reputation-damaging betrayal striking at the heart of Turkish pride and integrity. And Syrian refugees would be led into a slaughterhouse. The Turkish government has no choice but to protect its border and therefore enable Syria’s foes—and its growing list of defectors. However, if Ankara decided to change tactics and open up a diplomatic line to Damascus, this could be used as a bargaining chip. And indeed, it is in Turkey’s best interest to act as negotiator between the hostile parties and move to the forefront of the peace-plan effort—as it has done between Syria and Israel and the U.S. and Iran.xi With far more leverage than the United Nations, in the form of both threats and assistance, the Turks needs to be open to talks with Tehran, Moscow and most of all Bashar al-Assad himself. Prime Minister Erdogan should be sitting where Kofi Annan has sat and must work to bury the hatchet. The brutal dictator, despite his crimes against humanity, is not going anywhere. (While high-level defections continue, as with Brigadier General Manaf Tlass in July, they are all Sunni officers and mostly those who were already under house arrest.) Without foreign intervention, this civil war has the potential to play out for years. Though the opposition will be virulently against this course, Turkey, as their host and defender, has considerable leverage over them as well—and no other nation or group has it. Turkish soldiers must be at the border, ready to protect the Syrian opposition and refugees, but they must take care never to provoke Syria’s armed forces. Foreign Minister Davutoglu should be at every meeting between Clinton and Lavrov and Annan and Assad. That the ever-convening international community has not worked to press this initiative shows a lack of will to end the bloodshed as well as a delusional dream that Bashar al-Assad and his Alawite accomplices will step down. The goal is a ceasefire, effectively saving thousands of civilian lives, and only one country has the ghost of a chance at working toward a real one. Turkey has been acknowledged as a Muslim beacon of prosperity and liberalism in the Middle East and has indeed made admirable choices, often at once pragmatic and idealistic, during the Arab Awakening. But it has watched, waited and reacted long enough. The fledgling democracy must take the opportunity to assert itself as the major regional player and pursue an aggressive role as peacemaker—which will gain it the respect of the West without alienating it from the greater Middle East or Russia. Turkish expertise and tradition in balancing secular and Muslim government should be exported to Libya, where thousands of Turks reside and where business cooperation may help to stabilize the fractured nation. It should be offered to an Egypt grappling with an identity swinging between a military junta and religious populists. In Syria, the Turks are the best suited to build the bridge connecting the regime in Damascus and the scattered opposition. That bridge, as flimsy as it may be, is desperately needed to stop the daily massacres and the growing sectarian tragedy that is already set to poison future generations. It goes without saying that Turkey itself should lead by example, clean up its own backyard with respect to the Kurdish question, Armenia and Greece, and shed its antiquated and artificial attempts to gird it nationalist pride by suppressing non-Turks. To be seen as fervent in trying to solve these issues at home and taking the reins of the region’s conflicts would bestow Turkey with true national pride and international prestige. 1“Turkey Allows Limited Access to Syrian Refugee Camp.” Hurriyet Daily News. Turkey. June 19, 2011. 2“Turkey and the Arab Spring: Embracing ‘People’s Power’.” Gallia Lindenstrauss. European Institute of the Mediterranean. March 2012. www.euromesco.net/images/papers/papersiemed14.pdf 3“The Tide Begins to Turn.” The Economist. July 7, 2012. www.economist.com/node/21558276 4“Report: Turkey Tells West It Might Launch Offensive Against Syria.” Today’s Zaman. Turkey. June 27, 2011. http://www.todayszaman.com/news-248653-report-turkey-tells-west-it-might-launch-offensive-against-syria.html 5“U.S. Tells Turkey to Back Off Syria.” NOW Lebanon. Tony Badran. March 22, 2012. http://www.nowlebanon.com/NewsArticleDetails.aspx?ID=378866 Michael Quiñones’ latest project, a fizzy look at foreign policy predictions, launched in July 2012 at There Will Be War.
<urn:uuid:9e3d3d1c-bf30-4f7d-ae19-91215fc9c13c>
CC-MAIN-2015-35
http://fpif.org/attacking_syria_is_a_no-win_situation_for_turkey/?q=Tag%253AIsrael
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.958088
1,415
2.09375
2
Not signed in ( Forgot your password? Apply for membership is a product of : Random Geek: Stark Contrast (4) - An Honorable Man Bottom of Page 1 to 1 of 1 Feb 18th 2008 Then there is Tony Stark over in Captain America. First thing you notice, he wears a suit or a shield uniform. He does not wander about in power armor while at the office. He does not hide his face behind a metal mask. The reader sees the man, and that man is suffering. This is not the portrait of a character who has seized power, sneering that "the best is yet to come", no this is a man with a job he does not want but has to do. This is not a man who cavalierly sacrificed friendship on the alter self righteousness, no this is a man who lost his best friend over a argument he still does not understand why they had. This is a man who felt he did the right thing and now he hates himself for it. You can see it in Steve Epting's art. The weight of the world is on this character's shoulders now. I talk allot about Brubaker but Epting knocks it out of the park each issue too. The "Iron Man" runs Shield as a penance, the only way to justify what he choose to do is to make sure the world is a better place each day. And to make sure the wishes and ideals of a fallen friend are respected and carried forward. Ed Brubaker simply says "[his] Tony Stark is an honorable man." 1 to 1 of 1
<urn:uuid:f2849c3d-b5d3-4245-b058-d98534382270>
CC-MAIN-2015-35
http://freakangels.com/whitechapel/comments.php?DiscussionID=1078&page=1
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.921549
335
1.617188
2
GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network. hfsutils is a comprehensive software package being developed to permit manipulation of HFS volumes from UNIX and other systems. HFS is the ``Hierarchical File System,'' the native volume format used on modern Macintosh computers. The software reads and writes HFS (but not HFS+) volumes with several command-line programs and optionally an X interface. The software can also be used as a C library. muser lists processes which have a given directory (or cwd if not specified) as a parent of their current working directory (thus making it impossible to unmount that directory if it is a mount point). This script has overlapping functionality with the fuser program from the psmisc package, but has the advantage that it works on SMB mounts. Additionally, it provides a color, formatted listing of process IDs, executable names, current working directories, and the command lines used to run the programs. It works with varying-sized /proc/*/cwd fields. Virtualfs provides a set of plugins and let you define new ones. Each plugin may intercept and enhance file system operation. Various plugins are already done, including remote device access for Xterminals (to access the floppy, CD, and sound cards with standard applications), auto-mounter (browse and automount your SMB shares), access control lists, etc. The Extended Universal Resource Locator library provides a complete virtualization of file-like objects. How data is stored is completely transparent to the client, since the library is meant to replace java.io.File. It provides implementations for handling local files, Jar/Zip archives, and XML documents. (Implementations for CVS and FTP are available seperately.) Other storage providers can be written and plugged in. It also provides a merged filesystem implementation that allows multiple hierarchies to appear as one and to override each other in a controlled way. Other features include notification of changes to files, and support for attaching (dynamically updatable) actions to file objects.
<urn:uuid:1e546fd9-1bc6-4468-9e47-5a024c7739ae>
CC-MAIN-2015-35
http://freecode.com/tags/filesystems?page=1&sort=vitality&with=&without=16
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.911027
523
1.960938
2
Concurrency Kit provides a plethora of concurrency primitives and lock-less and lock-free data structures designed to aid in the design and implementation of high performance scalable concurrent systems. It was designed to minimize dependencies on operating system-specific interfaces, and most of the interface relies only on a strict subset of the standard library and more popular compiler extensions. FastFlow is a pattern-based programming framework targeting streaming applications. It implements pipeline, farm, divide and conquer, and their composition, as well as generic streaming networks. It is specifically designed to support the development and the seamless porting of existing applications on multi-core, GPGPUs, and clusters of them. The layered template-based C++ design ensures flexibility and extendibility. Its lock-free/fence-free run-time support minimizes cache invalidation traffic and enforces the development of high-performance (high-throughput, low-latency) scalable applications. It has been proven comparable or faster than TBB, OpenMP, and Cilk on several micro-benchmarcks and real-world applications, especially when dealing with fine-grained parallelism and high-throughput applications. liblfds is a portable, lock-free data structure library. Out-of-the-box ports are provided for Linux (user-mode) and Windows (user-mode and kernel-mode) on ARM, x86, and x64, under a variety of toolchains. Currently, the library contains a freelist, queue, ringbuffer, singly-linked list (logical delete only), and a stack. The homepage contains a blog, bugzilla, forum, and mediawiki. The mediawiki contains comprehensive documentation for development, building, testing, and porting. There is no license. You are free to use this code in any way. libLunchbox facilitates the development and deployment of multi-threaded applications. It provides OS Abstraction, using utility classes abstracting common operating system features (such as threads, locks, memory maps, shared library loading, and condition variables), high-performance primitives (including thread-safe utilities tuned for performance, such as atomic variables, spin locks, and lock-free containers), and utility classes (including helper primitives which are not in the standard library, such as logging, pools, and random number generation).
<urn:uuid:ac901310-b1c7-4aed-a6d5-0df2372477e7>
CC-MAIN-2015-35
http://freecode.com/tags/lock-free?page=1&sort=popularity&with=3568&without=
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.917787
483
1.765625
2
/etc/net represents a new approach to Linux network configuration tasks. Inspired by the limitations of traditional network configuration subsystems, /etc/net provides built-in support for configuration profiles, interface name management, removable devices, full iproute2 command set, interface dependencies resolution, QoS, and firewall configuration frameworks. /etc/net provides support for the following interface types: ethernet, WiFi (WEP), IPv4/IPv6 tunnels, PSK IPSec tunnels, VLAN, PLIP, ethernet bonding and bridging, traffic equalizer, Pent@NET, Pent@VALUE, SkyStar-2, TUN/TAP, OpenVPN TUN/TAP, usbnet, and PPP. Due to its modular structure, support for new interface types can be added without overall design changes. The 0MQ lightweight messaging kernel is a library which extends the standard socket interfaces with features traditionally provided by specialized messaging middleware products. 0MQ sockets provide an abstraction of asynchronous message queues, multiple messaging patterns, message filtering (subscriptions), seamless access to multiple transport protocols, and more. 360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command. A3Com is a set of Perl modules and utilites which use SNMP to manage 3Com switches, such as SS3900s, SS9300s, and CoreBuilders. Tools included will search/dump/store bridge tables, ARP tables, retrieve system info, save and restore configurations in batch mode, upload new software in batch mode, change passwords, reboot switches, dump VLAN configurations, and more. The Analysis Console for Intrusion Databases (ACID) is a PHP-based analysis engine to search and process a database of incidents generated by security-related software such as IDSes and firewalls (e.g., Snort or ipchains). It provides a search interface for finding alerts matching practically any criteria. This includes arrival time, signature time, source/dest address/port, flags, payload, etc. ACID also provides the ability to annotate and logically group related events, delete false positives, or archive alerts among databases. Finally, a variety of statistics and graphs can be generated based on time, IP address, ports, alert classification, and sensor. This is a set of Linux drivers for the ACP modem (Mwave), a WinModem. It is composed of a loadable kernel module and a user level application. Together these components support direct attachment to public switched telephone networks (PSTNs) and support selected world wide countries. This driver provides support for the IBM ThinkPad 600E. The modem also supports the standard communications port interface (ttySx) and is compatible with the Hayes AT Command Set.
<urn:uuid:4d10bc93-a00a-48c2-a804-d5ad2c035e14>
CC-MAIN-2015-35
http://freecode.com/tags/networking?page=1&sort=name&with=8641&without=
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.871311
756
1.585938
2
AbiWord is a free word processing program similar to Microsoft Word. It is suitable for a wide variety of word processing tasks. It allows you to collaborate with multiple people on one document at the same time. It is tightly integrated with the AbiCollab.net Web service, which lets you store documents online, allows easy document sharing with your friends, and performs format conversions on the fly. Achievo is a Web-based project management and tracking tool for small- to medium-sized companies, aiming to become a fully featured ERP-like system in the future. Features include a time registration module, scheduler, project management, todo's, and several statistical tools. Achievo is multi-language, fully customizable, and uses a modular system to allow future extensions. Actionpoll is a simple PHP script which provides the standard functionality such as unlimited options, IP tracking of users, easy installation, and HTML and WML output. An event can be triggered if a certain number of votes is reached. Surveys can be stored either in a MySQL database or in text files. AdaCGI is an Ada95 interface to the "Common Gateway Interface" (CGI). AdaCGI makes it easier to create Ada95 programs that can be invoked by World Wide Web (WWW) HTTP servers using the standard CGI interface. Using it, you can create Web applications using Ada95 to perform queries or other processing by request from a WWW user. Ghostscript is a processor for PostScript and PDF files. It can rasterize these files to a wide variety of printers, devices for screen preview, and image file formats. Since applications tend to prepare pages for printing in a high-level format such as PostScript, most Unix users with low-level bitmap printers, such as inkjets, use GhostScript as part of the printing process. In addition, Ghostscript is capable of converting PostScript files, functionality comparable to Adobe Acrobat Distiller, but on the command line. In addition, Ghostscript is used for file import and viewing by a great many other applications, including xv, ImageMagick, gimp, and xdvi. Several GUI wrappers for viewing PostScript and PDF files exist, including GSview, ghostview, gv, ggv, and kghostview. This is far from a comprehensive list. AFT (Almost Free Text) is a document preparation system. It is mostly free form, meaning that there is little intrusive markup; AFT source documents look a lot like plain old ASCII text. It has a few rules for structuring your document, more to do with formatting your text than embedding lots of commands, and it produces all types of output (HTML, XHTML, LaTeX, roll-your-own XML, etc.). All that needs to be done is to edit a rule file. You can even customize your own rule files for specialized output. Agora is a Web-based, threaded discussion tool, similar to Usenet newsgroups. Agora remembers each user's preferences, and allows threaded, unread-only browsing. It offers the ability to manage several different groups, with different themes, forums, and administrators for each group. Agora offers a basic Web-based ICQ client, as well as a Web-based notes system. The Alamin GSM SMS Gateway is a group of daemons that allows you to send/receive SMS messages from any GSM device that supports AT+ commands (GSM modems or GSM mobile phones) or supported by Gnokii. A client program allows you to send messages from any IP client. An SMTP interface is provided to allow MTAs to send SMS directly to the GSM network. IMP (Incoming Message Processor) modules allows you to extend functionality to implement banking, network administration, bd querys, etc. from a GSM mobile phone.
<urn:uuid:0d9925ec-e400-4a49-8a9d-de180b4792d2>
CC-MAIN-2015-35
http://freecode.com/tags/os-independent?page=1&with=191&without=888
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.891237
805
1.601563
2
Notepas is a multi-platform text editor written in Lazarus which can be compiled for multiple platforms and widget sets using the advanced native Free Pascal Compiler. Aimed at developers, it has some functions usually not found in other text editors and introduces some new exclusive features. foma is a compiler, programming language, and C library for constructing finite-state automata and transducers for various uses. It has specific support for many natural language processing applications such as producing morphological analyzers. Although NLP applications are probably the main use of foma, it is sufficiently generic to use for a large number of purposes. It comes with an xfst-compatible interface and regular expression language. The library contains efficient implementations of all classical automata/transducer algorithms: determinization, minimization, epsilon-removal, composition, and boolean operations. More advanced construction methods are also available: context restriction, quotients, first-order regular logic, transducers from replacement rules, etc. Email Address Validator is a PHP class that allows the developer to validate email addresses according to the RFC 5321 or RFC 5322 standards. It can also check to see if the domain can be resolved to MX RRs. Acceptable local-parts include dot-atom, quoted string, and obsolete. Acceptable domains include domain name, IPv4 address, IPv6 address, and IPv4-mapped IPv6 address. Folding white spaces and nested comments are also supported. Artha is a handy thesaurus based on WordNet with distinct features like global hot key look up, passive desktop notification, regular expression based search, etc. Artha may be used as a free open-source replacement/clone to the proprietary WordWeb Pro thesaurus (which is also based on WordNet) on Unix-like and Windows operating systems. Regular Expression Builder for Java (reb4j) is a simple set of classes that encapsulates the regular expressions used by java.util.regex.Pattern and provides facilities for composing larger expressions from sub-expressions. It effectively provides a way to build regular expressions without the risk of encountering PatternSyntaxExceptions at runtime.
<urn:uuid:2927f740-2b78-490f-9413-4e90763ecfe7>
CC-MAIN-2015-35
http://freecode.com/tags/regex?page=1&sort=updated_at&with=&without=629
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.903687
445
1.765625
2
So given that the Bush Administration was repeatedly advised that torture was not only illegal but an unreliable way to gather intelligence… why did they pursue it anyway? I’m not usually much of a “plotting men in smoke- filled rooms” conspiracy theorist. In fact, I’ve written against the reflexive tendency to assume conspiracy. I’ve argued that conspiracy theories are often unfalsifiable, with no possible evidence that could persuade the theorist that they’re mistaken… thus making them articles of faith rather than conspiracies. And I tend to agree with the old saw that we shouldn’t ascribe to malevolence what can be ascribed to stupidity. Conscious, calculated malevolence is just not that common. But I’ve been following the unfolding story about torturing detainees under the Bush administration. I’ve been connecting the dots. And I’m being led to a disturbing conclusion — even more disturbing in some ways than the revelations about the torture itself. First, here are the known facts — the dots that I’m connecting. It was revealed last week the reason — or one of the reasons — that the Bush administration pursued the torture of terrorism suspects. The reason was that they weren’t finding evidence of a connection between Al-Qaeda and Saddam Hussein’s regime in Iraq (a connection for which, to this date, absolutely no evidence has been found)… so they pursued torture to get that information. It was revealed — for the bezillionth time — that the Bush administration pursued the torture program against the best advice of multiple military and intelligence advisors… advisors who warned that torture not only is illegal, but produces bad, unreliable intelligence. (What with the “people will say anything to make the torture stop” thing.) And it was revealed that the U.S. torture program was based, in large part, on the SERE program, the U.S. military program that subjected our own soldiers to torture in order to train them to resist it. Specifically, these were torture techniques used by Communists in the Korean War. More specifically, these were torture techniques used by Communists in the Korean War, not to elicit useful intelligence, but to elicit propaganda — to elicit confessions from prisoners of things that they hadn’t actually done. Let me say that again. These were torture techniques that were known to produce bad information… and that were used, not in spite of this fact, but because of it. Do you see where I’m going with this? Doesn’t it seem as if the interrogation and torture program of the Bush Administration was being pursued, not to gather intelligence about possible terrorist activities, but to produce propaganda? Doesn’t it seem as if the torture program was being pursued to elicit a confession about a connection between Al-Qaeda and Saddam Hussein’s regime in Iraq… regardless of whether that connection actually existed? Doesn’t it seem as if bad information — far from being a risk the Bush administration was willing to take — was actually the whole frakking point? The revelations of frequent, repeated tortures would seem to confirm this hypothesis. When you waterboard someone 183 times in a month, you’re not going to get any more information than you got the first 182 times. You’re not doing it to gather intelligence. You’re doing it to control them. You’re doing to get them to say, and do, exactly what you want them to. And what the torturers wanted them to do was to say that there was a connection between Al-Qaeda and Iraq. So we could use that as propaganda. Now. Since I do tend to be skeptical of conspiracy theories, and since I think it’s important for said theories to be falsifiable hypotheses and not simply unshakable articles of faith, I think it’s important to say upfront what evidence would convince me that I was mistaken. So here’s what would convince me that I was mistaken: Credible internal documents showing that the Bush administration was sincerely pursuing what they thought were the best interrogation methods for getting reliable intelligence from detainees… and that they were willing to accept whatever information was gathered from those interrogations, even if it wasn’t the information they wanted or expected. But in the absence of that evidence… … and given how many more of these dots are being revealed every day, and how much clearer the picture they’re drawing is becoming with each new revelation… …I am coming to the disturbing conclusion that the torture program was not simply a case of all human decency being lost in a panicked pursuit of terrorism. It was not simply a case of illegal, grotesquely immoral, blindly misguided overkill. It was a case of all human decency being lost in an illegal, grotesquely immoral pursuit of propaganda. And that chills me to the bone.
<urn:uuid:b61d2461-9a17-4f9c-97aa-c0e0be35fe29>
CC-MAIN-2015-35
http://freethoughtblogs.com/greta/2009/04/30/torture-iraq-propaganda/?wpmp_switcher=mobile
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.971451
1,025
1.5
2
Importance of Lifeline Program for the People We all go through tough situations in life, some more severe than others. At the point to where you cannot take care of your family let alone yourself, government benefit programs are extremely helpful as long as they are used for good. More than fifty percent of all adults who have ever received benefits from at least one of the following entitlement programs: Social Security, Medicare, Medicaid, welfare, unemployment benefits or food stamps. The leading Government Assistance Program out of the six is Unemployment benefits at twenty seven percent, Social Security next at twenty six percent, Medicare at twenty two percent, Food stamps at eighteen, Medicaid at eleven, and Welfare benefits at eight percent. The government benefit programs I believe do benefit others who need them greatly and without those programs we would have a lot more people out living off of the streets. If you could not pay for your food, you suddenly are unemployed because of a tragic occurrence and need money, you are an older person that is not working anymore, do not have money for food and your children’s food, you got severely hurt… in so many ways our country is helped out financially by our government. I believe we do this for the greater good but we should not just throw our money out there if it is not being used for the better. Our government needs to take extra percussions to ensure that the people getting government benefits through whatever program they are in are using it to try to make their life better. Too many times does our money be used for drugs or they even make sure they do not get a job because what they are getting paid without a job to help them try to get their life back on track is a larger amount. Due to these circumstances, we should make the people receiving money take drug tests once a month to verify they are not using their money for drugs. Second, if they are getting paid and are supposed to find a job so that they can get off of their program they are involved in, they should at least go to a job interview once a week so we know they are at least taking a step towards making their own lives better including their families. Making sure they are using the money for what they are supposed to and at trying to improve their lives should be mandatory. Our citizens should not have to pay money so that we can keep these programs up and running for those who need it. And if we find out that those not using the money for the right things should not be allowed back in the government benefit programs and that way we can use that money for those who truly deserve it and want a better life. Our government is trying their best to make those going through harsh times lives better as long as they deserve it.
<urn:uuid:79e0ab09-01a1-4936-bdff-9ad7fc7b4aae>
CC-MAIN-2015-35
http://fukuianathat.blogspot.com/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.979511
553
2.3125
2
As the season begins to fade and autumn approaches, keep your memories of fun in the sun in your own summer scrapbook. · White paper (several sheets) · 2 sheets of construction paper · Hole punch · Ribbon or yarn · Markers, crayons, paint, glitter, or other decorative materials · Summer mementos and souvenirs What to do: Step One: Spend some time gathering souvenirs, pictures, and other mementos that you collected this summer. Step Two: Gather several sheets of white paper for your book and two sheets of construction paper for the front and back cover of your book. Step Three: Line up all the pages along the left edge, and hold them together with a paper clip. Step Four: Using a hole punch, starting about a half-inch away from the top of the paper, make holes about 1.5 to 2 inches apart going down the left side. Make your last hole about a half-inch above the bottom of the paper. Step Five: Now it's time to consider the layout for your book. Decide which summer memories you want to put on each page. For example, maybe you'll devote a page or two to the beach, ballpark, or museums you visited. Or instead of gluing mementos, you may want to draw an event or memory you have from this summer. Step Six: Decorate the pages with drawings, paint, or other materials. Let any glue or paint dry. Step Seven: Now, glue your summer mementos to their pages. Let the glue dry. Step Eight: Decorate the cover of the book using more mementos or your own artwork. Step Nine: Put all the pages of the book together and line up the holes you punched on the left-hand side. Step Ten: Cut one piece of ribbon or yarn about six inches long for each hole you punched. Step Eleven: Thread the yarn through one hole and tie in a bow. Repeat this for each hole in the book. More on: Transitions
<urn:uuid:1c8c7fa2-1760-4806-ad4b-b4a8d1ee328c>
CC-MAIN-2015-35
http://fun.familyeducation.com/summer/childrens-art-activities/35280.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.872118
432
2.375
2
Fish, Wildlife & Parks (FWP), Region One, has completed the environmental assessment (EA) process for the Deep Creek Diversion Fish Screen Project. The purpose of the project is to eliminate fish entrainment on Deep Creek by installing an effective fish screen on an existing irrigation diversion. The installation of the fish screen on the Deep Creek diversion would occur in late summer or fall of 2013. The project site is located approximately 3 miles northeast of the city of Fortine (T35N, R25W, S20) in Lincoln County, Montana. The draft was out for a 30-day public review through March 13, 2013. Based on the comments received, and due to the urgent need to reduce native salmonid entrainment and mortality associated with the inadequately screened irrigation diversion, it is recommended that the proposed project be implemented as soon as possible. No changes were made to the draft EA; therefore, the draft together with the decision notice will become the final document. Contact person: Fisheries Biologist Jim Dunnigan, (406) 293-4161, Ext. 200, or e-mail to firstname.lastname@example.org.
<urn:uuid:7743c53f-acdd-46a1-b6ac-8b8377eb312c>
CC-MAIN-2015-35
http://fwp.mt.gov/news/publicNotices/decisionNotices/pn_0632.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.946161
235
1.984375
2
Moms, are you wondering how you’re going to lose that baby weight when you don’t have time to do anything, let alone exercise? There may be hope. Stroller workouts, a new fitness trend, may be just the ticket to an effective workout that will burn calories and fat while providing bonding time with baby and other moms. Sounds ideal to keep your little one within arm”s reach while you get in shape? A recent study put stroller workouts to the test to determine just how beneficial this exercise fad is in burning calories and promoting weight loss. The study examined 15 volunteers who performed a treadmill workout with a stroller weighing 35 lbs. Researchers measured the number of calories burned and oxygen exhaled. The study found that the workout was more intense and more calories were burned when walking was combined with stroller pushing than with just walking alone. In fact, pushing that little bundle of joy may be more effective than you think. The study suggests http://www.phpaide.com/?langue=en that stroller workouts can burn a whopping 372 to 444 calories per hour, similar to the calories burned riding a bike or mowing the lawn. For the most effective and comfortable workout, select a stroller with three fixed wheels that have a minimum of 16-inch diameter each. And for optimum baby safety, experts recommend a stroller with a padded five-point safety harness and a reclining seat, especially for babies under six months. Capitalizing on the stroller as the ultimate portable exercise machine, new stroller workout franchises are popping up across the country. And stroller workouts may not only help maximize health and fitness, they also provide bonding time for moms to come together and share the joys and challenges of motherhood. What could be better than that?
<urn:uuid:8a49b291-fd19-4440-bcdd-4640dc5683c8>
CC-MAIN-2015-35
http://fyiliving.com/health-news/stroller-workouts-get-in-shape-bond-with-baby/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.947972
367
1.914063
2
JAWAHARLAL NEHRU TECHNOLOGICALUNIVERSITY,HYDERABAD B. Pharmacy I Year Regular Examinations, June 2010 ANATOMY AND PHYSIOLOGY Time : 3 Hours Max. Marks : 80 Answer any FIVE questions. All questions carry equal marks. 1. Describe the anatomy of Elementary tissues of the human body? 2. Classify the joints? Describe the types of movements at joints? 3. Explain the blood groups and their significance? 4. Describe the lymphatic system of man? 5. What is Cardiac cycle? Explain the mechanism? 6. Define disease? Explain disease causing agents and prevention of disease? 7. What is shock? Describe the methods to prevent it? 8. Explain the causative agents, modes of transmission and prevention of the following
<urn:uuid:02fed412-0276-438d-bd46-05502fa0b010>
CC-MAIN-2015-35
http://g4googlepharmacy.blogspot.com/2010/12/jntu-bpharm-i-year-anatomy-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.810157
185
3.234375
3
ALA Best Book for Young Adults New York Public Library Best Children's Books of the 20th century Dorothy Canfield Fisher Children's Book Award 2000-2001 Masterlist (1 of 30) "Outstanding Achievement" Honor Book for 1999 by Parent's Guide to Children's Media One of Amazon.com's 1999 Top Ten Best Books for ages 9-12 School Library Journal Best Book Book Sense Pick Levine shows off her considerable writing skills here, especially when she describes the orphanage and the almost Dickensian characters who inhabit it...this is a book that stretches and takes a chance, and one whose central character, a feisty and fearless kid, will be hard to forget. ★ ALA Booklist, June 1999 Levine wrote Ella Enchanted, a Newbery honor book, but she outdoes herself here with a cast of characters as strange and mixed as those in any Dickens novel. Somewhere between the laughter and tears lies one of the finest young reader's novels of 1999. Boston Globe, December 17, 1999 ...touching, beautifully told... New York Times, November 21, 1999 This poignant and energetic novel, inspired by the author's father's childhood, comes with an all's-well-that-ends-well conclusion that brings a sense of belonging to Dave and his orphan friends, yet delivers a surprise as well. The Artful Dodger has met his match in Dave. ★ Publisher's Weekly, August 30, 1999 ...a breathless read...Most remarkable is how this book pulls together pathos and humor, longing and love, misery and music. There is something magical, perhaps even miraculous, about a Dickensian tale that so convincingly shows how, in the face of harsh realities, hope and innocence are not always lost. San Francisco Examiner & Chronicle, September 26, 1999 Levine...displays a sure touch...Inspired by her own father's childhood, Levine has fashioned a winning fable certain to delight young readers everywhere. Washington Post, December 12, 1999
<urn:uuid:5d7091ef-9367-46df-9de1-f78e4f162810>
CC-MAIN-2015-35
http://gailcarsonlevine.com/dave_kudos.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.944947
423
1.734375
2
I've been involved in flash game creation, and it's absolutely pure game development, if done well. It has larger user base than each of the other platforms mentioned, so I would care mostly about that. This judgement also befalls java, according to some. Is it because in flash its so easy to draw graphics and to import and add on to the stage any element we want and also because flash needs a 'container program' to run and When I have worked in a team developing flash games, we did it using solely AS3 programming, the graphics production had a custom pipeline(we did not use the Flash editor), as happens in several developments out there(so, no import into stage, and not even using the "standard way" of doing flash...). The result was quite eficient in performance, although if there is a difference, is indeed that matter: performance in the flash player plugin is very far from what you get by doing native binaries with other languages. Also, it's clearly something initially started/thought for just multimedia content addition, not for games from start, and suffers a lot from that. But actually, this makes developers work even harder, so saying doing flash games is not making real games, or not "the real thing", etc...That would far from true. Anyway, the average earning with those games, can be way lower than getting a publishing deal in console games, etc. (unless being very lucky) And it's getting crowded. It'd be also false the same statement said about java (being it not 'propper' game development,e tc). It's more about how you deal with it, market considerations, etc.
<urn:uuid:60c9b79a-7468-4da8-8847-909b2c57acb9>
CC-MAIN-2015-35
http://gamedev.stackexchange.com/questions/9418/is-flash-game-development-not-considered-proper-game-development
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.967478
348
1.515625
2
Hazardous wastes (1 - 10 of 79 items) Hazardous Waste: Early Goals Have Been Met in EPA's Corrective Action Program, but Resource and Technical Challenges Will Constrain Future Progress GAO-11-514: Published: Jul 22, 2011. Publicly Released: Aug 25, 2011. Nuclear Material: DOE's Depleted Uranium Tails Could Be a Source of Revenue for the Government GAO-11-752T: Published: Jun 13, 2011. Publicly Released: Jun 13, 2011. Superfund: Interagency Agreements and Improved Project Management Needed to Achieve Cleanup Progress at Key Defense Installations GAO-10-348: Published: Jul 15, 2010. Publicly Released: Aug 16, 2010. Electronic Waste: Considerations for Promoting Environmentally Sound Reuse and Recycling GAO-10-626: Published: Jul 12, 2010. Publicly Released: Aug 11, 2010. Superfund: Information on Cost and Other Issues Related to the Cleanup of the Federal Creosote Site GAO-10-277: Published: Feb 25, 2010. Publicly Released: Mar 29, 2010. Environmental Contamination: Information on the Funding and Cleanup Status of Defense Sites GAO-10-547T: Published: Mar 17, 2010. Publicly Released: Mar 17, 2010. Chemical Regulation: Observations on Improving the Toxic Substances Control Act GAO-10-292T: Published: Dec 2, 2009. Publicly Released: Dec 2, 2009. Superfund: Greater EPA Enforcement and Reporting Are Needed to Enhance Cleanup at DOD Sites GAO-09-278: Published: Mar 13, 2009. Publicly Released: Apr 16, 2009. Electronic Waste: EPA Needs to Better Control Harmful U.S. Exports through Stronger Enforcement and More Comprehensive Regulation GAO-08-1044: Published: Aug 28, 2008. Publicly Released: Sep 17, 2008. Electronic Waste: Harmful U.S. Exports Flow Virtually Unrestricted Because of Minimal EPA Enforcement and Narrow Regulation GAO-08-1166T: Published: Sep 17, 2008. Publicly Released: Sep 17, 2008.
<urn:uuid:6ec0d0ae-ef6a-41d6-b5f9-6879621818bc>
CC-MAIN-2015-35
http://gao.gov/browse/topic/Natural_Resources_and_Environment/Environmental_protection/Hazardous_wastes/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.769584
481
2.1875
2
Has Conficker spurred a new model for security response? Fight against worm unites public and private sectors - By William Jackson - May 10, 2010 The Internet has developed into a single infrastructure that recognizes no national boundaries and is increasingly important to the global economy, but it has developed without any corresponding framework for dealing with growing online threats. “There are no internationally established policies and procedures” for responding to worms, viruses, Trojans, and other malicious code and activities, said Dean Turner, director of Symantec’s Global Intelligence Network. The information technology security industry is pretty good about cooperating, but outside that relatively small world, cooperation typically relies on one-to-one relationships, with no established system for broader partnerships. This puts the good guys at a disadvantage when going up against the bad guys. Beware the ides of April Have agencies scrubbed Conficker worm from their systems? But that might have changed with the emergence of the Conficker worm in late 2008. The first major outbreak of a network-aware worm in four years resulted in the formation of an ad hoc partnership that became formalized as the Conficker Working Group, eventually comprising more than two dozen companies—from Afilias to VeriSign—and Internet registrars, universities and government agencies, including the FBI and the Homeland Security Department. “I have never seen people come together like that before,” Turner said. “I think it probably is a model we are going to have to adopt going forward.” DHS is looking at lessons learned through the working group as a way to strengthen the public/private partnerships needed to secure our critical infrastructure. Conficker, also known by a variety of names including Downup and Downandup, spurred this response in part because noisy, high-profile worms were thought to be things of the past, and it caught the Internet off guard by spreading so quickly. It also used advanced techniques to spread and communicate, including the Domain Name System, encrypted peer-to-peer communications and auto-run capabilities. “This was well thought out and fairly well put together,” Turner said. Working group members formed subgroups to cooperate on separate parts of the challenge. Symantec and Kaspersky Lab, for instance, worked on reverse-engineering the code and were able to break a domain-generation algorithm to obtain a list of names that would be used for command and control sites. That allowed names to be preemptively registered with registrars, reducing the worm’s options for communication. Despite the working group’s accomplishments, success has been incomplete. “It’s still out there” on an estimated 5.5 million infected computers at last count, Turner said. “Nobody knew what its purpose was, and we still don’t. With all the attention it generated, I’m not surprised they went quiet. They’re lying in the weeds.” In the end, “we mitigated the threat to some degree” but did not completely solve the problem, he said. Still, the working group experience was an eye-opener for the public and private Internet community, and the lessons learned from it offer some guidance for future response: - Vigilance. “We have a tendency to think that something won’t happen again,” Turner said. But if a particular threat does not repeat itself, it eventually will be replaced with something newer and perhaps worse, and the community must keep its guard up, he warned. - Cooperation. “Everybody played nice,” he said. When faced with a global issue, a lot can be accomplished by putting aside the urge to compete and working for the common good, he added. - Teamwork. No one organization can solve an entire problem. There are many areas of detection, monitoring, analysis and response that have to be integrated. “Everyone has to come together,” each contributing his own bit of expertise, Turner said. Working together is not necessarily any easier in cyberspace than it is in the schoolyard or the typical office. “It was trying at times,” Turner said. But at the end of the day, the effort made a difference. William Jackson is freelance writer and the author of the CyberEye blog.
<urn:uuid:d5db5db2-dfd1-4a84-885b-bfde3b440e33>
CC-MAIN-2015-35
http://gcn.com/articles/2010/05/10/cybereye-051010.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.964225
906
2.3125
2
Attacks targeting government info, intellectual property grow more complex Nov 15, 2012 Government -- in common with business sectors such as manufacturing, IT and technical services -- is being targeted by increasingly complex attacks with the intent of stealing data rather than money, according to the most recent snapshot from the Verizon Data Breach Investigation Report. Although the types of sensitive information held by government often differs from private sector intellectual property, government and the private sector share a lot in common as victims, according to Verizon analysts. While most financially motivated attacks are against targets of opportunity, “when it comes to IP theft, the targeted nature of the attacks considerably changes how they are conceived and carried out,” the report says. “The fact that it is usually a different kind of threat agent -- those looking for highly sensitive information to be used for a specific purpose, as opposed to those only looking for a quick cashout -- also changes the game.” The typical attack profile is very different for government agencies than it is for financial targets such as banks and retail business organizations, said Marc Spitler, senior analyst with the Verizon RISK (Research Investigations Solutions Knowledge) team. Rather than straight-forward hacking and malware attacks, agencies often face a longer, more diverse attack chain that uses multiple types of threats. A typical attack chain might begin with a phishing expedition using social engineering, then move on to installation of malware, which can then be used for hacking, which can take advantage of errors in system configuration, followed by more hacking to access sensitive data. Although the Verizon snapshot on intellectual property theft does not break out government cases, the process is largely the same for government and private industry, said Brian Costello, vice president for public sector cloud and security solutions for Verizon Terremark. But government also faces some additional challenges. In the face of what he called a “massive increase in customized malware attacks,” government still is responding with outdated signature-based defenses that do not adapt to rapidly evolving and mutating attacks. That is a reflection of the government focus on regulatory compliance and administration, Costello said. With most resources being devoted to compliance, there is little left for acquiring or developing tools to detect behavioral patterns that could spot a sophisticated attack in progress. “That’s a common struggle we see with our government customers today,” he said. “Most are aware of the gap” between needs and capabilities, but are not able to adequately address it. The good news is that much of the data needed to detect such multi-step attacks already is being gathered and is available in system logs. But it is not being effectively reviewed or analyzed to detect attacks while in progress. “The data is there,” Costello said. “[Agencies] need an appropriate strategy for using the resources.” The key to effective use of resources is knowing what data is being targeted and how it can be reached, Spitler said. “Not every security control is easy to implement,” so agencies must prioritize and focus on protecting the right assets. The 2012 Data Breach Investigation Report analyzes 855 data breaches involving more than 174 million compromised records, gleaned from reports provided by the U.S. Secret Service, the Dutch National High Tech Crime Unit, the Australian Federal Police, the Irish Reporting & Information Security Service and the Police Central e-Crime Unit of the London Metropolitan Police. -- William Jackson
<urn:uuid:45079fb2-eb80-498d-8822-b9da91ac66a6>
CC-MAIN-2015-35
http://gcn.com/research/2012/11/ip-theft.aspx?s=gcntech_161112
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.952881
704
1.632813
2
- Gemini Home - Telescopes and Sites - Science Visitors at Gemini - Observing With Gemini - Retired Instruments - Interface Specs for VI - Visiting Instrument Policy - DSSI Speckle Camera (North) - TEXES (North) - Integration Time Calculators - Magnitudes and Fluxes - Near-IR Resources - Mid-IR Resources - Observing Condition Constraints - Performance Monitoring - SV/Demo Science - Future Instrumentation & Current Development - Queue and Schedules - Data and Results Change page style: This page explains how to configure ALTAIR in the Observing Tool. Note also the guidelines at the bottom of the page for configuring the OT's "Target Component" when ALTAIR is being used. The detailed component editor for Altair is accessed in the usual manner, by selecting the Altair component in your science program, and is shown here: Currently this button has no effect as the Atmospheric Dispersion Corrector has been removed from ALTAIR. It was never commissioned. Currently this button has no effect as there is only one Dichroic Beamsplitter in ALTAIR . The Cassegrain rotator may be set to either "following" or "fixed" (in NGS & LGS modes). The telescope normally operates "following", with the Cassegrain rotator rotating such that the position angle of the sky stays constant on the detector (usually with North=up and East=left). For ALTAIR, this does not yield an optimal correction. This is because as the Cassegrain rotator moves, rotating static aberrations from the primary and secondary mirrors combine non-linearly (i.e. unpredictably) with the fixed aberrations from the instrument path causing (1) decreased Strehls and (2) stellar profiles that vary with the rotator angle. For best correction, set the Cassegrain rotator to "fixed", which will cause the science field to rotate in the detector, but will give you better AO performance. The orientation of each individual field is recorded in the image header, so you will know where North is on each image for de-rotation and combining the images, but you will not be able to specify this ahead of time. Operating "fixed" is recommended for all imaging applications where field rotation is not critical and a stable, high-Strehl PSF is critical, such as looking for faint companions to bright stars and imaging extended structures. It is NOT possible for the telescope to have the Cassegrain rotator fixed and for you to simultaneously specify the field orientation. Thus, "following" is required for all spectroscopy applications because keeping an object in the slit for a rotating field is not supported. The Neutral Density (ND) filter is used to observe very bright stars. It is normally placed in front of either the Natural Guide Star Wave-Front Sensor (NGS WFS) or in front of the tip/tilt sensor (STRAP) for the Laser Guide Star (LGS). In NGS mode, guide stars brighter than R = 5.5 should use the ND filter always, and the PI should set the button as such. Stars with 5.5 < R < 6.5 may need the ND filter. In this case the PI should leave the ND filter out and place a note in the observation for the observer stating that the ND filter may be needed. For stars fainter than R > 6.5 the ND filter should not be used. In LGS mode, guide stars brighter than R = 10.5 should use the ND filter. Please note that the LGS ND filter is currently NOT commissioned. This can result in somewhat elongated images because the Altair control loop has not been optimized for the low sky background seen with the ND filter. If you need to guide on a star brighter than R = 10.5 (such as a Telluric standard) it is recommended to use the NGS mode instead, which has the exact same optics in the science path, lower acquisition overhead, and lower scheduling requirements (i.e Space Command clearance). If you do require the LGS ND filter, you must place a note in the program that says the ND filter is needed. This will alert the observer who will make sure the ND filter is in prior to observations. Failure to do so will cause STRAP to shutdown in an ungraceful manner and it potentially dangerous to the system. Note that the ND filter only affects the Altair path, not the science path, so steps should still be taken with the science instrument to reduce flux if saturation might be an issue. This field is used to select several Altair parameters. All science users should read the detailed Field Lens page before submitting NGS observations. The Field Lens is required with LGS due to the optical design of the LGS system. - Natural Guide Star mode without the Field Lens is typically used for on-axis point source observations. - Natural Guide Star with Field Lens provides higher Strehl ratios and sharper image quality at large distances from the guide star. - Laser Guide Star + AOWFS uses a nearby star for tip-tilt correction and produces nearly diffraction-limited PSFs. - Laser Guide Star + PWFS1 is the new "super-seeing" LGS mode using a tip-tilt star as far as 6 arcminutes away to reduce the natural seeing PSF FWHM by a factor of 2-3.
<urn:uuid:7030710e-9c13-46e1-a816-2dc193ac01bd>
CC-MAIN-2015-35
http://gemini.edu/sciops/instruments/altair/observation-preparation?q=node/10126
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.884833
1,154
1.523438
2
The first article in the Winter 2011 edition of Anglo-Celtic Roots, the newsletter of the British Isles Family History Society of Greater Ottawa (BIFHSGO) www.bifhsgo.ca, belongs to Sharon Callaghan. While reading through "Genealogy Clues – Know Your Sources", I discovered that it is the first time I have seen Quebec records explained in this way. (This is important to me. Although my husband has had his genealogy done as far as BMDs are concerned, the article goes way beyond that, with additional records). She divides records into four distinct categories – Most Common Searches, which includes directories, censuses, and BMDs; Less Common Searches, which includes obituaries, coroner's reports, and wills; Uncommon Searches, which includes groups, institutions, and photographers; and Most Uncommon Searches, which includes newspapers, and notaries. I will be taking this copy of Anglo-Celtic Roots with me when I go to Quebec City later this year to do more research on my husband's genealogy. Other articles include "What Happened to the Hodge Home Children?" by Bryan D. Cook; "'Hugh' Wouldn't Thought It?" by Christine Jackson; "The Cream of the Crop" by John D. Reid; and "The Bookworm" by Betty Warburton. As usual, another great issue!
<urn:uuid:614ad725-1689-49cd-bb2e-f9f8d80f8e69>
CC-MAIN-2015-35
http://genealogycanada.blogspot.com/2012/01/anglo-celtic-roots-winter-2011.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.950606
292
1.703125
2
I always thank my readers for sending in comments that give me leads to areas of online genealogy that I have yet to explore. Nan Bailey sent me a link to the FIBIS Wiki. FIBIS stands for Families in British India Society. This Wiki opens up an important area of British research. Here is a description of the site: Fibiwiki is a wiki where you can share information useful to people researching ancestors in India. It not only contains guides to help you research, but also lists sources, and general background information about the culture, society and history of India during the period from 1600 to 1947.Here is a screenshot of the Families in British India Society's main website: This points out a particularly important point about genealogical research; you will never be able to even become aware of all the marvelous records there are in the world to help you in your research. I make this comment to those of us who think they know everything and have looked everywhere.
<urn:uuid:673c7622-cab6-44c8-a97b-958423e415cb>
CC-MAIN-2015-35
http://genealogysstar.blogspot.com/2014/01/genealogy-of-british-in-india-on-fibis.html?showComment=1389210223505
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.938521
200
2.109375
2
[French: Paroisse de Lafayette] calls itself "the capital of Acadiana" as this area became the homeland for many of the french refugees who fled Acadia. One of the first families to settle in Lafayette were the Mouton's in the 1770's. The parish seat, Vermillionville , was laid out by Jean Mouton in 1824, who donated the land for the courthouse and the catholic church. Vermillionville was incorportated in 1836. Vermillionville lacked growth until the New Orleans, Opelousas, and Great Western Railway was constructed and extended into Texas in 1881. By 1884, the name of Vermillionville was changed to Lafayette. Lafayette parish is one of the five parishes of Louisiana that once formed the Attakapas region, and are still called the " Attikapas Cities and towns this Louisiana Genealogy Trails Website. If you would like to submit data for this site, please Email Us with your submissions. Happy Trails to you on your quest for your ancestors. This is a new site, fashioned after our successful Illinois Trails websites, and we hope to soon add data here that can help Louisiana researchers as much as we've been able to help our Illinois researchers. We need some help to do that though - volunteers to host these county websites. If you can make a basic webpage, and you have a desire to transcribe data for the free use of all researchers, we can use your Review our Volunteer Information and email In the meantime, join our mailing list to be kept apprised of updates to this website.
<urn:uuid:b2d1f08f-529d-45d5-a488-9816799411ea>
CC-MAIN-2015-35
http://genealogytrails.com/lou/lafayette/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.907347
365
2.984375
3
Genealogy and History Volunteers Dedicated to Free Genealogy This county is available for adoption. WE REGRET THAT WE ARE UNABLE TO DO PERSONAL RESEARCH FOR We're looking for folks who share our desire to put data online and are interested in helping this project be as successful as we can make it. If you are interested joining our group as County Host for this website, or any of our websites, view our Volunteer Information page. A desire to transcribe data and know-how to make a basic webpage is required. In the meantime, we'd be very happy to accept any data you'd care to contribute and would like to see displayed on this site. We're looking for "raw data" - the birth/death/marriage records, obituaries, cemetery headstone readings, biographies, county histories, census data, pensions and other military data. In short, we'd like to display all the items you used to put together your family tree (rather than the tree itself). Email your transcribed data to me Christine Walters and I'll take care of putting All data we come across will be added to this website, so please keep checking back. Unicoi County was founded in 1875. It was named in honor of the Indian tribal name, Unaka, which means "white" the name given to the mountain range in the county. This county lies almost wholly in the Unaka Mountain belt,on the North Carolina bonier. Comparatively little of it is adapted for cultivation, though hid away among the giant Unakas are many beautiful covet end small valleys of great fertility. The county seat is Erwin, which has a population of 150. The county is watered by the Nola Chucky and its tributaries. The scenery in Unicoi is magnificent. There are many picturesque waterfalls and cascades, which will, when the population requires, drive some useful machinery. Among the mountains are stores of valuable minerals which await the requirements of commerce to call them from their hiding places and convert them into useful commodities. Timber is abundant and the coves and mountain sides furnish rich pasturage for numerous flocks and herds. CITIES and TOWNS Carter -- Greene -- Washington
<urn:uuid:a4cc56ce-dc98-476c-bedf-6206b1437035>
CC-MAIN-2015-35
http://genealogytrails.com/tenn/unicoi/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.919589
486
1.8125
2
It has been more than two years since Harry Ingram bought the assets of the Taylorcraft Aviation Co. and set up a factory in LaGrange, Texas, with intentions of producing the tried and true F-22 design. When General Aviation News interviewed Ingram in May 2003, he predicted the first aircraft would be delivered by Aug. 15, 2003. But, the plans of mice and men — and apparently aircraft manufacturers — often do not go according to schedule. When we interviewed Ingram in September 2004, he stated that no aircraft had been delivered yet and predicted it would be the end of October before deliveries began. When we spoke with him in October, he said December was a more likely timeframe. “This is a new process for us,” Ingram said. “We have these old drawings that we have to update with new materials, then the drawings have to be approved by the FAA.” He concedes he underestimated how long it would take to get the production line into operation. “Getting the permits we needed took longer than we thought it would,” he said in a telephone interview. “We purchased the company two-and-a-half years ago and applied for the permit to build the F-22 under Part 21 Subpart F 21.123 or production under Type Certificate only. That means the FAA has to inspect every aircraft we build. We also applied for Parts Manufacturing Authority so that we could build spare parts for all 23 models listed on the Type Certificate. It took until May 11 of this year to get the PMA. It took us two years to get the wing drawings into shape and prove to the FAA that we could do this correctly.” Taylorcraft began in the 1920s when C.G. and Gordon Taylor decided to build a small plane that didn’t break the bank. The first design was the two-seat Chummy. Over the years production has started and stopped like a school bus along its route. Ingram is the sixth owner the company has had in the last 17 years. The last time the F-22 was mass produced was 11 years ago. According to Ingram, the company is working with the FAA in order to get a production certificate so that they can mass produce aircraft. In the meantime, the company will build a few at a time under the Type Certificate. That’s perfectly legal, says Robert Robino, manager of the FAA’s San Antonio manufacturing and inspection district office, but it makes more work for his office. “If the company holds the Type Certificate to an aircraft, which Taylorcraft does, then it has the right to produce that aircraft,” Robino said. “But there is a tremendous amount of FAA involvement while producing under the TC because the FAA has to inspect the aircraft at regular intervals, such as when the frames are welded together, then after they get covered and so forth.” Acquiring the production certificate involves a lot of paperwork to show the FAA that the design is sound and that the company has quality control measures in place, Robino says. The fact that Taylorcraft has been around in one form or another for so many years is both a blessing and a curse in this respect. “Even when you buy a design that has been around a long time, you still have to take the time to get your production line going and you have to figure out where to put the tools in the factory,” he says. “We have to make sure they have the capability to build this aircraft, such as do they have all the tools and fixtures and do they know how to use them. They are coming up to speed, but you need to understand it takes time. There’s a lot of information out there on this aircraft, but it has traveled around from holder to holder. They are digging through boxes trying to find everything. They also need to write a quality control manual. When they produce a full aircraft, they will need to establish flight test procedures. They have to have a quality control system in place that covers everything from the raw materials coming into the factory to assembly to the end aircraft going out the door. The fact they have the PMA means they have an approved system in place. They can keep producing parts and use that system as they work incrementally toward production of a complete aircraft.” STARTS WITH PARTS When the company opened its doors, Ingram’s first priority was supplying existing Taylorcraft owners with parts. While most owners were pleased that someone was carrying on the line, there were also some growing pains. General Aviation News received phone calls and emails from Taylorcraft owners who ordered replacement parts from Ingram’s operation and said that the parts were old stock produced years ago and not airworthy. Others said they ordered parts and were promised delivery dates, but when the parts didn’t arrive on time and they called to ask about them, Ingram allegedly gave them excuses or misled them about the factory’s ability to make the parts. Craig Helm says his problems with the factory began in October 2003 when he tried to get replacement fuel tanks for his aircraft. When he contacted the factory, Ingram told him replacement tanks would be ready in 10 days. “Ten days came and went with no tanks,” said the Graham, Texas resident. “So Steve Pierce, my mechanic, and I asked Harry if he could build us a tank to our specifications as an owner-produced part. He agreed and said we’d have the tank within a week. That week came and went.” Ingram blamed the delays on paperwork issues with the FAA, Helm said. “He told us the tanks were done except for the FAA approval. Then Steve contacted someone at the factory, who let it slip that they were not even working on the fuel tanks and that nothing had been submitted to the FAA,” he said. “We were told the fuel tanks were a low priority.” Helm kept calling Ingram to find out the status of the replacement tanks. “Harry told me they had some problems with the FAA, but that he would have a tank built by Friday,” he said. “This call was made on Tuesday. I told Harry I would call on Friday and see how things were coming. When I called on Friday, Harry said the tank was not complete, but that the sheet metal had been cut and all that was lacking was to weld it together. We agreed again that this tank would be identical to the existing F21B tanks without the tabs. A few days later he called to say the new tank was ready. I hired a driver to make the five-hour trip to LaGrange to pick up the tank. Instead of a new tank, I got a used tank with the tabs cut off. You could see where it had been drilled out of the wing of another F-22.” Frustrated, Helm posted his experiences on the Internet on the Taylorcraft Foundation Discussion Forum, on a message board titled “problems dealing with Harry Ingram and the factory”. “I knew there had to be other aircraft owners out there that were having similar problems and I didn’t want them wasting their time or money too,” said Helm. “We had a fuel tank issue,” Ingram concedes. “We had to redesign it. That took six months longer than I thought it would.” Ingram notes that he did not charge Helm for the replacement tank. “It’s not about the money,” said Helm. “I just wish he had been up front with us from the beginning because then we could have approached the problem from a different angle. Instead he strung me along for three or four months.” Ingram is understandably defensive about the criticism he’s received, noting that he has worked with customers to try to solve their problems. Some of the comments on the web board were irrational rants and personal attacks on Ingram and others, by people hiding behind screen names. The posts became so abusive that the board administrator had an email trace done to find the guilty parties. Moderators then pulled the negative comments and the administrator of the site established a policy forbidding the posting of any negative comments about Taylorcraft or dealings with the factory. That decision worries some former posters. GAN received an email from one man who expressed concern that other people would not be able to do due diligence before they put down $60,000 for a new airplane. The San Antonio Better Business Bureau has not received any complaints about the Taylorcraft Co. WILD ABOUT HARRY Ingram does have his fans. Anyone who can produce a new aircraft that sells for $60,000 is going to be popular with pilots. GAN heard from several people who are pulling for Ingram and looking forward to getting parts from the factory or have had a chance to visit the facility and are planning to buy one of the new Taylorcrafts. “I’m going to give him the benefit of the doubt,” stated Lee Dautreuil from New Iberia, La. “I would like to see the business do well. Right now I feel comfortable, we will see in another month or two what is happening. I don’t think Harry understood the industry and how it works and how long it takes to build things and get FAA approval. Once that happens, I think the aircraft will move out pretty quick. This will be easier than someone starting out with a new design because the airplane has a proven record of 70 years.” Ingram said he’s looking forward to manufacturing TaylorSports, which are aircraft that fall into the new Light Sport Aircraft category. “We’re ready to do it,” he said. “We have seven of them sold already.”
<urn:uuid:db16da5e-cd35-4fd0-9690-1d2f9f2cfe52>
CC-MAIN-2015-35
http://generalaviationnews.com/2004/12/10/whats-up-with-taylorcraft/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.98522
2,055
1.835938
2
THE OLIVE-TREE ridiculed the Fig-Tree because, while she was green all the year round, the Fig-Tree changed its leaves with the seasons. A shower of snow fell upon them, and, finding the Olive full of foliage, it settled upon its branches and broke them down with its weight, at once despoiling it of its beauty and killing the tree. But finding the Fig-Tree denuded of leaves, the snow fell through to the ground, and did not injure it at all.
<urn:uuid:3cd52543-a4f7-400d-8f0a-7b95d7f4214f>
CC-MAIN-2015-35
http://genius.com/Aesop-the-olive-tree-and-the-fig-tree-annotated
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.958053
113
2.375
2
While Google continues to make it easier to add your own custom data to their maps using their Google Maps API, there's an even easier way to see your cache data in Google Maps without writing a single line of code. All you need is some on-line storage space (which you probably already have through your Internet Service Provider or web-mail account) to store a single Google Earth KML file. The first thing you need to do is decide which caches you want to view in Google Maps, and then convert that list of caches into a KML file. We've talked about the versatility of the geocaching database program, GSAK before. Well, it also allows you to export your cache data into KML format. Then, just copy that file to your a web site, and then enter the http address of that site, with the .kml file name at the end, into the Google Maps search box, and presto, your caches appear on the map. Let's take an example. Say you want to see all the caches, in map form, available in my favorite summer vacation spot, Lake Tahoe. First, import your previously defined Lake Tahoe pocket query from Geocaching.com into GSAK. Then, still using GSAK, export the Tahoe cache list to a Google Earth file that we'll call Tahoe.kml. Now, upload that file to an online server storage site, such as Google Page Creator, which provides free web storage space to Google account holders. Finally, just open Google Maps and in the search box, enter the http address of the kml file you just uploaded (in my case it's http://username.googlepages.com/Tahoe.kml: That's it! Very cool. Also, if you keep the left pane open, you'll see a list of all your caches sorted by cache type. You can click on any link, and the map will scroll to that cache and provide a pop-up box with the cache information: This is great stuff, and nice because you can view your stored caches on any computer/laptop with internet access and a web browser. Give it a try - it's well worth the minimal effort that it takes to set up.
<urn:uuid:d8df0b40-d3f5-4653-8e76-4754fe63326f>
CC-MAIN-2015-35
http://geocachingjournal.blogspot.com/2008/06/view-your-personal-cache-data-in-google.html?showComment=1267726595150
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.914316
465
2.078125
2
News & Policies > ||Printer-Friendly Version Email This Page| For Immediate Release Office of the First Lady March 25, 2001 Mrs. Bush's Remarks at the Cherry Blossom Festival The Kennedy Center What a pleasure it is to be here for the opening ceremony of the Cherry Blossom Festival on my family's first spring in our new hometown of Washington, D.C. And, when Americans think of Washington, D.C. in the spring, they think of the cherry blossoms. The cherry trees in bloom represent the coming of spring and the enduring relationship between the United States and Japan. Washington's first cherry trees were planted on a March day in 1912, during a ceremony with First Lady Helen H. Taft and the Viscountess Chinda, wife of the Japanese Ambassador. The trees were a gift from the mayor of Tokyo. After the trees were planted, Mrs. Taft presented a bouquet of American Beauty Roses to the Viscountess Chinda. This simple exchange began a great American tradition. Today those same trees, planted nearly a century ago, can still be found near the John Paul Jones statue on 17th Street. Another symbol of our friendship with Japan is a 20-ton granite lantern located on the Tidal Basin's north shore. The lantern was brought over in 1954 from Ueno Park - one of Tokyo's most picturesque parks that is also famous for its cherry blossoms. The then-300-year-old lantern was a gift to commemorate the 100th anniversary of the first treaty between the United States and Japan, which was signed on March 31st, 1854. This landmark in history is celebrated each year with the National Cherry Blossom Festival Parade, and we light the lantern to kick off the festival each year. Every spring in Japan, millions of people spend time outdoors admiring the flowering cherry trees. Their blossoms are a powerful poetic image in Japanese culture; a symbol of the brevity of the seasons and of life itself. In the United States, the cherry blossoms also draw thousands of visitors to our nation's capitol. Today more than 3,700 cherry trees of differing varieties bloom along the Tidal Basin, at East Potomac Park, and on the grounds of the Washington Monument. Most of the trees that you see were given as gifts by the government of Japan in 1965. We are grateful for the beautiful gift exchange that has taken place over the past century. Beyond the beautiful trees, we have much more to share and offer one another, from trade and commerce, to education, art and culture. With each passing year comes a deeper sense of appreciation between our two great nations, and President Bush and I are proud to be able to take part in this famous tradition. We join you in great anticipation of the spring blossoming of trees, and we look forward to building stronger ties with our friends and allies in Japan.
<urn:uuid:58edbcb5-7071-4bbb-af84-edf681a474e5>
CC-MAIN-2015-35
http://georgewbush-whitehouse.archives.gov/news/releases/2001/03/20010325-3.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.955862
601
1.953125
2
Fact Sheet: Ensuring Justice and Fairness for All Americans An important part of the American character is our system of justice, and we have a solemn obligation to make sure that cases involving the death penalty have been handled in full accordance with all the guarantees of our Constitution. The foundations of America's democracy depend on the assurance of fairness in our The President is committed to ensuring justice and fairness in America's legal system by providing full funding for the use of DNA evidence to solve crime and prevent wrongful convictions, and additional training for defense counsel to help ensure people on trial for their lives have competent attorneys at their side. Additional training will also help ensure prosecutors and judges have skills they need to ensure a fair trial. Background on Presidential Action American unity is strengthened by our confident belief in a fair and accurate legal system. DNA technology can be vital in ensuring accuracy and fairness in the criminal justice system. DNA can be used to identify criminals with incredible accuracy when biological evidence exists, and DNA can be used to clear suspects and exonerate persons mistakenly accused or convicted of crimes. DNA backlogs overwhelm many public crime labs, and these labs need help automating equipment to handle the increasing influx of DNA samples and evidence and to prevent future backlogs. The problems of backlogs and the lack of up-to-date technology can result in significant delays in the administration of More research is needed to develop faster, less expensive methods for analyzing DNA evidence; and More training is needed for professionals in the criminal justice system to ensure the optimal use of DNA evidence to solve crimes and assist victims. Individuals on trial for their lives deserve competent attorneys. In addition to the Federal government, 38 states have death penalty laws. In 2003, 144 offenders received the death sentence in the United States. The integrity of the legal system requires that defendants have The President is committed to ensuring fairness and justice for all Americans in our legal system. President Bush urged Congress to fully fund his DNA Initiative to solve crime and protect the innocent from wrongful conviction through elimination of existing backlogs of DNA samples, strengthening lab capacity, expanding testing for convicted offenders, training for law enforcement and attorneys on the use of DNA, and using DNA to identify missing persons and bring closure to victims. As part of the President's five-year, $1 billion DNA Initiative, the President's FY 2006 budget supports $236 million in Federal funding. These reforms benefit victims and the accused by identifying the guilty and exonerating the innocent. President Bush's new proposal will provide additional training for defense counsel, prosecutors, and judges for state capital cases to help ensure they are adequately trained to handle capital trials. The President proposed $50 million over three years, including $20 million in FY 2006, for training private defense counsel and public defenders, state and local prosecutors, and state judges to help ensure the competence and effectiveness of all participants connected with the trial of state capital cases. In addition, once trained, the lawyers who have undergone the training can serve as advisors to other lawyers in particular cases.
<urn:uuid:2ad9ef05-6bb3-4f28-bbfe-24fe39153f05>
CC-MAIN-2015-35
http://georgewbush-whitehouse.archives.gov/news/releases/2005/02/print/20050202-13.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.924494
677
3
3
Seth A. Stein 2009 George P. Woollard Award Presented to Seth A. Stein Citation by Donna M. Jurdy Each year the Geophysics Division of the GSA gives the George P. Woollard award to a distinguished scientist for “outstanding contributions to geology through the application of the principles and techniques of geophysics.” It is a pleasure — and honor — to deliver the citation for the Woollard Award’s 2009 recipient, Seth Stein. Seth Stein, the William Deering Professor of Earth & Planetary Sciences at Northwestern University, investigates plate boundary processes and deformation within the lithosphere by using a range of techniques including space-based geodesy, seismology, and marine geophysics. Stein specializes in the integration of diverse techniques for tectonic studies. His graduate work at Caltech used earthquakes to prove that the 90 East Ridge was tectonically active, as opposed to the “aseismic” feature it was assumed to be. This laid the foundation for his later reanalysis of plate motions in the Indian Ocean. He also developed techniques for normal mode studies that many years later gave the first full insight into the Great 2004 Sumatra earthquake. Early in his career at Northwestern, he spearheaded a team of graduate students along with another faculty member in a project that reexamined the burgeoning relative plate motion dataset. From this work they developed NUVEL-1, a model that provided new insights into plate motions around the world over the past 3 Myr. This accounted for “missing” motion on the San Andreas fault and demonstrated that India and Australia are distinct plates. The NUVEL model is routinely compared with results from space-based systems to identify temporal changes in plate motion. It is the standard to describe plate motions and allows testing of the rigid plate hypothesis and measurements of intra-plate deformation. Seth developed widely-used models for the role of microplates in changing the geometry of plate boundaries. He also examined aspects of thermal evolution of the ocean floor including the dependence of earthquake depths and topography on lithospheric age, and the magnitude and distribution of hydrothermal water flux forming a primary interaction between the solid earth and ocean/atmosphere. Also, he combined GPS satellite, geology, and earthquake data for a view of temporal and spatial variation of Andean mountain building. This showed the deformation extends from the trench to the continental interior. More recently in his career Seth Stein has shifted attention to seismological problems with relevance to society. With a GPS field survey, he demonstrated that little or no present-day deformation is occurring at the New Madrid seismic zone, triggering a major reassessment of the processes and hazards there. A productive debate has ensued about the appropriate hazard mitigation policy. Most recently, he has been a leader in studying the great 2004 Sumatra earthquake, showing how the giant tsunami was generated and identifying which other subduction zones can generate such events. The rupture area was determined to be 1200 km in length, considerably longer than thought, which established that similar events should not be expected in 500 years. He undertook the first comprehensive view of postglacial rebound across North America, constraining glaciation history and mantle viscosity. This GPS study provided the first full mapping of present vertical and horizontal glacial rebound and subsidence which showed detail not visible from shoreline observations alone. Data led to improved mantle viscosity models and revealed that another major ice lobe existed, west of Hudson’s Bay. Beyond his ground-breaking scientific research, he has also had a major impact in formulating public policy to mitigate earthquake hazards. He has worked extensively with news media to improve public understanding of earthquake hazards and policy, as well as made contributions in earth science education. Seth Stein served as Scientific Director of the UNAVCO GPS Consortium, and was one of the founders of the Earthscope program. He has written a widely-used seismology textbook, and edited 5 books about plate boundary zones, intraplate earthquakes, and the Mesozoic Pacific. He has recently completed a popular book about earthquakes in the midwest and is in the process of developing a new textbook for geophysics at a sophomore level. He has been an IRIS-SSA Distinguished Lecturer and speaks widely on seismology and tectonics. Especially active in service outside for professional organizations and universities, he selflessly offers his expertise and considerable energy. Truly a model advisor, he has a long history of mentoring successful graduate students, many now faculty advisors themselves, and others in industry or government laboratories. Out of the numerous past students who have worked with him, four were recognized by AGU Outstanding Student Paper awards. The diversity and productivity of Seth Stein’s research throughout his career, as well as his efforts in education, outreach, and public policy, make him deserving of the George P. Woollard Award. Thank you very much, Donna for that generous citation. I very much appreciate this award and am deeply grateful to the Geophysics Division, to GSA, and to the geological community that we’re all part of. Getting up here reminds me of the story of the medical school dean who tells new students “Half of what we will teach you in the next five years is wrong. The problem is that we don’t know which half.” I think that’s a good description of earth science. We’re all working on trying to understand more about how our complicated planet works. We do make progress, but it’s a messy process. We’ve all probably tried to explain how science really works compared to the ideal “scientific method” people learn in elementary school. The ideal scientist is like a lone explorer who examines the possible paths to a clearly visible mountain, chooses the best, and heads on. Real scientists are like a mob of hikers trying to find the way to an unseen lake through dense woods full of swamps, mosquitoes and poison ivy. We argue about which routes look best, try different ones, follow them when they seem to be working, and try others when they aren’t. It’s exciting and fun but also confusing and frustrating. Eventually, mostly through luck, we reach the lake, often by different routes that get there about the same time. Once we’re at the lake, we argue whether it’s the right lake. The moral is that while searching for the lake we were all confused and going in the wrong directions about half the time. Eventually, we got there as a group by combining many people’s efforts. It’s hard to say who contributed what, since we’re all sure that we played the key role. It’s also not that important, because after relaxing in satisfaction for a while, we realize that this lake is just a small pond. We’ve made progress, but the big lake is somewhere higher up on the mountain, and it’s time to get to work looking for it. Almost all the projects we do, big or small, are a lot like hunting for the lake. We got there with lots of help — from the people we worked with, from other people working on that problem or related problems, and from the broad community whose knowledge we drew on. Moreover, the results are just part of a much bigger picture. In that spirit, I’d like to thank many people. The first is my wife, Carol. We’ve been a two-geologist family for 28 years, with all the fun and complications that poses. When we go to the same meetings, there’s the issue of leaving children. Since we live where “Ferris Beuhler’s Day Off”, “Home Alone”, and “Risky Business” were filmed you get the idea. There’s the problem of long absences. When Carol was gone twice for a month doing heat flow work off Costa Rica, I did the Mr. Mom stuff. I remember talking to a mother who said her family couldn’t function if she were gone overnight. There are the issues of talking to children. When we explained to our 3-year old son that the average old ocean basins were about a kilometer shallower than previously thought, he worried whether there was enough room for whales. On the other hand, our daughter is an avid rock climber, but doesn’t care where they came from. Next are my colleagues. In particular, over many years Donna Jurdy and Brad Sageman made our department a comfortable place. Emile Okal does the opposite — he makes life uncomfortable by coming up with several neat scientific problems a day that he wants to solve immediately. Since that’s more than even he can solve working 12-hour days, I get dragged into a few and fun results often emerge. A lot of one’s closest colleagues are students. I’ve been lucky to work — as an advisor or a coauthor — with great students: Doug Wiens, Joe Engeln, Paul Stoddard, Gary Acton, Charles DeMets, Don Argus, Paul Lundgren, George Helffrich, John Brodholt, Michael Wysession, John Weber, Thomas Shoberg, Lisa Leffler, John DeLaughter, Fred Marton, Phil Richardson, Andy Newman, Eryn Klosko, Alberto Lopez, Kim Schramm, James Hebden, Laura Swafford, and Carl Ebeling. They were fun, thought for themselves, and didn’t worry about conventional wisdom they heard from me or elsewhere. When they didn’t agree with me, I got responses like “I can’t believe you missed that” or “that’s stupid.” They were often right, of course. Then there are coauthors: a great part of science is working with and learning from so many smart people. As you get older the numbers grow — my records show 167 coauthors. I’d use up my time listing everyone, but thanks in particular to Bob Geller, Richard Gordon, Tetsuzo Seno, Sierd Cloetingh, Rinus Wortel, Tim Dixon, Steve Kirby, John Schneider, Giovanni Sella, Anke Friedrich, Mian Liu, and Eric Calais. I’d like to finish up with some thoughts about an issue many us have been mulling over. We do exciting science, but ofen don’t do as well communicating it to the public. There’s broad if diffuse interest in issues of the earth, energy and environment. For example, we had a window of public interest for almost two weeks between December 26, 2004, when the Indian ocean tsunami that killed more than 200,000 people dominated the news, until January 7 when Brad Pitt and Jennifer Aniston announced that they were splitting up. Still, on many important issues — natural hazards, global warming, natural resources, etc. — much of the public doesn’t appreciate concepts that we learned as undergraduates and teach our undergraduates. They certainly don’t appreciate that these are areas about which we still have lots to learn. For example, I read a piece in the Sierra Club Bulletin advising students about “green careers” and was amused that none of them involved science. I wrote a letter — which to be fair, they printed — pointing out that addressing environmental issues without science was like hiking without a map — it’s easy to get lost. The good news is that we’re trying hard to communicate our science in lots of ways. It’s different from talking among ourselves, as I’ve learned while doing things like IRIS/SSA lectures and now writing a general audience book. Still, it’s fun and I encourage anyone interested to try. We know how exciting and fun it is to work on problems that are both challenging and relevant to people’s lives, but the trick is to convey this to everyone else.
<urn:uuid:b8d20411-5be7-4814-a6e6-8fc85af81dc9>
CC-MAIN-2015-35
http://geosociety.org/awards/09speeches/woollard.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.961976
2,512
2.09375
2
Durendal, famous sword of Roland by Marto of Toledo Spain has a tempered steel blade, ornated with 24K Gold engravings on the upper part. Durendal is a sword from legends of Charlemagne. Ships in 3-10 days Warning: Last items in stock! Durendal, sword of Roland Sword of Roland by Marto of Toledo Spain has a tempered steel blade, ornated with 24K Gold engravings on the upper part. The 24K Gold plated cast metal hilt has the quillons, in the design of twin Lions heads, bended toward the blade with a heraldic shield and crest centered. The leaf-shaped pommel and is decorated with relief figures. Legend of Roland: As told in the Matter of France, Durendal is the name of the sword of Charlemagne's paladin Roland (Roldan). According to Ludovico Ariosto's Orlando Furioso it once belonged to Hector of Troy, and was given to Roland by Malagigi. In The Song of Roland, the sword is said to contain within its hilt one tooth of Saint Peter, blood of Saint Basil, hair of Saint Denis, and a piece of the raiment of the Blessed Virgin Mary. In the poem, during the Roncesvalles battle (August 15th 778) Charlemagne's troops, coming back from the siege of Saragossa, were ambushed by 100,000 Saracens helped by moors. Count Roland, fighting a loosing rear guard action for the Frank army, attempts to destroy the sword to prevent it from being captured by the ambushing Saradurcens and creates La Brčche de Roland, a pass on the Pirenees, in the process. But Durendal proves indestructible, so he hurls it into a poisoned stream instead. Local folklore claims Durendal still exists, preserved in Rocamadour, France. An inscription on Ogier the Dane's sword Curtana read "My name is Cortana, of the same steel and temper as Joyeuse and Durendal." Durendal, Sword of Roland features * Overall Length: 117 cms - 46 inches * Blade: Tempered AISI 440 Stainless Steel - 24K Gold etching * Handle: Zamak - 24K Gold plated * Famous sword of Roland Legendary medieval swords.
<urn:uuid:56643f60-b1f9-419c-8bf2-536d9002d3d5>
CC-MAIN-2015-35
http://getasword.com/legendary-swords/320-sword-of-roland.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.886722
515
2.34375
2
By Brad Salzmann, PA-C Even short periods of high temperature, humidity, or exertion can cause serious health problems. Heat-related illness and deaths are preventable, yet many people suffer serious health illness or death every year. The Centers for Disease Control and Prevention reported an average of 618 heat-related deaths per year in the United States from 1999-2010. Extreme heat is defined as temperatures that are substantially hotter and/or more humid than are typical for that location at that time of year. HOW MUCH HEAT IS TOO MUCH? There is no specific temperature or humidity level that must be obtained for heat-related illness or death to occur. The National Institute for Occupational Safety and Health, for example, reported a healthy 30-year-old landscaper died of heat stroke on a day that never went higher than 81 degrees. Heat-related illness and death rather occurs when heat pushes the body beyond its ability to compensate. The human body cools itself by sweating; the sweat brings heat to the surface where it evaporates. High humidity reduces the ability of sweat to evaporate. WHO IS AT MOST RISK? Body heat is produced two ways: internal (metabolic) heat is generated by physical exertion, and environmental heat is from high air temperature; humidity; direct sun exposure; heavy clothing; and lack of water, rest, and cooling. Anybody can succumb to heat. However, the elderly; very young; people with handicaps who are unable to take care of themselves or communicate; those with mental illness, cardiovascular, lung or other chronic diseases are at increased risk. Outdoor workers in agriculture, construction, logging, and firefighting are at increased risk, as well as those involved in exertional exercise outdoors. Statistically, 68 percent of heat-related deaths are male. There are some studies that predict risks will increase with climate change. Heat rash is a skin irritation caused by excessive sweating; it is most common in young children. Heat rash looks like a collection of pimples or small blisters, usually on the neck, chest, or in the groin and elbow creases. Treatment for heat rash is to provide a cooler, less humid environment; dusting powder may help. Heat cramps are caused by excessive sweating, which depletes the body of salt and fluid. Heat cramps are muscle pains or spasms, usually in the abdomen, arms, and legs. Heat cramps can be serious for those with heart disease or who are on a low-salt diet, and medical attention should be obtained. Otherwise, stop all activity, sit quietly in a cool place, drink clear juice or a sports beverage, and rest for several hours after cramps subside. If cramps do not subside within an hour, seek medical attention. Heat exhaustion is a body’s response to an excessive loss of fluid and salt. It can develop after several days of exposure and inadequate replacement of water and electrolytes. Symptoms of heat exhaustion include heavy sweating, paleness, muscle cramps, tiredness, weakness, dizziness, headache, nausea/vomiting, and fainting. Signs include cool, moist skin; rapid, shallow breathing; and a fast, weak pulse. The elderly and people with high blood pressure or who work or exercise in a hot environment are at higher risk. Treat heat exhaustion with cool (non-alcoholic) fluids, rest, cool shower/bath, air conditioning, and light-weight clothing. Heat stroke is a medical emergency; call 911 immediately. The body is unable to regulate its temperature, which can rise rapidly. The sweating mechanism fails and fatal temperatures can rise to 106 degrees or higher within minutes. Heat stroke can present with an extremely high body temperature; red, hot, dry skin (no sweating); rapid, strong pulse; throbbing headache; dizziness; nausea; confusion; unconsciousness; or seizures. Immediate cooling is necessary! Begin cool water immersion, shower, spray, sponging, wrapped in cool wet sheets, and vigorous fanning until emergency medical services are available. Do not give fluids by mouth. Sunburn can cause first or second-degree burns. Ultraviolet radiation (sun exposure) damages the cells of the skin. Protect skin from excessive exposure by seeking shade, especially during the midday hours; wearing lightweight clothing, hats, sunglasses with UVA and UVB protection; frequent application of sunblock (SPF 15 or higher); and avoiding indoor tanning. Skin cancer risk is increased with exposure to the sun. The three most common types are basal cell, squamous cell, and melanoma. Skin cancers can invade normal nearby tissue and sometimes spreads to other parts of the body. Prevention is the best treatment. Air conditioning is the number one protective factor for heat-related illness and death. Increase fluid levels during hot weather. Don’t wait until you are thirsty; thirst is a late indicator of dehydration. Don’t drink fluids with alcohol or large amounts of sugar. If you are not urinating every two to three hours or the urine is dark, then you need to drink more. Acclimation occurs over the course of several weeks and actually causes a body to sweat more efficiently. Minimizing exposure, staying well hydrated, frequent rests, protective clothing, and acclimation all reduce the risks of heat-related illness. Brad Salzmann is an orthopedics physician assistant at Gifford. He also has a master’s degree in disaster medicine and management, and serves as part of a national Disaster Medical Assistance Team based in Worcester, Mass.
<urn:uuid:95510c2c-6d74-4d28-a798-7ac26aaeb78b>
CC-MAIN-2015-35
http://giffordmed.org/blog/tag/skin-cancer/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.946912
1,151
3.421875
3
I am using the ArcGIS Explorer SDK and have run into an issue surrounding a query I would like to perform with SQL. I believe my query is built wrong or perhaps I am looking at the wrong fields. Would anyone have any input on my code below and/or possible solutions? I would like the code to query a column for specific values then return them into a combo box. My query simply returns a blank value at the moment. Below is the code for that block. Try Dim md As MapDisplay = ESRI.ArcGISExplorer.Application.Application.ActiveMapDisplay Dim map As Map = md.Map Dim cblayernameselect As MapItem = cblayername.SelectedItem Dim cbfieldnameselect As String = cbfieldname.SelectedItem Dim selitem As SelectedItemsCollection = ESRI.ArcGISExplorer.Application.Application.SelectedItems cbattribute.Items.Clear() selitem.Select(cblayernameselect) Dim child As PackageChildLayer = TryCast(ESRI.ArcGISExplorer.Application.Application.SelectedItems(0), PackageChildLayer) Dim layertable As Table = child.Table Dim cbcolumn As Column = layertable.Columns.Item(cbfieldnameselect) Dim whereclause As String = "SELECT " & cbcolumn.Name & " FROM " & layertable.Name Dim rows As RowCollection = layertable.Search(New Filter(whereclause)) For Each row In rows cbattribute.Items.Add(row) Next row Catch ex As Exception MsgBox(ex.Message) End Try
<urn:uuid:38324700-1556-4340-ada2-a0b8d060f682>
CC-MAIN-2015-35
http://gis.stackexchange.com/questions/22091/creating-sql-query-in-arcgis-explorer-sdk?answertab=active
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.803209
352
1.5
2
I have set pgrouting and inserted my data with osm2pgrouting . I would like to know how can I find out which way is one way. Also I read that if I assign the reverse_cost of an one way to -1 only the this road is considered as one way, is it true? http://www.webrian.ch/2011/07/set-up-pgrouting-with-openstreetmap.html describes one possible solution. The challenge is that osm2pgrouting does not import one-way information. The author uses GRASS to find one-ways from the data. This solution sets reverse_cost to -1 to mark one-ways. In pgRoutingDocs there is "How to handle one-way streets" The idea there is to set the cost against the one-way direction very high (instead of -1). Note: Only if the reverse parameter is set to true, the algorithms will use the reverse_cost field. Osm2po, another OSM import tool, handles one-way information better. reverse_cost fields are filled automatically (to a very high value). Thank you for the answer, but I think that something might be wrong: The osm2pgrouting code (Export2DB.cpp, called by osm2pgrouting.cpp) writes : but after exporting france.osm I notice that So I guess that the condition (way->oneway) is not precise enough... But "I might be wrong"! => Hell I did not send that answer?! In the meantime I forked and modified the osm2pgrouting git repo. for it to consider the "oneway" tag values "true", "1" and "yes"... Maybe some more modifications are to come : the osm wiki states something like 'some ways, like motorways, are automatically considered as oneway edges'. Still, this statement can be taken into account afterwards with a single sql command... HF!
<urn:uuid:0f8bc130-562e-4589-ac5a-cfbd4d22743d>
CC-MAIN-2015-35
http://gis.stackexchange.com/questions/26646/how-can-i-identify-oneways-at-pgrouting
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.92333
424
2.15625
2
The Bay Bridge is falling down, falling down, so that a bigger, better bridge—one less prone to falling down during an earthquake—can be erected in its place. If two architects get their way however, it might become this: "Imagine housing, recreational and cultural facilities connected to a continuous, lushly planted, green strip, floating above the water-an aerial garden, as the city's newest park through which you could walk and wander and enjoy the most spectacular views of the bay," reads an excerpt from the proposal by architects Ronald Rael and Virginia San Fratello. The image here depicts a "tennis court, bicycle path, and observation module." This image is an outdoor auditorium. This final image shows off the Bay Bridge's deadly suspended swimming pool and some living/recreational quarters, as well as the green grass that would line the length of the "unwanted" bridge. One "little" caveat: In the event of a major earthquake, the Bay Bridge would probably survive, but as a result of the catastrophe would be unusable thereafter, rending all of these additions worthless. This is precisely why the idea is all but certain to be rejected (at least for this bridge, in this area, anyway). [BLDG Blog]
<urn:uuid:8d566b0e-8c43-4e4b-b47a-fad988e6d769>
CC-MAIN-2015-35
http://gizmodo.com/5363512/bay-area-architects-seek-to-re-purpose-bay-bridge-as-park-apartments/?tag=parks
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.964331
262
2.25
2
Google's not content with being just an online digital locker for your music, it wants you buy MP3s from it, too. A New York Times report suggests Google is looking to open an online MP3 store and is negotiating with the record labels to secure the necessary licensing agreements. Google currently has an online music service, Music Beta, that serves as an online digital locker. You can upload your music library and access it remotely, but you can't purchase new music through the service. This limitation puts Google at a distinct disadvantage when compared to its competition. And there's a lot of competition. Services like Rdio and Spotify offer subscriptions that'll let you stream music across a variety of devices. iTunes will match your music and sync it through iCloud. And then there's Amazon's Cloud Music which lets you upload and stream your personal library. You can also add tracks by purchasing them from Amazon's Mp3 store, but there is no all-you-can-eat subscription. According to the NYT report, Google's gunning for Amazon, but it has to improve its bargaining skills. The company pursued similar negotiations with the music industry earlier this year, but the parties failed to reach an agreement. If Google can secure the licensing agreements this time around, it could give Amazon and the others a run for their money. [NYT]
<urn:uuid:c13f395c-6e5e-41f2-9590-d2b048023f5f>
CC-MAIN-2015-35
http://gizmodo.com/5849725/googles-negotiating-its-way-into-an-online-mp3-store
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.962184
273
1.5
2
If you're buying a new computer and it comes with a mouse you're probably looking at a shitty machine bundled with a relic. The age of the mouse is over. Anyone pushing them with new computers is selling crap. I'm so tired of mice. I've gotten used to touchscreens, and trackpads, and now whenever I have to use a simple pointer, I feel like I've traveled back in time. I almost expect all my icons to go 8-bit. And for years now, they've just been awful. When was the last time you really loved a mouse? When was the last time you were like, "damn, this is a great mouse and I enjoy using it?" Odds are, if you have had that experience in the last five years, it's been with a mouse that does a lot more than simple mousing. It probably had a touchpad on its top, or a gyroscope inside of it, or other way to manipulate data in a non-linear, two-dimensional fashion. In other words, it was probably much more than a mouse. We're getting trained by our phones and our tablets do do more and more with our hands. Some of those mobile gestures are making their way to the desktop—think of the way you can pinch to zoom on a trackpad now. And as we become more and more accustomed gestures, mice, and the single-point, two-dimensional actions they demand, make less and less sense. They feel constraining. Limiting. And that's because they're outdated. If the mouse were an automobile, it would qualify for collecter car plates. Douglas Englebart created a mouse prototype in 1963, and then showed it off to the world in 1968 at the now-famous Mother of all Demos. The Macintosh took it mainstream in 1984, and for nearly 30 years now it's been giving us all a way to move a curser around the screen and select. And little more. Today at any given time we may be running 20 apps at once, with a dozen or more browser windows open, while trying to sort through more data in a few seconds than an early Cray supercomputer saw over the course of its lifetime. And yet we still use tools designed for a simpler time, with simpler needs. And the thing is, the thing we've all been waiting for, the thing that's going to make us work faster, and more efficiently and be less prone to repetitive stress injuries and wrist strain and just plain old frustration—that thing is already here. It's gesture-based computing, and your operating system already supports it. Gesture-based computing gives us far more precision and control over the interface. We can manipulate not just points but entire screens. We can perform complex actions that once required keyboard shortcuts, with just our fingertips. Combining one movement with another lets us do things that the mouse's limited range of motion could not—at least not without throwing a staggering numbers of buttons into the mix. Apple, as usual, is ahead of the curve on this. The touchpads in its laptops, combined with the gestures built into Lion and Mountain Lion let us perform all sorts of tasks with a few simple swipes. The Magic Trackpad is taking this action to the desktop. And the lone mouse that it does sell, the Magic Mouse, is essentially a multi-touch device that also does mouse things. It's not something lost on other hardware makers. All the smart ones are already moving past the mouse. When Vizio showed off its new line of stunning all-in-ones at CES this year, for example, there was a gorgeous keyboard and trackpad, and even a remote, but nary a mouse in sight. But if Apple is ahead of the curve, Microsoft is already around the bend. While Windows 7 supports some gestures, Windows 8 takes it to an entirely other level. It's going to make touchscreen computing a reality. But you don't even have to wait for that to ship to see Microsoft's real mouse-killer: Kinect. The Kinect is the most revolutionary input device on the (mainstream) market. It's transformative, as a legion of hackers show day after unexpected day. It's the first mainstream device that's lets us manipulate data in three dimensions with just our bodies. It is the gateway drug to an era where the input device is simply something in the background, an unobserved and unblinking eye that captures everything without being noticed itself. It's no coincidence that the Kinect came out of gaming. If you want to see the future of how we'll work, it's already out there in the present of how we play. The gaming industry's devices for play have the capability to completely alter the way we work. Gamers often have the need to perform many complex actions simultaneously. And the industry has responded to that with all manner of input devices, many of which are single function, while others may use your entire body. It's made for an industry that's not only open to experimenting with interaction, but that recognizes this experimentation can be a selling point in itself. It's why the PC with the most innovative multitouch trackpad on the market today came out of the gaming industry. There is one place mice still rule: first person shooters. Thanks to their precision and speed, mice are still beloved tools for FPS aficionados, and a handful of other tasks as well. Yet that doesn't make them right for everyone, or even most people, in most situations. I mean, if I want to rope a steer, I'm still going to want to be on horse. But that doesn't mean I want to commute to work on one. Giddyup.
<urn:uuid:cb7adc15-f202-4b5b-b62e-ec8693cfc940>
CC-MAIN-2015-35
http://gizmodo.com/5886574/its-time-to-exterminate-the-mouse?tag=kinect
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.970058
1,176
1.789063
2
A team of Stanford scientists has revealed that it plans to sit Stephen Hawking down in a room, place a device on his head, and literally hack his brain to work out what's going on in there. The scientists, who have developed a tool called the iBrain (hey, imaginative!), will do this, on-stage, at a conference in Cambridge, UK, next month. Philip Low, a professor at Stanford and inventor of the iBrain, explains to the Telegraph: "This is very exciting for us because it allows us to have a window into the brain. We're building technology that will allow humanity to have access to the human brain for the first time... We'd like to find a way to bypass [Stephen's] body, pretty much hack his brain.". Hawking suffers from motor neurone disease and lost the power of speech nearly 30 years ago. The plan is to use the technology to recognise his high-level brain activity—which is presumably higher-level than most—in order to understand it and convert it into speech and movement. While such technology has been in development for a long time, it's worked with mixed results. For it to be at a stage where Stephen Hawking is willing to sit on a stage to demonstrate its abilities—well, that could signal that something quite special is about to happen. [Telegraph] Image by Associated Press/Lawrence Jackson
<urn:uuid:4d6bd2d8-9b76-4319-a501-270f3d9832c5>
CC-MAIN-2015-35
http://gizmodo.com/5920989/scientists-plan-to-hack-stephen-hawkings-brain?tag=stephen-hawking
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.974337
286
2.921875
3
Knot theory hasn't been the only unexpected math to pop up during DNA research. Scientists have used Venn diagrams to study DNA, and the Heisenberg uncertainty principle. The architecture of DNA shows traces of the "golden ratio" of length to width found in classical edifices like the Parthenon. Geometry enthusiasts have twisted DNA into möbius strips and constructed the five Platonic solids. Cell biologists now realize that, to even fit inside the nucleus, long, stringy DNA must fold and refold itself into a fractal pattern of loops within loops within loops, a pattern where it becomes nearly impossible to tell what scale - nano-, micro-, or millimeter - you're looking at. DNA has especially intimate ties to an oddball piece of math called Zipf's law, a phenomenon first discovered by a linguist. George Kingsley Zipf came from solid German stock—his family had run breweries in Germany—and he eventually became a professor of German at Harvard university. A colleague once described Zipf as someone "who would take roses apart to count their petals," and Zipf treated literature no differently. As a young scholar Zipf tackled James Joyce's Ulysses, and the main thing he got out of it was that it contained 29,899 different words, and 260,430 words total. From there Zipf dissected Beowulf, Homer, Chinese texts, and the Oeuvre of the Roman playwright Plautus. By counting the words in each work, he discovered Zipf's law. It says that the most common word in a language appears roughly twice as often as the second most common word, roughly three times as often as the third most, a hundred times as often as the hundredth most, etc. In English, "the" accounts for seven percent of words, "of" about half that, "and" a third of that, all way down to obscurities like grawlix or boustrophedon. These distributions hold just as true for Sanskrit, Etruscan, Hieroglyphics, Spanish, or Russian. Even when people make up languages, something like Zipf's law emerges. After Zipf died in 1950, scholars found evidence of his law in an astonishing variety of other places—in music, city population ranks, income distributions, mass extinctions, earthquake magnitudes, the ratios of different colors in paintings and cartoons, and more. Probably inevitably, the theory's sudden popularity led to a backlash, especially among linguists, who questioned what Zipf's law even meant, if anything. Still, many scientists defend Zipf's law because it feels correct—the frequency of words doesn't seem random—and, empirically, it does describe languages in uncannily accurate ways. Even the "language" of DNA. Of course, it's not apparent at first that DNA is Zipfian, especially to speakers of Western languages. Unlike most languages DNA doesn't have obvious spaces to distinguish each word. It's more like those ancient texts with no breaks or pauses or punctuation of any kind, just relentless strings of letters. You might think that the A-C-G-T triplets that code for amino acids could function as "words," but their individual frequencies don't look Zipfian. To find Zipf, scientists had to look at groups of triplets instead, and a few turned to an unlikely source for help: Chinese search engines. The Chinese language creates compound words by linking adjacent symbols. So if a Chinese text reads ABCD, search engines might examine a sliding "window" to find meaningful chunks, first AB, BC, and CD, then ABC and BCD. Using a sliding window proved a good strategy for finding meaningful chunks in DNA, too. The expression of DNA, the translation into proteins, also obeys Zipf's law. Like common words, a few genes in every cell get expressed time and time again, while most genes hardly ever come up in conversion. Over the ages cells have learned to rely on these common proteins more and more, and the most common one generally appears twice and thrice and quatrice as often as the next-most-common proteins. So if DNA shows Zipfian tendencies, too, is DNA arranged into a musical score of sorts? Musicians have in fact translated the A-C-G-T sequence of serotonin, a brain chemical, into little ditties by assigning the four DNA letters to the notes A, C, G, and, E. Other musicians have composed DNA melodies by assigning harmonious notes to the amino acids that popped up most often, and found that this produced more complex and euphonious sounds. Something even more interesting happened when two scientists, instead of turning DNA into music, inverted the process and translated the notes from a Chopin nocturne into DNA. They discovered a sequence "strikingly similar" to part of the gene for RNA polymerase. This polymerase, a protein universal throughout life, is what builds RNA from DNA. Which means, if you look closer, that the nocturne actually encodes an entire life cycle. Consider: Polymerase uses DNA to build RNA. RNA in turn builds complicated proteins. These proteins in turn build cells, which in turn build people, like Chopin. He in turn composed harmonious music —which completed the cycle by encoding the DNA to build polymerase. Musicology recapitulates ontology. Humans have long wanted to link music to deeper, grander themes in nature. most notably astronomers from ancient Greece right through to Kepler believed that, as the planets ran their course through the heavens, they created an achingly beautiful musica universalis, a hymn in praise of Creation. It turns out that universal music does exist, only it's closer than we ever imagined, in our DNA.
<urn:uuid:ba04efc9-0aff-4e11-bf4e-893a667b2ada>
CC-MAIN-2015-35
http://gizmodo.com/5925634/why-the-knotted-language-of-dna-sounds-like-music?tag=Dna
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.95844
1,203
3.921875
4
we wish we'd understood when we first learned about gluten and celiac disease. 1) There are researched points of view with a wider scope than the celiac story. These concepts were not obvious to us as new inquirers, but some of them fit our situation and the overall gluten syndrome community like a glove. 2) Some researchers believe gluten most often damages other tissues, organs, nerves or even nerves in the gut, beside the villi, meaning NOT NECESSARILY including the villi. In these cases villi biopsy is negative. Some researchers, professionals and patients find there are many serious manifestations of The Gluten Syndrome other than "villi damaged celiac disease" and IgE "wheat allergy". Damage is believed in many cases to focus in other organs or systems beside, meaning not necessarily including, intestinal villi, Therefore villi biopsy may be negative but damage may be to other tissues, organs, nerves, These researchers believe the mere presence of gluten related antibodies indicate the immune system has reacted to gluten and the gluten free diet is recommended. They also say cellular mimicry between the gluten related antibodies and many innocent body tissues is often the mechanism of damage. (This means the body tissues "look like" gluten enough to attract and bind with the gluten related antibodies which in turns attracts killer cells to that tissue and instigates autoimmune damage.) See 3) Published literature proposes that many gluten syndrome patients do NOT have elevated tTG (a commonly used screener), AND there are many significant gluten related antibodies that are not checked in today's standard tests, including gluten itself. More... 4) Some researchers say other foods may cross react with gluten Practitioners suspect these other cross reactive foods may keep gluten antibodies running high even on a strict gluten free diet, or they may react on their own and produce symptoms similar to the gluten free diet. Foods believed to cross react include wheat, barley, rye, corn, soy, milk, eggs, yeast, coffee, sesame and chocolate, and in some cases, oats. Even some non gluten grain substitutes may rarely trigger reactions in a few people, including buckwheat, quinoa and millet. "Leaky gut" are thought to play a role in the gluten syndrome and multiple food sensitivities. *Zonulin is a chemical discovered by a medical team headed by Dr. Alesio Fasano which regulates permeability of the gut wall and also the blood brain barrier. 5) A gluten challenge for "villi damaged celiac" subset diagnosis may be futile and risky even if the patient already knows gluten gives him problems. More... gluten challenge often does NOT provide the "celiac disease subset" diagnosis that the patient confidently expects, even if he has previously experienced dramatic improvement on the gluten free diet. including severe depression and psychiatric symptoms appear to have been associated with some gluten challenges. Many patients report gluten challenges to be "miserable" or "horrible" experiences even though standard celiac testing/biopsy at the conclusion is negative. Such patients might have shown up positive in testing if a more sensitive, or detailed test panel had been used, they may have antibodies for which no tests have yet been developed, or tissue or function damage in places other than intestinal villi. If symptoms present, many patients choose to listen to their own bodies' message and are thankful the body was able to tell them something is not right, even in the face of inadequate negative testing. 6) Indiscriminate, repeated gluten indiscretions may eventually cause serious physical and neurological damage/psychiatric symptoms and study indicates higher mortality rates. More... cheating patterns" on the gluten free diet, i.e., consistant occasional consumption of gluten on an otherwise gluten free diet, (pizza, birthday cake, croutons), may immediately or eventually trigger stronger physical or neurological/depression/psychiatric reactions than were experienced before the patient began the gluten free 7. Some researchers and professionals believe the brain and nervous system are particularly susceptible to gluten damage and that nerves may be silenced by this damage. More... Dr. Rodney Ford of New Zealand points out that if the nerves in an organ or system are damaged in some cases there may be little discomfort or few symptoms until there is serious dysfunction or organ failure. The very nerves that give warning are themselves damaged/silenced. But slowly dysfunctional nerves in an organ, for instance, affect the health and function of that organ or system. This phenomenon of silenced nerves may be partly why many folks who still think they are fine discover they have the gluten syndrome only after a relative is diagnosed. Dr. Ford cites a case in his practice of an encopretic school aged child (the child experienced soiling accidents long past potty training age). After the gluten free diet was introduced, this distressing problem resolved. The nerves in that section of the digestive tract healed and the child knew when it was time to visit the toilet. 8. Rarely a patient may experience temporary symptoms that resemble "withdrawal" near the start of a gluten free diet. More... This reaction is very uncommon, but a few patients (adults) have experienced depression or crying spells at the start of the gluten free diet, or shortly into the diet (often around 14 days to a month). The reaction has been severe in a few cases. In the case of children, behavior may significantly worsen for a time. This reaction is more frequently seen in autism circles. Firsthand accounts indicate that this appears to resolve eventually and the patient usually does well once this initial reaction is over. It is speculated that the "withdrawal" type symptoms are due to the removal of certain types of gluten or milk "pieces" that have an drug like "opiod" structure, similar to opiates. They affect the brain in such a way that their removal triggers an apparently temporary reaction that resembles drug or alcohol withdrawal. The pieces of gluten (or milk) are gluteomorphins (or sometimes called gliadorphins) and casomorphins (milk). Speculation regarding reduced blood flow when gluten is consumed and increased "normalized" blood flow when gluten is removed is another phenomenon some professionals suggest. It is known that in some situations such as hypothermia or heart events, tissue damage may be inflicted when previously constricted blood flow returns to normal. At this time there are no researched answers. This phenomenon is not well known or well studied. There is one such reaction in which a senior in frail health unsuccessfully attempted suicide. The patient continued the diet and once the reaction abated, the patient improved dramatically compared to his condition before the diet was implemented. Another case is on record in which a number of factors muddy the picture somewhat. A positive patient removed several foods that are cross reactive with gluten. months later she also removed gluten. At some point she also discontinued an antidepressant possibly too quickly. A month after going gluten free, in the autumn, a crying spell reaction occurred which also coincided with the seasonal affective disorder season. Two weeks into the the crying spell the patient resumed daily consumption of gluten and attempted to control the situation with medications. The patient's already fragile mental and emotional condition appeared to dramatically worsen after gluten was reintroduced. After a number of weeks of trials of various medications, she stabilized somewhat and over several more months gradually improved enough to able to ease back into her job. However she continues to cycle periodically and is now diagnosed with bipolar illness. This website encourages further research on this rare phenomenon and how to manage it. Other reactions may occur if diabetic routines, thyroid medications or other treatments need adjustment once the gluten free diet is established. Professional care from practitioners who understand the gluten syndrome is strongly advised in these While these reactions are quite rare, this website is looking for firsthand accounts of significant adverse reactions to the gluten free diet, both initial reactions and gluten challenge or serious "cheating " reactions in order to present the information to the research community. Email firstname.lastname@example.org or call 630-628-9126. A collection of these reactions is found on the Adverse Reaction page of this site. Here are links to several searches of forum posts , The Standard American Processed Gluten Free Diet often NOT a magic bullet in the long run. More... The standard gluten free diet alone is often NOT a magic bullet in the long run over several years, BUT it often appears to be an excellent, necessary, and permanent first aid step toward building better health. This diet style uses a lot of gluten free substitutes that in themselves are still junk food, and best used sparingly for According to some researchers, the underlying cause of gluten syndrome usually focuses on barriers that are not holding together well, such as the gut wall, blood brain barrier, and others. This allows molecular substances such as undigested gluten to slip into places they should not be and cause trouble all over the body. It is crucial to heal these body barriers with unprocessed, properly raised nutrient dense foods and extra nutrition, and avoid toxins that contribute to body barrier tissue deterioration and other deficiency issues. This addresses the deeper causes of gluten syndrome and possible development of multiple food sensitivities and their unhappy consequences. See Dr. Vojdani's audio talk on "The Role of Mucosal Immunity in Complex Diseases", also on Medical Diagrams page. Also often the immune system is thought to be in a hypersensitive mode and needs to be "quieted down" so it does not overreact to normal life exposures. For more info Dr. Thomas O'Bryan's audio download above is a helpful resource and his audio Secrets of Gluten Sensitivity. Also his latest audio which is posted on www.thedr.com along with other vital More details and references here for "9 Crucial Points we wish we had understood". Best Gluten Syndrome Resources and Updates These resources are particularly important for negative celiac testers and persons investigating gluten reactivity, now aptly named "The Gluten Syndrome". These are the resources a wider perspective of the gluten syndrome beyond "villi This website has no financial interest in the products and services featured anywhere on Landmark Online Gluten Summit 29 Expert Scientists, Practitioners, all interviewed by Dr. Thomas O'Bryan DC, CCN, November 11 - 17, 2013 This is an awesome, FREE opportunity to learn cutting edge information on the wider perspective of the gluten syndrome beyond celiac disease (includes the celiac disease This FREE Gluten Summit moderated by Dr. Thomas O'Bryan starts November 11 - 17. Dr. O'Bryan has presented countless research reviews of the medical literature published in respected journals. He has crisscrossed the country, not only here in the US, but internationally, over the past 5 years, training practitioners and speaking to many support groups. He is the ideal choice to interview this impressive lineup of researchers, scientists, practitioners, nutritionists, etc. If you have wondered what the big deal is with gluten, or if possibly you or someone you know have challenges with gluten to investigate, or you have received a negative gluten test but question it (they are very often false negative), or you need help implementing this life change, then this is the summit to tap into to get the latest scoop. And it's FREE. This could save your life or mind or the life or mind of someone you See you at this FREE summit. Note: In the very first exception ever, clicking the above links may contribute in a small way to the support of this family funded website. Funding issues in no way influence our hearty support of this event and trust it will bless your family. They offer detailed gluten related antibody panels, intestinal permeability panels and cross reactive foods panels. More information and details January, 2010 - Dr Thomas O'Bryan talk - "Inflammation" with intro by Sueson Vess on "Cancer and Sugar" Given for the Wheaton, IL Gluten Free Support Group. If you are having problems cutting out sugar Sueson will set you on the "straight and narrow". Sueson pulled no punches, and Dr. O'Bryan followed up with why. No and Cancer" mp3 "Sugar and Cancer" wav Note on sugar honey, (ie not above about 93 degrees, as opposed to the "raw" standard, 160 degrees), used in moderation, provides many beneficial and even medicinal properties. However, some folks with yeast overgrowth limit or avoid even unheated honey until the overgrowth clears. (Some researchers theorize that heavy metals may trigger yeast overgrowth.) September 19, 2009 - Latest O'Bryan audio with Dr. John Wycoff June 13, 2009 DC, CCN, DABCN audio Secrets of Gluten Sensitivity (Click to download MP3) 110 minute update was given November 21, 2008 to a support group in Minneapolis, Minnesota. Thanks to Greg Petersen (Nutrition Dynamics www.nut-dyn.com) for recording For the best understanding of this talk, access to the presentation slides is recommended. Many of the these slides are shown on the "Unlocking the Mystery of Wheat and Gluten Sensitivity. This basic DVD is highly recommended as well worth the $24 price, in addition to the audio downloads above which is are excellent updates of the DVD. reviews and updates are required for proper understanding of the significance of the gluten syndrome. The DVD is also a good visual foundation for spouses and friends. (Correction: Kamut is a member of the wheat family and NOT OK on a gluten free diet. The saliva test mentioned is not yet available. Note: ANY negative gluten antibody test is always inconclusive as there are many gluten related antibodies now in the process of discovery than there are tests developed at this website has no financial interest in ANY product or service mentioned on this site. - New book, new DVD, and new O'Bryan speaking schedule The Gluten Effect by Drs. Richard and Vikki Petersen HealthNow Medical Center practitioners perceive the Gluten Syndrome in a wider sense, far beyond the celiac perspective. They meet the gluten syndrome community realistically, and explain in simple terms the sinister interplay of the gluten effect on astonishing number of body tissues and systems. Petersens clarify important nutritional issues, and help the reader transition into the gluten free diet. Their teaching is personalized with real life stories of HealthNow patient recoveries from a myriad of gluten related maladies. This book uncovers in detail many unsuspected, and ominous aspects of a food we took for granted as the "staff of life" and is one of the most progressive gluten syndrome resources available today. The Gluten Effect will illuminate a path to better health for countless patients who grapple with chronic and perplexing health challenges. Order here www.thegluteneffect.com DVD available - 2008 Higher Truth of Health Conference by Dr. Ken Fine, Enterolab. This is the April 2008 Taos, New Mexico conference. Speakers include latest research from Dr. Ken Fine, Dr. Rodney Ford, Dr. Ron Hoggan, and many others. Order by phone, 972-686-6869 Dr. O'Bryan speaking schedules for professionals and patients- 2009 Nutrigenomic Therapies for Autoimmune Disease AND OTHER TOPICS This day seminar covers food allergies, sensitivities, genetics & autoimmunity. miss it! Patients get your practitioner to attend! Patients - Dr. O'Bryan often speaks to local support groups the evening before his lecture to professionals. Be sure to engage him for your local group. Topic for this year: Why Don't I Feel Better on a Gluten Free Diet? January, 2009 - New book and new New Book! - A New Understanding of Non Celiac Gluten Dr. Stephen Wangen, The Gluten-Free Doctor, also author of Bowel Syndrome Solution This heavily referenced handbook is a welcome support for patients suffering the many silent and subtle or overt and often debilitating effects of the gluten syndrome. Dr. Wangen is one of very few courageous authors who recognize and present the gluten syndrome in it's wider referenced context, beyond the celiac subset. Additionally he offers treatment suggestions for complications beyond the gluten free diet, and includes helpful food and vendor lists, disease lists, and other informational resources. Healthier Without Wheat is a gift to the gluten syndrome community which will positively redirect many confused and suffering non celiac gluten syndrome patients back to the help they seek in the face of false negative tests. New Audio - Dr. Thomas O'Bryan, DC, CCN DACBN, Click to download "Why Don't I feel Better on a Gluten Free diet?"* Approx: 90 min - includes Sueson Vess intro January, 2009, Wheaton, IL Patients with the gluten syndrome may have years of malnutrition and damage to address. The disease process may have taken on a "life of it's own" beyond treatment with the gluten free diet only. Dr. Tom tackles these issues and practical steps toward rebuilding health. 30% of biopsy diagnosed celiacs need more than the the gluten free diet before they improve. November, 2008 - New saliva home screener - 96% sensitive for 4 antibodies - $125 This test is temporarily unavailable! Coming back soon. This saliva test checks Deamidated Gliadin (AGA) - IgA, IgM tTG - IgA, IgM Includes script from Dr. O'Bryan 96% sensitivity means that this inexpensive test will pick up 96 out of 100 patients who have antigliadin or tTG antibodies. NOTE: Some patients may have other gluten related antibodies such as gluteomorphins or other glutenins, but NOT gliadin or tTG. Therefore as with all other antibody tests, a positive is definitive, a negative is necessarily inconclusive for the gluten This test was developed by Dr. Aristo Vojdani, Immunosciences Laboratories, CA (A Patients - contact Dr. Thomas (test includes script) page or bottom of page for contact instructions. This website has no financial interest in products or services mentioned here. - Fall seminar schedule for healthcare practitioners, Unlocking the Secrets of Gluten Sensitivity by Dr. Thomas 8 hour day seminar for healthcare practitioners November 1, 2008 Seattle, November 2, 2008 Long Beach, California November 8, 2008 New York, NY November 9, 2008 November 16, 2008 November 22, 2008 December 6, 2008 Hide: 8 hour day seminar for healthcare practitioners 2 hour seminar for patients (free 110 minute audio reviews and updates are required for perspective of the significance of the gluten syndrome. This audio is featured above under June 13 also. (Correction: kamut is a member of the wheat family and NOT OK on a gluten free diet. Saliva test mentioned is not yet available. Note: ANY negative gluten antibody test is inconclusive as there are many gluten related antibodies now in the process of discovery than there are tests developed at this Dr. Thomas O'Bryan DON'T MISS THIS - IT WILL CHANGE YOUR Sponsored by Metagenics, this vital and popular day seminar for healthcare practitioners is a startling gluten syndrome research review. It contains incredible, vital and little known research and information and will put you on the cutting edge. This information fits the patient community like a glove. Both of these seminars are worth the drive for both patients and JUNE, 2008 - New audio presentation and research articles by Dr. Aristo Vojdani, Los Angeles, CA The Role of Mucosal Immunity in Complex Presented at the Pan American Allergy Woodlands, Texas, March, 2008 Dr. Vojdani discusses the role of mucosal barriers in The Gluten Syndrome and related food reactivities. He also explains the consequences of cooking and processing on these foods and our reactions to them. New Research Articles The Immunology of Immediate and Delayed Hypersensitivity to Gluten - Aristo Vojdani, PH.D, M.T., Thomas O'Bryan, D.C., C.C.N., DACBN. European Journal of Inflammation, Full text here The Immunology of Gluten Sensitivity Beyond the Intestinal Tract - Aristo Vojdani, PH.D, M.T., Thomas O'Bryan, D.C., C.C.N., DACBN Full text here JANUARY, 2008 - Health Institute Conference, Taos, New Mexico, April 3-6, 2008 Kenneth Fine, owner of Enterolab, Dallas, Texas, and other speakers including Dr. Ron Hoggan, Educator, and Dr. Rodney Ford, Australia, bring their collective wisdom and important, highly relevant research reports to this informative and entertaining event. Don't miss it! A Health Conference to Educate, Entertain, and Enlighten You NEW DVD! Relevant, worthwhile! Smarten Up! by Ron Hoggan, ED D Dangerous Grains by Dr. James Braly, MD and Ron Hoggan, Ed D is a 3 lecture compilation presented to teachers at educational conferences in Canada. Ron explains the neurology of the gluten syndrome and it's impact on children and adults. The referenced information is very helpful and in tune with research by Dr. Mario Hadjivassiliou and Dr. Aristo Vojdani Dr. James Braly, MD and Ron Hoggan also wrote Dangerous Grains, the book that pioneered the concept that gluten affects far more than the gut, most particularly the brain and nervous system. Ron Hoggan is an educator and has the gluten Grains and Smarten Up are available from Book - The Gluten Connection by Shari Lieberman, PhD., CNS, FACN The Gluten Connection is a forward thinking treatment of gluten reactivity and brings the wider scope of "the gluten connection" into sharper focus. Shari addresses the non celiac gluten syndrome phenomenon head on and her treatment of the issues fits the gluten reactive community. This referenced book lays out the basics of "the gluten connection", many related diseases including neurological disorders, pets and gluten, and the business of adjusting to a new lifestyle, going gluten free. A generous section of recipes are included to set the newbie on a delicious path to better health. This perspective of the gluten syndrome meshes well with information presented by Dr. Aristo Vojdani, Dr. Thomas O'Bryan, Dr. Ken Fine, Ron Hoggan and Mario Hadjivassiliou. www.glutenfreemall.com and www.amazon.com Animations of tight junctions and the role of zonulin in intestinal wall cells. This process is sometimes referred to as "leaky gut" and is thought to be involved in a number of adverse health conditions including allergies and intolerances. These animations describe the process shown in the Medical Diagrams mentioned below. Special thanks to Alba Therapeutics for these animations. Diagrams with audio presentation "Dietary Proteins and Peptides from Gastrointestinal to Neuroautoimmune Disorders" Presented March , 2007, Pan American Allergy Society Vojdani Ph.D., M.T.- Immunosciences Laboratories, Beverly Hills, CA Dr. Vojdani explains his diagrams of celiac disease, gluten intolerance and gluten sensitivity and compares them to the normal healthy gut. He also discusses his highly detailed Celiac Neuroautoimmune Test panel, (available Neuroimmunology Labs, WI), which includes the additional antibodies discussed below in the next link. This is the same panel mentioned in the DVD "Unlocking the Mystery of Wheat and Gluten Intolerance". These diagrams and audio presentation may be downloaded for use at Dr. visits and other educational purposes. antibody tests & tests beyond the villi biopsy. These include gluteomorphins, wheat (the whole kernel), tests for all gluten related antibodies, plus cross reactive food antibody tests, and target organ damage More antibody tests and other tests for gluten reactivity Some researchers identify additional gluten reactivity antibodies* and related markers not included in most standard celiac blood tests. This may explain why some patients receive negative standard tests that they question. This highly detailed test panel is available from Neuroimmunology Labs, Wisconsin. It is featured in the "lab charts" list on Medical Diagrams pages of this These additional tests are blood tests. The antibodies and markers are noted in published Additional gluten reactivity antibodies and other markers Stool antibody & general intestinal function gluten reactivity genes More genes for announced prior to publishing studies that they identify additional HLA DQ genes for non celiac gluten sensitivity than the usual HLA DQ 2 and 8 These HLA 1 and 3 genes and their subsets are also mentioned in published More genes for gluten reactivity Details and references? See "4 Crucial Points Explanation and References" and the page, both also found on the next page. Crucial current gluten reactivity research overviews Intestinal Health and Beyond Conference Fine, MD - March 2006 Enterolab stool testing research announcement with additional speakers and features. A long awaited perspective sought by the gluten sensitive community. Associated tests are without Dr. script. Unlocking the Mystery of Wheat and Gluten Dr. Thomas O'Bryan, DC, CCN, DABCN, Naperville, Il (Chicago area) professional chef - June 17, 2006 seminar. This heavily referenced, easy to follow overview is crucial to an understanding of the scope and severity of gluten sensitivity. DVD available at: website has no financial interest in products or services mentioned on
<urn:uuid:cacaa34e-f36e-42b3-bca8-6efb4349723a>
CC-MAIN-2015-35
http://glutenreactivity.com/
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644059455.0/warc/CC-MAIN-20150827025419-00000-ip-10-171-96-226.ec2.internal.warc.gz
en
0.893586
5,874
3.0625
3